SlideShare a Scribd company logo
3-D Secure 2.0
Hello!
I am Peter Frick
I am here because we have a story to tell.
You can find me at peter.frick@netcetera.com
2
1.
Would you …?
Let’s start with a personal
question
Our CV
○ We have walked the ways of 3-D Secure
since the early days.
○ One out of 2 cardholders in Germany rely
on us.
○ Many more do so in Switzerland.
4
Authentication
Do it right (again) !
5
45 %
Is an average failure rate for people using a static
password as means of authentication.
6
96 %
Is a proven, achievable success rate for an SMS OTP
authentication mechanism.
7
70 %
When using an App which is secured by a PIN the
number or successful authentications drop again .
8
Simplicity
Don’t overload a user
with fall-back means
(just because we cover
up for a technical
insufficiency).
As used sporadically
and “under stress”,
they often turn into a
failure.
Simplicity,
when the time
is right
Timing
Allow your users to
switch between
authentication methods
at their convenience.
Ensure your migration
strategy is soft.
9
RBA
Risk it!
10
Silent
Run.
Apply !
Simple
Rules.
No need to re-
invent the
wheel!
11
Yes, to
anything! Our customers have
experimented with Risk-Based
Authentication already under
3DS 1.0 throughout the entire
life cycle, from provisioning a
card for an authentication
method to securing each and
every transaction.
12
Open-up!
An old concept revived
13
All for 1, but still
behind “walls”. 3-D Secure
Authorize
Prevent
Fraud
14
Pre-Auth
Make sure your risk
score is produced based
on information from a
fraud prevention system,
not only on the limited
“profile” of this single
CNP trx.
Auth (de-coupled)
Allow an authentication
request to be initiated
de-coupled from the 3-D
Secure protocol flow.
Post-Auth
Provide a feed of real-
time information for
every 3-D Secure
request directly into the
authorization systems.
Let’s refresh
some (old)
concepts.
Benefit:
For example to fully live
up to Low Value
Excemption concepts
being imposed by
regulators.
Benefit:
A merchant has decided
to skip 3-D Secure, the
authorization might
want to reject the trx,
but can be “overruled” if
the user is again
prompted to
authenticate the trx.
Benefit:
Achieve a full fleshed trx
monitoring based on
real-time data.
15
“
«If you want to be successful in a country
where freedom is scarce, give your
employees, customers and partners the
freedom to think, experiment and act, and
you will succeed in nearly anyhting”.
- A friend from a country far South.
16
Thanks!
You can find me at peter.frick@netcetera.com
17
Credits
Special thanks to all the people who
made and released these awesome
resources for free:
○ Presentation template by
SlidesCarnival
○ Photographs by Unsplash
18

More Related Content

PDF
Seamless 3-D Secure e-commerce experience
PPTX
cybersecurity.pptx
PDF
Digital Payment and 3-D Secure by Netcetera
PPTX
PSD2 and 3DS2. The impact.
PDF
The 3-D Secure Protocol
PPTX
E-commerce System Technologies, Repository and Networking Technology
PDF
The Power Of Open Banking Coupled With Artificial Intelligence
PPTX
Metaverse- Digital Digest
Seamless 3-D Secure e-commerce experience
cybersecurity.pptx
Digital Payment and 3-D Secure by Netcetera
PSD2 and 3DS2. The impact.
The 3-D Secure Protocol
E-commerce System Technologies, Repository and Networking Technology
The Power Of Open Banking Coupled With Artificial Intelligence
Metaverse- Digital Digest

What's hot (20)

PPTX
TypeScriptでCLIアプリケーション開発
PPTX
La réalité augmentée
PPTX
FinTech and the Future of Finance
PPTX
Banks and cybersecurity v2
PDF
3 d internet report
PPTX
Les malwares
PPT
Introduction to emv
PPT
Blockchain based certificate verification
KEY
OWASP Mobile Top10 - Les 10 risques sur les mobiles
PPTX
EMV chip cards
PPTX
The role of IAM in OpenBanking and where do we stand
PDF
Présentation Méthode EBIOS Risk Manager
PDF
Unifi Log 收容與看板應用
PDF
NIST 800-63 Guidance & FIDO Authentication
PPTX
Digitalwatermarking
PDF
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
PPTX
Beginner's Guide to SIEM
PPT
Virtual reality
PDF
Metaverse - the attraction of new identty
TypeScriptでCLIアプリケーション開発
La réalité augmentée
FinTech and the Future of Finance
Banks and cybersecurity v2
3 d internet report
Les malwares
Introduction to emv
Blockchain based certificate verification
OWASP Mobile Top10 - Les 10 risques sur les mobiles
EMV chip cards
The role of IAM in OpenBanking and where do we stand
Présentation Méthode EBIOS Risk Manager
Unifi Log 收容與看板應用
NIST 800-63 Guidance & FIDO Authentication
Digitalwatermarking
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Beginner's Guide to SIEM
Virtual reality
Metaverse - the attraction of new identty
Ad

Similar to 3-D Secure 2.0 (20)

PPT
3D secure password
PPSX
3D PASSWORD
PDF
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
PPT
3 d secure password
PPTX
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
PDF
ThreatMetrix for 3d-secure
PDF
3D-Secure 2.2 Webinar
PPT
1 security goals
PDF
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
3 d secure pin (1)
PDF
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
PPT
You Can't Spell Enterprise Security without MFA
DOC
DOC
status
DOC
status
PPT
Authenticationtechnologies 120711134100-phpapp01
PDF
access-control-week-2
PPTX
Authentication Methods authauthauthauthauthautha
PDF
Portabl - The state of open banking, regulations, and the intersection of SSI...
3D secure password
3D PASSWORD
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3 d secure password
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
ThreatMetrix for 3d-secure
3D-Secure 2.2 Webinar
1 security goals
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
3 d secure pin (1)
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
You Can't Spell Enterprise Security without MFA
status
status
Authenticationtechnologies 120711134100-phpapp01
access-control-week-2
Authentication Methods authauthauthauthauthautha
Portabl - The state of open banking, regulations, and the intersection of SSI...
Ad

More from Netcetera (20)

PDF
Payment trend scouting - Kurt Schmid, Netcetera
PDF
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
PDF
Increase conversion, convenience and security in e-commerce checkouts - Silke...
PDF
Digital Payment in 2020 - Kurt Schmid, Netcetera
PDF
AI First. Erfolgsfaktoren für künstliche Intelligenz im Unternehmen
PPTX
Augmenting Maintenance
PDF
Front-end up front
PDF
The future of Prototpying
PDF
EMV Secure Remote Commerce (SRC)
PPTX
Online shopping technology in the fast lane?
PDF
Merchant tokenization and EMV® Secure Remote Commerce
PPTX
Augmenting Health Care
PDF
Driving transactional growth with 3-D Secure
PDF
Digital Payment Quo Vadis
PDF
EMV® Secure Remote Commerce
PDF
Context: The missing ingredient in multilingual software translation
PDF
Digital Payments - Netcetera Innovation Summit 2018
PDF
"Whats up and new at Netcetera?" - Netcetera Innovation Summit 2018
PDF
Fintech Innovations - Netcetera Innovation Summit 2018
PDF
RiSIC - Stop losing money. Today.
Payment trend scouting - Kurt Schmid, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Digital Payment in 2020 - Kurt Schmid, Netcetera
AI First. Erfolgsfaktoren für künstliche Intelligenz im Unternehmen
Augmenting Maintenance
Front-end up front
The future of Prototpying
EMV Secure Remote Commerce (SRC)
Online shopping technology in the fast lane?
Merchant tokenization and EMV® Secure Remote Commerce
Augmenting Health Care
Driving transactional growth with 3-D Secure
Digital Payment Quo Vadis
EMV® Secure Remote Commerce
Context: The missing ingredient in multilingual software translation
Digital Payments - Netcetera Innovation Summit 2018
"Whats up and new at Netcetera?" - Netcetera Innovation Summit 2018
Fintech Innovations - Netcetera Innovation Summit 2018
RiSIC - Stop losing money. Today.

Recently uploaded (20)

PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPT
Chapter four Project-Preparation material
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
How to Get Business Funding for Small Business Fast
PDF
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
340036916-American-Literature-Literary-Period-Overview.ppt
Nidhal Samdaie CV - International Business Consultant
Power and position in leadershipDOC-20250808-WA0011..pdf
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Comments on Crystal Cloud and Energy Star.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Chapter four Project-Preparation material
Tata consultancy services case study shri Sharda college, basrur
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Principles of Marketing, Industrial, Consumers,
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Probability Distribution, binomial distribution, poisson distribution
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Belch_12e_PPT_Ch18_Accessible_university.pptx
Keppel_Proposed Divestment of M1 Limited
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
ICG2025_ICG 6th steering committee 30-8-24.pptx
How to Get Business Funding for Small Business Fast
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf

3-D Secure 2.0

  • 2. Hello! I am Peter Frick I am here because we have a story to tell. You can find me at peter.frick@netcetera.com 2
  • 3. 1. Would you …? Let’s start with a personal question
  • 4. Our CV ○ We have walked the ways of 3-D Secure since the early days. ○ One out of 2 cardholders in Germany rely on us. ○ Many more do so in Switzerland. 4
  • 6. 45 % Is an average failure rate for people using a static password as means of authentication. 6
  • 7. 96 % Is a proven, achievable success rate for an SMS OTP authentication mechanism. 7
  • 8. 70 % When using an App which is secured by a PIN the number or successful authentications drop again . 8
  • 9. Simplicity Don’t overload a user with fall-back means (just because we cover up for a technical insufficiency). As used sporadically and “under stress”, they often turn into a failure. Simplicity, when the time is right Timing Allow your users to switch between authentication methods at their convenience. Ensure your migration strategy is soft. 9
  • 11. Silent Run. Apply ! Simple Rules. No need to re- invent the wheel! 11
  • 12. Yes, to anything! Our customers have experimented with Risk-Based Authentication already under 3DS 1.0 throughout the entire life cycle, from provisioning a card for an authentication method to securing each and every transaction. 12
  • 14. All for 1, but still behind “walls”. 3-D Secure Authorize Prevent Fraud 14
  • 15. Pre-Auth Make sure your risk score is produced based on information from a fraud prevention system, not only on the limited “profile” of this single CNP trx. Auth (de-coupled) Allow an authentication request to be initiated de-coupled from the 3-D Secure protocol flow. Post-Auth Provide a feed of real- time information for every 3-D Secure request directly into the authorization systems. Let’s refresh some (old) concepts. Benefit: For example to fully live up to Low Value Excemption concepts being imposed by regulators. Benefit: A merchant has decided to skip 3-D Secure, the authorization might want to reject the trx, but can be “overruled” if the user is again prompted to authenticate the trx. Benefit: Achieve a full fleshed trx monitoring based on real-time data. 15
  • 16. “ «If you want to be successful in a country where freedom is scarce, give your employees, customers and partners the freedom to think, experiment and act, and you will succeed in nearly anyhting”. - A friend from a country far South. 16
  • 17. Thanks! You can find me at peter.frick@netcetera.com 17
  • 18. Credits Special thanks to all the people who made and released these awesome resources for free: ○ Presentation template by SlidesCarnival ○ Photographs by Unsplash 18