Demystifying Big Data Analytics
|
|
|
- Stanley McDonald
- 9 years ago
- Views:
Transcription
1 Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013
2 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components of an effective anti-fraud analytics program Advanced analytics to detect rogue employee behavior Forensic analytics technology framework beyond rules-based tests Emerging technologies Page 2
3 Big Data and Big Data Analytics Page 3
4 The big question is What is Big Data? Big Data characteristics Big data represents data sets that can no longer be easily managed or analyzed with traditional or common management tools, methods, and infrastructure. High Volume Page 4
5 Big Data has arrived In this decade, the universe will grow 44x from 0.9 zettabytes to 35.2 zettabytes. Facebook Electronic Payments Video Rendering Social Media Mobile Sensors PayPal Video Surveillance Medical Imaging Smart grids Geophysical exploration Gene Sequencing Page 5
6 Enterprises are looking to leverage Big Data to Better understand their customer need and further their business growth. ebay needs insights into what the customer wants in order to improve customer experience and increase traffic on the site Yahoo adopted Big Data to connect what users are looking for with what advertisers are trying to sell to them. Optimize business decisions through data driven insights. The auto industry has been able to use GPS systems to gather information on customer driving habits to then improve their products. Make money by selling insights from Big Data. Polk, a household name in the auto industry, sells online subscriptions to data about vehicle sales and ownership to automakers, part suppliers, dealers, advertising firms, and insurance companies Page 6
7 What is Big Data analytics? Transform data to information, information to insight and insight to intelligence Analysis is based on a large population of transactions instead of sample Process of examining large amounts of data of a variety of types to uncover hidden patterns, unknown correlations and other useful information Act of transforming data with the aim of extracting useful information and facilitating the achievement of factual conclusions Extracting the nuggets of gold hidden under mountains of data Page 7
8 The Analytics Value Chain: Manage DATA Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Primary goal with managing data should be to cut through the Big Data hype to leverage the relevant data needed to drive better business decisions Big Data Not So Big Data Volume Terabytes/Pedabytes Megabytes/Gigabytes Variety Unstructured (text, voice, video) Structured / Relational Velocity Data in Motion (Streaming) Data at Rest Veracity Untrusted / Uncleansed Trusted / Cleansed Page 8
9 The Analytics Value Chain: Perform Analytics Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Clients must be adept across a continuum of analytical techniques Advanced Analytics Prescriptive Analytics To determine WHICH decision and/or action will produce the most effective result against a specific set of objectives and constraints Predictive Analytics Leverage past data to understand the underlying relationship between data inputs and outputs to understand WHY something happened or to predict WHAT will happen in the future across various scenarios Business Intelligence Descriptive Analytics Mine past data to report, visualize, and understand WHAT has already happened after the fact or in real-time Mathematical Complexity Page 9
10 The Analytics Value Chain: Drive Decisions Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Last year, IBM surveyed 4,500 clients who said that they use analytics to drive decisions in three primary areas: Customer - to grow revenue and provide personalized services / products Operations - to reduce costs and improve service reliability Finance - to optimize investments across revenue/cost tradeoffs and to identify fraud, waste, and abuse Page 10
11 Current fraud risks Page 11
12 Risks by category Page 12
13 How is fraud detected? 50.3% by tip or accident Source: ACFE 2010 Report to the Nations On Occupational Fraud Source: ACFE 2012Report to the Nations Page 13
14 Anti-Fraud Controls Page 14
15 2012 Ernst & Young Global Fraud Survey 39% of respondents say that bribery & corruption practices occur frequently in their countries 15% of CFOs surveyed said they would be willing to make cash payments to win business 20% of CFOs surveyed said that they are willing to make personal gifts to win business 372 global CFOs surveyed Page 15
16 Components of an effective anti-fraud & corruption compliance program Elements of a successful corporate anti-fraud, bribery and corruption program Code of Ethics Setting the Proper Tone Proactive Fraud and Controls Corruption Communication Risk Monitoring Prevention and Training Assessment and Analytics Policies Management Ownership and Involvement Reactive Incident Response Plan Anti-fraud, bribery and corruption key activities Corporate compliance assessment Corporate compliance design Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud road map FCPA / anti-bribery compliance assessments Fraud risk assessment Targeted anti-fraud analytics Anti-bribery and corruption analytics M&A Due Diligence 3 rd Party Due Diligence Vendor Risk profiling Vendor Vetting -Level I, II, III background checks Investigations Fraud response planning Forensic data analytics Discovery and document review Page 16
17 Start with the Fraud Tree New tools and methodologies are required for monitoring corruption schemes Traditional focus of legal and compliance. Increased use of audit resources. Corruption Fraud tree Traditional focus of external audit. Fraudulent statements Conflicts of interest Bribery and corruption/ FCPA Illegal gratuities Bid-rigging/ procurement Revenue recognition GAAP Reserves Non financial Asset misappropriation Traditional focus of internal audit. Cash larceny Theft of other assets inventory/ AR/ fixed assets Fake vendor Payroll fraud T&E fraud Theft of data Page 17
18 Forensic analytics maturity model Beyond traditional rules-based queries consider all four quadrants Low Detection Rate High Structured Data Matching, Grouping, Ordering, Joining, Filtering Traditional rules-based Queries & Analytics Anomaly Detection, Clustering Risk Ranking Statistical-Based Analysis Unstructured Data Keyword Search Traditional Keyword Searching Data visualization, Drill-down into data, Text Mining Data Visualization & Text Mining High False Positive Rate Low Page 18
19 Fraud risk is in all datasets When considering enterprise risk, all sources of data should be addressed Gartner study shows that 80% of enterprise data is unstructured in nature Most internal audit procedures focus on the 20% structured data Structured Data CRM Databases Accounting Systems Text Graphics 80% Unstructured Data Presentations & Spreadsheets Unstructured Data 20% 80% Few organizations have the methodologies or technologies to efficiently address unstructured data Source: Gartner Research Page 19
20 Unstructured forensic analytics Page 20
21 Every second 05 Babies are born 1.4 Million spam s 48 Minutes of video are uploaded to YouTube 06 People long-on for the first time 05 New broadband subscribers 50 Mobile phones sold 34,000 Google searches 200,000 Text messages are sent 02 New blogs created 09 PCs sold >01 New domains registered 60 People visit an online dating site Page 21
22 Message Frequency Analyze communication over time to identify gaps in data set Understand message counts across the population (View and/or instant messaging frequency and consistency relative to the population.) Over which time period? When communications occur Communication spikes around key business events Page 22
23 Keyword Search Summary Analyze keyword hits by term, custodian, and date Analyze effectiveness of keywords. Understand the effect of keyword hits by custodian and timeframe to prioritize review and analyze keyword hits. Page 23
24 Link analysis Who is talking to who? The first 48 hours: Live server log files pulled in quickly for early case assessments Understanding a complex organization s true organization chart: Identification of relationships, versus activities, amongst actors Triage of custodians and communications for traditional review and additional analytics: Rapidly identify and point to communications of highest interest Sample analytics criterion: 1. Private communications, where 90% of all communications is outbound 2. Private Communications where content is FORWARDED Outbound more than 35% of time 3. Private Communications where attachments are sent outbound more that 35% of time Page 24
25 Fraud Triangle analytics Applying the theory to electronic communications Over 3,000 fraudulent terms/phrases in a dozen languages Page 25
26 Interactive dashboard for Page 26
27 Emotional Tone Analysis Identify Derogatory, Surprised, Secretive, Worried communications Page 27
28 Combine analytics to surface issues Unstructured, communications data. is organized and risk scored for analysis and remediation. & TXT Messages Transactions Voice Mail & Instant Messages Analysis Platform Document management Employee Hard Drives Page 28
29 Custodian Risk Ranking Scored by custodian and time period based on multiple criteria 1. Behavioral Keywords 2. Behavioral Keywords 3. Behavioral Keywords 4. User Activity 5. User Activity 6. Alias Clustering Percentage of EY-ACFE opportunity-focused behavioral term hits for that week in ESI sent or received by the custodian in focus Percentage of EY-ACFE rationalization-focused behavioral term hits for that week in ESI sent or received by the custodian in focus. Percentage of EY-ACFE incentive-pressure-focused behavioral term hits for that week in ESI sent or received by the custodian in focus. Percentage of instances within that week, where custodian sends or receives ESI involving those outside of peer group, as identified through hierarchies. Percentage of instances within that week, where custodian sends or receives ESI involving those outside of superiors, as identified through hierarchies. Percentage of instances within that week, where custodian sends or receives ESI involving at least one (1) of their identified communicative aliases. Scaling: 3 Scaling: 3 Scaling: 4 Scaling: 2 Scaling: 2 Scaling: 3 7. Emotive Percentage of instances within that week, where the custodian sends or receives ESI Tone with negative emotions identified through linguistic analyses. Scaling: 5 Custodian C1 C2 C3 C4 C5 C6 C7 Scaling C1 Scaling C2 Scaling C3 Scaling C4 Scaling C5 Scaling C6 Scaling C7 Score A, Week A, Week Page 29
30 Rogue employee analytics Risk Scoring Model peer stratification dashboard review Peer Stratification Dots represent clusters of high risk communications that can be reviewed by clicking. Detail-Level View Page 30
31 Structured forensic analytics Page 31
32 Integrated sampling approach Identifying a sample set of 50 payments for review, from 1.4 million in scope. Raw ERP system tables Data model design EY Payment Sample Selection Tool X riskiest payments, for detailed manual review 0.5X randomly selected payments, for contextual review Structured Attribute Analysis Payments related to sensitive field changes, by riskiest users Payments related to sensitive field changes, by riskiest fields Duplicative invoices Invoice completeness Round payment amounts Requirements Clustering Payments to high amount, low frequency vendors Payments to low amount, high frequency vendors Benford s Law deviants Payments to statistically anomalous vendors Fuzzy matching between employees and vendors Text Mining and Analysis Identification and extraction of entities: Geographies Proper nouns Addresses Telephone numbers Top concept extraction Identification of hits against EY- ACFE bribery and corruption keywords Minimal BAU disruption Transparency Sustainability EY received raw SAP tablesand rapidly re-constructed change activity and payments. Adjust weightings on-the-fly to reduce false-positives Architecture to support feeding in additional data, as needed. Page 32
33 Transaction Risk Scoring Analyzing multiple tests for each transaction Review breaches on targeted analytics Filter by selected analytics Page 33
34 Beyond rules-based tests Integrate statistical, visual and text mining techniques to identify patterns of high risk or rogue employee activities. Page 34
35 Focus on the payment text descriptions What if you saw these terms used as justification for payments to third parties? <blank description> Friend fee Donation Nobody calls it bribe expense Government fee Special commission One time payment Special payment Commission to the customer Incentive payment Pay on behalf of Goodwill payment Consulting fee Team building expense Volume contract incentive Processing fee Page 35
36 Text analytics in transactional data Page 36
37 Interactive dashboard: Expense review interface (who, what, where, why, how and how much?) Page 37
38 Emerging technologies Page 38
39 Search-around functionality Rapidly build out networks of interest and tie in multiple data sources Easily find entities, documents, events, etc which are directly related to your selection Page 39
40 A more human way to look at data Data points are represented as objects, with logical relationships Graphical representation of relationships between seemingly discrete entities Epicenters of activity become immediately discernable View supporting documents as dynamic objects Page 40
41 EY resources Page 41
42 Ernst & Young resources The guide to investigating business fraud Corruption or compliance weighing the costs, the Ernst & Young 10th global fraud survey Best practices for a global FCPA program, Compliance Week Keep it clean: the role of policies and training in compliance with anti-corruption laws, Supply Chain Quarterly Exposing the iceberg: detecting fraud through , FRAUD Magazine Fraud triangle analytics: applying the theory, FRAUD Magazine Page 42
43 Ernst & Young resources Staying ahead of corruption liabilities, ACG Mergers & Acquisitions Detecting financial statement fraud Ernst & Young white paper Demonstrating the effectiveness of your compliance program, Compliance Week Acquisitions in emerging markets: know the risks and how to address them, Financier Worldwide Accounting for Words, Internal Auditor Breaking the Status Quo in Review, FRAUD Magazine Page 43
44 Components of an effective corruption compliance program Page 44
45 Contacts James Walton Senior Manager Advisory Services Enterprise Intelligence Dallas, TX (214) Dave Rogers Senior Manager Fraud Investigation & Dispute Services Dallas, TX (214) Page 45
46 Ernst & Young Assurance Tax Transactions Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 152,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit Ernst & Young LLP is a client-serving member firm of Ernst & Young Global Limited operating in the US Ernst & Young LLP. All Rights Reserved This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Neither Ernst & Young LLP nor any other member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication. On any specific matter, reference should be made to the appropriate advisor. Page 46
Taking Data Analytics to the Next Level
Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Using Data Analytics to Detect Fraud. Other Data Analysis Techniques
Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is
Fraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
Emerging Trends in Fraud Analytics:
Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Global EY FIDS Forensic Data Analytics Survey 2014
Global EY FIDS Forensic Data Analytics Survey 2014 Big risks require big data thinking The Eighth International Pharmaceutical Compliance Congress Dubai, United Arab Emirates Vincent Walden Partner, EY
www.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
Neil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Managing FCPA (Foreign Corrupt Practices Act) Risks
Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
How To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
Integrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
Leading the way with Information-Led Transformation. Mark Register, Vice President Information Management Software, IBM AP
Leading the way with Information-Led Transformation Mark Register, Vice President Information Management Software, IBM AP 1 Today s Topics Our Smarter Planet and the Information Challenge Accelerating
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
A New Era Of Analytic
Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Big Data / FDAAWARE. Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015
Big Data / FDAAWARE Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015 1 Agenda BIG DATA What is Big Data? Characteristics of Big Data Where it is being used? FDAAWARE
Better Business Analytics with Powerful Business Intelligence Tools
Better Business Analytics with Powerful Business Intelligence Tools Business Intelligence Defined There are many interpretations of what BI (Business Intelligence) really is and the benefits that it can
Microsoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Housekeeping 1. Any questions coming out of today s presentation can be discussed in the bar this evening 2. OCF is
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
BIG DATA Impact on DMOs. TTRA June 21, 2013
BIG DATA Impact on DMOs TTRA June 21, 2013 What is BIG DATA? 1. Big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or
Data: To BI or not to BI?
NATIONAL CONFERENCE ON BMS, 30 MAY 2013, HILTON HOTEL Challenges in building a BI and Big data analytics system Data: To BI or not to BI? Iva Valerieva, 1 Marketing & Business Development Manager Who Are
Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention
White paper Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention Abstract In the current economy where growth is stumpy and margins reduced, retailers
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
Big Data Analytics: 14 November 2013
www.pwc.com CSM-ACE 2013 Big Data Analytics: Take it to the next level in building innovation, differentiation and growth 14 About me Data analytics in the UK Forensic technology and data analytics in
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
Introducing SAP Fraud Management. Jérôme Pugnet
Introducing SAP Fraud Management Jérôme Pugnet LEARNING POINTS Impacts and Challenges of Fraud How Big is the Problem? Fraud is Typically Found Without Technology: an Undetected Potential! What are the
The Next Wave of Data Management. Is Big Data The New Normal?
