BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Secure Payments Academy - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Secure Payments Academy
X-ORIGINAL-URL:https://securepaymentsacademy.com
X-WR-CALDESC:Events for Secure Payments Academy
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20241027T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240318T080000
DTEND;TZID=America/New_York:20240319T170000
DTSTAMP:20260415T220924
CREATED:20240212T163318Z
LAST-MODIFIED:20240212T182716Z
UID:12118-1710748800-1710867600@securepaymentsacademy.com
SUMMARY:SPA-22: 2-Day – SPA Payment Tokenization
DESCRIPTION:SPA-22: 2-Day – Payment Tokenization\n\nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to describe payment tokenization\, its technology and use cases. \nDuring the last two decades card payments have moved from using magnetic stripe cards to EMV chip cards. This migration has been very effective in providing secure transactions for in-person payments. With the improvements in internet speeds and its availability globally\, more purchases are moving online. This provides ease of use and convenience for the consumer. \nIn parallel\, mobile smart phones have become capable of conducting payments transactions using the smartphone hardware – both for in-person and online payments. In order to create a safe online payment environment\, the card networks and stakeholders have created a number of technologies that help the promotion of card-not-present payments. The key technology used is payment tokenization. The first day of this course covers overview of the workings of payment tokenization\, how tokens are created\, where they are saved and how they are used. On the second day of the course\, major use cases for the tokenization are described in addition to card-on-file use cases and how they are processes. \nDuring these two days\, the relationship between payment tokenization and other new payment technologies\, such as 3DS and SRC\, are described. \n Who should Attend: \n\nIssuer/Processor Architects\nMerchant System Operations\nData Analysis team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 –Payment Tokenization \n\nTokenization Overview\nImplementation Considerations for Tokenization\nSecurity Considerations for Tokenization\nSummary & Conclusions\nTokenization Services\nType of Tokens\nPayment Tokenization Process\nSecurity in the Tokenization\nToken Service Provider Services\nToken Lifecycle Management\n\nDay 2 – Tokenization Use Cases \n\nUse Case Overview\nTokenization Implementation Processes\nTokenization Use Case Scenarios\nIn-Store contactless – Provisioning and Transaction Processing\nIn-App Payments – Transaction Processing\nMerchant CoF\, Pay Button\, Wearables\, IoT\nCard-on-file (CoF) tokenization in a Payment Vault\\nConsiderations for CoF Tokenization\n\nSPA-22: 2-Day – Payment Tokenization workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to adopt the payment tokenization technology in the new mobile centric world”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.\n\n\n\n\nFacebookTwitterLinkedInEmail
URL:https://securepaymentsacademy.com/event/spa-22-2-day-spa-payment-tokenization/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240304T080000
DTEND;TZID=America/New_York:20240304T120000
DTSTAMP:20260415T220924
CREATED:20240212T231551Z
LAST-MODIFIED:20240212T231551Z
UID:12247-1709539200-1709553600@securepaymentsacademy.com
SUMMARY:SPA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing – Online
DESCRIPTION:SPA-24 C: 4 Hours – Payment Fraud – Payments Tokenization Briefing \n Payments Tokenization in the Real Business World: Is Payments Tokenization Relevant to MY Business? \nWhy are we talking about Payments Tokenization? \nRetail Payments Tokenization has been available for some time and there has been broad market acceptance of tokenization services. These current tokenization offerings and technologies are only the first generation of a very powerful and emerging payments acceptance management capability for merchants and corporates. \nNext generation payments tokenization enables a much more in depth and responsive relationship with the merchant or corporate client\, such as through very highly focused credit terms and loyalty programs. Conversely\, tokenization services can also potentially disintermediate the payment acceptor from their clients\, as the PAN and related customer data may no longer be available to the merchant or corporate. \nIt all depends on the architecture and options taken by the merchant or corporate in implementing tokenization for their payment acceptance processes. And there are many options. \nAim of The Course: \nThis highly interactive 4-hour briefing provides clarity as to how tokenization works\, who the stakeholders are\, what tokenization can do beyond fraud controls\, and the types of costs and benefits from tokenization a merchant or corporate can expect. \nThe aim of this briefing is to help the attendee make a decision as to whether or not next generation tokenization is of interest to the organization\, and warrants further investigation. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify where the next generation of tokenization may be of value to the attendee’s organization\nDescribe how tokenization V.2 may address problems of the attendee’s organization\nAnalyze the potential business case factors for next generation tokenization\nIdentify considerations for decision making by the attendee’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offerings in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 4-hour Tokenization briefing is a precursor to our 2-Day Payments Tokenization Business Planning and 3-Day Payments Tokenization Product Planning Courses The combined 2-day and 3-day courses are also offered as 5-day program. \nDelegates who register for the 2-day introductory course as well as the 3-day deep dive course will receive a 10% discount on the combined package (applied at checkout). Alternatively\, register for the full 5-day program here. \n  \nCredits \nSPA-24C: 4 Hour Payments Tokenization Briefing\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-c-4-hours-payment-fraud-payments-tokenization-briefing-online/
LOCATION:Online
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240301T080000
DTEND;TZID=America/New_York:20240302T170000
DTSTAMP:20260415T220924
CREATED:20240212T163024Z
LAST-MODIFIED:20240212T182438Z
UID:12116-1709280000-1709398800@securepaymentsacademy.com
SUMMARY:SPA-02: EMV\, 2-Day Mobile\, Contactless\, THE FUNDAMENTALS – A Deep Dive for Acquirers & Issuers
DESCRIPTION:EMV\, Mobile\, Contactless\, The Fundamentals – A Deep Dive for Acquirers and Issuers\nThis is an extensive EMV workshop\, which covers EMV from beginning to end.  This extensive technical fundamentals workshop takes an in depth look at EMV\, Contactless NFC and Mobile Payment systems and technologies. The workshop covers standards\, protocols as well as implementation strategies. You will learn the EMV transaction’s flows and how it impacts the issuing and acquiring systems. You will also learn the standards for contactless NFC transactions and mobile payment components. \nCoursework includes card payments\, EMV fundamentals\, contactless architecture\, mobile design\, migration strategies and business case for Acquirers and Issuers   The course is both theory and hands on with practical demonstrations using the latest technology tools and products.  In addition\, the course spend significant time on the post EMV migration challenges faced by companies. \nWho Should Attend:\n\nProduct Development and Product Marketing\nAnybody needing a deep dive on EMV\, Mobile NFC\nOperations\, Engineering\nIT and Technical Departments\nDevelopers and Manufacturers of Cards\, Terminals and Payment Systems\nProduct marketing\n\nWorkshop Outline:\nDay One – EMV\n\n Understand EMV Chip -with ISO 7816 explained\n Chip transaction formats\n Discuss basic terms and concepts used in EMV\n Understand the different approaches and standards of MasterCard\, VISA\, EMVCo\, to EMV\, Contactless and Mobile Technologies\n EMV Commands\n Benefits of EMV\, including reduction in fraud\, provision of multi-applications and offline risk  management\n Review EMV certifications and compliance requirements\n Review personalization of EMV cards and systems\n Understand EMV migration impact on issuers\, acquirers\, and terminal/card vendors\n Review ISO 8583 message formats and EMV field\n Discuss transaction flow for EMV – Describe the 12 stages of the EMV transaction\n Demonstrate using a real EMV card an EMV transaction and show each stage using emulated host\nExplore EMV migration challenges and strategies\n\nDay Two – EMV Contactless and Mobile Payments\n\n Understand key decisions for EMV and review best business model development\n EMV online and offline PIN management\n Describe the EMV data encryption methods\n Review Key Management and security aspects of EMV\n Contactless market overview\n Understand use and benefit of contactless applications\n Review Contactless Standards PayPass\, PayWave\, EMVCo Contactless\n Transaction flow for MasterCard PayPass and Visa payWave\n Security aspects of contactless payment applications\n Online contactless transactions handling for authorization systems\n Review the latest mobile/NFC technologies\n Discuss Mobile Payment components – SE\, TSM\, OTA\n Review Card and Application Management System\n Review OTA and scripting\n Review Issuer host integration\, how-to send scripts OTA\nDescribe provisioning and mobile handsets\n Understand PIN management\, PIN usage options\n Payment applet – User Interface relationships\, Middlet\n\n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-02-emv-2-day-mobile-contactless-the-fundamentals-a-deep-dive-for-acquirers-issuers/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T090000
DTEND;TZID=America/New_York:20240301T170000
DTSTAMP:20260415T220924
CREATED:20240212T161158Z
LAST-MODIFIED:20240212T181953Z
UID:12108-1709110800-1709312400@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course
DESCRIPTION:PA-24B – A 3-Day Payment Tokenization Product Planning February 28-March 1\, 2024 \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course-2/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240226T090000
DTEND;TZID=America/New_York:20240301T170000
DTSTAMP:20260415T220924
CREATED:20240212T160234Z
LAST-MODIFIED:20240212T181432Z
UID:12103-1708938000-1709312400@securepaymentsacademy.com
SUMMARY:SPA-24 – 5-Day Payments Tokenization Deep-Dive – Toronto
DESCRIPTION:SPA-24 – 5-Day Payments Tokenization Deep-Dive – Toronto – February 26-March 1\, 2024\n\nA Deep Dive into Payments Tokenization \nLeveraging\, Productizing and Monetizing Tokens \n5-Day Payments Tokenization Deep-Dive \nSPA-24 – A 5-Day Payment Tokenization Deep Dive – Why a course on Payments Tokenization. \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization really works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\nAim of this Course \nThis 5 day deep dive first provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization . These key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe deep dive then provides a road map for the monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers . The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in tokenization\nDefine a business case and SWOT analysis for the delegate’s organization\nIllustrate how tokens function\nSpecify the organizational responsibilities\nSpecify core business & system processes\nIdentify tokenization leaders & authorities\nIdentify future of payments tokenization\nSpecify the operational responsibilities\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nIdentify the business costs and benefits\nEvaluate stakeholder business cases\nUndertake go/no go decision making\nWho Should Attend:This course is specifically designed for organizations that must make a decision as to whether or not the organization should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’.\n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Courses: \nThis course provides a deep dive into payments tokenization over a five day in depth program. Delegates can also cover the topics through two separate breakout courses – a two day session focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization (for further information on this breakout course number SPA-24A\, please click HERE)\, and a separate three day session focused on the monetization of payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment. (for further information on this breakout course number SPA-24B\, please click HERE). \n Program Details: \nThis Tokenization Deep Dive workshop includes at least 4 hands on exercises by the attendees to reinforce the daily learnings. \nDay 1 – Why Payments Tokenization? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – What is the Market Potential for Tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 4 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 5 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 5-day course. \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc.\n\n\n\n  \n\nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payments-tokenization-deep-dive-toronto/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240226T090000
DTEND;TZID=America/New_York:20240227T170000
DTSTAMP:20260415T220924
CREATED:20240212T160654Z
LAST-MODIFIED:20240212T181718Z
UID:12105-1708938000-1709053200@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. February 26-27\, 2024 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course-2/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Techology Srategies Intertional":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240220T090000
DTEND;TZID=America/New_York:20240221T170000
DTSTAMP:20260415T220924
CREATED:20240212T154904Z
LAST-MODIFIED:20240212T174456Z
UID:12101-1708419600-1708534800@securepaymentsacademy.com
SUMMARY:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems
DESCRIPTION:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems \nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to answer many questions that have arisen post COVID-19\, titled: eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems. \neCommerce and online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or better known as Card Not Present Fraud (CNP). In order to understand how  to combat fraud\, an understanding if the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. These are in addition to the EMVCo specifications 3DS2.2 that encourages merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the two days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks will be described. \nThere are newer techniques that are real technology and can detect fraudulent transactions with certainty. All these will be discussed in the two day workshop. \nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 – Introduction to eCommerce Payments \n\nDifferences between Card Present and Card Not Present transactions\nCard Present Fraud deterrent Technology\nCard Not Present Fraud Detection\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – CNP Fraud Detection Systems \n\nCNP Fraud\nCNP Fraud Types\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing affect on Encryption\nQC Safe Processing and Data protection\n\nSPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the new eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-18-2-days-ecommerce-payments-and-cnp-fraud-types-fraud-detection-and-fraud-mitigation-systems-2/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240219T090000
DTEND;TZID=America/New_York:20240221T170000
DTSTAMP:20260415T220924
CREATED:20240212T154159Z
LAST-MODIFIED:20240212T174122Z
UID:12097-1708333200-1708534800@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\n\n\nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-6/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231127
DTEND;VALUE=DATE:20231202
DTSTAMP:20260415T220924
CREATED:20230910T165032Z
LAST-MODIFIED:20230910T165532Z
UID:12013-1701043200-1701475199@securepaymentsacademy.com
SUMMARY:SPA-24 5-Day Payment Tokenization Deep-Dive Training Program
DESCRIPTION:A Deep Dive into Payments Tokenization:\nLeveraging\, Productizing and Monetizing Tokens\n\nHighlights\nTokenization can add significant value to your business\, OR it can disintermediate you from your customers. Which will it be? This 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nWhy a course on Payments Tokenization\, and why now?\nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However\, the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. \nTokenization can add significant value to your business\nProperly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors\, issuers and their clients. \nOr\, Tokenization can disintermediate you from your customers\nConversely\, failure to properly manage payments tokenization services by third parties is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\n Aim of the Course:\nThis 5 day deep dive into tokenization provides: \n\na business oriented introduction to tokenization\na monetization road map for new products and service offerings\n\nThe business oriented introduction to tokenization addresses how it works\, who the key stakeholders are and the roles they play in controlling the business and data generated by payments tokenization. Key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe road map for monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers focuses on how tokenization works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes:\nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to their organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in the tokenization ecosystem\nDefine a business case and SWOT analysis for their organization\nDescribe how tokens function within the payments environment\nSpecify core business processes\, system processes and organizational responsibilities in the context of their organization\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nEvaluate the costs\, benefits and business cases for tokenization\nIdentify important implementation considerations\nUndertake go/no go decision making\n\nWho Should Attend:\nThis course is specifically designed for organizations that must make a decision as to whether they should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nCourse Overview\nDay 1 – Why Payments Tokenization? \nThe potential of payments tokenization \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nThe importance of payments tokenization \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat business needs to know \n\nThe lifecycle of a payments token\nTokenization in the payments ecosystem\nIntroducing the tokenization data model\n\nLessons learned in adopting tokenization \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – The Business of Payments Tokenization\nThe market potential for tokenization \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nThe key players in tokenization \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nMonetizing payments tokenization \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from implementations\n\nGetting to a business case for tokenization \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization\n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nTaxonomy of tokenization offerings\nSoftware and services vendors\nCard scheme tokenization deconstructed\n\nDay 4 – The System of Tokenization\n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\n\nDay 5 – The Business of Tokenization\n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nThe business case for\n\nMerchants\nIssuers\nProcessors\n\n\nQuestions and decisions by\n\nMerchants\nIssuers\nProcessors\n\n\nCONCLUSION: The high stakes for payments stakeholders\n\nApproach:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The training program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this course. \nCredits \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International Inc. and VCS Technologies Inc.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payment-tokenization-deep-dive-training-program/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231127
DTEND;VALUE=DATE:20231130
DTSTAMP:20260415T220924
CREATED:20230604T183053Z
LAST-MODIFIED:20230604T183053Z
UID:11926-1701043200-1701302399@securepaymentsacademy.com
SUMMARY:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks
DESCRIPTION:SPA-23: 3-Days – Digital ID\, Digital Currency\, Fintech\, and Neo Banks\n\nOverview of Digital Payment World with ID at Its Core \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new two–day course to Digital identification\, currencies and how the new digital banks operate. \nDuring this three-day workshop\, attendees will be introduced to the structure of the digital world in payments and banking. In the new digital environment\, before any transactions or services can be delivered\, the user must be identified. This Digital Identification is based on several criteria to ensure correct identification of the user. Once the user is identified\, a range of services are offered to the user. During the first day digital Identification is discussed\, including its Attributes\, Credentials\, Validating and then Verifying the digital id\, using an authenticator device. \nOn the second day of the workshop\, digital currencies are described including the Central Bank Digital Currency. Many countries and their central banks globally have started initiatives to develop a centralized digital currency that can be used by all their citizens providing additional features over and above current payment platforms. Stable Coin is then described and compared with CBDC use cases. The de-centralized digital currencies\, such as Bitcoin and their underlying distributed accounting system\, such as Blockchain\, are described. The pros and cons of decentralized systems are discussed. \nAs financial institutions become more familiar with the use of digital technologies in order to reduce costs and increase efficiencies\, many FinTech companies have begun delivering a multitude of applications. These are described during the third day of the workshop\, including their advantages over the legacy systems. Digital Banks\, or Neo Banks\, are created to provide services to clients in a more efficient manner at much reduced cost. The Neo Banks in addition to delivering traditional services to their clients\, can provide other services that previously were only available in brick and mortar banks and with face-to-face interaction with the bank staff. These issues and how the mindset of the legacy banking needs to be changed will be described and discussed during this course. \nWho should Attend: \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nIT and Technical Departments\n\nDay 1 – Digital ID and Digital Currency \n\nWhat is Digital Identification\nAttributes of Identity\nCredentials\nValidation & Verification\nAuthenticator\nDigital Lifecycle\nDigital ID Models and Privacy Regulations\nDigital Credentials Adoption\n\nDay 2 – Digital Currency \n\nDigital Currency\nCentral Bank Digital Currency\nInternational CBDC projects\nStable Coin\nBitcoin Methodology\nBitcoin Technology\nBlockchain Technology\n\nDay 3 – Fintech and Neo Banks \n\nFintech – Financial Technology\nRange of applications\nConversion of traditional financial delivery\nNew methodologies for digital service delivery\nIntroduction to Digital Banking /Neo Banking\nThe new model of digital banking\nChange of mindset on digital banking\nDigital Bank Architecture\nIntegration with legacy banking\n\nSPA-23: 3-Days – Digital ID\, Digital Currency\, FinTech and Neo Banks workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. This course is a deep dive guide into “How to bring the established banking services into the digital age”. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. For more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-23-3-days-digital-id-digital-currency-fintech-and-neo-banks/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231107
DTEND;VALUE=DATE:20231108
DTSTAMP:20260415T220924
CREATED:20230604T182623Z
LAST-MODIFIED:20230604T182623Z
UID:11920-1699315200-1699401599@securepaymentsacademy.com
SUMMARY:SPA-07: 1 Day New Payments\, Business Cases and Business Issues with Fintech for Executives
DESCRIPTION:SPA-07: 1 Day New Payments\, Business Cases and Business Issues with Fintech for Executives\n\nOne Day Course on New Payments and Business Challenges with Fintech for Executives\nCourse Overview\nWhat are the New Payment Channels? How is EMV Impacting the ROI? When do Mobile Payments become Mainstream? What can you gain by upgrading ATMs? How Can Tokenization Reduce Fraud? What is the impact of BlockChain on the Banks? Workshop \nDesigned for business executives\, this course reviews new payment channels from the business point of view. We examine the costs associated with EMV implementation and its ROI. Mobile payment wallets are discussed and views of industry insiders are explained on the future of mobile payments. The course also looks at how the use of tokenization helps reduce fraud and add to the bottom line. This course describes the business needs behind the changes proposed for the current ATMs. The workshop also focusing on new technologies such as Blockchain and its growing popularity. \nCourse 7 demystifies the worlds of Blockchain and Bitcoin enabling students and their companies to better understand what it means for their businesses. The course provides a “how to” guide for leveraging these new technologies as well as strategies for incorporating them into current payments systems for the executives. \nThis course includes test and Certification. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-07-1-day-new-payments-business-cases-and-business-issues-with-fintech-for-executives/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231106
DTEND;VALUE=DATE:20231107
DTSTAMP:20260415T220924
CREATED:20230604T182154Z
LAST-MODIFIED:20230604T182154Z
UID:11914-1699228800-1699315199@securepaymentsacademy.com
SUMMARY:SPA-16 1-Day Blockchain Fundamentals\, Demystifying the Worlds of Blockchain and Bitcoin
DESCRIPTION:SPA-16 1-Day Blockchain Fundamentals\, Demystifying the Worlds of Blockchain and Bitcoin\n\nWHAT Is Blockchain and Bitcoin ? \nAmerica’s Payments Academy is pleased to bring you a new one-day Blockchain and Bitcoin workshop.  This first of its kind workshop explores the new Bitcoin cryptocurrency and its underlying platform – Blockchain. The workshop demystifies the worlds of Blockchain and Bitcoin enabling attendees and their companies to understand what it means for their businesses. The course provides a “how to” guide for leveraging these new technologies as well as strategies for incorporating them into current payments systems. \nThis is an easy-to-understand introduction into the key concepts\, practical implications and opportunities that these technologies bring to financial services and other sectors includes: \n\nKey characteristics of Bitcoin and Blockchain\nHow the technology works\nUnderstanding the distributed ledger\nBlockchain models and economies\nApplications in finance and regulatory issues\nThe opportunities\, challenges and constraints\n\nThe Blockchain\, Blockchain Fundamentals\, Demystifying the Worlds of Blockchain and Bitcoin workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies. \nStudents will receive a course workbook and completion certificate at the conclusion of this 1 day workshop. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-16-1-day-blockchain-fundamentals-demystifying-the-worlds-of-blockchain-and-bitcoin/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231030T080000
DTEND;TZID=America/New_York:20231101T170000
DTSTAMP:20260415T220924
CREATED:20230711T190906Z
LAST-MODIFIED:20230711T190906Z
UID:11985-1698652800-1698858000@securepaymentsacademy.com
SUMMARY:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security
DESCRIPTION:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security\n\nOverview of Payment Systems and operations with stakeholders\, Payment Security for card and online fraud detection and mitigation \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new three –day course Payment Fundamentals\, Digital Payment Frameworks and Payment Security. \nThis training program examines the history of payments history\, culminating in the current models used internationally. We analyze the different parties in a payment eco system and review the current payment technology platforms We also examine the creation\, securitization and processing of payment transactions\, some of the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. \nDuring the program we will focus on the dynamic digital transactions-based platforms and payment technologies that are being deployed in the market today\, such as EMV\, contactless and Mobile Payments. We will also delve into emerging developments such as tokenization\, 3D-Secure and blockchain. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the main features of different payment system types\nEvaluate payment system domains\, settlement and risk\nAnalyze digital payments and advantages provided by EMV\nExplain how blockchain works and describe its essential features\nAnalyze different fraud types\nEvaluate different fraud mitigation techniques for CNP environments\n\nWho should Attend: \n\nPeople new to the field of payments processing\nPayment Systems Operations and Engineering\nFraud Analysts\nRisk Assessors\nProduct Development and Product Marketing\nVendors of CNP fraud detection Systems\nBanking services development team\nProcess engineering team\nSystem Network Operators\nIT Operations\n\nProgram Details:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The workshop program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day program. \nDay 1 – Payment System Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – Digital Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nIntroduction to Blockchain and Bitcoin Technologies\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nIntroduction to EMV Tokenization\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Fraud \n\nDetailed Payment Fraud Types\nReview of fraud mitigation techniques\nNew Payment channels – in US Zelle\, PayPal etc.\nEMV Tokenization to overcome specific fraud types\nEMV 3D-Secure to secure online transactions\nEMV Secure Remote Commerce (SRC) platform for all online payment transactions security\nReview of the training\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact.
URL:https://securepaymentsacademy.com/event/spa-20-3-days-payment-fundamentals-digital-payment-frameworks-and-payment-security-4/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231023
DTEND;VALUE=DATE:20231026
DTSTAMP:20260415T220924
CREATED:20230604T181731Z
LAST-MODIFIED:20230604T181731Z
UID:11908-1698019200-1698278399@securepaymentsacademy.com
SUMMARY:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security
DESCRIPTION:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security\n\nOverview of Payment Systems and operations with stakeholders\, Payment Security for card and online fraud detection and mitigation \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new three –day course Payment Fundamentals\, Digital Payment Frameworks and Payment Security. \nThis training program examines the history of payments history\, culminating in the current models used internationally. We analyze the different parties in a payment eco system and review the current payment technology platforms We also examine the creation\, securitization and processing of payment transactions\, some of the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. \nDuring the program we will focus on the dynamic digital transactions-based platforms and payment technologies that are being deployed in the market today\, such as EMV\, contactless and Mobile Payments. We will also delve into emerging developments such as tokenization\, 3D-Secure and blockchain. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the main features of different payment system types\nEvaluate payment system domains\, settlement and risk\nAnalyze digital payments and advantages provided by EMV\nExplain how blockchain works and describe its essential features\nAnalyze different fraud types\nEvaluate different fraud mitigation techniques for CNP environments\n\nWho should Attend: \n\nPeople new to the field of payments processing\nPayment Systems Operations and Engineering\nFraud Analysts\nRisk Assessors\nProduct Development and Product Marketing\nVendors of CNP fraud detection Systems\nBanking services development team\nProcess engineering team\nSystem Network Operators\nIT Operations\n\nProgram Details:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The workshop program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day program. \nDay 1 – Payment System Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – Digital Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nIntroduction to Blockchain and Bitcoin Technologies\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nIntroduction to EMV Tokenization\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Fraud \n\nDetailed Payment Fraud Types\nReview of fraud mitigation techniques\nNew Payment channels – in US Zelle\, PayPal etc.\nEMV Tokenization to overcome specific fraud types\nEMV 3D-Secure to secure online transactions\nEMV Secure Remote Commerce (SRC) platform for all online payment transactions security\nReview of the training\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact.
URL:https://securepaymentsacademy.com/event/spa-20-3-days-payment-fundamentals-digital-payment-frameworks-and-payment-security-3/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231016T080000
DTEND;TZID=America/New_York:20231018T170000
DTSTAMP:20260415T220924
CREATED:20230711T190310Z
LAST-MODIFIED:20230711T190310Z
UID:11979-1697443200-1697648400@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-5/
LOCATION:Toronto\, Canada
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231010
DTEND;VALUE=DATE:20231013
DTSTAMP:20260415T220924
CREATED:20230604T181240Z
LAST-MODIFIED:20230604T181240Z
UID:11902-1696896000-1697155199@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-4/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231010
DTEND;VALUE=DATE:20231012
DTSTAMP:20260415T220924
CREATED:20230910T014823Z
LAST-MODIFIED:20230910T020916Z
UID:12004-1696896000-1697068799@securepaymentsacademy.com
SUMMARY:SPA-18 2-Days e-Commerce Payments and CNP Fraud
DESCRIPTION:e-Commerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems\nCourse Context\nCard Not Present (e-Commerce) online transactions have grown rapidly since the advent of COVID-19 and remains elevated as more and more consumers shift to online shopping. This has been accompanied by a sharp increase in Card Not Present (CNP) Fraud. This course aims to provide delegates with actionable insights on how to combat e-commerce payment fraud by delving into the different technologies and standards that have emerged to detect and combat fraud in the payments space. \nLearning Outcomes\nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card not present transactions.\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend:\n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\n\nCourse Overview\nDay 1 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation\n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCNP Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nTokenization\nQuantum Computing effect on fraud and encryption\nQC Safe Processing and Data protection\n\nDay 2 – Payment Card Fraud – FIDO\, 3DS and SRC for CNP Fraud and Mitigation\n\nFIDO (Fast Identity Online)\nIntroduction EMVCo 3DS2.2\nComponents of 3DS2.2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2.2 system\nSRC/One Click Standards\nLive 2-factor authentication demonstration\nPCI DSS\n\nApproach\nOur training programs aim to provide an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. It includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nDelegates will receive a course workbook and completion certificate at the conclusion of the program. For more information about our upcoming schedule\, visit the Workshop Schedule. \n 
URL:https://securepaymentsacademy.com/event/spa-18-2-days-e-commerce-payments-and-cnp-fraud/
LOCATION:London\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230927
DTEND;VALUE=DATE:20230929
DTSTAMP:20260415T220924
CREATED:20230604T180543Z
LAST-MODIFIED:20230604T180841Z
UID:11896-1695772800-1695945599@securepaymentsacademy.com
SUMMARY:SPA-17: 2-Day Mobile\, Contactless Payments Fundamentals – A Deep Dive designed for chip\, card & mobile handset manufacturers
DESCRIPTION:SPA-17: 2-Day Mobile\, Contactless Payments Fundamentals – A Deep Dive designed for chip\, card & mobile handset manufacturers\n\nMobile\, Contactless Payments Fundamentals – A Deep Dive designed for chip\, card\, terminal and mobile handset manufacturers \nIn this course we cover  the fundamental technologies for Mobile and contactless payments based on EMV standards.  We also include a discussion of antenna design and how to solve issues like ESD\, common with modern day antenna design.  The course also covers various levels of testing for Mobile\, contactless and EMV certification. \nThe course looks at EMV\, Contactless NFC and Mobile Payment systems and technologies. It is a hands on\, technical workshop that analyze the behavior of an EMV (for both contact and contactless) transactions using a state of the art test environment. We describe uses of the latest test tool methodologies to achieve certification.   The workshop covers standards\, protocols as well as implementation strategies. You will learn the EMV transaction’s flows and how it impacts the issuing and acquiring systems. You will also learn the standards for contactless NFC transactions and mobile payment components. An important part of the mobile and contactless payment is the design and use of the contactless controller and the antenna. These are discussed including issues and remedies. \nCoursework includes card payments\, EMV fundamentals\, contactless architecture\, mobile design\, provisioning and migration strategies for the stakeholders. The course is both theory and hands on with practical demonstrations using the latest technology tools and products. \nWho Should Attend:\n\nTerminal manufacturers\nChip Manufacturers\nMobile Handset Manufacturers\nOperations\, Engineering\nIT and Technical Departments\nDevelopers and Manufacturers of Cards\, Terminals and Payment Systems\nAntenna designers\n\nWorkshop Outline:\nDay One – EMV\n\n Understand EMV Chip -with ISO 7816 explained\n Chip transaction formats\n Discuss basic terms and concepts used in EMV\n Understand the different approaches and standards of MasterCard\, VISA\, EMVCo\, to EMV\, Contactless and Mobile Technologies\n EMV Commands\n Benefits of EMV\, including reduction in fraud\, provision of multi-applications and offline risk  management\n Review EMV certifications and compliance requirements\n Review personalization of EMV cards apersond systems\n Understand EMV migration impact on issuers\, acquirers\, and terminal/card vendorskey\n Review ISO 8583 message formats and EMV field\n Discuss transaction flow for EMV – Describe the 12 stages of the EMV transaction\n Demonstrate using a real EMV card an EMV transaction and show each stage using emulated host\nExplore EMV migration challenges and strategies\n\nDay Two – EMV Contactless and Mobile Payments\n\n Contactless\, and mobile antenna design\, testing and certification\n Antenna design issues and considerations\n EMV online and offline PIN management\n Describe the EMV data encryption methods\n Review Key Management and security aspects of EMV\n Contactless market overview\n Understand use and benefit of contactless applications\n Review Contactless Standards PayPass\, PayWave\, EMVCo Contactless\n Transaction flow for MasterCard PayPass and Visa payWave\n Security aspects of contactless payment applications\n Online contactless transactions handling for authorization systems\n Review the latest mobile/NFC technologies\n Discuss Mobile Payment components – SE\, TSM\, OTA\n Review Card and Application Management System\n Review OTA and scripting\n Review Issuer host integration\, how-to send scripts OTA\nDescribe provisioning and mobile handsets\n Understand PIN management\, PIN usage options\n Payment applet – User Interface relationships\, Middlet\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-17-2-day-mobile-contactless-payments-fundamentals-a-deep-dive-designed-for-chip-card-mobile-handset-manufacturers/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230920
DTEND;VALUE=DATE:20230923
DTSTAMP:20260415T220924
CREATED:20230604T175637Z
LAST-MODIFIED:20230711T174840Z
UID:11884-1695168000-1695427199@securepaymentsacademy.com
SUMMARY:SPA-24B – 3-Day Payments Tokenization Product Planning Course
DESCRIPTION:SPA-24B – A 3-Day Payment Tokenization Product Planning Sept 20-22 2023 \nLeveraging Payments Tokenization into new Products and Services. Taking Control of Your Payments \n Why a course on Payments Tokenization\, and why now? \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 3-day course provides a road map for the monetization of Payments Tokenization into new products and service offerings by merchants\, processors\, corporates and issuers. The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions. (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nAim of the Course \nThe aim of this course is to provide delegates with in-depth and actionable insights into the technology\, players\, rules\, risks\, opportunities and business impact of Payments Tokenization. \nBy the end of this comprehensive training program\, delegates will be able to undertake in-depth analyses of tokenization in the context of their organization\, enabling them to make informed decisions on the adoption and use (or not) of payments tokenization in their payment environment. \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIllustrate how tokens function within payments\nSpecify the organizational responsibilities\nSpecify the core business and system processes\nSurvey leaders and authorities in tokenisation\nIdentify the futures for payments tokenisation\nSpecify the operational responsibilities\nDefine the legal implications of tokenisation\nIdentify possible tokenisation business applications\nEnumerate the tokenisation market potential\nIdentify the overarching business costs and benefits\nEvaluate the stakeholder specific business cases\nUndertake the necessary go/no go decision making\n\n Who Should Attend: \nThis course is specifically designed for organizations that are considering as to whether or not they should invest in payments tokenization capabilities. This course is designed for delegates familiar with the basics of payments tokenization and are interested in making informed decisions as to the business case for further investment in a tokenization strategy. \n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Course: \n This 3-day product planning course can also be a follow up to SPA-24A\, a 2-day course focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization. Please click HERE for further information on the 2-day payments tokens business context course. \nDelegates who register for the 2-day tokenization  course as well as this 3-day course will receive an 8% discount on the combined package. \nProgram Details: \nThis course includes hands on exercises by delegates designed to reinforce the daily learnings \nStudents will receive a course workbook and completion certificate at the conclusion of this 4-day program. \nCourse Overview \nDay 1 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 2 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 3 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nSPA-24B: 3-Day – Payments Tokenization Course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24b-3-day-payments-tokenization-product-planning-course/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230918
DTEND;VALUE=DATE:20230923
DTSTAMP:20260415T220924
CREATED:20230604T180113Z
LAST-MODIFIED:20230711T174644Z
UID:11890-1694995200-1695427199@securepaymentsacademy.com
SUMMARY:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York
DESCRIPTION:SPA-24 – 5-Day Payments Tokenization Deep-Dive – New York Sept 18-22\, 2023\n\nA Deep Dive into Payments Tokenization \nLeveraging\, Productizing and Monetizing Tokens \n5-Day Payments Tokenization Deep-Dive \nSPA-24 – A 5-Day Payment Tokenization Deep Dive – Why a course on Payments Tokenization. \nThe product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how payments tokenization really works and how to manage the positive and negative impacts of tokenization on their businesses. \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. Tokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 5-day deep dive provides both a business planning and product strategy focus on payments tokenization\, designed to support decision making by merchants\, corporates\, issuers and processors on two key questions: \n\nDoes payments tokenization warrant serious consideration by the organization?\nShould the organization invest significant resources in a tokenization capability?\n\nAim of this Course \nThis 5 day deep dive first provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization . These key stakeholders include leading vendor and outsource solutions\, with a focus on the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services). \nThe deep dive then provides a road map for the monetization of payments tokenization into new products and service offerings by merchants\, processors\, corporates and issuers . The focus is on how tokenization really works in terms of data models\, processes and operating environments\, and therefore how stakeholders can use payments tokenization to increase their value propositions (hint: the stakes are high\, with significant new payments product wins and losses for stakeholders in the payments ecosystem). \nLearning Outcomes: \nBy the end of this course delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of payments tokenization services\nIdentify the key players in tokenization\nDefine a business case and SWOT analysis for the delegate’s organization\nIllustrate how tokens function\nSpecify the organizational responsibilities\nSpecify core business & system processes\nIdentify tokenization leaders & authorities\nIdentify future of payments tokenization\nSpecify the operational responsibilities\nDefine the legal implications of tokenization\nIdentify new tokenization business apps\nEnumerate tokenization market potential\nIdentify the business costs and benefits\nEvaluate stakeholder business cases\nUndertake go/no go decision making\nWho Should Attend:This course is specifically designed for organizations that must make a decision as to whether or not the organization should invest or further invest in their payments tokenization capabilities. The key consideration in the design of this training program is ‘How organizations can monetize Payments Tokenization’.\n\nBank Strategic decision makers\nDigital system architects\nBanking services development team\nMerchant System Operations\nProcess engineering team\nSystem Network Architects\nProduct Development\nProduct Management and Marketing\nFraud Detection department\nMobile Wallet design specialists\nIT and Technical Departments\n\nRelated Courses: \nThis course provides a deep dive into payments tokenization over a five day in depth program. Delegates can also cover the topics through two separate breakout courses – a two day session focused on the business context for payments tokenization\, enabling delegates to identify the relevance\, market potential\, business case and SWOT analysis of tokenization for their organization (for further information on this breakout course number SPA-24A\, please click HERE)\, and a separate three day session focused on the monetization of payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment. (for further information on this breakout course number SPA-24B\, please click HERE). \n Program Details: \nThis Tokenization Deep Dive workshop includes at least 4 hands on exercises by the attendees to reinforce the daily learnings. \nDay 1 – Why Payments Tokenization? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\nDay 2 – What is the Market Potential for Tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nDay 3 – The Process of Tokenization \n\nThe six party payments ecosystem\nThe seven stakeholders in tokenization\nTokenization in the payments ecosystem\nEXERCISE: Where is your organization in the ecosystem\nToken requesting stakeholder roles\nToken provisioning stakeholder roles\nToken processing stakeholder roles\nEXERCISE: Are your products suitable for tokenization\nToken requesting system processes\nToken provisioning system processes\nToken processing system processes\nEXERCISE: Are your systems ready for tokenization\nTaxonomy of software and services offerings\nSoftware and services vendors\nCard scheme tokenization offerings deconstructed\nEXERCISE: Best practices for payments business partners\n\nDay 4 – The System of Tokenization \n\nToken types and intelligence\nToken functions and lifecycles\nNext generation tokens beyond payments\nEXERCISE: What else can be done with payment tokens\nIn house\, outsource operations continuum\nTokenization data model\nSecurity in the tokenization architecture\nEXERCISE: Are your operations ready for tokenization\nToken compliance\, standards and protocols\nWho contracts with who\, for tokenization\nToken services fees and liability\nEXERCISE: Your organization’s legal obligations in payments\nMobile payments tokens use cases\nCard on file payments tokens use cases\nCard present payments tokens use cases\nEXERCISE: Is tokenization a paradigm shift\n\nDay 5 – The Business of Tokenization \n\nThe global market perspective\nKey conditions for market success\nPositioning in the market segments\nEXERCISE: How can you approach your target markets\nManaging expanded data and logic\nMonetizing fraud control and security\nEnabling new products and services\nEXERCISE: How can your organization leverage tokenization\nThe business case for merchants\, for issuers and for processors\nEXERCISE: Is there a business case for your organization\nQuestions and decisions to by merchants\, by issuers and by processors\nCONCLUSION: The high stakes for payments stakeholders\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 5-day course. \nSPA-24: A 5-Day – Payments Tokenization Deep-Dive course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc.\n\n\n\n  \n\nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-24-5-day-payments-tokenization-deep-dive/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230918
DTEND;VALUE=DATE:20230920
DTSTAMP:20260415T220924
CREATED:20230604T175026Z
LAST-MODIFIED:20230711T174728Z
UID:11878-1694995200-1695167999@securepaymentsacademy.com
SUMMARY:SPA-24A – 2-Day Payments Tokenization Business Planning Course
DESCRIPTION:SPA-24A – 2-Day Payments Tokenization Business Planning Course. Sept 18-19 2023 \nPayments Tokenization in the Real Business World. The Threats and Opportunities for Your Customer Relationships \nWhy a course on Payments Tokenization\, and why now? \nRetail Payments Tokenization has been available for some time. However the current tokenization offerings and technologies are only the first generation of a very powerful payments management capability. The product and service plans of merchants\, corporates\, issuers and processors depend on those organizations’ understanding of how tokenization really works and how to manage its impact on their businesses. \nTokenization can add significant value to your business – Properly implemented\, tokenization can enable a much closer and more focused relationship between merchants\, corporates\, processors and issuers and their clients. Conversely\, failure to properly manage payments tokenization services by third parties\, is an existential threat to your organization’s control over key customer data. \nThis 2-day course provides a business oriented introduction to the technology of\, how it works\, who the key stakeholders are and the roles they play in controlling the business and the data generated by payments tokenization. These key stakeholders include leading vendor and outsource solutions\, with a  on focus the card scheme offerings. Of particular importance is the generation and control of the additional business data generated by tokenization. (hint: there are options for businesses to take further control of their payments through appropriately structured tokenization services.) \nAim of the Course: \nThe aim of this course is to provide delegates with a basis for making business decisions as to whether or not taking control of payments tokenization warrants serious consideration by issuers\, processors\, merchants or corporates. \nLearning Outcomes: \nBy the end of the workshop delegates will be able to: \n\nIdentify the relevance of payments tokenization to the delegate’s organization\nDefine the true business drivers behind payments tokenization\nMap how tokenization services fit within the payments ecosystem\nEvaluate the market readiness for the adoption of advanced payments tokenization services\nIdentify the key players in tokenization solutions\nDefine a business case and SWOT analysis for the delegate’s organization\n\nWho Should Attend: \nThose responsible for making decisions or advising on product and service offering in their organization. This workshop is designed for delegates having some familiarity with tokenization and interested in learning more as to how payments tokenization might fit within their organization. \nRelated Courses \nThis 2-day business planning course can also be an introduction to a follow on SPA-24B – a 3 day course focused on the monetization payments tokenization\, where delegates will be able to undertake in-depth analyses of tokenization products and services in the context of their organization\, enabling them to make informed decisions on the adoption\, design and use (or not) of payments tokenization in their specific payments environment.    Please click HERE for further information on the 3 day payments tokens monetization course. \nDelegates who register for this 2-day introductory course as well as the 3-day deep dive course will receive an 8% discount on the combined package. \nProgram Details: \nStudents will receive a course workbook and completion certificate at the conclusion of this workshop. \nWhy payments tokenisation? \n\nImproved fraud\, security and much more\nCompliance and regulation\nNew product opportunities\n\nHow important is payments tokenization? \n\nA history of payments tokenization\nStakeholder value propositions\nThe high stakes for payments stakeholders\n\nWhat does business need to know about tokenization? \n\nThe lifecycle of a payments token\nTokenization within the payments ecosystem\nIntroducing the tokenization data model\n\nWhat are the lessons learned in adopting tokenization? \n\nUpsides\, downsides\, opportunities\, risks\nThe winners and the losers\nKey players and enabling technologies\n\n What is the market potential for tokenization? \n\nCanada as an example marketplace\nMarket factors for cardholder buy in\nMarket challenges for end user concerns\n\nWho are the key players in tokenization? \n\nLeading vendors\, services and technologies\nThe card schemes and their competitors\nIn house and outsource options\n\nHow has payments tokenization been monetized? \n\nCurrent and emerging use cases\nGlobal adoption models\, status and trends\nLessons learned from major implementations to date\n\nGetting to your business case \n\nThe end market perspective\nLiability\, compliance and risk\nThe high stakes SWOT outline\n\nSPA-24A: 2-Day – Payments Tokenization course\, is brought to you by Secure Payments Academy\, in partnership with Technology Strategies International and VCS Technologies Inc. \nFor more information about our upcoming schedule\, visit the Workshop Schedule
URL:https://securepaymentsacademy.com/event/spa-24a-2-day-payments-tokenization-business-planning-course/
LOCATION:New York
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230821
DTEND;VALUE=DATE:20230824
DTSTAMP:20260415T220924
CREATED:20230604T174610Z
LAST-MODIFIED:20230604T174610Z
UID:11872-1692576000-1692835199@securepaymentsacademy.com
SUMMARY:SPA-01: EMV 3 Day IMMERSION\, A to Z of EMV +++ POST EMV Migration Issues
DESCRIPTION:Course Description \nEMV Immersion is a 3 day workshop where students immerse themselves in the planning\, implementation and payments strategies required to succeed in an EMV chip and pin payments ecosystem. This course  addresses both business ad technical needs. Most importantly\, it addresses the post EMV challenges faced by business and individuals following the passing of the Card brand managed deadlines.  This course covers EMV from issuing\, acquiring\, processing and merchant perspectives. \nWho Should Attend \n\nPayments professionals\nTechnical staff\nDevelopers\n\n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-01-emv-3-day-immersion-a-to-z-of-emv-post-emv-migration-issues/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230807T080000
DTEND;TZID=America/New_York:20230808T170000
DTSTAMP:20260415T220924
CREATED:20230604T173411Z
LAST-MODIFIED:20230604T174054Z
UID:11864-1691395200-1691514000@securepaymentsacademy.com
SUMMARY:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems
DESCRIPTION:SPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems \nAmerica’s Secure Payments Academy is pleased to bring you a new two-day course to answer many questions that have arisen post COVID-19\, titled: eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems. \neCommerce and online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or better known as Card Not Present Fraud (CNP). In order to understand how  to combat fraud\, an understanding if the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. These are in addition to the EMVCo specifications 3DS2.2 that encourages merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the two days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks will be described. \nThere are newer techniques that are real technology and can detect fraudulent transactions with certainty. All these will be discussed in the two day workshop. \nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 – Introduction to eCommerce Payments \n\nDifferences between Card Present and Card Not Present transactions\nCard Present Fraud deterrent Technology\nCard Not Present Fraud Detection\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – CNP Fraud Detection Systems \n\nCNP Fraud\nCNP Fraud Types\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing affect on Encryption\nQC Safe Processing and Data protection\n\nSPA-18: 2-Days eCommerce Payments and CNP Fraud types\, Fraud Detection and Fraud mitigation Systems workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the new eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 2-day workshop. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-18-2-days-ecommerce-payments-and-cnp-fraud-types-fraud-detection-and-fraud-mitigation-systems/
LOCATION:New York
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230612T090000
DTEND;TZID=America/New_York:20230614T170000
DTSTAMP:20260415T220924
CREATED:20230502T222750Z
LAST-MODIFIED:20230504T183726Z
UID:11830-1686560400-1686762000@securepaymentsacademy.com
SUMMARY:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security
DESCRIPTION:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security\n\nOverview of Payment Systems and operations with stakeholders\, Payment Security for card and online fraud detection and mitigation \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new three –day course Payment Fundamentals\, Digital Payment Frameworks and Payment Security. \nThis training program examines the history of payments history\, culminating in the current models used internationally. We analyze the different parties in a payment eco system and review the current payment technology platforms We also examine the creation\, securitization and processing of payment transactions\, some of the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. \nDuring the program we will focus on the dynamic digital transactions-based platforms and payment technologies that are being deployed in the market today\, such as EMV\, contactless and Mobile Payments. We will also delve into emerging developments such as tokenization\, 3D-Secure and blockchain. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the main features of different payment system types\nEvaluate payment system domains\, settlement and risk\nAnalyze digital payments and advantages provided by EMV\nExplain how blockchain works and describe its essential features\nAnalyze different fraud types\nEvaluate different fraud mitigation techniques for CNP environments\n\nWho should Attend: \n\nPeople new to the field of payments processing\nPayment Systems Operations and Engineering\nFraud Analysts\nRisk Assessors\nProduct Development and Product Marketing\nVendors of CNP fraud detection Systems\nBanking services development team\nProcess engineering team\nSystem Network Operators\nIT Operations\n\nProgram Details:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The workshop program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day program. \nDay 1 – Payment System Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – Digital Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nIntroduction to Blockchain and Bitcoin Technologies\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nIntroduction to EMV Tokenization\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Fraud \n\nDetailed Payment Fraud Types\nReview of fraud mitigation techniques\nNew Payment channels – in US Zelle\, PayPal etc.\nEMV Tokenization to overcome specific fraud types\nEMV 3D-Secure to secure online transactions\nEMV Secure Remote Commerce (SRC) platform for all online payment transactions security\nReview of the training\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-20-3-days-payment-fundamentals-digital-payment-frameworks-and-payment-security-2/
LOCATION:Toronto\, Canada\, Toronto\, Canada
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230607T090000
DTEND;TZID=America/New_York:20230609T170000
DTSTAMP:20260415T220924
CREATED:20230502T222019Z
LAST-MODIFIED:20230504T184209Z
UID:11825-1686128400-1686330000@securepaymentsacademy.com
SUMMARY:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security
DESCRIPTION:SPA-20: 3-Days – Payment Fundamentals\, Digital Payment Frameworks and Payment Security\n\nOverview of Payment Systems and operations with stakeholders\, Payment Security for card and online fraud detection and mitigation \nAmerica’s leading payment experts  Secure Payments Academy is pleased to bring you a new three –day course Payment Fundamentals\, Digital Payment Frameworks and Payment Security. \nThis training program examines the history of payments history\, culminating in the current models used internationally. We analyze the different parties in a payment eco system and review the current payment technology platforms We also examine the creation\, securitization and processing of payment transactions\, some of the new technologies and channels becoming available for payments systems and project implementation for systems management tasks. \nDuring the program we will focus on the dynamic digital transactions-based platforms and payment technologies that are being deployed in the market today\, such as EMV\, contactless and Mobile Payments. We will also delve into emerging developments such as tokenization\, 3D-Secure and blockchain. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the main features of different payment system types\nEvaluate payment system domains\, settlement and risk\nAnalyze digital payments and advantages provided by EMV\nExplain how blockchain works and describe its essential features\nAnalyze different fraud types\nEvaluate different fraud mitigation techniques for CNP environments\n\nWho should Attend: \n\nPeople new to the field of payments processing\nPayment Systems Operations and Engineering\nFraud Analysts\nRisk Assessors\nProduct Development and Product Marketing\nVendors of CNP fraud detection Systems\nBanking services development team\nProcess engineering team\nSystem Network Operators\nIT Operations\n\nProgram Details:\nIn delivering these training programs we aim for an immersive experience in which delegates can apply the information and skills gained during the course in their organizational contexts. The workshop program includes at least four hands-on exercises each day to provide delegates with the opportunity to reinforce their learnings and ensure that the learning outcomes are achieved. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day program. \nDay 1 – Payment System Overview \n\nPayment System Overview\nHistory of Payment types\nParties in a Payment Transaction\nPayment System Models\nTypes of Payment Systems\nPayment System Functions\nPayment Domains\nPayment System Settlement\nOwnership and Regulations\nRisk Management\nCross Border Payments\nIntroduction to fraud and security techniques\nCredentials and EMV cards and their security methods\n\nDay 2 – Digital Payments \n\nDigital Payment Frameworks\nDetailed EMV Payments Systems Operations\nMobile and Contactless Payments\nPayment Platforms\, Back-end operations Project Management\nIntroduction to Blockchain and Bitcoin Technologies\nOnline Fraud and security techniques\nTypes of Fraud in payments\, Security technologies\, Layered approach to combat different types of fraud\nIntroduction to EMV Tokenization\nATM Technologies of the future\nCompliance\n\nDay 3 – Payment Fraud \n\nDetailed Payment Fraud Types\nReview of fraud mitigation techniques\nNew Payment channels – in US Zelle\, PayPal etc.\nEMV Tokenization to overcome specific fraud types\nEMV 3D-Secure to secure online transactions\nEMV Secure Remote Commerce (SRC) platform for all online payment transactions security\nReview of the training\n\nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-20-3-days-payment-fundamentals-digital-payment-frameworks-and-payment-security/
LOCATION:New York
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230531T090000
DTEND;TZID=America/New_York:20230602T170000
DTSTAMP:20260415T220924
CREATED:20230502T222459Z
LAST-MODIFIED:20230504T183347Z
UID:11828-1685523600-1685725200@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-3/
LOCATION:Toronto\, Canada\, Toronto\, Canada
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230524T090000
DTEND;TZID=America/New_York:20230526T170000
DTSTAMP:20260415T220924
CREATED:20230502T221440Z
LAST-MODIFIED:20230504T180429Z
UID:11822-1684918800-1685120400@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \nLearning Outcomes \nBy the end of this course delegates will be able to: \n\nDescribe the fraud types for card present transactions.\nAnalyze security types provided by EMV for both contact and contactless transactions\nIdentify differences between CNP and card present fraud patterns\nEvaluate how tokenization impacts CNP fraud types\nExplain how FIDO and 3DS detect fraud\nIllustrate how SRC and PCI function within the CNP environment\n\nWho should Attend: \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact. \nFor more information about our upcoming schedule\, visit the Workshop Schedule.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation-2/
LOCATION:New York
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220725
DTEND;VALUE=DATE:20220728
DTSTAMP:20260415T220924
CREATED:20220527T150206Z
LAST-MODIFIED:20220707T173350Z
UID:11106-1658707200-1658966399@securepaymentsacademy.com
SUMMARY:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation
DESCRIPTION:SPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation  \n  \nAmerica’s Secure Payments Academy is pleased to bring you a new three-day course to describe payment fraud for both card present and card not present transactions\, answer many questions that have arisen post COVID-19\, as more transactions go online and bring with them more fraudulent transactions. \n  \nFor about 50 years payment cards were used with magnetic stripes at the back of the card. Over the years fraudsters learned how to copy card numbers off the magnetic stripe and make fraudulent purchases. As the total amount of fraud escalated with new ways of stealing and using card numbers\, issuers and card networks were looking at solutions that would stop the card present fraud. The solution was EMV. Using an embedded chip in the plastic card\, EMV created a secure platform that is based on the latest encryption technologies with all transaction being dynamic such that they cannot be re-run. There are many security features with the EMV platform that will be discussed during the first day of this three-day course. \nCard Not Present (eCommerce) online transactions have shot up very rapidly during the lockdown and post lockdown due to COVID-19. With this increase in the online transactions\, there has been a sharp increase in online fraud\, or Card Not Present (CNP) Fraud. To understand how  to combat fraud\, an understanding of the eCommerce world is required. There are a multitude of techniques offered by various vendors to stop or at least decrease the amount of CNP fraud. On the third day of the course\, EMVCo’s standards 3DS2.2 are presented and discussed. These specifications encourage merchants to check their online customers and only send the issuer/processor the transactions that they have approved as coming from a genuine customer. \n  \nMany of the techniques used today work on collecting data about the customer and analyzing this data to determine if the customer is a real customer. These techniques are generally based on data Analytics. One issue with the data analytics is False Declines – meaning although the customer is a genuine customer\, their transaction has been declined by mistake (with bad analytics). False Declines damage merchants tremendously as a declined customer will not buy from that merchant again. \n  \nAnother looming problem for the eCommerce environment is that digital keys used to encrypt data may become hackable with the advent of Quantum Computing. During the three days of the workshop Quantum Computing (QC) and its effect on encrypted data will also be discussed and solutions for combatting QC hacks are described. \n  \n  \n  \nWho should Attend: \n  \n\nMerchant System Operations\, Engineering\nIssuer/Processor Operations\, Engineering\nFraud Analysis personnel\nSystem Architects and Developers\nProduct Development and Product Marketing\nIT and Technical Departments\nVendors of CNP fraud detection Systems\n\n  \nDay 1 –Payment Card Fraud – Card Present Fraud and Its Mitigation  \n\nCard Present Fraud\nCard present fraud types\nEMV Technology\nFeatures of EMV Security\nDeep dive into EMV Security types\nEffects of EMV on Card Present Fraud\nNFC Contactless Technology\nNFC Security\nUse of CDCVM (Consumer Device Cardholder Verification Method)\nMobile Devices as Card Present Transactions\n\n  \nDay 2 – Payment Card Fraud – CNP Fraud\, Detection and Mitigation  \n  \n\nDifferences between Card Present and Card Not Present transactions\nCNP Transaction basics\nCNP Fraud Types\nCard Not Present Fraud Detection\nCNP Fraud\nRelative Fraud Type values\nTotal Fraud Type Values\nTechniques for CNP Fraud Detection\nQuantum Computing effect on Encryption\nQC Safe Processing and Data protection\n\n  \n  \n  \nDay 3 – Payment Card Fraud – EMVCo 3DS2 for CNP Fraud Detection \n  \n\nIntroduction EMVCo 3DS2\nComponents of 3DS2\nData types collected\nAnalysis of data collected\nHow to decide Approval or Decline of transactions\nExample of a 3DS2 system\nFIDO\nSRC/One Click Standards\n2-Factor Authentication demonstration\n\n  \nSPA-19: 3-Days – Payment Fraud – Card Present Fraud detection and Mitigation\, Card Not Present (eCommerce) Payments and CNP Fraud types\, Detection\, and Mitigation workshop\, is brought to you by Secure Payments Academy\, America’s Payments Experts and led by skilled instructors with more than 3 decades of technical\, systems and business case experience in payments systems and technologies.  This course is a deep dive guide into “How to mitigate fraudulent transactions” for the card present as well as the CNP eCommerce world. \n  \nStudents will receive a course workbook and completion certificate at the conclusion of this 3-day workshop. \n  \nFor more information about our upcoming schedule\, visit the Workshop Schedule. \nTo contact us please go to Contact.
URL:https://securepaymentsacademy.com/event/spa-19-3-days-payment-fraud-card-present-fraud-detection-and-mitigation-card-not-present-ecommerce-payments-and-cnp-fraud-types-detection-and-mitigation/
LOCATION:Regent Street London UK\, 222 Regent Street\, London\, United Kingdom
CATEGORIES:SCIL
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220607
DTEND;VALUE=DATE:20220608
DTSTAMP:20260415T220924
CREATED:20180405T184552Z
LAST-MODIFIED:20220216T202544Z
UID:109-1654560000-1654646399@securepaymentsacademy.com
SUMMARY:SPA-07: 1 Day New Payments\, Business Cases and Business Issues with Fintech for Executives
DESCRIPTION:Course Overview\nWhat are the New Payment Channels? How is EMV Impacting the ROI? When do Mobile Payments become Mainstream? What can you gain by upgrading ATMs? How Can Tokenization Reduce Fraud? What is the impact of BlockChain on the Banks? Workshop \nDesigned for business executives\, this course reviews new payment channels from the business point of view. We examine the costs associated with EMV implementation and its ROI. Mobile payment wallets are discussed and views of industry insiders are explained on the future of mobile payments. The course also looks at how the use of tokenization helps reduce fraud and add to the bottom line. This course describes the business needs behind the changes proposed for the current ATMs. The workshop also focusing on new technologies such as Blockchain and its growing popularity. \nCourse 7 demystifies the worlds of Blockchain and Bitcoin enabling students and their companies to better understand what it means for their businesses. The course provides a “how to” guide for leveraging these new technologies as well as strategies for incorporating them into current payments systems for the executives. \nThis course includes test and Certification.
URL:https://securepaymentsacademy.com/event/1-day-new-payments-business-cases-and-business-issues-with-fintech-for-executives/
LOCATION:New York
CATEGORIES:SCIL
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220517
DTEND;VALUE=DATE:20220519
DTSTAMP:20260415T220924
CREATED:20201224T195719Z
LAST-MODIFIED:20220216T201357Z
UID:10991-1652745600-1652918399@securepaymentsacademy.com
SUMMARY:SPA-16: 2xhalf days: Blockchain Fundamentals\, Demystifying the Worlds of Blockchain and Bitcoin
DESCRIPTION:Blockchain Fundamentals\, Demystifying the Worlds of Blockchain and Bitcoin\nWhat is Blockchain and Bitcoin? \nThis new one day workshop demystifies the worlds of Blockchain and Bitcoin enabling students and their companies to better  understand what it means for their businesses.  The course provides a “how to” guide for leveraging these new technologies as well as strategies for incorporating them into current payments systems. \nThis is an easy-to-understand introduction into the key concepts\, practical implications and opportunities that these technologies bring to financial services and other sectors includes \n\nKey characteristics and relevancies of Bitcoin and Blockchain\nHow the Technology woks\nBlockchain models and economies\nApplications in Finance & regulatory issues\nThe opportunities\, challenges and constraints\n\nStudents will receive a course workbook and completion certificate at the conclusion of this 1 day workshop.
URL:https://securepaymentsacademy.com/event/spa-16-2xhalf-days-blockchain-fundamentals-demystifying-the-worlds-of-blockchain-and-bitcoin-2/
LOCATION:Online
CATEGORIES:SCIL
ORGANIZER;CN="Secure Payments Academy":MAILTO:info@securepaymentsacademy.com
END:VEVENT
END:VCALENDAR