FRAUD & SECURITY INTELLIGENCE



Similar documents
Fraud Solution for Financial Services

SAS Fraud Framework for Banking

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

Software AG Product Strategy Vision & Strategie Das Digitale Unternehmen

SAS Fraud Framework for Health Care Evolution and Learnings

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.

Warranty Fraud Detection & Prevention

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The Power of Risk, Compliance & Security Management in SAP S/4HANA

IBM Analytical Decision Management

Program Integrity in Government Transforming Data to Useful Information: Using Analytics to Detect and Prevent Improper Payments May 2013

High End Information Security Services

Extend your analytic capabilities with SAP Predictive Analysis

Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention

Big Data Executive Survey

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

The Canadian Realities of Big Data and Business Analytics. Utsav Arora February 12, 2014

Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value

Continuous Network Monitoring

Integrating a Big Data Platform into Government:

Hadoop Data Hubs and BI. Supporting the migration from siloed reporting and BI to centralized services with Hadoop

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

NEEDLE STACKS & BIG DATA: USING EVENT STREAM PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS

Security Intelligence

9K: How Technology Can Address Current and Emerging Fraud Risks

How To Create An Insight Analysis For Cyber Security

Being protected Using data analytics to detect fraud

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

How SAP Business Intelligence Solutions provide real-time insight into your organization

Finding the Sweet Spot. Using analytics to combine Fraud and AML

Best Practices to Improve Breach Readiness

IBM Security QRadar Risk Manager

Data: To BI or not to BI?

An Oracle White Paper November Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

ANALYTICS STRATEGY: creating a roadmap for success

BIG DATA THE NEW OPPORTUNITY

Effective Data Integration - where to begin. Bryte Systems

Intelligence-Driven Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Strategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014

The enemies ashore Vulnerabilities & hackers: A relationship that works

Τhe SAS BI delivers business-critical answers ahead of the competition Yannis Salamaras Senior Business Intelligence Consultant SAS Greece & Cyprus

SOCIAL MEDIA MONITORING AND SENTIMENT ANALYSIS SYSTEM

Big Data, Big Risk, Big Rewards. Hussein Syed

Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view

Information Technology Policy

Banking on Business Intelligence (BI)

Addressing Cyber Risk Building robust cyber governance

The Facets of Fraud. A layered approach to fraud prevention

IBM Security Intelligence Strategy

IBM Security QRadar Risk Manager

Data Integration Alternatives & Best Practices

Delivering Customer Value Faster With Big Data Analytics

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Bottomline Healthcare. Privacy and Data Security

Key Cyber Risks at the ERP Level

This Symposium brought to you by

Detect, Prevent, and Deter Fraud in Big Data Environments

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite

locuz.com Big Data Services

Electronic data interchange and proactive services for customers using revenue cycle management solutions from the Centricity portfolio

CyberArk Privileged Threat Analytics. Solution Brief

Explore the Possibilities

An Enterprise Framework for Business Intelligence

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Big Data in the Nordics 2012

Using Technology to Automate Fraud Detection Within Key Business Process Areas

An effective approach to preventing application fraud. Experian Fraud Analytics

Securing the endpoint and your data

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Agenda 3/7/ ERM Symposium March 14 16, Continuous Controls Monitoring. I. Changes In Corporate Environment

LAVASTORM ANALYTICS lavastorm.com. Transforming Fraud Management with Agile Data Analytics

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

IBM QRadar Security Intelligence April 2013

APERTURE. Safely enable your SaaS applications.

BIG DATA + ANALYTICS

Splunk Company Overview

Windows Server 2003 End of Support. What does it mean? What are my options?

Adaptive Case Management - Capabilities for Faster Decisions

Powering Security and Easy Authentication in a Multi-Channel World

VMware's Cloud Management Platform Simplifies and Automates Operations of Heterogeneous Environments and Hybrid Clouds

Insurance Fraud Detection System

Accenture Risk Management. Industry Report. Life Sciences

Improving claims management outcomes with predictive analytics

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!

Transcription:

FRAUD & SECURITY INTELLIGENCE STU BRADLEY, SR. DIRECTOR SECURITY INTELLIGENCE PRACTICE APRIL 16, 2015

2015 TRENDS MOBILE IS HERE TO STAY

2015 TRENDS INTERNET OF THINGS CREATING VULNERABILITIES

2015 TRENDS CLOUD VS. INTERNAL CONTROL Cloud services will account for more than 50% of IT spend in the next few years.

PONEMON INSTITUTE STATE OF DATA CENTRIC SECURITY

PONEMON INSTITUTE STATE OF DATA CENTRIC SECURITY

FRAUD COMPLEXITY SPAM MitB Application fraud

FRAUD COMPLEXITY (R)EVOLUTION EMV ATTACK Testing & manipulation of banking system vulnerabilities

TOWER GROUP FRAUD LOSS INCREASING ALONG WITH COMPLEXITY

TOWER GROUP BALANCING FRAUD LOSS WITH CUSTOMER EXPERIENCE

HOW DO I BALANCE BUSINESS EXPANSION AND THE INHERENT VULNERABILITIES? Q. With increasing data & vulnerabilities, how do I know that YOU are my customer? A. Behavioral Analytics Q. I need to stop fraudulent payments sooner. How do I get faster decisions? A. Real-time Decisioning (Pre-payment) Q. How do I keep up with the changing trends? How do I get analytic results faster? A. In-memory Analytics Q. How do I more effectively manage and store the data in a cost effective manner? A. Streaming & Hadoop Q. How do I prepare for the unknowns that are in the horizon? How do I respond quickly to intraday events? A. Data Visualization & Forensic Discovery

BEST PRACTICE COMPLIANCE + FRAUD + SECURITY

THE NEW ENTERPRISE COVERING THE FULL SPECTRUM defined analytics behavioral monitoring dynamic inmemory ad-hoc / unstructured data Unknown Patterns Detection Operations Ideation / Validation Proactive Forensics

Data Mgt. Analytics Case Management & Reporting Detection Operations Continuous Monitoring Validation / Optimization Model Tuning & Optimization Proactive Forensics Analytics & Data Discovery Peer-Based & Predictive Analytics Networks & Linking Visualization Simulation Global Search & Visual Investigation Ad Hoc Network Analysis ETL / Data Quality Data Federation Entity Resolution defined analytics behavioral monitoring dynamic inmemory ad-hoc / unstructured data Unknown Patterns

DETECTION OPERATIONS CARD FRAUD TIER I BANK BUSINESS IMPACT CHALLENGES Modernize analytic approach for one of largest US credit card portfolios Steady increase in Customer Dissatisfaction from Credit Card usage being declined inappropriately Increased fraud losses Increasingly difficult to maintain the prior fraud platform with 3,000+ rules SOLUTION SAS Enterprise Fraud Management solution Real-time SONNA decisioning (100% of transactions) Behavioral profiling (multi-entity Signatures & Dynamic Summarization) Consortium-aware custom models $60M / year increase in bottom line from increased revenue $40M / year bottom line savings from fraud loss prevention Reduction from 3,000 rules to 1 model + 75 rules

DETECTION OPERATIONS AUTO CLAIMS FRAUD DETECTION BUSINESS IMPACT CHALLENGES No-fault fraud exposure difficult to detect Bakeoff POC for suspicious claim detection in KY & MI auto claims Major data quality & entity resolution issues Incorporate 3 rd party data from NICB, ISO SOLUTION SaaS: SAS Fraud Framework for Insurance Time to value less than 3 months 16% of accepted alerts also flagged for medical management issues, demonstrating value beyond just fraud SAS Fraud Framework exceeded our expectations and showed SAS understanding of no fault fraud issues and SIU needs. - Grange SIU Manager 74% alert acceptance rate 162% increase in suspicious providers $2.2m previously unidentified questionable medical provider exposure

VALIDATION / OPTIMIZATION FINANCIAL CRIMES ANALYTICS PROFILE CHALLENGES Consolidate reputation exposure: AML, Fraud Heightened regulatory pressures Need to scale their transaction monitoring processes Desire to improve model risk tuning & optimization Current vendor used black box analytics Apply network analytics against historical investigations to quantify organized ring exposure SOLUTION High Performance AML Hadoop & Teradata data management strategy Visualization (Visual Analytics & Visual Scenario Designer ) GLOBAL TIER 1 BANK PEER BANKS UNDER Cease & Desist Orders COMBINED FIU

FORENSIC DISCOVERY VISUAL INVESTIGATOR

FRAUD & SECURITY INTELLIGENCE VISION STATEMENT Employ innovative use of technology, domain expertise and analytics to create business solutions that reduce losses from fraud & improper payments, modernize compliance, and identify threats to public safety & national security. Fraud & Security Intelligence Enterprise Extendibility Analytic Driven Detection Real-time Authoring & Simulation Visualization & Forensic Discovery

QUESTIONS?