What does a director of fraud and identity do?


One can find many articles about the responsibilities of system administrators, computer crime investigators, incident responders, disaster recovery managers, directors of security, application penetration testers and other information security specialists. However, there is little information about the responsibilities of directors of fraud and identity.

The purpose of this article is to outline the major tasks of directors of fraud and identity. The tasks can be grouped in four categories: collecting and processing customer feedback; following global trends in the fraud and identity field; working with other departments of the organization to ensure that the services provided by the organization are safe and reliable; and communicating with senior managers and executives with regard to fraud and identity-related issues. 

In this article, we’ll examine each of these four categories in detail.

Collecting and processing customer feedback

Every year, more than one million consumers become victims of fraud and more than 250,000 become victims of identity theft. Each victim has their own story to tell. If the feedback collected by victims of fraud and identity theft is recorded, analyzed and visualized correctly, it will provide the organization concerned with a clear guidance on how to make their products and services safer. 

Without implementing customer feedback, organizations will likely lose many customers. It is worth mentioning that the lack of visible security is the main reason for which customers abandon business transactions.

Following global trends in the fraud and identity field

About 75% of businesses are interested in getting more advanced authentication processes and security measures that put no additional burden on their customers. To identify such processes and measures, directors of fraud and security need to be well aware of the global trends in the field. This can be done by finding a large number of reliable sources of information (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Dimov. Read the original post at: