SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
ca Securecenter 
Ten Commandments for Tackling Fraud: 
The Role of Big Data and Predictive Analytics 
Revathi Subramanian 
SCX11S #CAWorld 
SVP, Data Science 
CA Technologies
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
RevathiSubramanian 
CA TechnologiesSVP, Data Science 
Author of “Bank Fraud: Using Technology to Combat Losses” 
Accurate enterprise-wide data combined with data-driven fraud analytics can have a transformational effect on banking and related industries. Revathiwill provide tips and insights on using technologies like neural network predictive modeling, user behavior-based pattern recognition and statistical big data analytics to reduce the risk of fraudulent activities in the enterprise.
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Current Challenges with Fraud Management 
FraudPrevention 
Operational Costs 
Customer 
Experience
4 
© 2014 CA. ALL RIGHTS RESERVED. 
It’s a balancing act. 
Achieving balance is the only way to increase customer acceptance. 
Failing to achieve balance results in lost business and unhappy customers. 
CUSTOMER 
EXPERIENCE 
FRAUD PREVENTION 
OPERATIONAL COSTS 
✔
5 
© 2014 CA. ALL RIGHTS RESERVED. 
1. Data: Garbage In; Garbage Out 
“On two occasions I have been asked, ‘pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?’ … I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.” Charles Babagge, ‘Passages from the Life of a Philosopher’
6 
© 2014 CA. ALL RIGHTS RESERVED. 
2. No documentation? No change! 
“When dealing with data, a rose by a different name is not the same as a rose.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
7 
© 2014 CA. ALL RIGHTS RESERVED. 
3. Key employees are not a substitute for good documentation. 
“Oh yeah! We made that change sometime in April and unfortunately we don’t have too many more details.”
8 
© 2014 CA. ALL RIGHTS RESERVED. 
4. Rules: More doesn’t mean better. 
“As it is with children or pets, having too many rules is generally counterproductive. Too many rules tend to confuse them. Interestingly, fraud management systems are no different.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
9 
© 2014 CA. ALL RIGHTS RESERVED. 
5. Score: Never rest on your laurels. 
“As fraud management systems get sophisticated, fraudsters also get sophisticated … Scoring processes have to keep on improving in order to tackle fraud effectively.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Non-linear models are a requirement for any complex risk management problem. 
Modeling technology used needs to look beyond the “Brownian motion.” 
Needs to take into account the entire domain’s fraud patterns 
Needs to constantly improve –automated yearly refreshes with regional tweaks 
Advanced Analytical Scoring = Huge Value
11 
© 2014 CA. ALL RIGHTS RESERVED. 
6. Score + Rules = Winning Strategy 
“A sophisticated scoring system combined with a limited set of rules to take into account operational considerations is the winning combination … Having too many rules can water down the fraud management system, but even the best scores are not very useful unless the operational use of the scores is streamlined with some carefully crafted rules… .” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Rules should be used to satisfy its business needs using a highly predictive score. 
Rules can also implement business policy. 
Business needs change over time and the rules need to change with that. 
One size does not fit all; There should be no need to go back to the tailor to get the best fit either.  
Scores tell you who might not be legitimate. 
Rules are what you decide to do with that knowledge. 
Any system that requires you to outsource rules is a problem. 
Maximum Precision with Maximum Flexibility
13 
© 2014 CA. ALL RIGHTS RESERVED. 
7. Fraud: It is everyone’s problem. 
“Every little bit of information we drop on the floor, every transaction that doesn’t get recorded, every rule that doesn’t get used right, every score that doesn’t get used optimally, every fraud analyst that doesn’t get trained well has an impact on the overall fraud management picture.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Online fraud problem is huge. 
Digital footprint left behind by the customer is a goldmine of information that can be tracked and utilized with advanced analytics. 
Device/browser characteristics can identify issues very quickly and precisely using advanced analytics. 
Possible to track a device in real-time and nab the fraudster before major damage is done 
Digital World: Goldmine of Information
15 
© 2014 CA. ALL RIGHTS RESERVED. 
9. Fraud Control Systems: If they rest, they rust. 
“Fraud control systems have to evolve and change with the times, and the changes have to happen in an agile fashion.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
16 
© 2014 CA. ALL RIGHTS RESERVED. 
10. Continual Improvement: The cycle never ends. 
“Every time there is a leap forward in the digital world, there is an equal leap forward in what the fraudsters can do to increase the losses.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Consider the important factors in a payment transaction: 
Each has unique history, distilled down to the critical information and combined with the transaction through a complex non-linear model to produce a score. 
Beyond the Simple: Pivots Aperson, thing or factor having a major or central role, function or effect 
Customer 
Card 
Device 
Merchant 
Customer 
Card 
Device 
Merchant 
Transaction 
789
18 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
19 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Data driven approach to KYC
Data driven approach to KYCData driven approach to KYC
Data driven approach to KYCPankaj Baid
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionZensar Technologies Ltd.
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer NeedsAlisa Karybina
 
Big Data in Banking (White paper)
Big Data in Banking (White paper)Big Data in Banking (White paper)
Big Data in Banking (White paper)InData Labs
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learningijtsrd
 
Customer Successes - Predictive Analytics v5
Customer Successes - Predictive Analytics v5Customer Successes - Predictive Analytics v5
Customer Successes - Predictive Analytics v5Pierre Leroux
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of FraudEZ-R Stats, LLC
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk ManagementTommy Seah
 
How Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIHow Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIExperian
 

Was ist angesagt? (16)

Data driven approach to KYC
Data driven approach to KYCData driven approach to KYC
Data driven approach to KYC
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs
 
Big Data in Banking (White paper)
Big Data in Banking (White paper)Big Data in Banking (White paper)
Big Data in Banking (White paper)
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 
Customer Successes - Predictive Analytics v5
Customer Successes - Predictive Analytics v5Customer Successes - Predictive Analytics v5
Customer Successes - Predictive Analytics v5
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of Fraud
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
Big data research
Big data researchBig data research
Big data research
 
How Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIHow Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROI
 

Andere mochten auch

Big data usage in fraud
Big data usage in fraudBig data usage in fraud
Big data usage in fraudIntellipaat
 
Fraud Prevention in Corporate Environment
Fraud Prevention in Corporate EnvironmentFraud Prevention in Corporate Environment
Fraud Prevention in Corporate EnvironmentSECURITYLLC
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Sarah Beldo
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...IBM Sverige
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015StampedeCon
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...cVidya Networks
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk" cVidya Networks
 
Webinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud PreventionWebinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud PreventionNetGuardians
 
Experiences with big data by Srinivasan Seshadri
Experiences with big data by Srinivasan SeshadriExperiences with big data by Srinivasan Seshadri
Experiences with big data by Srinivasan SeshadriThe Hive
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Geoffrey Fox
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarDatameer
 
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time AnalyticsHadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time Analyticshkbhadraa
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud DetectionNitesh Kumar
 
Exploratory factor analysis
Exploratory factor analysisExploratory factor analysis
Exploratory factor analysisJames Neill
 
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...Seeling Cheung
 

Andere mochten auch (20)

Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Big data usage in fraud
Big data usage in fraudBig data usage in fraud
Big data usage in fraud
 
Fraud Prevention in Corporate Environment
Fraud Prevention in Corporate EnvironmentFraud Prevention in Corporate Environment
Fraud Prevention in Corporate Environment
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
Aamod_Chandra
Aamod_ChandraAamod_Chandra
Aamod_Chandra
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 
Webinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud PreventionWebinar: Using Big Data Technology in Fraud Prevention
Webinar: Using Big Data Technology in Fraud Prevention
 
Experiences with big data by Srinivasan Seshadri
Experiences with big data by Srinivasan SeshadriExperiences with big data by Srinivasan Seshadri
Experiences with big data by Srinivasan Seshadri
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
 
Big Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud DetectionBig Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud Detection
 
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time AnalyticsHadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
 
Exploratory factor analysis
Exploratory factor analysisExploratory factor analysis
Exploratory factor analysis
 
Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...Medical University of South Carolina: Using Big Data and Predictive Analytics...
Medical University of South Carolina: Using Big Data and Predictive Analytics...
 

