LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013

Size: px
Start display at page:

Download "LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013"

Transcription

1 LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY Bill Franks Chief Analytics Officer Teradata July 2013

2 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For Efficiency Wrap-Up / Q & A 2 Confidential Do Not Distribute Without Permission

3 Closing The Tax Gap Is Crucial Tax Gap: The difference between owed and voluntarily remitted tax obligations The IRS estimates that at the Federal level, the tax gap is 15% to 17% Since most states start with the Federal AGI, this tax gap only grows larger in total 3 Confidential Do Not Distribute Without Permission

4 It Isn t Just About Compliance!! Improving efficiency and effectiveness can be just as important as increasing compliance How much money and effort is spent trying to make outdated and insufficient systems and processes work? Focus on spending more efficiently as well as collecting more revenue 4 Confidential Do Not Distribute Without Permission

5 Fraud Is Very Easy & Widespread Today Electronic filing, which was introduced to speed up delivery of refunds, has made the system more vulnerable to fraud The IRS is seeking to speed up the loading of data from W-2 payroll forms issued at the beginning of the tax season, a time lapse which gives fraudsters a window of opportunity to file using false data "We will not be prosecuting our way out of this We're going to have to make it more and more difficult for criminals to profit from this behavior," said Miller 5 Confidential Do Not Distribute Without Permission

6 The Unintended Consequences Of Being Helpful The thieves know that the IRS does not verify the employer W-2s sent with the return until after the refund is issued. Police Chief Larry Gomer said the speedy returns and the option of having your refund issued on a debit card are making it easier for criminals to pull off the fraud 6 Confidential Do Not Distribute Without Permission

7 Even Prisoners Are In On The Action TIGTA has previously suggested that the IRS wait to issue refunds until it receives thirdparty confirmation like W2s TIGTA said the IRS could also stop more fraud by improving the accuracy of its Prisoner File. The inspector general found that about 500,000 of these files, or 18%, are potentially inaccurate or missing information 7 Confidential Do Not Distribute Without Permission

8 This Isn t Just An Issue For The United States 8 Confidential Do Not Distribute Without Permission

9 Analytics Can Help With All Compliance Issues Purposeful Fraud The intent is different, but the revenue impact can be the same! Innocent Mistake Clueless & Uneducated On Requirements 9 Confidential Do Not Distribute Without Permission

10 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For Efficiency Wrap-Up / Q & A 10 Confidential Do Not Distribute Without Permission

11 Study What Private Industry Has Done Private companies have already addressed many of your issues at a deep level Financial institutions have highly sophisticated fraud processes built off of a wide range of data and tools A variety of industries have leveraged data & analytics to improve their customer service and operational efficiency Tax authorities don t need to start from scratch, they just need to borrow from others 11 Confidential Do Not Distribute Without Permission

12 Modernize Several Areas To Increase Collections Increase & Promote Compliance > Discover non-compliant taxpayers & enhance voluntary compliance > Improve agency-wide audit selection Improve Quality of Service > Reduce intrusion and burden for compliant citizens > Decrease telephone calls and follow-up > Improve business processes Optimize Workforce > Automate manual processes > Drive accuracy, efficiency and consistency > Improve access to vital information Drive Informed Business Decisions > Data driven decision making based on consistent, reliable data > Measurable reports to evaluate and modify business processes Documented & Integrated Tax Discovery Logic > Easy to defend in prosecutions > Easy to adjust and improve as behaviors change 12 Confidential Do Not Distribute Without Permission

13 The Impacts Of Modernizing Are Substantial Over $2 Billion Collected In Just 8 States! State #1 State #2 State #3 State #4 State #5 State #6 State #7 Audit resources are being used more effectively, while at the same time improving customer service. Revenue from the first discovery program was recognized in less than 70 days from the start of the program. Value added data now available to auditors and examiners for each lead, enabling them to work smarter, faster, more efficiently, & less intrusively. Generated a return on investment of 1,140% early on their project and has increased monthly revenue. Resulted in additional revenue collections to the state of over $275 million to date. Produced revenue exceeding $250 million, with thousands of leads representing multiple millions of dollars still being processed. Productivity at the agency increased with the automation of the lead generation process. State #8 Improved productivity by at least 37%. Collecting more taxes both in Sales and Franchise taxes with approximately the same number of employees. 13 Confidential Do Not Distribute Without Permission

14 Success Depends On Several Factors The availability of data for right-time analysis, not just the capture and storage of data An understanding of inefficiencies and compliance issues first, followed by automating ways to address the issues Leveraging analytics to provide prescriptive actions for right now and not simply identify historical issues 14 Confidential Do Not Distribute Without Permission

15 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For Efficiency Wrap-Up / Q & A 15 Confidential Do Not Distribute Without Permission

16 Challenges in Addressing Fraud Timeliness: Time to detection determines cost of correction Changing: Fraud continues to adapt and evolve Technology: New means of fraud enabled every day Scale: Analytics at scale across many data sources & types Consumer Concerns 42% of survey respondents believe they have been victims of online fraud 57% of respondents do not believe online companies are taking enough precautions to protect them against online fraud Ponemon Institute Consumers Reaction to Online Fraud April Confidential Do Not Distribute Without Permission

17 Performing Rich Analytics to Detect Fraud Identify suspect data Identify suspect relationships Web Logs {user, page, time} Click 1 Click 2 Click 3 Click 4 Identify suspect patterns Insurance Claims Transactions Stock Tick Data {user, payee, date} Returns Claim 1 Claim 2 Claim 3 {user, product, time} Purchase 1Purchase 2Purchase 3Purchase 4 {stock, price, user, time} Claim 4 Trade 1 Trade 2 Trade 3 Trade 4 {customer, SKU, price, date} Return 1 Return 2 Return 3Return 4 All at massive scale across multiple data sources & types 17 Confidential Do Not Distribute Without Permission

18 Start With The Simplest Analytics Make critical data available for analysis at the time a decision needs to be made Very simple fact checking can catch a lot of fraud > Does income match W2 reporting? > Does the address match W2, 1099, and other reporting? > Is income vastly different than in past years? > Has the refund payment method changed? > Has the same address been on many other returns? Much of the fraud happening today would not happen if simple checks like these were in place 18 Confidential Do Not Distribute Without Permission

19 Getting Started: Define The Relevant Metrics You must start by combining data to create metrics that will feed your analysis processes Potential metrics that show intent to defraud (or a mistake) include: > Third party financial information that conflicts with what is reported > Lifestyle beyond reported income means > Ratio of reported withholding of various taxes doesn t match expected > Tax preparer in common with other fraudulent taxpayers > Vastly different income distribution than in previous years > and many, many more 19 Confidential Do Not Distribute Without Permission

20 Basic Fraud Approaches Profile each metric to understand its characteristics. Without knowing what is normal, you can t flag things that aren t normal > Take into account special situations, sub-populations, or other factors Start with some simple thresholds, but be sure to define them right > Absolute rules - more than 5 red flags per return is cause for alarm > Ranking - we ll only worry about those returns with the highest 10% of flags > Change ranking - we care when a visible change in pattern occurs Univariate methods can find some low hanging fruit. However, it is only the starting point. You have to go deeper. 20 Confidential Do Not Distribute Without Permission

21 Going Beyond The Basics Examination of multiple metrics using composite scores adds more power > Score = Weight1*Metric1Score + Weight2*Metric2Score WeightN*MetricNScore There are many ways to define basic composite scores > Flagging each metric as 1 = ok, 0 = bad and then totaling the flags > Flagging each metric on a scale of 0 N and then totaling the flags > Ranking on each metric and taking the average rank > Applying uneven weights to your metrics in any of the above One approach won t fit all problems. You have to experiment 21 Confidential Do Not Distribute Without Permission

22 Statistical Modeling, Data Mining, & Machine Learning The most powerful method is to use statistical models to assess fraud risk > To build a predictive model, you need to identify some historical known cases of fraud > Clustering can also be used to find cases with similar characteristics. This won t predict fraud, but can identify unusual groupings of cases Various modeling options exist C3 T r a n s a c ti o n s C2 C Login Time Cluster analysis can help find cases that have similar profiles Response modeling can provide rankings on overall fraud risk Decision trees can help identify drivers of fraud and high risk cases 22 Confidential Do Not Distribute Without Permission

23 Adding Big Data: Social Media Analysis What do people say publicly? Are they living a lifestyle that exceeds their means and bragging about their new boat? Do they have any associations with known fraudsters? This data should likely be used to help an investigation rather than to target one 23 Confidential Do Not Distribute Without Permission

24 Adding Big Data: Social Network Analysis Link tax service businesses, individual preparer services, return addresses, and other address or relationship information Identify complex networks of relationships Fraud identified by connections & patterns within the graph relationships 24 Confidential Do Not Distribute Without Permission

25 Adding Big Data: Unstructured Text Analysis Explore the explanations taxpayers provide for their override of standards Analyze responses to inquiries sent to the taxpayer as part of an investigation My lender provided an incorrect value of my interest payments this year Information Extracted: Who? Bill Franks When? 12:00 on 7/7/2013 Mentioned lender documents? Yes = 1 Exact verbiage seen repeatedly? Yes = 1 Mentioned refinance? No = 0 25 Confidential Do Not Distribute Without Permission

26 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For Efficiency Wrap-Up / Q & A 26 Confidential Do Not Distribute Without Permission

27 Optimize Your Websites Tools today allow deep analysis of web browsing patterns This can help you identify information that is difficult for taxpayers to find Tune the website so you get less calls! Taxpayer satisfaction will increase alongside the cost savings Clickstream Led to a document download Clickstream Led to a phone call $ Taxpayer site navigation. Desired documents found, but only after 12+ steps! 27 Confidential Do Not Distribute Without Permission

28 Expedite Your Audit Review Process Direct your limited resources where they are most needed and where return is highest Use predictive models to identify the most likely fraud candidates Also use models to help assess whether responses are sufficient 28 Confidential Do Not Distribute Without Permission

29 Monitor Activity In Near Real Time Have analytic processes looking for anomalies continuously For example, did a large number of returns from a single apartment complex all get filed on the same day? Identify IP addresses that are not associated with a known preparer, but that are suddenly filing lots of returns 29 Confidential Do Not Distribute Without Permission

30 Use The Latest Customer Service Analytics Enhance call routing and agent workflow Use predictive routing to identify what a taxpayer is likely calling about Identify common paths that service agents take through internal sites, streamline, and standardize them 30 Confidential Do Not Distribute Without Permission

31 Conclusions Tax authorities are far behind in the effort to apply big data and analytics to their processes It all starts with the fundamental availability of data and the appropriate access to that data Don t just think about catching fraud and taxpayer errors. Also consider improved service and operational efficiency We will all be better off if tax authorities can be more efficient. We ll collect more and have to spend less! 31 Confidential Do Not Distribute Without Permission

32 Contact Information If you have further questions or comments: Bill Franks 32 Confidential Do Not Distribute Without Permission

Advanced Analytics for Audit Case Selection

Advanced Analytics for Audit Case Selection Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach

More information

SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE

SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE Les McMonagle (CISSP, CISA, ITIL) Director & Principal Consultant Teradata InfoSec COE July 2013 Agenda Defining The Problem

More information

Identity Theft and Tax Administration

Identity Theft and Tax Administration PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011

More information

Technology Advances that Help Stop Tax Refund Fraud and EITC Abuse

Technology Advances that Help Stop Tax Refund Fraud and EITC Abuse Technology Advances that Help Stop Tax Refund Fraud and EITC Abuse FTA Technology Conference July 31, 2013 Presented by: Joan Barr Brian Bequette, Sandy Fitzpatrick 1 [ Agenda ] 1 2 3 Impact of refund

More information

Treasury Inspector General Tax Administration (TIGTA)

Treasury Inspector General Tax Administration (TIGTA) Treasury Inspector General Tax Administration (TIGTA) 1 Finding The RED DOT in Tax Administration s BIG DATA OR Reducing the Hay to Find a Needle 2 Background on IRS and TIGTA s Oversight Role Selected

More information

Top 10 reasons to automate expense management process

Top 10 reasons to automate expense management process Top 10 reasons to automate expense management process Switching from spreadsheet to an automated solution Though many leading enterprises have moved to automate their expense management, there are still

More information

CLIENT SERVICES: Tax Problem Resolution Services

CLIENT SERVICES: Tax Problem Resolution Services CLIENT SERVICES: Tax Problem Resolution Services Dear Client: Are you having problems with the IRS? We re here to help you resolve your tax problems and put an end to the misery that the IRS can put you

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Continued Refinement of the Return Review Program Identity Theft Detection Models Is Needed December 11, 2015 Reference Number: 2016-40-008 This report

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial

More information

This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making.

This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making. Lost in a sea of data? Facing an external audit? Or just wondering how you re going meet the challenges of the next regulatory law? When you need fast, dependable support and company-specific solutions

More information

Tax Fraud in Increasing

Tax Fraud in Increasing Preventing Fraud with Through Analytics Satya Bhamidipati Data Scientist Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved. 2 Tax Fraud in Increasing 27%

More information

WRITTEN TESTIMONY OF JOHN A

WRITTEN TESTIMONY OF JOHN A WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The External Leads Program Results in the Recovery of Erroneously Issued Tax Refunds; However, Improvements Are Needed to Ensure That Leads Are Timely

More information

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The

More information

PARTNERSHIPS AND S CORPORATIONS. IRS Needs to Improve Information to Address Tax Noncompliance

PARTNERSHIPS AND S CORPORATIONS. IRS Needs to Improve Information to Address Tax Noncompliance United States Government Accountability Office Report to the Chairman, Committee on Finance, U.S. Senate May 2014 PARTNERSHIPS AND S CORPORATIONS IRS Needs to Improve Information to Address Tax Noncompliance

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION There Are Billions of Dollars in July 19, 2012 Reference Number: 2012-42-080 This report has cleared the Treasury Inspector General for Tax Administration

More information

WRITTEN TESTIMONY OF JOHN A

WRITTEN TESTIMONY OF JOHN A WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE HOUSE WAYS AND MEANS COMMITTEE SUBCOMMITTEE ON OVERSIGHT ON THE 2015 TAX FILING SEASON APRIL 22, 2015 Chairman Roskam,

More information

Maximizing Return and Minimizing Cost with the Decision Management Systems

Maximizing Return and Minimizing Cost with the Decision Management Systems KDD 2012: Beijing 18 th ACM SIGKDD Conference on Knowledge Discovery and Data Mining Rich Holada, Vice President, IBM SPSS Predictive Analytics Maximizing Return and Minimizing Cost with the Decision Management

More information

Warranty Fraud Detection & Prevention

Warranty Fraud Detection & Prevention Warranty Fraud Detection & Prevention Venky Rao North American Predictive Analytics Segment Leader Agenda IBM SPSS Predictive Analytics for Warranties: Case Studies Why address the Warranties process:

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Return Review Program Enhances the Identification of Fraud; However, System Security Needs Improvement July 2, 2015 Reference Number: 2015-20-060 This

More information

Transcript Tax Fraud & Identity Theft - Protecting your clients and yourself Webinar

Transcript Tax Fraud & Identity Theft - Protecting your clients and yourself Webinar Slide 1 Good morning and welcome to today s webinar. I am Larry Womac and I will be your presenter. With me are our subject matter experts Joseph Adversalo and Nepoh Lappia. Slide 2 Today s webinar is

More information

Real Time Tax System Initiative Public Meeting. December 8, 2011

Real Time Tax System Initiative Public Meeting. December 8, 2011 Real Time Tax System Initiative Public Meeting December 8, 2011 Agenda Goals of the Real Time Tax System Initiative Benefits for Taxpayers Overview of key compliance practices today Key observations /

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to Better Ensure That Refunds Claimed on Potentially Fraudulent Tax Returns Are Not Erroneously Released November 12, 2015 Reference

More information

Preventing Health Care Fraud

Preventing Health Care Fraud Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

Home Loan Manager Pro 7.1

Home Loan Manager Pro 7.1 Home Money Manager www.homemoneymanager.com.au Home Loan Manager Pro 7.1 The Mortgage Checker and Planning Tool 05 November 2015 DOWNLOAD SOFTWARE Home Loan Manager Pro is available from www.homemoneymanager.com.au

More information

TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE

TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON FINANCE UNITED STATES SENATE FOR A HEARING CONCERNING TAX SCHEMES AND SCAMS

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

Inside the SC DOR Data Warehouse Project

Inside the SC DOR Data Warehouse Project Inside the SC DOR Data Warehouse Project Presented by: Terry Garber, New Applications Manager, South Carolina DOR Paul Morris, Director, Revenue Solutions, Inc. (RSI) Agenda Introduction Project Overview

More information

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

Fraud detection in newly opened accounts. Connecting data helps predict identity theft Fraud detection in newly opened accounts Connecting data helps predict identity theft Executive summary Fraud continues to be a genuine threat and challenge. After a sharp and unexplained drop in identity

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

WITHHOLDING TAX. Utah State Tax Commission

WITHHOLDING TAX. Utah State Tax Commission Slide 1 WITHHOLDING TAX Utah State Tax Commission Thank you for contacting the Utah State Tax Commission. Today we are going to discuss the Employer Withholding Tax. This presentation will include how

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Improving Inside Sales Production with Automation

Improving Inside Sales Production with Automation Improving Inside Sales Production with Automation Improving Inside Sales Production with Automation A recent Noble Systems survey of Inside Sales Teams revealed that while one-half of the organizations

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Introduction to Integrated Marketing: Lead Scoring

Introduction to Integrated Marketing: Lead Scoring Introduction to Integrated Marketing: Lead Scoring Are You Making The Most Of Your Sales Leads? Lead scoring is a key missing link in many B2B marketing strategies. According to a recent Gartner study,

More information

June 2015 Newsletter

June 2015 Newsletter June 2015 Newsletter News From Silver Bridge CPAs TAX TIPS & TRICKS Consider Setting Up an Idaho Medical Savings Account! The state of Idaho has established a tax deduction for contributions made to an

More information

IDENTITY THEFT. Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud

IDENTITY THEFT. Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud United States Government Accountability Office Report to Congressional Requesters August 2014 IDENTITY THEFT Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud GAO-14-633

More information

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are

More information

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens From Chase to Prevention Stopping Healthcare Fraud Before it Happens Healthcare fraud, waste, and abuse cost taxpayers tens of billions of dollars per year, with Medicare and Medicaid fraud alone estimated

More information

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project

More information

Social Media Implementations

Social Media Implementations SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.

More information

Fraud Solution for Financial Services

Fraud Solution for Financial Services Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Revenue en e Solutions, Inc. Top Ten Compliance Programs to Drive Revenue

Revenue en e Solutions, Inc. Top Ten Compliance Programs to Drive Revenue Revenue en e Solutions, Inc. Top Ten Compliance Programs to Drive Revenue Presentation for: Federation of Tax Administrators Solution Track Series June 2009 Introductions Paul Panariello Co-founder of

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many

More information

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization

More information

12/31/14 IRS ISSUES. IRS Scam Alert p. 45. Circular 230 Update p. 45. Chapter 04 Pages 45-54. Section 10.35: 1. Call IRS at 800-366-4484.

12/31/14 IRS ISSUES. IRS Scam Alert p. 45. Circular 230 Update p. 45. Chapter 04 Pages 45-54. Section 10.35: 1. Call IRS at 800-366-4484. IRS ISSUES Chapter 04 Pages 45-54 IRS Scam Alert p. 45 1. Call IRS at 800-366-4484. 2. Complain to FTC at www.ftc.gov 3. Forward scam e-mails to: phishing@irs.gov Circular 230 Update p. 45 Section 10.35:

More information

Driving Value From Big Data

Driving Value From Big Data Big Data Executive Forum Data Discovery, Modern Architecture & Visualization Driving Value From Big Data Bill Franks Chief Analytics Officer, Teradata It s Not So Much Big Data As it is different data.

More information

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Analytics, Big Data, & Threat Intelligence: How Security is Transforming Analytics, Big Data, & Threat Intelligence: How Security is Transforming Jason Sloderbeck Director, Product Management RSA Web Threat Detection 1 Presentation Overview The Largest Threat How Can Big Data

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

Analyzing Big Data: The Path to Competitive Advantage

Analyzing Big Data: The Path to Competitive Advantage White Paper Analyzing Big Data: The Path to Competitive Advantage by Marcia Kaplan Contents Introduction....2 How Big is Big Data?................................................................................

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

Employment Development Department Accounts Receivable for Benefit Overpayments

Employment Development Department Accounts Receivable for Benefit Overpayments Employment Development Department Accounts Receivable for Benefit Overpayments Introduction In addition to collections of the State's employment tax program, the Employment Development Department (EDD

More information

3 Top Big Data Use Cases in Financial Services

3 Top Big Data Use Cases in Financial Services FINANCIAL SERVICES USE CASE EBOOK 3 Top Big Data Use Cases in Financial Services How Financial Services Companies are Gaining Momentum in Big Data Analytics and Getting Results INTRODUCTION Helping Financial

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

Finding Fraud at a Fortune 500 Company

Finding Fraud at a Fortune 500 Company About Luminescent is a consulting firm based in Minneapolis, MN, focused on forensic accounting, governance and financial integrity. The firm has performed hundreds of forensic accounting engagements involving

More information

Fight identity-theft tax fraud with integrated layers of authentication

Fight identity-theft tax fraud with integrated layers of authentication WHITE PAPER Fight identity-theft tax fraud with integrated layers of authentication Jeffrey Huth Vice President, Product Strategy TransUnion Government Information Solutions Executive summary Identity-theft

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

IMMEDIATE STEPS 5 NEXT STEPS 13

IMMEDIATE STEPS 5 NEXT STEPS 13 INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity Theft Report 9 NEXT STEPS 13 Review Your Credit Reports 13 Dispute Errors with Credit Reporting

More information

Recognize the many faces of fraud

Recognize the many faces of fraud Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and

More information

Three proven methods to achieve a higher ROI from data mining

Three proven methods to achieve a higher ROI from data mining IBM SPSS Modeler Three proven methods to achieve a higher ROI from data mining Take your business results to the next level Highlights: Incorporate additional types of data in your predictive models By

More information

IBM Counter Fraud Signature Solutions

IBM Counter Fraud Signature Solutions IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services

More information

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number

More information

Catching Fraudsters In Real Time

Catching Fraudsters In Real Time Catching Fraudsters In Real Time Aaron Tietz aaron.tietz@tufts.edu Mentor: Ming Chow Abstract Unlike physical store retailers, e-retailers are responsible to repay customers for money lost due to fraudulent

More information

T&E Spend Analysis Report

T&E Spend Analysis Report T&E Spend Analysis Report Volume 1 Volume 1 Fall 2014 CORPORATE CARD 1234 5678 9876 5432 Executive Summary For this report Oversight analyzed over 10 million transactions, a total of over $1 billion dollars

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

Report True Fraud Protection: Securing People, Process and Personal Data

Report True Fraud Protection: Securing People, Process and Personal Data True Fraud Protection: Securing People, Process and Personal Data This report is available for download on Teleperformance s website. For more information about articles, cases, white papers go to: www.teleperformance.com

More information

Tax Preparers and Identity Theft

Tax Preparers and Identity Theft Tax Preparers and Identity Theft It is a form of crime unique to the 21st Century, as the massive collection of data from consumers and a lack of sophisticated computer security measures combine to offer

More information

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973

More information

Data-driven government: Challenges and a path forward

Data-driven government: Challenges and a path forward IBM Analytics White Paper Government Data-driven government: Challenges and a path forward 2 Data-driven government: Challenges and a path forward Contents 2 Executive summary 2 What is data-driven government

More information

KEYS TO CLOUD APP SECURITY

KEYS TO CLOUD APP SECURITY KEYS TO CLOUD APP SECURITY Cloud App Security It s About Cloud Confidence Cloud apps they re everywhere these days! They re easy to use and they let people work faster. Forrester predicts the SaaS market

