Keir Breitenfeld is a senior business consultant supporting Experian’s fraud and identity clients by translating intimate product and service expertise into risk-based and compliance-based operational and strategic successes. Keir has been with Experian for more than 10 years, most recently as Vice President of Product Management and Marketing for Experian’s Fraud and Identity Solutions business. His responsibilities included stewardship of Experian’s comprehensive set of consumer and commercial authentication products and platforms. His background prior to joining Experian in 2005 includes serving as a Director of Product Management with both HNC Software and Fair Isaac Corporation and leading fraud detection and prevention units at Fleet/Advanta Credit Card Services and Capital One Financial Corporation. Keir recently spent time with FinTech start-up, Trulioo, a global identity bureau, where he worked with partners worldwide to maximize market penetration and operational performance in KYC/AML related use cases. Prior to entering the financial services arena, Breitenfeld served in the U.S. Navy as a surface warfare officer aboard the guided missile frigate USS Estocin (FFG-15). He earned a Bachelor of Science in criminology from Auburn University and a Master of Business Administration from Duke University.

-- Keir Breitenfeld

All posts by Keir Breitenfeld

Loading...

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Published: November 16, 2009 by Keir Breitenfeld

Well, here we are nearly at the beginning of November and the Red Flags Rule has been with us for nearly two years and...

Published: November 2, 2009 by Keir Breitenfeld

As I wrote in my previous posting, a key Red Flags Rule challenge facing many institutions is one that manages the number of referrals generated...

Published: November 2, 2009 by Keir Breitenfeld

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Published: October 13, 2009 by Keir Breitenfeld

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

Published: October 9, 2009 by Keir Breitenfeld

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Published: September 30, 2009 by Keir Breitenfeld

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Published: September 24, 2009 by Keir Breitenfeld

There were always questions around the likelihood that the August 1, 2009 deadline would stick. Well, the FTC has pushed out the Red Flag...

Published: July 30, 2009 by Keir Breitenfeld

As I’ve suggested in previous postings, we’ve certainly expected more clarifying language from the Red Flags Rule drafting agencies.  Well, here is some pretty...

Published: June 12, 2009 by Keir Breitenfeld

We at Experian have been conducting a survey of visitors to our Red Flag guidelines microsite (www.experian.com/redflags). Some initial findings show that approximately 40 percent of...

Published: June 10, 2009 by Keir Breitenfeld

As most industry folks are aware, the FTC recently pushed out their Red Flags Rule enforcement deadline to August 1, 2009. It is important...

Published: June 10, 2009 by Keir Breitenfeld

One of the handful of mandatory elements in the Red Flag guidelines, which focus on FACTA Sections 114 and 315, is the implementation of...

Published: May 29, 2009 by Keir Breitenfeld

What are your thoughts on the third extension to the Identity Theft Red Flags Rule deadline? Was your institution ready to meet Red Flag......

Published: May 22, 2009 by Keir Breitenfeld

Does the rule list the Red Flags? The Identity Theft Red Flags Rule provides several examples of Red Flagsin four separate categories: 1. alerts...

Published: May 15, 2009 by Keir Breitenfeld

The Federal Trade Commission announced on April 30, one day before the intended May 1 Red Flags Ruleenforcement deadline, a third extension of that...

Published: May 14, 2009 by Keir Breitenfeld

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image