Fraud Mgmt Program

Overview

Overview: 
 

GRAPA's Telco Fraud Specialist Training is the industries oldest, most extensive and recognized of certifications available for the telecoms fraud analyst. 

Over 800 Fraud, Audit and Security Analyst have succesfully completed this 40-hour certification and workshop program. 

This program was compiled soliciting best practices in fraud management for fraud specialists around the world and has been designed to provide attendees with a new, innovative, and comprehensive approach to the professional practice of combating fraud. 

The unique and comprehensive GRAPA fraud standards, governance model, methodologies and framework guarantee the student is being provided with the latest and best in Fraud Containment tools and approaches.

GRAPA's exploit-library-driven approach provides a grounding for fraud professionals in real-world risks and exposures.

 Certification - Up to 40 Hours CPE Credit : 

Hundreds of Telecoms Fraud, Security and Audit  professionals have completed this program since its inception in 2011. In that time it has been continuously updated with the latest best practices in the professionals practice of internal audit and hundreds of carriers have aligned themselves with these standards and the principles they represent. 

 

  • Gain an exhaustive overview of all of the different areas within the telecom where Fraud Management teams are typically involved
  • Learn about SiMBOX Fraud, Interconnect Frauds, Bypass Fraud, Traffic Piracy, Premium Rate Fraud, PBX HACKING AND ALL OTHER MAJOR FORMS OF TELECOMS FRAUD 
  • Learn the latest methods for the detection and deterence of the largest frauds 
  • Learn about the emerging role of fraud management within the context of the larger cyber security domain 
  • A comprehensive introduction to the full range of fraud vulnerabilities in network, I/T, sales, operations, accounting, channels and the customer domains.
  • Learn how proactive FM teams are helping protect their companies assets and revenues 
  • An introduction to the Scientific, Systematic and Proven approach to the organization and addressing of fraud risks as defined by the GRAPA standards and Fraud Experts from around the world
  • Learn how frauds are organized and carried out , and the proper methods for detection and deterrence of the frauds.
  • How to build and deploy an effective and efficient fraud management team.
  1. Telecoms Fraud Management Fundamentals
  2. Managing a fraud management system effectively
  3. Voice Network Fraud and Controls
  4. Data Network Fraud and Controls
  5. Interconnect Frauds – Non-Traffic based
  6. Interconnect Frauds – Traffic based
  7. Roaming Fraud Management
  8. Physical Hacking of Voice and Data Networks
  9. Logical Hacking of Voice and Data Networks
  10. Social Engineering and its role in frauds
  11. Collusion and Employee Frauds
  12. Collusion and Customer Frauds
  13. Accounting Fraud Management
  14. Corporate Sales and Backhaul Fraud
  15. Customer Frauds
  16. Channel, Agent and Point of Sales Fraud
  17. Supply Chain Fraud
  18. Mbanking, Money Laundering and Credit Card Frauds
  19. Broadcast and Content Fraud Management
  20. Principles of Cyber Fraud Management

The Fraud Program is organized into 3 major sections:

  • -              Fraud management for Voice
  • -          Fraud Management for Data
  • -          Non-Network Related Frauds

Fraud Management for Voice Networks

Best practices review of fraud protection for voice networks. Fundamentals of fraud management in the voice environment, protection of voice networks, and an exhaustive review of the top frauds that hamper voice networks today.

1) Fraud Fundamentals - Best Practices in Fraud Management for Telecoms

Profiling, Case Management, Fraud Management Systems, and How to run a Fraud Management department. How to set up and run a fraud management system

2) Exploit Chains and Organizing the Fraud Management Functions

Understand how frauds are engineered. Deception, Conversion, and Incursion methods

3) Understand Voice Network Vulnerabilities

How network operations run the network. Responsibilities and risks in the typical network environment

4) SS7 and Voice Network Security

How voice networks manage security and integrity . Principles of SS7 AAA

5 ) Interconnect Frauds - Bypass Frauds

Understand SIMbox, Refiling, and Traffic Hijack. How bypasses are engineered, how to detect them

What a SIMbox is, how SIMbox frauds are engineered . FMS, Test Call Service and major SIMbox fraud management challenges

6) Injection Frauds

TeeIn, PBX Hack, and other Physical Injections. Call Sell, Premium Rate, and Logical Injection Frauds

7) Roaming Frauds

Fundamentals of roaming operations and key fraud points including partner frauds, steering frauds, and IRSF frauds.

Fraud Management & Cyber Security for Data Networks

Best practices review of fraud protection for data networks. Fundamentals of fraud management (Incident and Case Management) and implementation of data fraud (logical and physical hack) controls. Learn about the major attack vectors utilized by cyber fraudsters including physical hacking, logical hacking, and advanced cyber attack techniques (DDOS, Zero Day). Learn about the key controls and vulnerabilities of 3G, 4G, and WiFi networks, and how to protect them.

8) Best Practices in Fraud Management for Telecoms

Profiling, Case Management, Fraud Management Systems, and how to run a Fraud Management department

Fraudster Behavior Profiling: How it is done, how to apply it to fraud management cases

How to organize the Fraud Management Function: KPIs, role of fraud team in overall security management

9) Data Network Protection and Controls

Fundamentals of data network operations and security. Key fraud controls and vulnerabilities for a data network

Keys to security of IP Networks. Tracerte, Ping, DHCP, DNS, Radius, Diameter, and other security protocols

The internet ecosystem, roles and responsibilities of Carriers, Partners, and Fraud Vulnerability

10) Physical Hacking and Network Security

How hackers create physical breaches in data networks. The different attack vectors and controls required to fraud proof a physical data network

Ways to hack fixed networks (cable, fiber, DSL) and how fraudsters use them

Ways to hack wireless (mobile, WiFi, WiMax, microwave, satellite) and how fraudsters use them

11) Logical Hacking and Network Security

Gaining physical access to the network is just the first step in a fraud attack. In this unit, we review the different ways fraudsters spoof identities, gain security clearance, and actually gain control of internal systems and operations. Cyber hacking, DDOS and other methods of attack are reviewed.

Top ten IP based hack approaches. How they work, how to detect, how to prevent

12) Backhaul, Corporate Services and Core Network Protection

Protection of the data environment is about making sure that all avenues of attack are recognized and monitored. In this unit, we review the different forms of wholesale data access, the contracts and vulnerabilities involved, and the key protections against the violation of fiber, cable, DSL, IPX, GRX, and leased line violation. Learn about the key internal frauds associated with corporate services deploy


Fraud Management or Customer & Employee Frauds

Each year, telecoms loose billions of dollars to frauds not directly associated with their networks at all. These “extra-network” frauds include customer frauds, channels frauds, sales frauds and a growing range of electronic transfers and mBanking frauds. This program provides professionals with a best practices review of how these frauds work, and how they are addressed.

Sessions 1 & 2: Fraud Fundamentals - Best Practices in Fraud Management For Telecoms

Profiling, Case Management, Fraud Management Systems, and how to run a fraud Management department

13) Social Engineering and Interpersonal Frauds

Focus on the different techniques of social engineering, how they are executed, and how to protect against them. Indepth review of the different methods customer use to spoof and fool our sales and provisioning operations

14)Accounting Frauds

Accounting systems are designed to protect the organization from financial frauds, but bypassing the accounting systems leads to many of the worst fraud cases. Learn the principles of accounting as a fraud control operation, and about each of the major categories of accounting frauds including accounts payable, accounts receivable, cash, credit, supply chain, off-book, on-book, and over-book frauds.

15) Channels, Sales, and Supply Chain Frauds

Sales channels, distributors, points of sale, and internal supply chains are the source of millions in loss for telecoms. We review the different forms of channel and distribution frauds and their containment.

16) mBanking, eCommerce, and Credit Card Frauds

Telecoms networks represent the biggest and most vulnerable of operations utilized for the transfer and protection of money. Online banking, eCommerce, credit card transactions, and money laundering are all issues for the telecoms fraud analyst. Learn the principles of banking, credit, debit, and funds transfer security and fraud protection.

Who Should Attend:
Fraud Analysts, Fraud Management Systems Support Teams, Security, Audit and other employees focused on the containment of frauds within the telecoms environment.  : 

  • New members of the telecoms fraud management team looking for a comprehensive introduction to the unique characteristics of telecoms fraud management 
  • Experienced fraud management professionals looking for a clear vocabulary and structure, a reinforcement of the importance of their role, and an opportunity to expand their scope within the telecom. 
  • Fraud managers who wish to strengthen and add value to their teams and who are in need of a systematic, effective approach. 
  • Security, audit and other risk management personnel looking for a standard comprehensive review of the many issues and areas where telecoms fraud risk most often results in fraudulent activity.