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

Money Math for Teens. Credit Score

Money Math for Teens. Credit Score Money Math for Teens This Money Math for Teens lesson is part of a series created by Generation Money, a multimedia financial literacy initiative of the FINRA Investor Education Foundation, Channel One

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

SAS Fraud Framework for Banking

SAS Fraud Framework for Banking SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools

More information

Your security is our priority

Your security is our priority Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products

More information

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

Fraud Analytics Monitor, Detect and Mitigate Risks. White Paper FRAUD ANALYTICS

Fraud Analytics Monitor, Detect and Mitigate Risks. White Paper FRAUD ANALYTICS White Paper Fraud Analytics Monitor, Detect and Mitigate Risks FRAUD ANALYTICS Role of Analytics In Fraud Management Analytical Tools and their Utility in Fraud Detection Steps For Successful Fraud Analytics

More information

Fun, engaging and effective. Aligned with national financial education and core curriculum requirements.

Fun, engaging and effective. Aligned with national financial education and core curriculum requirements. Building Your Financial Foundation Adult Level Curriculum - Instructors Guide Fun, engaging and effective. Aligned with national financial education and core curriculum requirements. Lessons on: Credit

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

Lexmark Solution to Increase Productivity

Lexmark Solution to Increase Productivity Background: Annual Revenue: Location: (MainSource) is the premier community financial services company in the Midwest. MainSource has been in business for 25 years, and has more than 70 branches in Indiana,

More information

Responsive Business Process and Event Management

Responsive Business Process and Event Management Building Responsive Enterprises: One decision at a Time James Taylor CEO, Decision Management Solutions Visibility, prediction, impact and action are the keys More information at: www.decisionmanagementsolutions.com

More information

ACA INFORMATION TECHNOLOGY READINESS AND DATA SECURITY

ACA INFORMATION TECHNOLOGY READINESS AND DATA SECURITY JOINT HEARING BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM, SUBCOMMITTEE ON ENERGY POLICY, HEALTH CARE AND ENTITLEMENTS AND THE COMMITTEE ON HOMELAND SECURITY, SUBCOMMITTEE ON CYBERSECURITY,

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Interim Results of the 2011 Filing Season March 31, 2011 Reference Number: 2011-40-032 This report has cleared the Treasury Inspector General for Tax Administration

More information

May 2011 Report No. 11-030. An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services

May 2011 Report No. 11-030. An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services John Keel, CPA State Auditor An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services Report No. 11-030 An Audit Report on Substance Abuse Program Contract

More information

How To Identify And Prevent Tax Fraud

How To Identify And Prevent Tax Fraud TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Detection Has Improved; However, Identity Theft Continues to Result in Billions of Dollars in Potentially Fraudulent Tax Refunds September 20, 2013 Reference

More information

Steps to Vital New Control Over Wages, Tips and Shift Pay

Steps to Vital New Control Over Wages, Tips and Shift Pay 3 Steps to Vital New Control Over Wages, Tips and Shift Pay In today s hospitality industry, time really is money. After all, the faster you serve customers, the more customers you can serve. That s why

More information

The Power of Risk, Compliance & Security Management in SAP S/4HANA

The Power of Risk, Compliance & Security Management in SAP S/4HANA The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution

More information

BUSINESS INTELLIGENCE: IT'S TIME TO TAKE PRIVATE EQUITY TO THE NEXT LEVEL. by John Stiffler

BUSINESS INTELLIGENCE: IT'S TIME TO TAKE PRIVATE EQUITY TO THE NEXT LEVEL. by John Stiffler IT'S TIME TO TAKE PRIVATE EQUITY TO by John Stiffler In a challenging economic environment, portfolio management has taken on greater importance. Private equity firms must look at every possible avenue

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information

MDaudit Compliance made easy. MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk.

MDaudit Compliance made easy. MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk. MDaudit Compliance made easy MDaudit software automates and streamlines the auditing process to improve productivity and reduce compliance risk. MDaudit As healthcare compliance, auditing and coding professionals,

More information