The Next Wave of Data Management Is Big Data The New Normal? Table of Contents Introduction 3 Separating Reality and Hype 3 Why Are Firms Making IT Investments In Big Data? 4 Trends In Data Management
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers
60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative
Using data analytics and continuous auditing for effective risk management
Using data analytics and continuous auditing for effective risk management April 2014 Irakis Kanavaris Agenda Current trends Common terminology of Data Analytics and CA/CM KPMG approach & observations
www.pwc.com/oracle Next presentation starting soon Business Analytics using Big Data to gain competitive advantage
www.pwc.com/oracle Next presentation starting soon Business Analytics using Big Data to gain competitive advantage If every image made and every word written from the earliest stirring of civilization
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations
Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14
Keith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
Oracle Financials Cloud Modernize Finance
FINANCIALS CLOUD Oracle Financials Cloud Modernize Finance Copyright 2014 Oracle Corporation. All Rights Reserved. Introduction Introduction Cloud computing is a vision that is increasingly turning into
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.
IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
Data collection architecture for Big Data
Data collection architecture for Big Data a framework for a research agenda (Research in progress - ERP Sense Making of Big Data) Wout Hofman, May 2015, BDEI workshop 2 Big Data succes stories bias our
SIGNIFICANCE OF BUSINESS INTELLIGENCE APPLICATIONS FOR BETTER DECISION MAKING & BUSINESS PERFORMANCE
SIGNIFICANCE OF BUSINESS INTELLIGENCE APPLICATIONS FOR BETTER DECISION MAKING & BUSINESS PERFORMANCE Dr. Nitin P. Mankar Professor (Director), Jayawantrao Sawant Institute of Management & Research (JSIMR).
Viewpoint ediscovery Services
Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
III JORNADAS DE DATA MINING
III JORNADAS DE DATA MINING EN EL MARCO DE LA MAESTRÍA EN DATA MINING DE LA UNIVERSIDAD AUSTRAL PRESENTACIÓN TECNOLÓGICA IBM Alan Schcolnik, Cognos Technical Sales Team Leader, IBM Software Group. IAE
THOMSON REUTERS ACCELUS
THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
Worldwide Anti-Corruption Policy
Worldwide Anti-Corruption Policy I. PURPOSE The laws of most countries make the payment or offer of payment or even receipt of a bribe, kickback or other corrupt payment a crime, subjecting both Eaton
Driving business performance Using data analytics
Driving business performance Using data analytics January 2016 kpmg.com About data analytics Many companies are overlooking a significant opportunity to enhance decision making and improve performance
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01
FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources...
SAS Fraud Framework for Banking
SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
ANALYTICS STRATEGY: creating a roadmap for success
ANALYTICS STRATEGY: creating a roadmap for success Companies in the capital and commodity markets are looking at analytics for opportunities to improve revenue and cost savings. Yet, many firms are struggling
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
BIG DATA FUNDAMENTALS
BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management
Deloitte Forensic. Deloitte Forensic. Capability Statement
Deloitte Forensic Deloitte Forensic Capability Statement Deloitte named a Kennedy Vanguard Leader in Forensic Investigation Consulting, based on capabilities. Source: Kennedy Consulting Research & Advisory;
Data analytics and workforce strategies New insights for performance improvement and tax efficiency
Data analytics and workforce strategies New insights for performance improvement and tax efficiency Leading organizations today are shaping effective workforce strategies through the use of data analytics.
Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value
Zero-in on business decisions through innovation solutions for smart big data management How to turn volume, variety and velocity into value ON THE LOOKOUT FOR NEW SOURCES OF VALUE CREATION WHAT WILL DRIVE
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
CRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP
CRGroup Whitepaper: Digging through the Data Reporting Options in Microsoft Dynamics GP The objective of this paper is to provide greater insight on each of the reporting options available to you within
BEYOND BI: Big Data Analytic Use Cases
BEYOND BI: Big Data Analytic Use Cases Big Data Analytics Use Cases This white paper discusses the types and characteristics of big data analytics use cases, how they differ from traditional business intelligence
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.
Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare
Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA
Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA ABSTRACT Current trends in data mining allow the business community to take advantage of
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
10426: Large Scale Project Accounting Data Migration in E-Business Suite
10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand
