Augustus NY 2013 - 2013
Creative Director
JSK Ventures / T-Mobile Premium Partner Retailer - Greater New York City Area Nov 2010 - May 2012
Co-Founder & Director, Business Development & Sales
Intouch Concepts Inc / Verizon Wireless Premium Retailer - Greater New York City Area Dec 2005 - Jul 2010
Director, Sales & Operations North East Area
Wireless Resource Inc Feb 2000 - Dec 2005
Regional Manager, Retail Sales & Business Development
Education:
Fairleigh Dickinson University
B.Sc, Business Management
Fashion Institute of Technology
Jan 2014 to 2000 Senior Risk ManagerJPMorgan Chase Wilmington, DE Jan 2011 to Dec 2013 Risk ManagerJP Morgan Chase Wilmington, DE Nov 2006 to Dec 2010 Senior Risk AnalystUnitrin Inc Plymouth Meeting, PA May 2005 to Nov 2006 Business AnalystTemple University, Math and Science Resource Center Philadelphia, PA Sep 2003 to May 2005 SupervisorTemple University, Strategic Initiatives Philadelphia, PA Sep 2004 to Dec 2004 Student Strategy ConsultantBritish Airways
Oct 2000 to Jan 2002 Business AnalystAmerican Express Bank New Delhi, Delhi Jul 1997 to Dec 1997 Intern
Education:
Fox School of Business and Management, Temple University Philadelphia, PA Sep 2003 to May 2005 M.B.A.Kurukshetra University Kurukshetra, HARYANA, IN Aug 1996 to May 1998 Masters in International BusinessSri Venkateshwara College, Delhi University Delhi, Delhi Aug 1993 to May 1996 International Business Program
Name / Title
Company / Classification
Phones & Addresses
Charu Mehta Finance Executive
Compensation Rating & Inspctn Insurance Agents, Brokers, and Service
60 Park Pl # 12, Newark, NJ 07102
Us Patents
Method And System For Detecting, Monitoring And Addressing Data Compromises
Thomas C. Barton - Newark DE, US Sandhya Kumar - Hockessin DE, US Charu Mehta - Glen Mills PA, US Harold Paulson, Jr. - Chadds Ford PA, US Geetha Vaidyanathan - Landenberg PA, US Jiun-Ming Wu - Wilmington DE, US
Assignee:
JPMorgan Chase Bank, N.A. - New York NY
International Classification:
G06Q 40/00
US Classification:
705 39, 705 35
Abstract:
According to an embodiment of the present invention, an automated computer implemented method for detecting one or more data compromises comprises the steps of detecting an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm; classifying the activity based on a combination of risk level, size of data compromise and fraud severity; and identifying a specific mitigation response to the activity through an interface. Another embodiment of the present invention determines whether one or more accounts associated with the activity have been probed or tested by a fraudster to determine if the one or more accounts are valid.