BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Secure Payments Academy - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://securepaymentsacademy.com
X-WR-CALDESC:Events for Secure Payments Academy
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241119
DTEND;VALUE=DATE:20241121
DTSTAMP:20260415T202620
CREATED:20240627T145424Z
LAST-MODIFIED:20240627T145455Z
UID:12357-1731974400-1732147199@securepaymentsacademy.com
SUMMARY:SPA-26 – 2-Day Open Banking Course
DESCRIPTION:SPA-26 – 2-Day Open Banking Course\n\nSPA-26 – 2-Day Open Banking Course \nOpen Banking Technology\, Services\, Security and Legal Implications \n  \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a two–day course to explain the technology\, services and regulatory requirements of Open Banking. \nDuring this 2-day course\, attendees will be introduced to the structure of the digital world for Open banking and its relationship with FinTech’s.  The primary role of Open Banking is to enable consumers to select the services they need for their financial needs. The Open Banking services are varies and once selected provide a secure interface at a faster delivery rate than classic banking. FinTech services by third party providers interface to the core Open Banking through defined IP interface. \nAn important part of the Open Banking environment is compliance with regulatory requirements. Open Banking introduces a new paradigm in the financial services industry by promoting greater transparency\, competition\, and innovation. However\, it also brings significant regulatory and compliance challenges that must be addressed to ensure security\, privacy\, and consumer protection. \nOpen Banking fundamentally transforms how financial data is shared and accessed\, introducing numerous benefits but also significant security and privacy challenges. Ensuring robust security and privacy protections is essential to maintain consumer trust and regulatory compliance. \nAnother area that is presented in this course is the relationship between Open Banking and digital transformation. Open Banking and digital transformation are intricately linked\, each driving and enhancing the other. Open Banking serves as a catalyst for digital transformation within the financial services industry\, enabling institutions to innovate\, improve customer experiences\, and streamline operations. Here’s how Open Banking and digital transformation interrelate: \n  \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nEvaluate Open Banking principles and practices\nDescribe technical features of Open Banking systems\nExplain typical Open Banking use cases\nAnalyze options for implementation and management of Open Banking solutions\nDifferentiate the regulatory requirements and their related compliance needs in various jurisdictions.\n\n  \nWho Should Attend: \nThis two-day Open Banking training workshop is designed for a diverse audience that includes professionals and stakeholders from various sectors within the financial services industry and related fields. The following individuals would benefit from attending: \n  \n\nBanking and Financial Services Professionals\nTechnology and IT Professionals\nFinTech Entrepreneurs and Startups\nRegulatory and Compliance Officers\nConsultants and Advisors\nAcademia and Research\nGovernment and Regulatory Bodies\nOthers\, such as Customer Experience Managers\, Marketing and Investors Professionals\n\n  \nCourse Content \nThis agenda ensures a comprehensive and engaging exploration of Open Banking\, balancing theoretical knowledge with practical applications and interactive sessions. \nDay 1 – Open Banking Ecosystem \n\nIntroductions – Course Overview\nWhat is Open Banking\nRegulatory Frameworks and Standards\nOpen Banking Ecosystem\nTechnology and Infrastructure\nUse cases for Open Banking Services\nTechnology & Security\nBusiness Model and Transformation of Incumbents to stay competitive\nOpen Banking API and Digital Transformation\n\nDay 2 – Strategies and Services \n\nRecap of Day 1 and Introduction to Day 2\nInnovation and Emerging Trends in Open Banking\nDeveloping Open Banking Strategies\nConsumer Protection and Ethical Considerations\nDesigning and Open Banking Product – Hands on Workshop\nBusiness Modes and Implementations of New Entrants – how they became as important as Big Banks\n\nSPA-26: 2-Days – Open Banking training workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. This course is a deep dive guide into “How to bring the established banking services into the new Open Banking age”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. For more information about our upcoming schedule\, visit the Workshop Schedule. \n  \nTo contact us please go to Contact. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-26-2-day-open-banking-course/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241109
DTSTAMP:20260415T202620
CREATED:20240627T145012Z
LAST-MODIFIED:20240719T164256Z
UID:12353-1730678400-1731110399@securepaymentsacademy.com
SUMMARY:SPA-25 – 5-Day ISO20022 Deep Dive Course
DESCRIPTION:SPA-25 – 5-Day ISO20022 Deep Dive Course\n\nSPA-25 – 5-Day ISO20022 Deep Dive Course \n ISO20022 – All the Payments Data Your Business will Ever Need\, all the Time \n 5-Day ISO 20022 Standards Deep Dive \n Why are we talking about ISO20022 for merchants and corporates?  \nBy 2025\, 90% of global bank large value settlements will be ISO20022 compliant\, and most real time payments shortly thereafter.  The speed and conditions for payment settlement will increasingly be impacted by additional data that will accompany the payment. That additional data is being defined by global and national compliance regimes to meet not just payment integrity\, but also environmental\, social\, trade\, supply chain\, sanctions\, competition\, social equity\, treasury etc. standards. \nISO20022 is much more than a ‘data standard’ – it is an open data framework that supports multiple vertical specific compliance regimes. This positions ISIO20022 as a data tool for business system compliance across the ever increasing complexity of multiple compliance standards.  ISO20022 also supports multiple system architectures\, including parallel processes\, payor and/or payee integration\, and a range of outsource models from data standard translation only\, to full third party processing. \nYour business systems have options – ISO20022 expands the definition of a payments transaction to include many types of additional business data\, almost all of which is already captured through other systems by the front end of the payments ecosystem. Demands for compliance with this new world of expanded payments will increasingly shift to that front end. This challenge can be met by a wide range of system architectures contemplated by the ISO20022 framework. \nAim of this course \nThe aim of this program is to help the attendee make a decision as to the potential feasibility of implementing ISO20022 standards in the organization’s systems and processes\, and therefore warrants an investment in further and more in depth  investigation  of the impact on those systems. \nLearning Outcomes: \nAt the end of this program\, delegates will be able to: \n\nDescribe the purpose and scope of ISO20022\nIdentify the drivers for a new global payments standard\nExplain how the standard is managed\nIdentify the potential role of ISO20022 in addition to payments\nUnderstand the new payment ecosystem under ISO20022\nSpecify how ISO20022 supports key payments functions\nAdvise on the potential of ISO20022 for business development\nDescribe the current market acceptance of ISO20022\nSpecify how ISO20022 supports legacy payments processes\nIdentify implications for the operation of an ISO20022 service\nUnderstand how ISO20022 works with related standards\nIdentify where ISO20022 is positioning as a key technology\nSpecify the structure of the business data used by ISO20022\nDefine the mechanisms for adapting ISO20022\nEnumerate potential killer apps for ISO20022\nEvaluate the applicability of the ISO20022 data model\nIdentify verticals first to be impacted by ISO20022\nAdvise on where ISO20022 may be of greatest value\nUnderstand risks in the adoption of ISO20022\nIdentify the market value of ISO20022 enabled services\n\nWho Should Attend: \nThis course is specifically designed for organizations that must make a decision as to whether or not the organization should move forward in planning their payments ISO20022 capabilities. The key consideration in the design of this training program is ‘How organizations can monetize ISO20022’. \nProgram Details: \nDay 1 – What is ISO20022 from a Business Perspective? \n\nWhat is ISO20022 concepts from a Business Perspective?\nAn overarching transaction standard across verticals\nA data model for extended transaction data\nA mechanism for compliance under multiple regimes\nConstraints in legacy payment transaction formats\, e.g. ISO 8583\nIncreased demands on core payments processes\nChanging business models for processing and settlement\nGovernance and control under ISO and SWIFT\nStandards setting by internal and third parties\nImplementation by regional and vertical organizations\nISO20022 and finance\nISO20022 and security\nISO20022 and ESG\n\nDay 2 – What is ISO20022’s Role in Payments? \n\nThe payor / payee relationship under ISO20022\nISO20022 in the six party payments model\nOverview of ISO20022 payment messaging\nGenerating requests for payment\nGenerating payments\nMessaging between Payor and Payee\nAutomating certain payments processes\nSupporting partner and client relationships\nHelping organize business data across the enterprise\nGlobal adoption and trends\nInterbank settlement as the first use case\nEuropean\, Asian & North American implementations\n\nDay 3 – Key Processes \n\nGenerating and issuing a compliant ISO20022 message\nTransporting the message\nReceiving and processing the message\nThe 13 potential actors in an ISO20022 transaction\nIntegrated versus parallel messaging\nSandboxing\, testing and certification requirements\nXML\, SWIFT MX\, TWIST\, OAGI\, RosettaNet etc. inputs\nSWIFT gpi\, GMP\, CBPR+\, HVPS+\, eBAM etc. best practices\nNexo\, Berlin\, SEPA\, FpML\, FIX\, TARGET etc. applications\nG20\, FSB\, FATF\, ISITC\, DTCC etc. global initiatives\nTCH\, NACHA\, ANSI\, Federal Reserve etc. in the U.S.\nSEPA\, EURO1\, TARGET2\, STEP2\, STET etc. in the E.U.\n\nDay 4 – Data Model Walkthrough \n\nTop level Message types\nMultiple levels of data elements under each Message\nPer Message best practice guidance\nThe Supplementary Data message extensions to data dictionary\nExternal Code Sets as approved by Standards Eval Group\nData Source Schemes industry specific data fields\nChargeback\, loyalty\, liquidity\, contracts\, trade\, etc. apps\nNext gen retail\, securities\, equities\, B2B\, POS transactions\nClimate\, ESG\, risk\, security\, health care\, stability support?\nThe need for ISO20022 planning tools for business\nStrategic and product views of ISO20022 data fields\nWalkthrough of an ISO20022 business data manager\n\nDay 5 – ISO & SWIFT Targets \n\nCross border trade\nHigh value payments\nPOS commoditization\nSupply chain\, analytics\, treasury etc. back office functions\nStraight thru\, eInvoice\, real time\, securities etc. processing\nCustomer relationship\, loyalty\, fintech etc. front office\nBank driven adoption and marketing\nMigration and translation from legacy to new transaction formats\nCompetition from card schemes\, CIPS\, blockchains etc.\nWhat ISO20022 is selling vs. what the end user wants\nEarly adopters\, sophisticated users\, and the average Joe\nThe desire for less costs versus more services\n\nApproach: \nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The training program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this course. \nCredits: \nSPA-25: 5-Day – ISO20022 Deep Dive Program is brought to you by VCS Technologies Inc. in partnership with the Secure Payments Academy and Technology Strategies International Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-25-5-day-iso20022-deep-dive-course/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241028
DTEND;VALUE=DATE:20241101
DTSTAMP:20260415T202620
CREATED:20240627T144600Z
LAST-MODIFIED:20240719T164544Z
UID:12349-1730073600-1730419199@securepaymentsacademy.com
SUMMARY:SPA-21: 4-Day – Payment Fundamentals\, Payment Technologies\, Digital Payment Framework\, Digital ID and Digital Banking
DESCRIPTION:SPA-21: 4-Day – Payment Fundamentals\, Payment Technologies\, Digital Payment Framework\, Digital ID and Digital Banking\n\nOverview of Payment Systems\, digitization of payments and its efficiencies with Digital ID \nThis workshop introduces the payment history and current models used internationally. The online course explains the different parties in a payment eco system. It also reviews the current payment technology platforms\, creation\, securitization and processing of payment transactions\, the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. This is a 4-day course that covers the contents listed below. \nDuring Day1 Payment Systems are described including the parties involved in a payment transaction\, models of payment systems and risk management. The first day is aimed at familiarizing students with various aspects of the payment systems. \nDay 2 gives a deep dive view of the payment systems with information on practical application of the technologies based on the specifications. During this session\, back-end system and security subjects are introduced. \nThe 3rd day workshop discusses the Payment Technologies that provides insight and details of the newly defined techniques for online payment transactions. It examines how to further secure transactions through use of tokenization technologies.  It describes the various ways that transaction information is replaced by a token for added security. We also describe the new technologies being defined by EMVCo that include 3D-Secure and the new Secure Remote Commerce framework. These standards from EMVCo that will help banks and processors to secure their ecommerce and online transactions in a structured and standard way. \nDay 4 workshop discusses Digital ID\, Digital Currency\, Digital-Neo Bank. As more stakeholders migrate to digitize their operations\, there are new opportunities for banks\, processors\, and retailers. Much of the digital world depends on how accurate a person can de identified. The Digital ID section describes in detail concepts and usage of Digital IDs. Digital Currencies include what is known as Bitcoin and Blockchain\, and central bank digital currencies. Digital currency in its various forms is described and discussed during day 4. \nWho should Attend: \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDetails: \nDay 1 – Payment Systems Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – EMV-Based Payments and Online Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Technologies \n\nPayment Tokenization\n3D-Secure\nSecure Remote Commerce (SRC) platform\nNew Payment channels – in US Zelle\, PayPal etc.\nReview of the training\n\nDay 4 – Digital ID\, Digital Currency\, Digital-Neo Bank \n\nWhat is Digital Identification\nAttributes of Identity\nCredentials\, Validation & Verification\nDigital ID Models and Privacy Regulations\nDigital Credentials Adoption\nBlockchain and Bitcoin Technologies\nCentral Bank Digital Currency\nIntroduction to Digital Banking /Neo Banking\nThe new model of digital banking\nChange of mindset on digital banking\nDigital Bank Architecture\nIntegration with legacy banking\n\nSPA-21: 4-Day – Payment Fundamentals\, Payment Technologies\, Digital Payment Framework\, Digital ID and Digital Banking workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. This course is a deep dive guide into “Payments Fundamentals and how to enhance it by adopting newer technologies”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. For more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-21-4-day-payment-fundamentals-payment-technologies-digital-payment-framework-digital-id-and-digital-banking/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240930
DTEND;VALUE=DATE:20241002
DTSTAMP:20260415T202620
CREATED:20240627T144141Z
LAST-MODIFIED:20240719T164625Z
UID:12345-1727654400-1727827199@securepaymentsacademy.com
SUMMARY:SPA-22: 2-Day – Payment Tokenization
DESCRIPTION:SPA-22: 2-Day – Payment Tokenization\n\nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to describe payment tokenization\, its technology and use cases. \nDuring the last two decades card payments have moved from using magnetic stripe cards to EMV chip cards. This migration has been very effective in providing secure transactions for in-person payments. With the improvements in internet speeds and its availability globally\, more purchases are moving online. This provides ease of use and convenience for the consumer. \nIn parallel\, mobile smart phones have become capable of conducting payments transactions using the smartphone hardware – both for in-person and online payments. In order to create a safe online payment environment\, the card networks and stakeholders have created a number of technologies that help the promotion of card-not-present payments. The key technology used is payment tokenization. The first day of this course covers overview of the workings of payment tokenization\, how tokens are created\, where they are saved and how they are used. On the second day of the course\, major use cases for the tokenization are described in addition to card-on-file use cases and how they are processes. \nDuring these two days\, the relationship between payment tokenization and other new payment technologies\, such as 3DS and SRC\, are described. \n Who should Attend: \n\nIssuer/Processor Architects\nMerchant System Operations\nData Analysis team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 –Payment Tokenization \n\nTokenization Overview\nImplementation Considerations for Tokenization\nSecurity Considerations for Tokenization\nSummary & Conclusions\nTokenization Services\nType of Tokens\nPayment Tokenization Process\nSecurity in the Tokenization\nToken Service Provider Services\nToken Lifecycle Management\n\nDay 2 – Tokenization Use Cases \n\nUse Case Overview\nTokenization Implementation Processes\nTokenization Use Case Scenarios\nIn-Store contactless – Provisioning and Transaction Processing\nIn-App Payments – Transaction Processing\nMerchant CoF\, Pay Button\, Wearables\, IoT\nCard-on-file (CoF) tokenization in a Payment Vault\\nConsiderations for CoF Tokenization\n\nSPA-22: 2-Day – Payment Tokenization workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to adopt the payment tokenization technology in the new mobile centric world”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-22-2-day-payment-tokenization/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240925
DTEND;VALUE=DATE:20240927
DTSTAMP:20260415T202620
CREATED:20240627T142825Z
LAST-MODIFIED:20240719T164659Z
UID:12336-1727222400-1727395199@securepaymentsacademy.com
SUMMARY:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems
DESCRIPTION:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems\n\nSPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems \nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to answer many questions that have arisen post COVID-19\, titled: eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems. \neCommerce and online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or better known as Card Not Present Fraud (CNP). In order to understand how  to combat fraud\, an understanding if the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. These are in addition to the EMVCo specifications 3DS2.2 that encourages merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the two days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks will be described. \nThere are newer techniques that are real technology and can detect fraudulent transactions with certainty. All these will be discussed in the two day workshop. \nLearning Outcomes\nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card not present transactions.\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation\n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCNP Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nTokenization\nQuantum Computing effect on fraud and encryption\nQC Safe Processing and Data protection\n\nDay 2 – Payment Card Fraud – FIDO\, 3DS and SRC for CNP Fraud and Mitigation\n\nFIDO (Fast Identity Online)\nIntroduction EMVCo 3DS2.2\nComponents of 3DS2.2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2.2 system\nSRC/One Click Standards\nLive 2-factor authentication demonstration\nPCI DSS\n\nSPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the new eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-18-2-days-ecommerce-payments-and-cnp-fraud-types-fraud-detection-and-fraud-mitigation-systems-3/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240924
DTEND;VALUE=DATE:20240927
DTSTAMP:20260415T202620
CREATED:20240627T143439Z
LAST-MODIFIED:20240719T164738Z
UID:12340-1727136000-1727395199@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Card Fraud Deep Dive: Card Present Fraud and Mitigation\, CNP Fraud Types for Online and Mobile\, CNP Security Techniques – 3DS\, Tokenization\, SRC and FIDO
DESCRIPTION:SPA-19: 3-Days – Payment Card Fraud Deep Dive: Card Present Fraud and Mitigation\, CNP Fraud Types for Online and Mobile\, CNP Security Techniques – 3DS\, Tokenization\, SRC and FIDO\n\nSPA-19: 3-Days – Payment Card Fraud Deep Dive: Card Present Fraud and Mitigation\, CNP Fraud Types for Online and Mobile\, CNP Security Techniques – 3DS\, Tokenization\, SRC and FIDO \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. In addition\, we will discuss other CNP fraud mitigation techniques including Tokenization\, where the PAN is replaced by a token\, SRC framework that allows many techniques to be adopted and standards from FIDO Alliance that removes the need for using passwords by using an approved device. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – CNP Security Techniques – 3DS\,  Tokenization\, SRC and FIDO \n\nIntroduction EMVCo 3DS\nComponents of 3DS\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS system\nPayment Tokenization techniques\nImplementation & Security Considerations\nTypes of Payment Tokens\nToken Provider Services\nToken Lifecycle Management\nTokenization Use Cases\nCard On File Tokenization\nSRC/One Click Standards\nFIDO\nLive Demonstration – 2-Factor Authentication\n\nSPA-19: 3-Days – Payment Fraud – Payment Card Fraud Deep Dive: Card Present Fraud and Mitigation\, CNP Fraud Types for Online and Mobile\, CNP Security Techniques – 3DS\, Tokenization\, SRC and FIDO workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-card-fraud-deep-dive-card-present-fraud-and-mitigation-cnp-fraud-types-for-online-and-mobile-cnp-security-techniques-3ds-tokenization-src-and-fido/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240617T080000
DTEND;TZID=America/New_York:20240619T170000
DTSTAMP:20260415T202620
CREATED:20240212T194337Z
LAST-MODIFIED:20240719T164811Z
UID:12232-1718611200-1718816400@securepaymentsacademy.com
SUMMARY:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security
DESCRIPTION:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security\n\nOverview of Payment Systems and operations with stakeholders\, Payment Security for card and online fraud detection and mitigation \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new three –day course Payment Fundamentals\, Digital Payment Frameworks and Payment Security. \nThis training program examines the history of payments history\, culminating in the current models used internationally. We analyze the different parties in a payment eco system and review the current payment technology platforms We also examine the creation\, securitization and processing of payment transactions\, some of the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. \nDuring the program we will focus on the dynamic digital transactions-based platforms and payment technologies that are being deployed in the market today\, such as EMV\, contactless and Mobile Payments. We will also delve into emerging developments such as tokenization\, 3D-Secure and blockchain. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the main features of different payment system types\nEvaluate payment system domains\, settlement and risk\nAnalyze digital payments and advantages provided by EMV\nExplain how blockchain works and describe its essential features\nAnalyze different fraud types\nEvaluate different fraud mitigation techniques for CNP environments\n\nWho should Attend: \n\nPeople new to the field of payments processing\nPayment Systems Operations and Engineering\nFraud Analysts\nRisk Assessors\nProduct Development and Product Marketing\nVendors of CNP fraud detection Systems\nBanking services development team\nProcess engineering team\nSystem Network Operators\nIT Operations\n\nProgram Details:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The workshop program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day program. \nDay 1 – Payment System Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – Digital Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nIntroduction to Blockchain and Bitcoin Technologies\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nIntroduction to EMV Tokenization\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Fraud \n\nDetailed Payment Fraud Types\nReview of fraud mitigation techniques\nNew Payment channels – in US Zelle\, PayPal etc.\nEMV Tokenization to overcome specific fraud types\nEMV 3D-Secure to secure online transactions\nEMV Secure Remote Commerce (SRC) platform for all online payment transactions security\nReview of the training\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-20-3-days-payment-fundamentals-digital-payment-frameworks-and-payment-security-5/
LOCATION:Great Neck\, NY 11021\, 98 Cuttermill Road\, Great Neck\, NY\, 11021\, United States
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240603T090000
DTEND;TZID=America/New_York:20240605T170000
DTSTAMP:20260415T202620
CREATED:20240212T173341Z
LAST-MODIFIED:20240719T165154Z
UID:12137-1717405200-1717606800@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\nJune 3-5\, 2024\n\n\n\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\n\n\nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/pa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240529T080000
DTEND;TZID=America/New_York:20240531T170000
DTSTAMP:20260415T202620
CREATED:20240212T172734Z
LAST-MODIFIED:20240212T185930Z
UID:12135-1716969600-1717174800@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course – New York
DESCRIPTION:SPA-24B – A 3-Day Payment Tokenization Product Planning May 29-31\, 2024 \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course-new-york-2/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240527T080000
DTEND;TZID=America/New_York:20240531T170000
DTSTAMP:20260415T202620
CREATED:20240212T172218Z
LAST-MODIFIED:20240212T185719Z
UID:12131-1716796800-1717174800@securepaymentsacademy.com
SUMMARY:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York
DESCRIPTION:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York – May 27-31\, 2024\n\nA Deep Dive into Payments Tokenization \nLeveraging\, Productizing and Monetizing Tokens \n5-Day Payments Tokenization Deep-Dive \nSPA-24 – A 5-Day Payment Tokenization Deep Dive – Why a course on Payments Tokenization. \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization really works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\nAim of this Course \nThis 5 day deep dive first provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization . These key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe deep dive then provides a road map for the monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers . The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in tokenization\nDefine a business case and SWOT analysis for the delegate’s organization\nIllustrate how tokens function\nSpecify the organizational responsibilities\nSpecify core business & system processes\nIdentify tokenization leaders & authorities\nIdentify future of payments tokenization\nSpecify the operational responsibilities\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nIdentify the business costs and benefits\nEvaluate stakeholder business cases\nUndertake go/no go decision making\nWho Should Attend:This course is specifically designed for organizations that must make a decision as to whether or not the organization should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’.\n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Courses: \nThis course provides a deep dive into payments tokenization over a five day in depth program. Delegates can also cover the topics through two separate breakout courses – a two day session focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization (for further information on this breakout course number SPA-24A\, please click HERE)\, and a separate three day session focused on the monetization of payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment. (for further information on this breakout course number SPA-24B\, please click HERE). \n Program Details: \nThis Tokenization Deep Dive workshop includes at least 4 hands on exercises by the attendees to reinforce the daily learnings. \nDay 1 – Why Payments Tokenization? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – What is the Market Potential for Tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 4 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 5 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 5-day course. \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc.\n\n\n\n  \n\nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payments-tokenization-deep-dive-new-york-2/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240527T080000
DTEND;TZID=America/New_York:20240528T170000
DTSTAMP:20260415T202620
CREATED:20240212T172444Z
LAST-MODIFIED:20240212T185359Z
UID:12133-1716796800-1716915600@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course – New York
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. May 27-28\, 2024 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course-new-york-2/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240506T080000
DTEND;TZID=America/New_York:20240506T120000
DTSTAMP:20260415T202620
CREATED:20240212T230940Z
LAST-MODIFIED:20240212T231038Z
UID:12240-1714982400-1714996800@securepaymentsacademy.com
SUMMARY:SPA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing – Online
DESCRIPTION:PA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing \n Payments Tokenization in the Real Business World: Is Payments Tokenization Relevant to MY Business? \nWhy are we talking about Payments Tokenization? \nRetail Payments Tokenization has been available for some time and there has been broad market acceptance of tokenization services. These current tokenization offerings and technologies are only the first generation of a very powerful and emerging payments acceptance management capability for merchants and corporates. \nNext generation payments tokenization enables a much more in depth and responsive relationship with the merchant or corporate client\, such as through very highly focused credit terms and loyalty programs. Conversely\, tokenization services can also potentially disintermediate the payment acceptor from their clients\, as the PAN and related customer data may no longer be available to the merchant or corporate. \nIt all depends on the architecture and options taken by the merchant or corporate in implementing tokenization for their payment acceptance processes. And there are many options. \nAim of The Course: \nThis highly interactive 4-hour briefing provides clarity as to how tokenization works\, who the stakeholders are\, what tokenization can do beyond fraud controls\, and the types of costs and benefits from tokenization a merchant or corporate can expect. \nThe aim of this briefing is to help the attendee make a decision as to whether or not next generation tokenization is of interest to the organization\, and warrants further investigation. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify where the next generation of tokenization may be of value to the attendee’s organization\nDescribe how tokenization V.2 may address problems of the attendee’s organization\nAnalyze the potential business case factors for next generation tokenization\nIdentify considerations for decision making by the attendee’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offerings in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 4-hour Tokenization briefing is a precursor to our 2-Day Payments Tokenization Business Planning and 3-Day Payments Tokenization Product Planning Courses The combined 2-day and 3-day courses are also offered as 5-day program. \nDelegates who register for the 2-day introductory course as well as the 3-day deep dive course will receive a 10% discount on the combined package (applied at checkout). Alternatively\, register for the full 5-day program here. \n  \nCredits \nSPA-24C: 4 Hour Payments Tokenization Briefing\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-c-4-hours-payment-fraud-payments-tokenization-briefing/
LOCATION:Online
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240424T080000
DTEND;TZID=America/New_York:20240426T170000
DTSTAMP:20260415T202620
CREATED:20240212T165316Z
LAST-MODIFIED:20240212T185127Z
UID:12129-1713945600-1714150800@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course
DESCRIPTION:SPA-24B – A 3-Day Payment Tokenization Product Planning  \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course-3/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240422T080000
DTEND;TZID=America/New_York:20240426T170000
DTSTAMP:20260415T202620
CREATED:20240212T164847Z
LAST-MODIFIED:20240212T184911Z
UID:12124-1713772800-1714150800@securepaymentsacademy.com
SUMMARY:SPA-24 5-Day Payment Tokenization Deep-Dive Training Program – Toronto
DESCRIPTION:A Deep Dive into Payments Tokenization:\nLeveraging\, Productizing and Monetizing Tokens\nHighlights\nTokenization can add significant value to your business\, OR it can disintermediate you from your customers. Which will it be? This 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nWhy a course on Payments Tokenization\, and why now?\nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However\, the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. \nTokenization can add significant value to your business\nProperly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors\, issuers and their clients. \nOr\, Tokenization can disintermediate you from your customers\nConversely\, failure to properly manage payments tokenization services by third parties is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\n Aim of the Course:\nThis 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nThe business oriented introduction to tokenization addresses how it works\, who the key stakeholders are and the roles they play in controlling the business and data generated by payments tokenization. Key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe road map for monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers focuses on how tokenization works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes:\nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to their organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in the tokenization ecosystem\nDefine a business case and SWOT analysis for their organization\nDescribe how tokens function within the payments environment\nSpecify core business processes\, system processes and organizational responsibilities in the context of their organization\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nEvaluate the costs\, benefits and business cases for tokenization\nIdentify important implementation considerations\nUndertake go/no go decision making\n\nWho Should Attend:\nThis course is specifically designed for organizations that must make a decision as to whether they should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nCourse Overview\nDay 1 – Why Payments Tokenization? \nThe potential of payments tokenization \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nThe importance of payments tokenization \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat business needs to know \n\nThe lifecycle of a payments token\nTokenization in the payments ecosystem\nIntroducing the tokenization data model\n\nLessons learned in adopting tokenization \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – The Business of Payments Tokenization\nThe market potential for tokenization \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nThe key players in tokenization \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nMonetizing payments tokenization \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from implementations\n\nGetting to a business case for tokenization \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization\n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nTaxonomy of tokenization offerings\nSoftware and services vendors\nCard scheme tokenization deconstructed\n\nDay 4 – The System of Tokenization\n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\n\nDay 5 – The Business of Tokenization\n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nThe business case for\n\nMerchants\nIssuers\nProcessors\n\n\nQuestions and decisions by\n\nMerchants\nIssuers\nProcessors\n\n\nCONCLUSION: The high stakes for payments stakeholders\n\nApproach:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The training program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this course. \nCredits \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payment-tokenization-deep-dive-training-program-toronto/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240422T080000
DTEND;TZID=America/New_York:20240423T170000
DTSTAMP:20260415T202620
CREATED:20240212T165125Z
LAST-MODIFIED:20240212T184521Z
UID:12127-1713772800-1713891600@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. April 22-23 2024 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course-3/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240415T080000
DTEND;TZID=America/New_York:20240417T170000
DTSTAMP:20260415T202620
CREATED:20240212T164245Z
LAST-MODIFIED:20240212T184158Z
UID:12122-1713168000-1713373200@securepaymentsacademy.com
SUMMARY:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks – New York
DESCRIPTION:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks\n\nOverview of Digital Payment World with ID at Its Core \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new two–day course to Digital identification\, currencies and how the new digital banks operate. \nDuring this three-day workshop\, attendees will be introduced to the structure of the digital world in payments and banking. In the new digital environment\, before any transactions or services can be delivered\, the user must be identified. This Digital Identification is based on several criteria to ensure correct identification of the user. Once the user is identified\, a range of services are offered to the user. During the first day digital Identification is discussed\, including its Attributes\, Credentials\, Validating and then Verifying the digital id\, using an authenticator device. \nOn the second day of the workshop\, digital currencies are described including the Central Bank Digital Currency. Many countries and their central banks globally have started initiatives to develop a centralized digital currency that can be used by all their citizens providing additional features over and above current payment platforms. Stable Coin is then described and compared with CBDC use cases. The de-centralized digital currencies\, such as Bitcoin and their underlying distributed accounting system\, such as Blockchain\, are described. The pros and cons of decentralized systems are discussed. \nAs financial institutions become more familiar with the use of digital technologies in order to reduce costs and increase efficiencies\, many FinTech companies have begun delivering a multitude of applications. These are described during the third day of the workshop\, including their advantages over the legacy systems. Digital Banks\, or Neo Banks\, are created to provide services to clients in a more efficient manner at much reduced cost. The Neo Banks in addition to delivering traditional services to their clients\, can provide other services that previously were only available in brick and mortar banks and with face-to-face interaction with the bank staff. These issues and how the mindset of the legacy banking needs to be changed will be described and discussed during this course. \nWho should Attend: \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 – Digital ID and Digital Currency \n\nWhat is Digital Identification\nAttributes of Identity\nCredentials\nValidation & Verification\nAuthenticator\nDigital Lifecycle\nDigital ID Models and Privacy Regulations\nDigital Credentials Adoption\n\nDay 2 – Digital Currency \n\nDigital Currency\nCentral Bank Digital Currency\nInternational CBDC projects\nStable Coin\nBitcoin Methodology\nBitcoin Technology\nBlockchain Technology\n\nDay 3 – Fintech and Neo Banks \n\nFintech – Financial Technology\nRange of applications\nConversion of traditional financial delivery\nNew methodologies for digital service delivery\nIntroduction to Digital Banking /Neo Banking\nThe new model of digital banking\nChange of mindset on digital banking\nDigital Bank Architecture\nIntegration with legacy banking\n\nSPA-23: 3-Days – Digital ID\, Digital Currency\, FinTech and Neo Banks workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. This course is a deep dive guide into “How to bring the established banking services into the digital age”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. For more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-23-3-days-digital-id-digital-currency-fintech-and-neo-banks-new-york/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240408T080000
DTEND;TZID=America/New_York:20240411T120000
DTSTAMP:20260415T202620
CREATED:20240212T163741Z
LAST-MODIFIED:20240212T183904Z
UID:12120-1712563200-1712836800@securepaymentsacademy.com
SUMMARY:SPA-11: EMV\, Contact\, Contactless\, and NFC Mobile Payments – The Fundamentals\, 4-Module Online Workshop
DESCRIPTION:SPA-11: EMV\, Contact\, Contactless\, and NFC Mobile Payments – The Fundamentals\, 4-Module Online Workshop\n\nModule 1:  EMV Basics (See below for details) \nModule 2: EMV Certification and Personalization ( See below for details) \nModule 3: EMV Transactions and Security ( See below for details) \nModule 4: NFC & Mobile Payments ( See below or details) \nLogin details will be emailed to registered trainees one week prior to  date of the first module. \nEMV\, The Fundamentals: (A Deep Dive for Acquirers & Issuers) A Four Part Course on EMV\, Contact\, Contactless\, and NFC Mobile Payments – Presented as Four Webinars\nThis extensive four part technical fundamentals webinar takes an in depth look at EMV\, Contactless NFC and Mobile Payment technologies. This highly technical workshop has been designed for IT professionals\, operations managers and systems development staff. These webinars cover standards as well as implementation strategies. You will learn the EMV transaction’s flows and how it affects the issuing and acquiring systems\, while describing the different stages of the transaction. The EMV standards are the platform on which contactless NFC and Mobile payments are based. You will also learn the standards for contactless NFC transactions and Mobile payment components. Examples of the Mobile payment wallets are described. \nWho should Attend:\n\n     Product Development and Product Marketing\n     Product and System Architects\n     Anybody needing a deep dive on EMV\n     Operations\, Engineering\n     IT and Technical Departments\n     Developers and Manufacturers of Cards\, Terminals and Payment Systems\n\nOnline Workshop  Outline:\n           Module One – EMV Fundamentals\n\n     Understand EMV Chip Technology\n     Discuss basic terms and concepts used in EMV\n     Understand the different approaches and standards of MasterCard\, VISA\, EMVCo\, to EMV\, Contactless and Mobile Technologies\n     Benefits of EMV\, including reduction in fraud\, provision of multi-applications and offline risk management\n     Understand key decisions for EMV and review best business model development\n\n  \n         Module Two – EMV Certification and Personalization\n\n     Review EMV certifications and compliance requirements\n     Review personalization systems\n     Understand EMV migration impact on issuers\, acquirers\, and terminal/card vendors\n\n  \n         Module Three – EMV Transactions and Security\n\n     Discuss transaction flow for EMV – Describe the 12 stages of the EMV transaction\n     Understand PIN management\, PIN usage options\n     Review Key Management and security aspects of EMV\n     Explore EMV migration challenges and strategies\n\n  \n         Module Four – NFC and Mobile Payments\n\n     Contactless market overview\n     Understand use and benefit of contactless applications\n     Review Contactless Standards and Security\n     Review the latest mobile/NFC technologies\n     Discuss Mobile Payment components – SE\, TSM\, OTA\n     Review Card and Application Management System\n     Payment applet – User Interface relationships\, Middlet\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-11-emv-contact-contactless-and-nfc-mobile-payments-the-fundamentals-4-module-online-workshop/
LOCATION:Online
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T080000
DTEND;TZID=America/New_York:20240329T170000
DTSTAMP:20260415T202620
CREATED:20240212T162730Z
LAST-MODIFIED:20240212T183554Z
UID:12114-1711526400-1711731600@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course – New York
DESCRIPTION:SPA-24B – A 3-Day Payment Tokenization Product Planning March 27-March 29\, 2024 \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course-new-york/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240325T090000
DTEND;TZID=America/New_York:20240329T170000
DTSTAMP:20260415T202620
CREATED:20240212T161726Z
LAST-MODIFIED:20240212T183052Z
UID:12110-1711357200-1711731600@securepaymentsacademy.com
SUMMARY:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York
DESCRIPTION:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York – March 25-29\, 2024\n\nA Deep Dive into Payments Tokenization \nLeveraging\, Productizing and Monetizing Tokens \n5-Day Payments Tokenization Deep-Dive \nSPA-24 – A 5-Day Payment Tokenization Deep Dive – Why a course on Payments Tokenization. \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization really works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\nAim of this Course \nThis 5 day deep dive first provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization . These key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe deep dive then provides a road map for the monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers . The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in tokenization\nDefine a business case and SWOT analysis for the delegate’s organization\nIllustrate how tokens function\nSpecify the organizational responsibilities\nSpecify core business & system processes\nIdentify tokenization leaders & authorities\nIdentify future of payments tokenization\nSpecify the operational responsibilities\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nIdentify the business costs and benefits\nEvaluate stakeholder business cases\nUndertake go/no go decision making\nWho Should Attend:This course is specifically designed for organizations that must make a decision as to whether or not the organization should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’.\n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Courses: \nThis course provides a deep dive into payments tokenization over a five day in depth program. Delegates can also cover the topics through two separate breakout courses – a two day session focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization (for further information on this breakout course number SPA-24A\, please click HERE)\, and a separate three day session focused on the monetization of payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment. (for further information on this breakout course number SPA-24B\, please click HERE). \n Program Details: \nThis Tokenization Deep Dive workshop includes at least 4 hands on exercises by the attendees to reinforce the daily learnings. \nDay 1 – Why Payments Tokenization? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – What is the Market Potential for Tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 4 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 5 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 5-day course. \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc.\n\n\n\n  \n\nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payments-tokenization-deep-dive-new-york/
LOCATION:New York
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240325
DTEND;VALUE=DATE:20240327
DTSTAMP:20260415T202620
CREATED:20240212T162434Z
LAST-MODIFIED:20240212T183345Z
UID:12112-1711324800-1711497599@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course – New York
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. March 25-26\, 2024 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course-new-york/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240318T080000
DTEND;TZID=America/New_York:20240319T170000
DTSTAMP:20260415T202620
CREATED:20240212T163318Z
LAST-MODIFIED:20240212T182716Z
UID:12118-1710748800-1710867600@securepaymentsacademy.com
SUMMARY:SPA-22: 2-Day – SPA Payment Tokenization
DESCRIPTION:SPA-22: 2-Day – Payment Tokenization\n\nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to describe payment tokenization\, its technology and use cases. \nDuring the last two decades card payments have moved from using magnetic stripe cards to EMV chip cards. This migration has been very effective in providing secure transactions for in-person payments. With the improvements in internet speeds and its availability globally\, more purchases are moving online. This provides ease of use and convenience for the consumer. \nIn parallel\, mobile smart phones have become capable of conducting payments transactions using the smartphone hardware – both for in-person and online payments. In order to create a safe online payment environment\, the card networks and stakeholders have created a number of technologies that help the promotion of card-not-present payments. The key technology used is payment tokenization. The first day of this course covers overview of the workings of payment tokenization\, how tokens are created\, where they are saved and how they are used. On the second day of the course\, major use cases for the tokenization are described in addition to card-on-file use cases and how they are processes. \nDuring these two days\, the relationship between payment tokenization and other new payment technologies\, such as 3DS and SRC\, are described. \n Who should Attend: \n\nIssuer/Processor Architects\nMerchant System Operations\nData Analysis team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 –Payment Tokenization \n\nTokenization Overview\nImplementation Considerations for Tokenization\nSecurity Considerations for Tokenization\nSummary & Conclusions\nTokenization Services\nType of Tokens\nPayment Tokenization Process\nSecurity in the Tokenization\nToken Service Provider Services\nToken Lifecycle Management\n\nDay 2 – Tokenization Use Cases \n\nUse Case Overview\nTokenization Implementation Processes\nTokenization Use Case Scenarios\nIn-Store contactless – Provisioning and Transaction Processing\nIn-App Payments – Transaction Processing\nMerchant CoF\, Pay Button\, Wearables\, IoT\nCard-on-file (CoF) tokenization in a Payment Vault\\nConsiderations for CoF Tokenization\n\nSPA-22: 2-Day – Payment Tokenization workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to adopt the payment tokenization technology in the new mobile centric world”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.\n\n\n\n\nFacebookTwitterLinkedInEmail
URL:https://securepaymentsacademy.com/event/spa-22-2-day-spa-payment-tokenization/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240304T080000
DTEND;TZID=America/New_York:20240304T120000
DTSTAMP:20260415T202620
CREATED:20240212T231551Z
LAST-MODIFIED:20240212T231551Z
UID:12247-1709539200-1709553600@securepaymentsacademy.com
SUMMARY:SPA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing – Online
DESCRIPTION:SPA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing \n Payments Tokenization in the Real Business World: Is Payments Tokenization Relevant to MY Business? \nWhy are we talking about Payments Tokenization? \nRetail Payments Tokenization has been available for some time and there has been broad market acceptance of tokenization services. These current tokenization offerings and technologies are only the first generation of a very powerful and emerging payments acceptance management capability for merchants and corporates. \nNext generation payments tokenization enables a much more in depth and responsive relationship with the merchant or corporate client\, such as through very highly focused credit terms and loyalty programs. Conversely\, tokenization services can also potentially disintermediate the payment acceptor from their clients\, as the PAN and related customer data may no longer be available to the merchant or corporate. \nIt all depends on the architecture and options taken by the merchant or corporate in implementing tokenization for their payment acceptance processes. And there are many options. \nAim of The Course: \nThis highly interactive 4-hour briefing provides clarity as to how tokenization works\, who the stakeholders are\, what tokenization can do beyond fraud controls\, and the types of costs and benefits from tokenization a merchant or corporate can expect. \nThe aim of this briefing is to help the attendee make a decision as to whether or not next generation tokenization is of interest to the organization\, and warrants further investigation. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify where the next generation of tokenization may be of value to the attendee’s organization\nDescribe how tokenization V.2 may address problems of the attendee’s organization\nAnalyze the potential business case factors for next generation tokenization\nIdentify considerations for decision making by the attendee’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offerings in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 4-hour Tokenization briefing is a precursor to our 2-Day Payments Tokenization Business Planning and 3-Day Payments Tokenization Product Planning Courses The combined 2-day and 3-day courses are also offered as 5-day program. \nDelegates who register for the 2-day introductory course as well as the 3-day deep dive course will receive a 10% discount on the combined package (applied at checkout). Alternatively\, register for the full 5-day program here. \n  \nCredits \nSPA-24C: 4 Hour Payments Tokenization Briefing\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-c-4-hours-payment-fraud-payments-tokenization-briefing-online/
LOCATION:Online
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240301T080000
DTEND;TZID=America/New_York:20240302T170000
DTSTAMP:20260415T202620
CREATED:20240212T163024Z
LAST-MODIFIED:20240212T182438Z
UID:12116-1709280000-1709398800@securepaymentsacademy.com
SUMMARY:SPA-02: EMV\, 2-Day Mobile\, Contactless\, THE FUNDAMENTALS – A Deep Dive for Acquirers & Issuers
DESCRIPTION:EMV\, Mobile\, Contactless\, The Fundamentals – A Deep Dive for Acquirers and Issuers\nThis is an extensive EMV workshop\, which covers EMV from beginning to end.  This extensive technical fundamentals workshop takes an in depth look at EMV\, Contactless NFC and Mobile Payment systems and technologies. The workshop covers standards\, protocols as well as implementation strategies. You will learn the EMV transaction’s flows and how it impacts the issuing and acquiring systems. You will also learn the standards for contactless NFC transactions and mobile payment components. \nCoursework includes card payments\, EMV fundamentals\, contactless architecture\, mobile design\, migration strategies and business case for Acquirers and Issuers   The course is both theory and hands on with practical demonstrations using the latest technology tools and products.  In addition\, the course spend significant time on the post EMV migration challenges faced by companies. \nWho Should Attend:\n\nProduct Development and Product Marketing\nAnybody needing a deep dive on EMV\, Mobile NFC\nOperations\, Engineering\nIT and Technical Departments\nDevelopers and Manufacturers of Cards\, Terminals and Payment Systems\nProduct marketing\n\nWorkshop Outline:\nDay One – EMV\n\n Understand EMV Chip -with ISO 7816 explained\n Chip transaction formats\n Discuss basic terms and concepts used in EMV\n Understand the different approaches and standards of MasterCard\, VISA\, EMVCo\, to EMV\, Contactless and Mobile Technologies\n EMV Commands\n Benefits of EMV\, including reduction in fraud\, provision of multi-applications and offline risk  management\n Review EMV certifications and compliance requirements\n Review personalization of EMV cards and systems\n Understand EMV migration impact on issuers\, acquirers\, and terminal/card vendors\n Review ISO 8583 message formats and EMV field\n Discuss transaction flow for EMV – Describe the 12 stages of the EMV transaction\n Demonstrate using a real EMV card an EMV transaction and show each stage using emulated host\nExplore EMV migration challenges and strategies\n\nDay Two – EMV Contactless and Mobile Payments\n\n Understand key decisions for EMV and review best business model development\n EMV online and offline PIN management\n Describe the EMV data encryption methods\n Review Key Management and security aspects of EMV\n Contactless market overview\n Understand use and benefit of contactless applications\n Review Contactless Standards PayPass\, PayWave\, EMVCo Contactless\n Transaction flow for MasterCard PayPass and Visa payWave\n Security aspects of contactless payment applications\n Online contactless transactions handling for authorization systems\n Review the latest mobile/NFC technologies\n Discuss Mobile Payment components – SE\, TSM\, OTA\n Review Card and Application Management System\n Review OTA and scripting\n Review Issuer host integration\, how-to send scripts OTA\nDescribe provisioning and mobile handsets\n Understand PIN management\, PIN usage options\n Payment applet – User Interface relationships\, Middlet\n\n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-02-emv-2-day-mobile-contactless-the-fundamentals-a-deep-dive-for-acquirers-issuers/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T090000
DTEND;TZID=America/New_York:20240301T170000
DTSTAMP:20260415T202620
CREATED:20240212T161158Z
LAST-MODIFIED:20240212T181953Z
UID:12108-1709110800-1709312400@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course
DESCRIPTION:PA-24B – A 3-Day Payment Tokenization Product Planning February 28-March 1\, 2024 \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course-2/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240226T090000
DTEND;TZID=America/New_York:20240301T170000
DTSTAMP:20260415T202620
CREATED:20240212T160234Z
LAST-MODIFIED:20240212T181432Z
UID:12103-1708938000-1709312400@securepaymentsacademy.com
SUMMARY:SPA-24 – 5-Day Payments Tokenization Deep-Dive – Toronto
DESCRIPTION:SPA-24 – 5-Day Payments Tokenization Deep-Dive – Toronto – February 26-March 1\, 2024\n\nA Deep Dive into Payments Tokenization \nLeveraging\, Productizing and Monetizing Tokens \n5-Day Payments Tokenization Deep-Dive \nSPA-24 – A 5-Day Payment Tokenization Deep Dive – Why a course on Payments Tokenization. \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization really works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\nAim of this Course \nThis 5 day deep dive first provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization . These key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe deep dive then provides a road map for the monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers . The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in tokenization\nDefine a business case and SWOT analysis for the delegate’s organization\nIllustrate how tokens function\nSpecify the organizational responsibilities\nSpecify core business & system processes\nIdentify tokenization leaders & authorities\nIdentify future of payments tokenization\nSpecify the operational responsibilities\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nIdentify the business costs and benefits\nEvaluate stakeholder business cases\nUndertake go/no go decision making\nWho Should Attend:This course is specifically designed for organizations that must make a decision as to whether or not the organization should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’.\n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Courses: \nThis course provides a deep dive into payments tokenization over a five day in depth program. Delegates can also cover the topics through two separate breakout courses – a two day session focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization (for further information on this breakout course number SPA-24A\, please click HERE)\, and a separate three day session focused on the monetization of payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment. (for further information on this breakout course number SPA-24B\, please click HERE). \n Program Details: \nThis Tokenization Deep Dive workshop includes at least 4 hands on exercises by the attendees to reinforce the daily learnings. \nDay 1 – Why Payments Tokenization? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – What is the Market Potential for Tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 4 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 5 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 5-day course. \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc.\n\n\n\n  \n\nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payments-tokenization-deep-dive-toronto/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240226T090000
DTEND;TZID=America/New_York:20240227T170000
DTSTAMP:20260415T202620
CREATED:20240212T160654Z
LAST-MODIFIED:20240212T181718Z
UID:12105-1708938000-1709053200@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. February 26-27\, 2024 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course-2/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240220T090000
DTEND;TZID=America/New_York:20240221T170000
DTSTAMP:20260415T202620
CREATED:20240212T154904Z
LAST-MODIFIED:20240212T174456Z
UID:12101-1708419600-1708534800@securepaymentsacademy.com
SUMMARY:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems
DESCRIPTION:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems \nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to answer many questions that have arisen post COVID-19\, titled: eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems. \neCommerce and online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or better known as Card Not Present Fraud (CNP). In order to understand how  to combat fraud\, an understanding if the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. These are in addition to the EMVCo specifications 3DS2.2 that encourages merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the two days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks will be described. \nThere are newer techniques that are real technology and can detect fraudulent transactions with certainty. All these will be discussed in the two day workshop. \nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 – Introduction to eCommerce Payments \n\nDifferences between Card Present and Card Not Present transactions\nCard Present Fraud deterrent Technology\nCard Not Present Fraud Detection\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – CNP Fraud Detection Systems \n\nCNP Fraud\nCNP Fraud Types\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing affect on Encryption\nQC Safe Processing and Data protection\n\nSPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the new eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-18-2-days-ecommerce-payments-and-cnp-fraud-types-fraud-detection-and-fraud-mitigation-systems-2/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240219T090000
DTEND;TZID=America/New_York:20240221T170000
DTSTAMP:20260415T202620
CREATED:20240212T154159Z
LAST-MODIFIED:20240212T174122Z
UID:12097-1708333200-1708534800@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\n\n\nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-6/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231127
DTEND;VALUE=DATE:20231202
DTSTAMP:20260415T202620
CREATED:20230910T165032Z
LAST-MODIFIED:20230910T165532Z
UID:12013-1701043200-1701475199@securepaymentsacademy.com
SUMMARY:SPA-24 5-Day Payment Tokenization Deep-Dive Training Program
DESCRIPTION:A Deep Dive into Payments Tokenization:\nLeveraging\, Productizing and Monetizing Tokens\n\nHighlights\nTokenization can add significant value to your business\, OR it can disintermediate you from your customers. Which will it be? This 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nWhy a course on Payments Tokenization\, and why now?\nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However\, the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. \nTokenization can add significant value to your business\nProperly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors\, issuers and their clients. \nOr\, Tokenization can disintermediate you from your customers\nConversely\, failure to properly manage payments tokenization services by third parties is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\n Aim of the Course:\nThis 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nThe business oriented introduction to tokenization addresses how it works\, who the key stakeholders are and the roles they play in controlling the business and data generated by payments tokenization. Key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe road map for monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers focuses on how tokenization works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes:\nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to their organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in the tokenization ecosystem\nDefine a business case and SWOT analysis for their organization\nDescribe how tokens function within the payments environment\nSpecify core business processes\, system processes and organizational responsibilities in the context of their organization\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nEvaluate the costs\, benefits and business cases for tokenization\nIdentify important implementation considerations\nUndertake go/no go decision making\n\nWho Should Attend:\nThis course is specifically designed for organizations that must make a decision as to whether they should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nCourse Overview\nDay 1 – Why Payments Tokenization? \nThe potential of payments tokenization \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nThe importance of payments tokenization \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat business needs to know \n\nThe lifecycle of a payments token\nTokenization in the payments ecosystem\nIntroducing the tokenization data model\n\nLessons learned in adopting tokenization \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – The Business of Payments Tokenization\nThe market potential for tokenization \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nThe key players in tokenization \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nMonetizing payments tokenization \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from implementations\n\nGetting to a business case for tokenization \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization\n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nTaxonomy of tokenization offerings\nSoftware and services vendors\nCard scheme tokenization deconstructed\n\nDay 4 – The System of Tokenization\n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\n\nDay 5 – The Business of Tokenization\n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nThe business case for\n\nMerchants\nIssuers\nProcessors\n\n\nQuestions and decisions by\n\nMerchants\nIssuers\nProcessors\n\n\nCONCLUSION: The high stakes for payments stakeholders\n\nApproach:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The training program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this course. \nCredits \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payment-tokenization-deep-dive-training-program/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231127
DTEND;VALUE=DATE:20231130
DTSTAMP:20260415T202620
CREATED:20230604T183053Z
LAST-MODIFIED:20230604T183053Z
UID:11926-1701043200-1701302399@securepaymentsacademy.com
SUMMARY:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks
DESCRIPTION:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks\n\nOverview of Digital Payment World with ID at Its Core \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new two–day course to Digital identification\, currencies and how the new digital banks operate. \nDuring this three-day workshop\, attendees will be introduced to the structure of the digital world in payments and banking. In the new digital environment\, before any transactions or services can be delivered\, the user must be identified. This Digital Identification is based on several criteria to ensure correct identification of the user. Once the user is identified\, a range of services are offered to the user. During the first day digital Identification is discussed\, including its Attributes\, Credentials\, Validating and then Verifying the digital id\, using an authenticator device. \nOn the second day of the workshop\, digital currencies are described including the Central Bank Digital Currency. Many countries and their central banks globally have started initiatives to develop a centralized digital currency that can be used by all their citizens providing additional features over and above current payment platforms. Stable Coin is then described and compared with CBDC use cases. The de-centralized digital currencies\, such as Bitcoin and their underlying distributed accounting system\, such as Blockchain\, are described. The pros and cons of decentralized systems are discussed. \nAs financial institutions become more familiar with the use of digital technologies in order to reduce costs and increase efficiencies\, many FinTech companies have begun delivering a multitude of applications. These are described during the third day of the workshop\, including their advantages over the legacy systems. Digital Banks\, or Neo Banks\, are created to provide services to clients in a more efficient manner at much reduced cost. The Neo Banks in addition to delivering traditional services to their clients\, can provide other services that previously were only available in brick and mortar banks and with face-to-face interaction with the bank staff. These issues and how the mindset of the legacy banking needs to be changed will be described and discussed during this course. \nWho should Attend: \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 – Digital ID and Digital Currency \n\nWhat is Digital Identification\nAttributes of Identity\nCredentials\nValidation & Verification\nAuthenticator\nDigital Lifecycle\nDigital ID Models and Privacy Regulations\nDigital Credentials Adoption\n\nDay 2 – Digital Currency \n\nDigital Currency\nCentral Bank Digital Currency\nInternational CBDC projects\nStable Coin\nBitcoin Methodology\nBitcoin Technology\nBlockchain Technology\n\nDay 3 – Fintech and Neo Banks \n\nFintech – Financial Technology\nRange of applications\nConversion of traditional financial delivery\nNew methodologies for digital service delivery\nIntroduction to Digital Banking /Neo Banking\nThe new model of digital banking\nChange of mindset on digital banking\nDigital Bank Architecture\nIntegration with legacy banking\n\nSPA-23: 3-Days – Digital ID\, Digital Currency\, FinTech and Neo Banks workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. This course is a deep dive guide into “How to bring the established banking services into the digital age”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. For more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-23-3-days-digital-id-digital-currency-fintech-and-neo-banks/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
END:VCALENDAR