IBM Counter Fraud Signature Solutions



Similar documents
Warranty Fraud Detection & Prevention

Security Intelligence

Insurance Bureau of Canada

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM SECURITY QRADAR INCIDENT FORENSICS

Technology and Trends for Smarter Business Analytics

IBM QRadar Security Intelligence April 2013

Three Ways to Improve Claims Management with Business Analytics

MoneyGram International

Maximizing Return and Minimizing Cost with the Decision Management Systems

IBM's Fraud and Abuse, Analytics and Management Solution

IBM Big Data Analytics Vienna, 2013 May 13

Protecting against cyber threats and security breaches

The webinar will begin shortly

Using Data Mining to Detect Insurance Fraud

Security strategies to stay off the Børsen front page

Program Integrity in Government Transforming Data to Useful Information: Using Analytics to Detect and Prevent Improper Payments May 2013

IBM Security Intelligence Strategy

IBM Analytical Decision Management

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

and Security in the Era of Cloud

Under the Hood of the IBM Threat Protection System

Introduction to Predictive Analytics: SPSS Modeler

IBM Security IBM Corporation IBM Corporation

Making critical connections: predictive analytics in government

Focus on the business, not the business of data warehousing!

Using Data Mining to Detect Insurance Fraud

Recognize the many faces of fraud

An Enterprise Framework for Business Intelligence

Fraud Solution for Financial Services

Stay ahead of insiderthreats with predictive,intelligent security

Three proven methods to achieve a higher ROI from data mining

Detect, Prevent, and Deter Fraud in Big Data Environments

The Future of Business Analytics is Now! 2013 IBM Corporation

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The IBM Cognos family

Addressing government challenges with big data analytics

SAS Fraud Framework for Health Care Evolution and Learnings

Improving sales effectiveness in the quote-to-cash process

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

SCALABLE SYSTEMS LIFE SCIENCE & HEALTHCARE PRACTICES

The Current State of Cyber Security

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

The battle to contain fraud is as old as

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Making Critical Connections: Predictive Analytics in Government

Introducing IBM s Advanced Threat Protection Platform

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Improving claims management outcomes with predictive analytics

Preventing Health Care Fraud

A strategic approach to fraud

The Facets of Fraud. A layered approach to fraud prevention

Solve your toughest challenges with data mining

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

Beyond listening Driving better decisions with business intelligence from social sources

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement

White Paper March Government performance management Set goals, drive accountability and improve outcomes

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist

VIEW POINT. Big data analytics: New whistleblower on insurance fraud. Abstract

Increasing marketing campaign profitability with Predictive Analytics

IBM Security Systems Support

Predictive Analytics for Donor Management

How To Create An Insight Analysis For Cyber Security

IBM SPSS Modeler Professional

Manage your IT Resources with IBM Capacity Management Analytics (CMA)

Delivering new insights and value to consumer products companies through big data

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Claims management for insurance: Reduce costs while delivering more responsive service.

A proven 5-step framework for managing supplier performance

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Spend Enrichment: Making better decisions starts with accurate data

AMPLIFYING SECURITY INTELLIGENCE

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics

The Informatica Solution for Improper Payments

Insights into Enterprise Telecom Expense Management

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection

Powering Security and Easy Authentication in a Multi-Channel World

Working with telecommunications

How To Transform Customer Service With Business Analytics

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance

Security Intelligence Solutions

Transcription:

IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes

Provider ID Theft o Claim for routine services is submitted by Dorsey Med Group located at 2625 Piedmont Road Northeast, Suite 56-331 o The provider is listed as Dr. Harry Dorsey, a licensed internist in the State of Georgia o Dorsey is a respected physician with 39 years of experience. o However 2

Provider ID Theft o 2625 Piedmont Road Northeast, Suite 56-331 is a UPS Store mail box o Dr. Harry Dorsey s practice in Albany Georgia - 200 miles away o The business was incorporated by Olga Teplukhina who also applied for the NPI o When contacted, Dr. Dorsey did not have any knowledge of Dorsey Med Group 3

Excessive Units o Provider submits a claim for a patient suffering for post surgical nausea consisting of 200 units of Tigan (HCPCS J3250) o One "unit" of Tigan is 200mg o The maximum daily dosage is 800mg per day (4 units) o This could be a mistake that happens as the result of confusion over the dosage (200mg) versus units o Typical dosage cost is less than $10 o However 4

Excessive Units o One provider was identified as an outlier that billed every instance at 200 units o In most cases, the provider is paid approximately $900 per dose (versus $10 per dose, which is normal) o Some patients had multiple visits - as many as 70 in one quarter o Over a period of 10 months, the provider received approximately $2,000,000 related to the alleged administration of Tigan Member DOS HCPCS Description Units Paid 12345678 5-1-2011 J3250 Trimethobenzamide 200 $900 5

Geospatial and Cluster Analysis o We uncovered abnormal billing related to HCPCS code E0172 (Seat lift mechanism placed over or on top of toilet) o The behaviors we identified were material, distinct, and by definition, anomalous o Total disbursements for this device exceed $230,000 for the period of January-July 2011 o Payments were highly concentrated for a large number of patients in a remote regional in Texas o The listed addresses were highly suspect and consisted of a video store, a deserted home, and an empty strip mall 6

IBM is seeing an increase in fraud that is expected to continue. We anticipate greater focus on fraud as a potential compromise in closing budget gaps 1. Crime rings are increasingly turning to fraud Fraud is low risk and relatively easy to conduct Medical claims are path to revenue for fraudsters 2. Economic downturns lead to greater fraud and abuse Individuals and businesses seek new ways to make ends meet 3. Market conditions pressuring our public and private bottom line Need to find new sources of savings 4. Advances in analytics are make finding and preventing fraud both possible & economical We can now do what we previously couldn t Survey participants estimated that the typical organization loses 5% of its revenues to occupational fraud each year The median loss caused by the occupational fraud cases in our study was $140,000 20% of the cases were greater than 1M The frauds reported to us lasted a median of 18 months before being detected 7

This new era is reshaping the IT landscape and creating new market dynamics The new era is driving the IBM Counter Fraud strategy Cloud Mobile Social Internet of Things 8 SEPTEMBER, 2013

Helping our customers become a Hard Target Predict and Protect Disrupt and Defeat Prosecute and Recover Learn and Apply 9

Fraud (aka Improper Payment or Program Integrity) is a deliberate misrepresentation or deception intended to result in financial gain. Fraud is a criminal act. Abuse refers to similar actions not proven to be criminal. Financial Crimes includes Anti-money laundering and cyber-risk primarily for banking Organized rings conducting sophisticated attacks against corporations for producing financial gains Staged Events Money Laundering Improper Billing Improper Payments Providers taking advantage of public and private institutions for the purpose of improper financial gain Organized Opportunistic Individuals seeking improper payments by taking advantage of private and public institutions Slip Fall Arson Tax Fraud Medical Fraud Procurement Financial Statement Expense Employees creating fraudulent transactions, records, and claims to receive improper payments from Employers 10

Anatomy of a Complex fraud 11

IBM s Counter Fraud solution reduces improper payments using a layered best of breed approach to disrupt the intentions of both organized and opportunistic fraudsters Detect in real time if a medical bill or other transaction is fraudulent by applying models and rules in real time to determine the propensity for fraud Apply the results of Detection to stop processing known fraud, or encourage fraudsters to abandon their objective by showing more is known than they think should be known Predict & Protect Detect Detect fraud within a business process Prevent Take action in real time when it matters Disrupt & Defeat Prosecute & Recover Investigate Confirm fraud for prosecution, recovery, rules and watch lists Fraudster Discover Find fraud within the data Learn & Apply 12 Gather data about DETECTED or DISCOVERED fraud; build cases for prosecution, recoveries, or denial of payments. Provide feedback to DETECTION and/or DISCOVERY Discover fraud retrospectively by reviewing past data and looking for patterns and anomalies that may indicate an individual or organization is potentially fraudulent

Counter-Fraud solutions must provide a layered approach by leveraging multiple analytical techniques Entity Analytics Predictive Analytics Forensic Analysis Content Analytics Retrospective Analysis 13

