SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Maximising the Business Value Through Fraud Management Dane Warren – Head of Security and Risk (Virgin Mobile)
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BUSINESS STRATEGY From "Information Technology Strategy and Management: Best Practices" by Eng K. Chew and Petter Gottschalk. Information Science Reference, 2009 1. Right Goals 2. Value Proposition 3 .  Business  Model 4. Trade Offs 5. Fit 6. Continuity
BUSINESS STRATEGY Market Core Values Vision Mission Strategic  Planning
VALUE MAXIMISATION 101 ,[object Object],[object Object]
ENTERPRISE RISK MANAGEMENT ,[object Object],[object Object],[object Object],[object Object],Business Priorities From "IT Risk: Turning Business Threats Into Competitive Advantage" by George Westerman and Richard Hunter.  Harvard Business Press, 2007.
ENTERPRISE RISK MANAGEMENT Impact:  Business Assessment Likelihood:  Technical Assessment Rare Unlikely Possible Likely Almost Certain Severe M H H VH VH Major M M H H VH Moderate L M H H H Minor L L M M H Negligible L L M M H
ENTERPRISE RISK MANAGEMENT ,[object Object],[object Object],[object Object]
BUSINESS OPPORTUNITIES How do we add value? How do we make money? How do we save money? Competitors?
FRAUD MANAGEMENT VALUE MAXIMISATION ,[object Object],[object Object]
FRAUD MANAGEMENT VALUE MAXIMISATION ,[object Object],[object Object]
FRAUD MANAGEMENT VALUE MAXIMISATION ,[object Object],[object Object]
FRAUD MANAGEMENT VALUE MAXIMISATION ,[object Object],[object Object]
FRAUD MANAGEMENT VALUE MAXIMISATION ,[object Object],[object Object]
NEW THREATS  (VECTORS) ,[object Object],[object Object],[object Object],[object Object],[object Object]
NEW RESPONSES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SUMMARY Business Context ERM Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],Value  Maximisation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3 4
SUMMARY FRAUD CONTEXT New Responses Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],New Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Examples ,[object Object],[object Object],[object Object],[object Object],1 2 3 4
QUESTIONS? ,[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Maximising Business Value Through Fraud Management Dane Warren Li

Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementAnu Damodaran
 
AR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementAR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementValentine Seivert
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationResolver Inc.
 
Running software business in Plc
Running software business in Plc Running software business in Plc
Running software business in Plc Jani Kykyri
 
ISACA Puget Sound November 2002 - CRM Security & Controls
ISACA Puget Sound November 2002 - CRM Security & ControlsISACA Puget Sound November 2002 - CRM Security & Controls
ISACA Puget Sound November 2002 - CRM Security & Controlsprosenzw69
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)dansimms
 
Paper-Insurance_industry-ENG
Paper-Insurance_industry-ENGPaper-Insurance_industry-ENG
Paper-Insurance_industry-ENGPablo Turletti
 
I F M006 Andrew Savitz91807
I F M006 Andrew  Savitz91807I F M006 Andrew  Savitz91807
I F M006 Andrew Savitz91807Dreamforce07
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414pptgregoryg
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414pptgregoryg
 
Becoming Customer Centric: A Business and IT Roadmap
Becoming Customer Centric: A Business and IT RoadmapBecoming Customer Centric: A Business and IT Roadmap
Becoming Customer Centric: A Business and IT RoadmapPlus Consulting
 
Be Digital or Die - Big Data in Financial Services
Be Digital or Die - Big Data in Financial ServicesBe Digital or Die - Big Data in Financial Services
Be Digital or Die - Big Data in Financial ServicesFintricity
 
Growing Enterprise Value
Growing Enterprise ValueGrowing Enterprise Value
Growing Enterprise ValueBruce Starcher
 
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...Sales Hacker
 
The Age Of New Reality Marketing V5.1 Final
The Age Of New Reality Marketing V5.1 FinalThe Age Of New Reality Marketing V5.1 Final
The Age Of New Reality Marketing V5.1 FinalTony Mooney
 
AI – THE TYRANNY OF SCALE.pptx
AI – THE TYRANNY OF SCALE.pptxAI – THE TYRANNY OF SCALE.pptx
AI – THE TYRANNY OF SCALE.pptxIshvinderKaur5
 
Internet + Business = E Business
Internet + Business = E BusinessInternet + Business = E Business
Internet + Business = E BusinessMrirfan
 

Ähnlich wie Maximising Business Value Through Fraud Management Dane Warren Li (20)

Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
AR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementAR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk Management
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Running software business in Plc
Running software business in Plc Running software business in Plc
Running software business in Plc
 
ISACA Puget Sound November 2002 - CRM Security & Controls
ISACA Puget Sound November 2002 - CRM Security & ControlsISACA Puget Sound November 2002 - CRM Security & Controls
ISACA Puget Sound November 2002 - CRM Security & Controls
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)
 
Paper-Insurance_industry-ENG
Paper-Insurance_industry-ENGPaper-Insurance_industry-ENG
Paper-Insurance_industry-ENG
 
Washington Defense Corporation Formal Business Proposal 11.23.16
Washington Defense Corporation Formal Business Proposal 11.23.16Washington Defense Corporation Formal Business Proposal 11.23.16
Washington Defense Corporation Formal Business Proposal 11.23.16
 
Lecture 03 DMC and Strategy
Lecture 03 DMC and StrategyLecture 03 DMC and Strategy
Lecture 03 DMC and Strategy
 
I F M006 Andrew Savitz91807
I F M006 Andrew  Savitz91807I F M006 Andrew  Savitz91807
I F M006 Andrew Savitz91807
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414ppt
 
Risk And Relevance 20080414ppt
Risk And Relevance 20080414pptRisk And Relevance 20080414ppt
Risk And Relevance 20080414ppt
 
Becoming Customer Centric: A Business and IT Roadmap
Becoming Customer Centric: A Business and IT RoadmapBecoming Customer Centric: A Business and IT Roadmap
Becoming Customer Centric: A Business and IT Roadmap
 
Be Digital or Die - Big Data in Financial Services
Be Digital or Die - Big Data in Financial ServicesBe Digital or Die - Big Data in Financial Services
Be Digital or Die - Big Data in Financial Services
 
Winning new business in a difficult market
Winning new business in a difficult marketWinning new business in a difficult market
Winning new business in a difficult market
 
Growing Enterprise Value
Growing Enterprise ValueGrowing Enterprise Value
Growing Enterprise Value
 
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...
Dave Govan (VP of Sales, Sailthru) - Aligning a Go to Market Strategy with Sa...
 
The Age Of New Reality Marketing V5.1 Final
The Age Of New Reality Marketing V5.1 FinalThe Age Of New Reality Marketing V5.1 Final
The Age Of New Reality Marketing V5.1 Final
 
AI – THE TYRANNY OF SCALE.pptx
AI – THE TYRANNY OF SCALE.pptxAI – THE TYRANNY OF SCALE.pptx
AI – THE TYRANNY OF SCALE.pptx
 
Internet + Business = E Business
Internet + Business = E BusinessInternet + Business = E Business
Internet + Business = E Business
 

Maximising Business Value Through Fraud Management Dane Warren Li

  • 1. Maximising the Business Value Through Fraud Management Dane Warren – Head of Security and Risk (Virgin Mobile)
  • 2.
  • 3. BUSINESS STRATEGY From "Information Technology Strategy and Management: Best Practices" by Eng K. Chew and Petter Gottschalk. Information Science Reference, 2009 1. Right Goals 2. Value Proposition 3 . Business Model 4. Trade Offs 5. Fit 6. Continuity
  • 4. BUSINESS STRATEGY Market Core Values Vision Mission Strategic Planning
  • 5.
  • 6.
  • 7. ENTERPRISE RISK MANAGEMENT Impact: Business Assessment Likelihood: Technical Assessment Rare Unlikely Possible Likely Almost Certain Severe M H H VH VH Major M M H H VH Moderate L M H H H Minor L L M M H Negligible L L M M H
  • 8.
  • 9. BUSINESS OPPORTUNITIES How do we add value? How do we make money? How do we save money? Competitors?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.