IBM Counter Fraud Signature Solutions

Size: px
Start display at page:

Download "IBM Counter Fraud Signature Solutions"

Transcription

1 IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes

2 Provider ID Theft o Claim for routine services is submitted by Dorsey Med Group located at 2625 Piedmont Road Northeast, Suite o The provider is listed as Dr. Harry Dorsey, a licensed internist in the State of Georgia o Dorsey is a respected physician with 39 years of experience. o However 2

3 Provider ID Theft o 2625 Piedmont Road Northeast, Suite is a UPS Store mail box o Dr. Harry Dorsey s practice in Albany Georgia miles away o The business was incorporated by Olga Teplukhina who also applied for the NPI o When contacted, Dr. Dorsey did not have any knowledge of Dorsey Med Group 3

4 Excessive Units o Provider submits a claim for a patient suffering for post surgical nausea consisting of 200 units of Tigan (HCPCS J3250) o One "unit" of Tigan is 200mg o The maximum daily dosage is 800mg per day (4 units) o This could be a mistake that happens as the result of confusion over the dosage (200mg) versus units o Typical dosage cost is less than $10 o However 4

5 Excessive Units o One provider was identified as an outlier that billed every instance at 200 units o In most cases, the provider is paid approximately $900 per dose (versus $10 per dose, which is normal) o Some patients had multiple visits - as many as 70 in one quarter o Over a period of 10 months, the provider received approximately $2,000,000 related to the alleged administration of Tigan Member DOS HCPCS Description Units Paid J3250 Trimethobenzamide 200 $900 5

6 Geospatial and Cluster Analysis o We uncovered abnormal billing related to HCPCS code E0172 (Seat lift mechanism placed over or on top of toilet) o The behaviors we identified were material, distinct, and by definition, anomalous o Total disbursements for this device exceed $230,000 for the period of January-July 2011 o Payments were highly concentrated for a large number of patients in a remote regional in Texas o The listed addresses were highly suspect and consisted of a video store, a deserted home, and an empty strip mall 6

7 IBM is seeing an increase in fraud that is expected to continue. We anticipate greater focus on fraud as a potential compromise in closing budget gaps 1. Crime rings are increasingly turning to fraud Fraud is low risk and relatively easy to conduct Medical claims are path to revenue for fraudsters 2. Economic downturns lead to greater fraud and abuse Individuals and businesses seek new ways to make ends meet 3. Market conditions pressuring our public and private bottom line Need to find new sources of savings 4. Advances in analytics are make finding and preventing fraud both possible & economical We can now do what we previously couldn t Survey participants estimated that the typical organization loses 5% of its revenues to occupational fraud each year The median loss caused by the occupational fraud cases in our study was $140,000 20% of the cases were greater than 1M The frauds reported to us lasted a median of 18 months before being detected 7

8 This new era is reshaping the IT landscape and creating new market dynamics The new era is driving the IBM Counter Fraud strategy Cloud Mobile Social Internet of Things 8 SEPTEMBER, 2013

9 Helping our customers become a Hard Target Predict and Protect Disrupt and Defeat Prosecute and Recover Learn and Apply 9

10 Fraud (aka Improper Payment or Program Integrity) is a deliberate misrepresentation or deception intended to result in financial gain. Fraud is a criminal act. Abuse refers to similar actions not proven to be criminal. Financial Crimes includes Anti-money laundering and cyber-risk primarily for banking Organized rings conducting sophisticated attacks against corporations for producing financial gains Staged Events Money Laundering Improper Billing Improper Payments Providers taking advantage of public and private institutions for the purpose of improper financial gain Organized Opportunistic Individuals seeking improper payments by taking advantage of private and public institutions Slip Fall Arson Tax Fraud Medical Fraud Procurement Financial Statement Expense Employees creating fraudulent transactions, records, and claims to receive improper payments from Employers 10

11 Anatomy of a Complex fraud 11

12 IBM s Counter Fraud solution reduces improper payments using a layered best of breed approach to disrupt the intentions of both organized and opportunistic fraudsters Detect in real time if a medical bill or other transaction is fraudulent by applying models and rules in real time to determine the propensity for fraud Apply the results of Detection to stop processing known fraud, or encourage fraudsters to abandon their objective by showing more is known than they think should be known Predict & Protect Detect Detect fraud within a business process Prevent Take action in real time when it matters Disrupt & Defeat Prosecute & Recover Investigate Confirm fraud for prosecution, recovery, rules and watch lists Fraudster Discover Find fraud within the data Learn & Apply 12 Gather data about DETECTED or DISCOVERED fraud; build cases for prosecution, recoveries, or denial of payments. Provide feedback to DETECTION and/or DISCOVERY Discover fraud retrospectively by reviewing past data and looking for patterns and anomalies that may indicate an individual or organization is potentially fraudulent

13 Counter-Fraud solutions must provide a layered approach by leveraging multiple analytical techniques Entity Analytics Predictive Analytics Forensic Analysis Content Analytics Retrospective Analysis 13

14 IBM Fraud Solution Framework Operational Systems Advanced Industry Libraries: Data Models, Predictive Models, Rules, Reports, Process, External Fraud Data and so on Real Time / In line Prevention Detection Back Office Analytics Discovery Investigation Reporting Integration Action Guidance Rules Predictive Analytics Rules Decision Management Selection Evaluation Anomalies Identification Case Management Relationship Visualization Investigative Analytics Operational Reporting Dashboards Feedback Observation Space Information Domains Internal Sources External Sources Evolving Unstructured Sources Fraud Use Case Libraries 14

15 IBM Technology Operational Systems Advanced Industry Libraries: Data Models, Predictive Models, Rules, Reports, Process, External Fraud Data etc. Real Time / In line Prevention Detection Back Office Analytics Discovery Investigation Reporting Integration Action Guidance Rules Predictive Analytics Rules Decision Management Selection Evaluation Anomalies Identification Case Management Relationship Visualization Investigative Analytics Operational Reporting Dashboards Feedback Observation Space Information Domains Internal Sources External Sources Evolving Unstructured Sources Fraud Use Case Libraries 15

16 IBM Counter Fraud Solution Form, Bill, Claim Application, and so on Entity Analytics Detection Discovery Applicant Business Rules Predictive Model Claimant Entity Analytics Optimize Fraud Decisions Anomaly Detection 9,500 model library Selection Evaluation Identification Real Time Alert Provider New Investigation Observation Space Case Management Intelligent Investigation Intelligent Fraud Dashboards 16

17 Public story: Fraud detection at Alameda County Social Services Challenge: Case workers were confronted with: Applicants applying for public assistance who were not adequately screened prior to enrollment Applicants receiving benefits that were noncompliant for several months to year Administrative caseload burdens of per worker, reducing their ability to spend time with clients Solution: Alameda County implemented a new Social Services Integrated Reporting System (SSIRS) powered by IBM InfoSphere Identity Insight, IBM BI Data Warehouse and Cognos Reporting,Charting, and Dashboarding Services were provided by IBM 200 Concurrent Users interact with SSIRS through web enabled interfaces Business Benefits: ROI: 631%, Payback 2 months, $24M annual benefit Bring together data on child welfare system clients from multiple payment and case management systems Decrease false positives and negatives and reduce investigation time for increased fraud ROI - Investigators now receive high ROI case alerts - Workers are alerted to child and adult endangerment, double dipping, and fraudulent representation - Investigators receive relationship information immediately

18 Banking story: Preventing fraud at MoneyGram MoneyGram Since the tool launched in May 2010 as part of MoneyGram s efforts to enhance its global consumer anti-fraud program, MoneyGram has prevented thousands of fraudulent transactions, saving its customers about $22.5 million. Business Wire 03/09/11 18

19 Insurance story: Claim fraud detection at Santam Insurance in South Africa South Africa s largest short-term insurance company uses predictive analytics to uncover a major insurance fraud syndicate, save millions on fraudulent claims and resolve legitimate claims 70 times faster than before. Solution Business Opportunity Like most insurers around the world, Santam was losing millions of dollars paying out fraudulent claims every year. Expenses were being passed on to the customer in the form of higher premiums and longer waits to settle legitimate claims. To improve its bottom line and enhance customer satisfaction, the company needed to detect and stop insurance fraud early in the claims process. It also needed to find a way to isolate risky, fraudulent claims so that claims managers could more quickly process lower-risk claims. Gained the ability to spot fraud early with an advanced analytics solution that captures data from incoming claims, assesses each claim against identified risk factors and segments claims to five risk categories, separating higher-risk cases from low-risk claims. Plans to use propensity modeling to enhance and refine segmentation process as more data becomes available Results Identified a major fraud ring in less than 30 days after implementation. Saved more than $2.5M in payouts to fraudulent customers, and nearly $5M in total repudiations. Reduced claims processing time on low-risk claims by nearly 90%. Cut operating costs by reducing the number of mobile claims investigations.

20 IBM Counter-Fraud and Financial Crime Signature Solution An unparalleled combination of integrated capabilities, delivery experience, and business expertise with a proven ability to deliver business outcomes Learn and Apply Prosecute and Recover Disrupt and Defeat Predict and Protect 20

21 Predictive Police 21

22 Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express, or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Cognos, the Cognos logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 22

Warranty Fraud Detection & Prevention

Warranty Fraud Detection & Prevention Warranty Fraud Detection & Prevention Venky Rao North American Predictive Analytics Segment Leader Agenda IBM SPSS Predictive Analytics for Warranties: Case Studies Why address the Warranties process:

More information

Security Intelligence

Security Intelligence IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers

More information

Leverage big data to fight claims fraud

Leverage big data to fight claims fraud Leverage big data to fight claims fraud How big data supports smarter approaches to addressing claims fraud Highlights Identify patterns and trends across emerging information to pinpoint fraudsters quickly

More information

Insurance Bureau of Canada

Insurance Bureau of Canada Bureau of Canada Outsmarting fraudsters with fraud analytics Overview The need The insurance industry is constrained by the manual and ad hoc approach to detecting and investigating potential fraud. The

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Technology and Trends for Smarter Business Analytics

Technology and Trends for Smarter Business Analytics Don Campbell Chief Technology Officer, Business Analytics, IBM Technology and Trends for Smarter Business Analytics Business Analytics software Where organizations are focusing Business Analytics Enhance

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Three Ways to Improve Claims Management with Business Analytics

Three Ways to Improve Claims Management with Business Analytics IBM Software Business Analytics Insurance Three Ways to Improve Claims Management with Business Analytics Three Ways to Improve Claims Management Overview Filing a claim is perhaps the single most important

More information

MoneyGram International

MoneyGram International MoneyGram International Detects and prevents money transfer fraud before it impacts customers Smart is... Optimizing decision making processes to mitigate fraud and safeguard business Using a powerful

More information

Maximizing Return and Minimizing Cost with the Decision Management Systems

Maximizing Return and Minimizing Cost with the Decision Management Systems KDD 2012: Beijing 18 th ACM SIGKDD Conference on Knowledge Discovery and Data Mining Rich Holada, Vice President, IBM SPSS Predictive Analytics Maximizing Return and Minimizing Cost with the Decision Management

More information

IBM's Fraud and Abuse, Analytics and Management Solution

IBM's Fraud and Abuse, Analytics and Management Solution Government Efficiency through Innovative Reform IBM's Fraud and Abuse, Analytics and Management Solution Service Definition Copyright IBM Corporation 2014 Table of Contents Overview... 1 Major differentiators...

More information

IBM Big Data Analytics Vienna, 2013 May 13

IBM Big Data Analytics Vienna, 2013 May 13 IBM Big Data Analytics Vienna, 2013 May 13 Dipl.Ing.Wolfgang Nimführ Big Data Industry Solutions Regional Leader IBM Software Group Europe Agenda for today 1 IBM s viewpoint on on big big data data and

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

Program Integrity in Government Transforming Data to Useful Information: Using Analytics to Detect and Prevent Improper Payments May 2013

Program Integrity in Government Transforming Data to Useful Information: Using Analytics to Detect and Prevent Improper Payments May 2013 Program Integrity in Government Transforming Data to Useful Information: Using Analytics to Detect and Prevent Improper Payments May 2013 Ed Rounds Smarter Analytics Executive, Fraud, Waste and Abuse Government,

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

IBM Analytical Decision Management

IBM Analytical Decision Management IBM Analytical Decision Management Deliver better outcomes in real time, every time Highlights Organizations of all types can maximize outcomes with IBM Analytical Decision Management, which enables you

More information

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services

More information

Increasing customer satisfaction and reducing costs in property and casualty insurance

Increasing customer satisfaction and reducing costs in property and casualty insurance Increasing customer satisfaction and reducing costs in property and casualty insurance Contents: 1 Optimizing claim handling 2 Improve claim handling with real-time risk assessment 3 How do predictive

More information

and Security in the Era of Cloud

and Security in the Era of Cloud Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer

More information

Optimize data management for. smarter banking and financial markets

Optimize data management for. smarter banking and financial markets Optimize data management for smarter banking and financial markets 2 Flexibility, transparency, quick response times: Are you ready for the new financial environment? 1 2 and profitability Meeting customer

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer

More information

Introduction to Predictive Analytics: SPSS Modeler

Introduction to Predictive Analytics: SPSS Modeler Introduction to Predictive Analytics: SPSS Modeler John Antonucci, Sr. BDM Katrina Adams Ph.D. Welcome! The Webinar will begin at 12:00 pm EST LPA Events Calendar Upcoming Webinars Today - Introduction

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Focus on the business, not the business of data warehousing!

Focus on the business, not the business of data warehousing! Focus on the business, not the business of data warehousing! Adam M. Ronthal Technical Product Marketing and Strategy Big Data, Cloud, and Appliances @ARonthal 1 Disclaimer Copyright IBM Corporation 2014.

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: Combine powerful analytical techniques with existing fraud detection and prevention efforts Build

More information

Recognize the many faces of fraud

Recognize the many faces of fraud Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and

More information

An Enterprise Framework for Business Intelligence

An Enterprise Framework for Business Intelligence An Enterprise Framework for Business Intelligence Colin White BI Research May 2009 Sponsored by Oracle Corporation TABLE OF CONTENTS AN ENTERPRISE FRAMEWORK FOR BUSINESS INTELLIGENCE 1 THE BI PROCESSING

More information

Fraud Solution for Financial Services

Fraud Solution for Financial Services Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

Three proven methods to achieve a higher ROI from data mining

Three proven methods to achieve a higher ROI from data mining IBM SPSS Modeler Three proven methods to achieve a higher ROI from data mining Take your business results to the next level Highlights: Incorporate additional types of data in your predictive models By

More information

Detect, Prevent, and Deter Fraud in Big Data Environments

Detect, Prevent, and Deter Fraud in Big Data Environments SAP Brief SAP s for Governance, Risk, and Compliance SAP Fraud Management Objectives Detect, Prevent, and Deter Fraud in Big Data Environments Detect and prevent fraud to reduce financial loss Detect and

More information

The Future of Business Analytics is Now! 2013 IBM Corporation

The Future of Business Analytics is Now! 2013 IBM Corporation The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

The IBM Cognos family

The IBM Cognos family IBM Software Business Analytics Cognos software The IBM Cognos family Analytics in the hands of everyone who needs it The IBM Cognos family Overview Business intelligence (BI) and business analytics have

More information

Addressing government challenges with big data analytics

Addressing government challenges with big data analytics IBM Software White Paper Government Addressing government challenges with big data analytics 2 Addressing government challenges with big data analytics Contents 2 Introduction 4 How big data analytics

More information

SAS Fraud Framework for Health Care Evolution and Learnings

SAS Fraud Framework for Health Care Evolution and Learnings SAS Fraud Framework for Health Care Evolution and Learnings Julie Malida, Principal for Health Care Fraud, SAS Jay King, Manager, Advanced Analytics Lab, SAS Copyright 2009, SAS Institute Inc. All rights

More information

Improving sales effectiveness in the quote-to-cash process

Improving sales effectiveness in the quote-to-cash process IBM Software Industry Solutions Management Improving sales effectiveness in the quote-to-cash process Improving sales effectiveness in the quote-to-cash process Contents 2 Executive summary 2 Effective

More information

BigData Analytics per la sicurezza delle Infrastrutture Critiche

BigData Analytics per la sicurezza delle Infrastrutture Critiche BigData Analytics per la sicurezza delle Infrastrutture Critiche Vincenzo Conti IBM Security Sales Consultant Energy and utility organizations are at the forefront of attacks Utilities are among the most

More information

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution IBM Sales and Distribution Solution Brief Banking IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution Risk transparency across the enterprise 2 IBM Business Analytics: Finance

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

SCALABLE SYSTEMS LIFE SCIENCE & HEALTHCARE PRACTICES

SCALABLE SYSTEMS LIFE SCIENCE & HEALTHCARE PRACTICES SCALABLE SYSTEMS LIFE SCIENCE & HEALTHCARE PRACTICES Improve Your DNA Data, Numbers & Analytics IntelliPayer Scalable Systems IntelliPayer solution is a next generation healthcare payer solution framework

More information

The Current State of Cyber Security

The Current State of Cyber Security The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012

More information

Society Protection Best Practices from Industry

Society Protection Best Practices from Industry Society Best Practices from Industry The Nuts and Bolts of the Dynamic Attack Chain 1 October 2015 1 2015 IBM Corporation You are an... IT Security Manager (and a father of three teenagers his wife is

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

The battle to contain fraud is as old as

The battle to contain fraud is as old as 22 SPONSORED FEATURE COMBATTING DIGITAL FRAUD Combatting digital fraud Combatting digital fraud has become a strategic business issue for today s CIOs. The battle to contain fraud is as old as business

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Yield and. Protection. Anti-Fraud. Uncover insights you never thought were possible.

Yield and. Protection. Anti-Fraud. Uncover insights you never thought were possible. Home Home Yield and Anti-Fraud Protection Uncover insights you never thought were possible. Tax and welfare agencies worldwide strive to increase compliance, prevent improper payments and reduce errors.

More information

Information Management in Government Leveraging Big Data

Information Management in Government Leveraging Big Data Information Management in Government Leveraging Big Data Kevin Redmond Central & Eastern Europe Information Management Executive 1 March 18, 2014 Governments must lead in the face of global challenges

More information

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved. Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet

More information

Improving claims management outcomes with predictive analytics

Improving claims management outcomes with predictive analytics Improving claims management outcomes with predictive analytics Contents: 1 Executive Summary 2 Introduction 3 Predictive Analytics Defined 3 Proven ROI from Predictive Analytics 4 Improving Decisions in

More information

Preventing Health Care Fraud

Preventing Health Care Fraud Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

The Facets of Fraud. A layered approach to fraud prevention

The Facets of Fraud. A layered approach to fraud prevention The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics

More information

Recognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions

Recognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions Building a Smarter Planet with Advanced Cyber Security Solutions Recognize Nefarious Cyber Activity and Catch Those Responsible with Highlights g Cyber Security Solutions from IBM InfoSphere Entity Analytic

More information

Prevention is Better than Cure: Protect Your Medical Identity

Prevention is Better than Cure: Protect Your Medical Identity Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical

More information

Beyond listening Driving better decisions with business intelligence from social sources

Beyond listening Driving better decisions with business intelligence from social sources Beyond listening Driving better decisions with business intelligence from social sources From insight to action with IBM Social Media Analytics State of the Union Opinions prevail on the Internet Social

More information

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement white paper Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement»» Summary For business intelligence analysts the era

More information

White Paper March 2009. Government performance management Set goals, drive accountability and improve outcomes

White Paper March 2009. Government performance management Set goals, drive accountability and improve outcomes White Paper March 2009 Government performance management Set goals, drive accountability and improve outcomes 2 Contents 3 Business problems Why performance management? 4 Business drivers 6 The solution

More information

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist 2008 IBM Corporation Agenda Objective Interoperability Prerequisites Where to model

More information

Better Business Outcomes with Business Analytics

Better Business Outcomes with Business Analytics IBM Software Business analytics Business Analytics software Better Business Outcomes with Business Analytics Why analytics-driven organizations increasingly outperform their peers 2 Better Business Outcomes

More information

VIEW POINT. Big data analytics: New whistleblower on insurance fraud. Abstract

VIEW POINT. Big data analytics: New whistleblower on insurance fraud. Abstract VIEW POINT Big data analytics: New whistleblower on insurance fraud - Sachin Pandhare Abstract As fraudsters get smarter and use technology advancements to their benefit, insurance companies face greater

More information

Increasing marketing campaign profitability with Predictive Analytics

Increasing marketing campaign profitability with Predictive Analytics Increasing marketing campaign profitability with Predictive Analytics Highlights: Achieve better campaign results without increasing staff or budget Enhance your CRM by creating personalized campaigns

More information

IBM Security Systems Support

IBM Security Systems Support IBM Security Systems Support Dave Milburn European Customer Support Manager Security Systems - Identity & Access Management (dave_milburn@uk.ibm.com) 23 rd May 2014 12014 IBM Corporation Remote Technical

More information

Predictive Analytics for Donor Management

Predictive Analytics for Donor Management IBM Software Business Analytics IBM SPSS Predictive Analytics Predictive Analytics for Donor Management Predictive Analytics for Donor Management Contents 2 Overview 3 The challenges of donor management

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

IBM SPSS Modeler Professional

IBM SPSS Modeler Professional IBM SPSS Modeler Professional Make better decisions through predictive intelligence Highlights Create more effective strategies by evaluating trends and likely outcomes. Easily access, prepare and model

More information

Manage your IT Resources with IBM Capacity Management Analytics (CMA)

Manage your IT Resources with IBM Capacity Management Analytics (CMA) Manage your IT Resources with IBM Capacity Management Analytics (CMA) New England Users Group (NEDB2UG) Meeting Sturbridge, Massachusetts, USA, http://www.nedb2ug.org November 19, 2015 Milan Babiak Technical

More information

Delivering new insights and value to consumer products companies through big data

Delivering new insights and value to consumer products companies through big data IBM Software White Paper Consumer Products Delivering new insights and value to consumer products companies through big data 2 Delivering new insights and value to consumer products companies through big

More information

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project

More information

Economic crime has risen to

Economic crime has risen to Insurance companies need to task economic crime as a top priority Economic crime has risen to its highest level in the past six years and the insurance industry is no exception. This is one of the many

More information

Claims management for insurance: Reduce costs while delivering more responsive service.

Claims management for insurance: Reduce costs while delivering more responsive service. Claims management for insurance: Reduce costs while delivering more responsive service. > SPEED CLAIMS CYCLE TIMES > ENRICH CUSTOMER EXPERIENCES > STREAMLINE RELATIONSHIPS WITH VENDORS > REDUCE FRAUD-RELATED

More information

A proven 5-step framework for managing supplier performance

A proven 5-step framework for managing supplier performance IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

Spend Enrichment: Making better decisions starts with accurate data

Spend Enrichment: Making better decisions starts with accurate data IBM Software Industry Solutions Industry/Product Identifier Spend Enrichment: Making better decisions starts with accurate data Spend Enrichment: Making better decisions starts with accurate data Contents

More information

AMPLIFYING SECURITY INTELLIGENCE

AMPLIFYING SECURITY INTELLIGENCE AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest

More information

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics Independently explore, visualize, model and share insights without IT assistance Highlights Explore, analyze, visualize and share your insights independently, without relying on IT for assistance. Work

More information

A financial software company

A financial software company A financial software company Projecting USD10 million revenue lift with the IBM Netezza data warehouse appliance Overview The need A financial software company sought to analyze customer engagements to

More information

The Informatica Solution for Improper Payments

The Informatica Solution for Improper Payments The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade

More information

Insights into Enterprise Telecom Expense Management

Insights into Enterprise Telecom Expense Management IBM Software Industry Solutions Telecom Expense Management Insights into Enterprise Telecom Expense Management Trends and Best Practices Insights into Enterprise Telecom Expense Management Introduction

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are

More information

LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013

LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013 LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY Bill Franks Chief Analytics Officer Teradata July 2013 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For

More information

Powering Security and Easy Authentication in a Multi-Channel World

Powering Security and Easy Authentication in a Multi-Channel World Powering Security and Easy Authentication in a Multi-Channel World Archit Lohokare Global Product Manager IBM Security Systems 1 2012 IBM Corporation IBM Security Systems division is one of the largest

More information

Big Data: Aspirations, Applications, and Analytics. 2012 IBM Corporation

Big Data: Aspirations, Applications, and Analytics. 2012 IBM Corporation Big Data: Aspirations, Applications, and Analytics Study overview IBM Institute for Business Value and the Saïd Business School partnered to benchmark global big data activities IBM Institute for Business

More information

Working with telecommunications

Working with telecommunications Working with telecommunications Minimizing churn in the telecommunications industry Contents: 1 Churn analysis using data mining 2 Customer churn analysis with IBM SPSS Modeler 3 Types of analysis 3 Feature

More information

IBM X-Force 2012 Cyber Security Threat Landscape

IBM X-Force 2012 Cyber Security Threat Landscape IBM X-Force 2012 Cyber Security Threat Landscape Johan Celis X-Force R&D Spokesperson Security Channel Sales Leader BeNeLux 1 Mission IBM Security Systems To protect our customers from security threats

More information

How To Transform Customer Service With Business Analytics

How To Transform Customer Service With Business Analytics IBM Software Business Analytics Customer Service Transforming customer service with business analytics 2 Transforming customer service with business analytics Contents 2 Overview 2 Customer service is

More information

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering

More information

Security Intelligence Solutions

Security Intelligence Solutions Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security

More information