IBM Fraud Solution Framework Operational Systems Advanced Industry Libraries: Data Models, Predictive Models, Rules, Reports, Process, External Fraud Data and so on Real Time / In line Prevention Detection Back Office Analytics Discovery Investigation Reporting Integration Action Guidance Rules Predictive Analytics Rules Decision Management Selection Evaluation Anomalies Identification Case Management Relationship Visualization Investigative Analytics Operational Reporting Dashboards Feedback Observation Space Information Domains Internal Sources External Sources Evolving Unstructured Sources Fraud Use Case Libraries 14

IBM Technology Operational Systems Advanced Industry Libraries: Data Models, Predictive Models, Rules, Reports, Process, External Fraud Data etc. Real Time / In line Prevention Detection Back Office Analytics Discovery Investigation Reporting Integration Action Guidance Rules Predictive Analytics Rules Decision Management Selection Evaluation Anomalies Identification Case Management Relationship Visualization Investigative Analytics Operational Reporting Dashboards Feedback Observation Space Information Domains Internal Sources External Sources Evolving Unstructured Sources Fraud Use Case Libraries 15

IBM Counter Fraud Solution Form, Bill, Claim Application, and so on Entity Analytics Detection Discovery Applicant Business Rules Predictive Model Claimant Entity Analytics Optimize Fraud Decisions Anomaly Detection 9,500 model library Selection Evaluation Identification Real Time Alert Provider New Investigation Observation Space Case Management Intelligent Investigation Intelligent Fraud Dashboards 16

Public story: Fraud detection at Alameda County Social Services Challenge: Case workers were confronted with: Applicants applying for public assistance who were not adequately screened prior to enrollment Applicants receiving benefits that were noncompliant for several months to year Administrative caseload burdens of 300-600 per worker, reducing their ability to spend time with clients Solution: Alameda County implemented a new Social Services Integrated Reporting System (SSIRS) powered by IBM InfoSphere Identity Insight, IBM BI Data Warehouse and Cognos Reporting,Charting, and Dashboarding Services were provided by IBM 200 Concurrent Users interact with SSIRS through web enabled interfaces Business Benefits: ROI: 631%, Payback 2 months, $24M annual benefit Bring together data on child welfare system clients from multiple payment and case management systems Decrease false positives and negatives and reduce investigation time for increased fraud ROI - Investigators now receive high ROI case alerts - Workers are alerted to child and adult endangerment, double dipping, and fraudulent representation - Investigators receive relationship information immediately

Banking story: Preventing fraud at MoneyGram MoneyGram Since the tool launched in May 2010 as part of MoneyGram s efforts to enhance its global consumer anti-fraud program, MoneyGram has prevented thousands of fraudulent transactions, saving its customers about $22.5 million. Business Wire 03/09/11 18

Insurance story: Claim fraud detection at Santam Insurance in South Africa South Africa s largest short-term insurance company uses predictive analytics to uncover a major insurance fraud syndicate, save millions on fraudulent claims and resolve legitimate claims 70 times faster than before. Solution Business Opportunity Like most insurers around the world, Santam was losing millions of dollars paying out fraudulent claims every year. Expenses were being passed on to the customer in the form of higher premiums and longer waits to settle legitimate claims. To improve its bottom line and enhance customer satisfaction, the company needed to detect and stop insurance fraud early in the claims process. It also needed to find a way to isolate risky, fraudulent claims so that claims managers could more quickly process lower-risk claims. Gained the ability to spot fraud early with an advanced analytics solution that captures data from incoming claims, assesses each claim against identified risk factors and segments claims to five risk categories, separating higher-risk cases from low-risk claims. Plans to use propensity modeling to enhance and refine segmentation process as more data becomes available Results Identified a major fraud ring in less than 30 days after implementation. Saved more than $2.5M in payouts to fraudulent customers, and nearly $5M in total repudiations. Reduced claims processing time on low-risk claims by nearly 90%. Cut operating costs by reducing the number of mobile claims investigations.

IBM Counter-Fraud and Financial Crime Signature Solution An unparalleled combination of integrated capabilities, delivery experience, and business expertise with a proven ability to deliver business outcomes Learn and Apply Prosecute and Recover Disrupt and Defeat Predict and Protect 20

Predictive Police 21

Copyright IBM Corporation 2011. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express, or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Cognos, the Cognos logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 22