Ähnlich wie Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics

Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...accenture
 
Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperAre Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperQuatrro Processing Services (QPS)
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...venkatvajradhar1
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataFraudBusters
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportJoshua Enders
 
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Abdur Rahman (Sagor)
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...Opus
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresaSAP Latinoamérica
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET Journal
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 

Ähnlich wie Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics (20)

Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
 
The guide to combatting cross channel fraud
The guide to combatting cross channel fraudThe guide to combatting cross channel fraud
The guide to combatting cross channel fraud
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
 
Fraud Meetup
Fraud MeetupFraud Meetup
Fraud Meetup
 
Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperAre Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...How we successfully implemented ai in audit    by venkat vajradhar _ dec, 202...
How we successfully implemented ai in audit by venkat vajradhar _ dec, 202...
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud Report
 
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresa
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics

  • 1. ca Securecenter Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Analytics Revathi Subramanian SCX11S #CAWorld SVP, Data Science CA Technologies
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract RevathiSubramanian CA TechnologiesSVP, Data Science Author of “Bank Fraud: Using Technology to Combat Losses” Accurate enterprise-wide data combined with data-driven fraud analytics can have a transformational effect on banking and related industries. Revathiwill provide tips and insights on using technologies like neural network predictive modeling, user behavior-based pattern recognition and statistical big data analytics to reduce the risk of fraudulent activities in the enterprise.
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Current Challenges with Fraud Management FraudPrevention Operational Costs Customer Experience
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. It’s a balancing act. Achieving balance is the only way to increase customer acceptance. Failing to achieve balance results in lost business and unhappy customers. CUSTOMER EXPERIENCE FRAUD PREVENTION OPERATIONAL COSTS ✔
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. 1. Data: Garbage In; Garbage Out “On two occasions I have been asked, ‘pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?’ … I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.” Charles Babagge, ‘Passages from the Life of a Philosopher’
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. 2. No documentation? No change! “When dealing with data, a rose by a different name is not the same as a rose.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. 3. Key employees are not a substitute for good documentation. “Oh yeah! We made that change sometime in April and unfortunately we don’t have too many more details.”
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. 4. Rules: More doesn’t mean better. “As it is with children or pets, having too many rules is generally counterproductive. Too many rules tend to confuse them. Interestingly, fraud management systems are no different.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. 5. Score: Never rest on your laurels. “As fraud management systems get sophisticated, fraudsters also get sophisticated … Scoring processes have to keep on improving in order to tackle fraud effectively.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Non-linear models are a requirement for any complex risk management problem. Modeling technology used needs to look beyond the “Brownian motion.” Needs to take into account the entire domain’s fraud patterns Needs to constantly improve –automated yearly refreshes with regional tweaks Advanced Analytical Scoring = Huge Value
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. 6. Score + Rules = Winning Strategy “A sophisticated scoring system combined with a limited set of rules to take into account operational considerations is the winning combination … Having too many rules can water down the fraud management system, but even the best scores are not very useful unless the operational use of the scores is streamlined with some carefully crafted rules… .” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Rules should be used to satisfy its business needs using a highly predictive score. Rules can also implement business policy. Business needs change over time and the rules need to change with that. One size does not fit all; There should be no need to go back to the tailor to get the best fit either.  Scores tell you who might not be legitimate. Rules are what you decide to do with that knowledge. Any system that requires you to outsource rules is a problem. Maximum Precision with Maximum Flexibility
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. 7. Fraud: It is everyone’s problem. “Every little bit of information we drop on the floor, every transaction that doesn’t get recorded, every rule that doesn’t get used right, every score that doesn’t get used optimally, every fraud analyst that doesn’t get trained well has an impact on the overall fraud management picture.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Online fraud problem is huge. Digital footprint left behind by the customer is a goldmine of information that can be tracked and utilized with advanced analytics. Device/browser characteristics can identify issues very quickly and precisely using advanced analytics. Possible to track a device in real-time and nab the fraudster before major damage is done Digital World: Goldmine of Information
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. 9. Fraud Control Systems: If they rest, they rust. “Fraud control systems have to evolve and change with the times, and the changes have to happen in an agile fashion.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. 10. Continual Improvement: The cycle never ends. “Every time there is a leap forward in the digital world, there is an equal leap forward in what the fraudsters can do to increase the losses.” RevathiSubramanian, Bank Fraud: Using Technology to Combat Losses
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Consider the important factors in a payment transaction: Each has unique history, distilled down to the critical information and combined with the transaction through a complex non-linear model to produce a score. Beyond the Simple: Pivots Aperson, thing or factor having a major or central role, function or effect Customer Card Device Merchant Customer Card Device Merchant Transaction 789
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation