SlideShare a Scribd company logo
1 of 17
FROM THE BATTLEFIELD TO THE BOTTOM LINE:
USING MULTI-NODAL NETWORK ANALYSIS TO
DETECT FINANCIAL RISK
Christopher Kenly
Aveshka, Inc.
Vice President
Innovative Analytic Solutions
2
Bottom Line
We can leverage the
lessons learned from
the government’s
change in the way it
is doing business
after 9/11 and apply
them to managing
financial risk.
3
Pre-9/11 Threats
Pre-9/11, how did we think about national security threats?
Regional Concerns
Economic Interests
Nation-States
Narcotics
4
Post 9/11
We are faced with loosely
affiliated groups united by
ideology
• Not tied to nation-states
• Independently funded
• Operating globally
• Operating clandestinely
• Difficult to track/trace
How do we view the new threat environment?
5
Post 9/11
What has the battlefield looked like?
• No frontline; attacks
throughout the country
• Limited visibility into
enemy organization &
operations
• Evolving adversary
tactics & techniques
6
Post 9/11
How to deal with new threats?
• New government agencies and programs
to facilitate information sharing
• New efforts to collect and share critical
infrastructure information and exploit
open-source data sets
• Enhanced analytical techniques
throughout government
7
Post 9/11
How to deal with new threats?
• Multi-nodal network analysis to
provide a 360⁰ view of threat
network
• Identifies previously unknown
linkages using Dark Network Theory
8
Analytics in Action
• New tools to identify and analyze threat streams, financial networks,
and communications and conduct targeting and travel screening
• New technologies and techniques that allow an analyst to query data
from multiple databases rapidly and comprehensively to provide
information awareness and reveal hidden relationships
9
Threat Environment
Systemic Risk
Money
Laundering
Rogue Trading
Insider Trading
Leaks or Loss of
IP
Accounting
Fraud
Pump-&-Dump
Schemes
Identity Theft
How did we think about financial threats?
Ponzi Schemes
10
Financial “Battlefield”
What does the financial “battlefield” look like?
• Globalization of risk
• Company brands at risk
• Millions of transactions
• Non-transactional data
• Social media sources
• Proprietary data sources
11
How does it currently work?
Without analytics, researching and planning for the mitigation of risk is
a cumbersome and intricate task.
Financial
Risk and
Exposure
Unknown exposure to
risks results
misinformed decision
making
Sifting through massive
data sets, located in
disparate
databases, and existing
in various formats
Traditional mitigation
based on transactional
analysis often fails to
identify hidden
relationships and
latent risks
Analytical accuracy and
speed can vary across
organizational
divisions, experience
levels, and subject
domains
12
Lessons Learned
• Use multi-nodal network analysis and data analytics to help mitigate risk
• Multi-nodal network analysis
• Identify conflicts of interest
• Identify derogatory information (e.g., bankruptcies)
• Map social media relationships
• Determine front companies
• Identify operational tactics
• Data analytics
• Connect the dots
• Identify linkages quickly
What lessons can we take from the battlefield and apply to
financial risks?
13
Analytics in Action
14
Analytics in Action
Fraud
Detection
Anti-Money
Laundering
Intelligence
Collection &
Analysis
Competitive
Intelligence
Transaction
Monitoring
Risk
Assessment
Due Diligence
Brand &
Reputation
Management
How can analytics transform the financial industry?
• If used correctly, it can truly be a game changer.
15
Benefits of Analytically Enabled Multi-Nodal Network Analysis
Seamless Single intuitive interface enables access to vast quantities
of data from disparate sources
Flexible Cloud-based scalable architecture enables tailored inputs
and outputs – analysis and reporting on your terms
Cost-effective Independent of your infrastructure so that it can be
accessed anywhere with lower total lifecycle costs
Powerful
Customizable visualization tools highlight hidden
relationships and new avenues of inquiry
Efficient Automated data collection and prioritization of results
shrink the analytic timeline
QUESTIONS?
17
Points of Contact
SCOTT SCHNEIDERMAN
o | 571.814.5737
m | 917.209.8829
e | sschneiderman@aveshka.com
PRINCIPAL
Innovative Analytic Solutions
ADAM KILLIAN
o | 571.814.5729
m | 571.243.4388
e | akillian@aveshka.com
PRINCIPAL
Innovative Analytic Solutions
CHRIS KENLY
o | 571.814.5702
m | 609.372.5120
e | ckenly@aveshka.com
VICE PRESIDENT
Innovative Analytic Solutions
KELLI COOPER
o | 571.814.5745
m | 706.564.2411
e | kcooper@aveshka.com
ANALYST
Innovative Analytic Solutions

More Related Content

What's hot

Big Data Analytics and a Chartered Accountant
Big Data Analytics and a Chartered AccountantBig Data Analytics and a Chartered Accountant
Big Data Analytics and a Chartered AccountantBharath Rao
 
3D Data Strategy Framework
3D Data Strategy Framework3D Data Strategy Framework
3D Data Strategy FrameworkDaniel Ren
 
Quantamental Investing - Merging Machine Learning, Fundamentals, & Insight
Quantamental Investing - Merging Machine Learning, Fundamentals, & InsightQuantamental Investing - Merging Machine Learning, Fundamentals, & Insight
Quantamental Investing - Merging Machine Learning, Fundamentals, & Insightgurrajsangha
 
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.Jari Koister
 
Clueda - Baader Investment Conference 2014
Clueda - Baader Investment Conference 2014Clueda - Baader Investment Conference 2014
Clueda - Baader Investment Conference 2014Clueda AG
 
7 Pillars Of Data Strategy - High Five 2018
7 Pillars Of Data Strategy - High Five 20187 Pillars Of Data Strategy - High Five 2018
7 Pillars Of Data Strategy - High Five 2018Evan Levy
 
The Research Board Presentation (1) (1)
The Research Board Presentation (1) (1)The Research Board Presentation (1) (1)
The Research Board Presentation (1) (1)Roger Ehrenberg
 
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015)
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015) SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015)
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015) saravana krishnamurthy
 
The Business Of Big Data (Ga Preso) Final
The Business Of Big Data (Ga Preso) FinalThe Business Of Big Data (Ga Preso) Final
The Business Of Big Data (Ga Preso) FinalRoger Ehrenberg
 
Where's the Brain in Analytics
Where's the Brain in AnalyticsWhere's the Brain in Analytics
Where's the Brain in AnalyticsDenodo
 
Big data & analytics for banking new york lars hamberg
Big data & analytics for banking new york   lars hambergBig data & analytics for banking new york   lars hamberg
Big data & analytics for banking new york lars hambergLars Hamberg
 
Infographic: Big Data Exploration
Infographic: Big Data ExplorationInfographic: Big Data Exploration
Infographic: Big Data ExplorationDavid Pittman
 
Infographic: Big Data Exploration
Infographic: Big Data ExplorationInfographic: Big Data Exploration
Infographic: Big Data ExplorationIBM Analytics
 
Welcome to the Age of Big Data in Banking
Welcome to the Age of Big Data in Banking Welcome to the Age of Big Data in Banking
Welcome to the Age of Big Data in Banking Andy Hirst
 
Predictive and prescriptive analytics: Transform the finance function with gr...
Predictive and prescriptive analytics: Transform the finance function with gr...Predictive and prescriptive analytics: Transform the finance function with gr...
Predictive and prescriptive analytics: Transform the finance function with gr...Grant Thornton LLP
 
Business Analytics and Big Data
Business Analytics and Big DataBusiness Analytics and Big Data
Business Analytics and Big DataAbhishek Kapoor
 
Microsoft jeroen ter heerdt
Microsoft jeroen ter heerdtMicrosoft jeroen ter heerdt
Microsoft jeroen ter heerdtBigDataExpo
 

What's hot (20)

Big Data Analytics and a Chartered Accountant
Big Data Analytics and a Chartered AccountantBig Data Analytics and a Chartered Accountant
Big Data Analytics and a Chartered Accountant
 
Big data
Big dataBig data
Big data
 
3D Data Strategy Framework
3D Data Strategy Framework3D Data Strategy Framework
3D Data Strategy Framework
 
Quantamental Investing - Merging Machine Learning, Fundamentals, & Insight
Quantamental Investing - Merging Machine Learning, Fundamentals, & InsightQuantamental Investing - Merging Machine Learning, Fundamentals, & Insight
Quantamental Investing - Merging Machine Learning, Fundamentals, & Insight
 
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.
Talk at IEEE Big Data/Cloud conference in Santa Clara, June 28th, 2013.
 
Clueda - Baader Investment Conference 2014
Clueda - Baader Investment Conference 2014Clueda - Baader Investment Conference 2014
Clueda - Baader Investment Conference 2014
 
7 Pillars Of Data Strategy - High Five 2018
7 Pillars Of Data Strategy - High Five 20187 Pillars Of Data Strategy - High Five 2018
7 Pillars Of Data Strategy - High Five 2018
 
Big Data
Big DataBig Data
Big Data
 
The Research Board Presentation (1) (1)
The Research Board Presentation (1) (1)The Research Board Presentation (1) (1)
The Research Board Presentation (1) (1)
 
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015)
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015) SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015)
SJSU Business School: Guest Lecture - Big Data in Business (Sept 28, 2015)
 
The Business Of Big Data (Ga Preso) Final
The Business Of Big Data (Ga Preso) FinalThe Business Of Big Data (Ga Preso) Final
The Business Of Big Data (Ga Preso) Final
 
Big data
Big dataBig data
Big data
 
Where's the Brain in Analytics
Where's the Brain in AnalyticsWhere's the Brain in Analytics
Where's the Brain in Analytics
 
Big data & analytics for banking new york lars hamberg
Big data & analytics for banking new york   lars hambergBig data & analytics for banking new york   lars hamberg
Big data & analytics for banking new york lars hamberg
 
Infographic: Big Data Exploration
Infographic: Big Data ExplorationInfographic: Big Data Exploration
Infographic: Big Data Exploration
 
Infographic: Big Data Exploration
Infographic: Big Data ExplorationInfographic: Big Data Exploration
Infographic: Big Data Exploration
 
Welcome to the Age of Big Data in Banking
Welcome to the Age of Big Data in Banking Welcome to the Age of Big Data in Banking
Welcome to the Age of Big Data in Banking
 
Predictive and prescriptive analytics: Transform the finance function with gr...
Predictive and prescriptive analytics: Transform the finance function with gr...Predictive and prescriptive analytics: Transform the finance function with gr...
Predictive and prescriptive analytics: Transform the finance function with gr...
 
Business Analytics and Big Data
Business Analytics and Big DataBusiness Analytics and Big Data
Business Analytics and Big Data
 
Microsoft jeroen ter heerdt
Microsoft jeroen ter heerdtMicrosoft jeroen ter heerdt
Microsoft jeroen ter heerdt
 

Viewers also liked

Big data bi-mature-oanyc summit
Big data bi-mature-oanyc summitBig data bi-mature-oanyc summit
Big data bi-mature-oanyc summitOpen Analytics
 
Optier presentation for open analytics event
Optier presentation for open analytics eventOptier presentation for open analytics event
Optier presentation for open analytics eventOpen Analytics
 
Intridea ajn-rttos OA NYC Summit
Intridea ajn-rttos OA NYC SummitIntridea ajn-rttos OA NYC Summit
Intridea ajn-rttos OA NYC SummitOpen Analytics
 
No sql and sql - open analytics summit
No sql and sql - open analytics summitNo sql and sql - open analytics summit
No sql and sql - open analytics summitOpen Analytics
 
Open analytics summit nyc
Open analytics summit nycOpen analytics summit nyc
Open analytics summit nycOpen Analytics
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanycOpen Analytics
 

Viewers also liked (7)

Oas schwartz 16
Oas schwartz 16Oas schwartz 16
Oas schwartz 16
 
Big data bi-mature-oanyc summit
Big data bi-mature-oanyc summitBig data bi-mature-oanyc summit
Big data bi-mature-oanyc summit
 
Optier presentation for open analytics event
Optier presentation for open analytics eventOptier presentation for open analytics event
Optier presentation for open analytics event
 
Intridea ajn-rttos OA NYC Summit
Intridea ajn-rttos OA NYC SummitIntridea ajn-rttos OA NYC Summit
Intridea ajn-rttos OA NYC Summit
 
No sql and sql - open analytics summit
No sql and sql - open analytics summitNo sql and sql - open analytics summit
No sql and sql - open analytics summit
 
Open analytics summit nyc
Open analytics summit nycOpen analytics summit nyc
Open analytics summit nyc
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanyc
 

Similar to Candor - open analytics nyc

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a DiseaseSurfWatch Labs
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
Improve Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasImprove Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasRecorded Future
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaPuneet Kukreja
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Ethisphere
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco systemDavid Sweigert
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 

Similar to Candor - open analytics nyc (20)

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a Disease
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
SLA Best Practices Ci
SLA Best Practices   CiSLA Best Practices   Ci
SLA Best Practices Ci
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
Improve Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasImprove Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These Ideas
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco system
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 

More from Open Analytics

Cyber after Snowden (OA Cyber Summit)
Cyber after Snowden (OA Cyber Summit)Cyber after Snowden (OA Cyber Summit)
Cyber after Snowden (OA Cyber Summit)Open Analytics
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Open Analytics
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)Open Analytics
 
An Immigrant’s view of Cyberspace (OA Cyber Summit)
An Immigrant’s view of Cyberspace (OA Cyber Summit)An Immigrant’s view of Cyberspace (OA Cyber Summit)
An Immigrant’s view of Cyberspace (OA Cyber Summit)Open Analytics
 
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)Open Analytics
 
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...Open Analytics
 
Using Real-Time Data to Drive Optimization & Personalization
Using Real-Time Data to Drive Optimization & PersonalizationUsing Real-Time Data to Drive Optimization & Personalization
Using Real-Time Data to Drive Optimization & PersonalizationOpen Analytics
 
M&A Trends in Telco Analytics
M&A Trends in Telco AnalyticsM&A Trends in Telco Analytics
M&A Trends in Telco AnalyticsOpen Analytics
 
Competing in the Digital Economy
Competing in the Digital EconomyCompeting in the Digital Economy
Competing in the Digital EconomyOpen Analytics
 
Piwik: An Analytics Alternative (Chicago Summit)
Piwik: An Analytics Alternative (Chicago Summit)Piwik: An Analytics Alternative (Chicago Summit)
Piwik: An Analytics Alternative (Chicago Summit)Open Analytics
 
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...Open Analytics
 
Crossing the Chasm (Ikanow - Chicago Summit)
Crossing the Chasm (Ikanow - Chicago Summit)Crossing the Chasm (Ikanow - Chicago Summit)
Crossing the Chasm (Ikanow - Chicago Summit)Open Analytics
 
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...Open Analytics
 
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...Open Analytics
 
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)Characterizing Risk in your Supply Chain (nContext - Chicago Summit)
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)Open Analytics
 
From Insight to Impact (Chicago Summit - Keynote)
From Insight to Impact (Chicago Summit - Keynote)From Insight to Impact (Chicago Summit - Keynote)
From Insight to Impact (Chicago Summit - Keynote)Open Analytics
 
Easybib Open Analytics NYC
Easybib Open Analytics NYCEasybib Open Analytics NYC
Easybib Open Analytics NYCOpen Analytics
 
MarkLogic - Open Analytics Meetup
MarkLogic - Open Analytics MeetupMarkLogic - Open Analytics Meetup
MarkLogic - Open Analytics MeetupOpen Analytics
 
The caprate presentation_july2013_open analytics dc meetup
The caprate presentation_july2013_open analytics dc meetupThe caprate presentation_july2013_open analytics dc meetup
The caprate presentation_july2013_open analytics dc meetupOpen Analytics
 
Verifeed open analytics_3min deck_071713_final
Verifeed open analytics_3min deck_071713_finalVerifeed open analytics_3min deck_071713_final
Verifeed open analytics_3min deck_071713_finalOpen Analytics
 

More from Open Analytics (20)

Cyber after Snowden (OA Cyber Summit)
Cyber after Snowden (OA Cyber Summit)Cyber after Snowden (OA Cyber Summit)
Cyber after Snowden (OA Cyber Summit)
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)
 
An Immigrant’s view of Cyberspace (OA Cyber Summit)
An Immigrant’s view of Cyberspace (OA Cyber Summit)An Immigrant’s view of Cyberspace (OA Cyber Summit)
An Immigrant’s view of Cyberspace (OA Cyber Summit)
 
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
 
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...
Observations on CFR.org Website Traffic Surge Due to Chechnya Terrorism Scare...
 
Using Real-Time Data to Drive Optimization & Personalization
Using Real-Time Data to Drive Optimization & PersonalizationUsing Real-Time Data to Drive Optimization & Personalization
Using Real-Time Data to Drive Optimization & Personalization
 
M&A Trends in Telco Analytics
M&A Trends in Telco AnalyticsM&A Trends in Telco Analytics
M&A Trends in Telco Analytics
 
Competing in the Digital Economy
Competing in the Digital EconomyCompeting in the Digital Economy
Competing in the Digital Economy
 
Piwik: An Analytics Alternative (Chicago Summit)
Piwik: An Analytics Alternative (Chicago Summit)Piwik: An Analytics Alternative (Chicago Summit)
Piwik: An Analytics Alternative (Chicago Summit)
 
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...
Social Media, Cloud Computing, Machine Learning, Open Source, and Big Data An...
 
Crossing the Chasm (Ikanow - Chicago Summit)
Crossing the Chasm (Ikanow - Chicago Summit)Crossing the Chasm (Ikanow - Chicago Summit)
Crossing the Chasm (Ikanow - Chicago Summit)
 
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...
On the “Moneyball” – Building the Team, Product, and Service to Rival (Pegged...
 
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...
Data evolutions in media, marketing, and retail (Business Adv Group - Chicago...
 
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)Characterizing Risk in your Supply Chain (nContext - Chicago Summit)
Characterizing Risk in your Supply Chain (nContext - Chicago Summit)
 
From Insight to Impact (Chicago Summit - Keynote)
From Insight to Impact (Chicago Summit - Keynote)From Insight to Impact (Chicago Summit - Keynote)
From Insight to Impact (Chicago Summit - Keynote)
 
Easybib Open Analytics NYC
Easybib Open Analytics NYCEasybib Open Analytics NYC
Easybib Open Analytics NYC
 
MarkLogic - Open Analytics Meetup
MarkLogic - Open Analytics MeetupMarkLogic - Open Analytics Meetup
MarkLogic - Open Analytics Meetup
 
The caprate presentation_july2013_open analytics dc meetup
The caprate presentation_july2013_open analytics dc meetupThe caprate presentation_july2013_open analytics dc meetup
The caprate presentation_july2013_open analytics dc meetup
 
Verifeed open analytics_3min deck_071713_final
Verifeed open analytics_3min deck_071713_finalVerifeed open analytics_3min deck_071713_final
Verifeed open analytics_3min deck_071713_final
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Candor - open analytics nyc

  • 1. FROM THE BATTLEFIELD TO THE BOTTOM LINE: USING MULTI-NODAL NETWORK ANALYSIS TO DETECT FINANCIAL RISK Christopher Kenly Aveshka, Inc. Vice President Innovative Analytic Solutions
  • 2. 2 Bottom Line We can leverage the lessons learned from the government’s change in the way it is doing business after 9/11 and apply them to managing financial risk.
  • 3. 3 Pre-9/11 Threats Pre-9/11, how did we think about national security threats? Regional Concerns Economic Interests Nation-States Narcotics
  • 4. 4 Post 9/11 We are faced with loosely affiliated groups united by ideology • Not tied to nation-states • Independently funded • Operating globally • Operating clandestinely • Difficult to track/trace How do we view the new threat environment?
  • 5. 5 Post 9/11 What has the battlefield looked like? • No frontline; attacks throughout the country • Limited visibility into enemy organization & operations • Evolving adversary tactics & techniques
  • 6. 6 Post 9/11 How to deal with new threats? • New government agencies and programs to facilitate information sharing • New efforts to collect and share critical infrastructure information and exploit open-source data sets • Enhanced analytical techniques throughout government
  • 7. 7 Post 9/11 How to deal with new threats? • Multi-nodal network analysis to provide a 360⁰ view of threat network • Identifies previously unknown linkages using Dark Network Theory
  • 8. 8 Analytics in Action • New tools to identify and analyze threat streams, financial networks, and communications and conduct targeting and travel screening • New technologies and techniques that allow an analyst to query data from multiple databases rapidly and comprehensively to provide information awareness and reveal hidden relationships
  • 9. 9 Threat Environment Systemic Risk Money Laundering Rogue Trading Insider Trading Leaks or Loss of IP Accounting Fraud Pump-&-Dump Schemes Identity Theft How did we think about financial threats? Ponzi Schemes
  • 10. 10 Financial “Battlefield” What does the financial “battlefield” look like? • Globalization of risk • Company brands at risk • Millions of transactions • Non-transactional data • Social media sources • Proprietary data sources
  • 11. 11 How does it currently work? Without analytics, researching and planning for the mitigation of risk is a cumbersome and intricate task. Financial Risk and Exposure Unknown exposure to risks results misinformed decision making Sifting through massive data sets, located in disparate databases, and existing in various formats Traditional mitigation based on transactional analysis often fails to identify hidden relationships and latent risks Analytical accuracy and speed can vary across organizational divisions, experience levels, and subject domains
  • 12. 12 Lessons Learned • Use multi-nodal network analysis and data analytics to help mitigate risk • Multi-nodal network analysis • Identify conflicts of interest • Identify derogatory information (e.g., bankruptcies) • Map social media relationships • Determine front companies • Identify operational tactics • Data analytics • Connect the dots • Identify linkages quickly What lessons can we take from the battlefield and apply to financial risks?
  • 14. 14 Analytics in Action Fraud Detection Anti-Money Laundering Intelligence Collection & Analysis Competitive Intelligence Transaction Monitoring Risk Assessment Due Diligence Brand & Reputation Management How can analytics transform the financial industry? • If used correctly, it can truly be a game changer.
  • 15. 15 Benefits of Analytically Enabled Multi-Nodal Network Analysis Seamless Single intuitive interface enables access to vast quantities of data from disparate sources Flexible Cloud-based scalable architecture enables tailored inputs and outputs – analysis and reporting on your terms Cost-effective Independent of your infrastructure so that it can be accessed anywhere with lower total lifecycle costs Powerful Customizable visualization tools highlight hidden relationships and new avenues of inquiry Efficient Automated data collection and prioritization of results shrink the analytic timeline
  • 17. 17 Points of Contact SCOTT SCHNEIDERMAN o | 571.814.5737 m | 917.209.8829 e | sschneiderman@aveshka.com PRINCIPAL Innovative Analytic Solutions ADAM KILLIAN o | 571.814.5729 m | 571.243.4388 e | akillian@aveshka.com PRINCIPAL Innovative Analytic Solutions CHRIS KENLY o | 571.814.5702 m | 609.372.5120 e | ckenly@aveshka.com VICE PRESIDENT Innovative Analytic Solutions KELLI COOPER o | 571.814.5745 m | 706.564.2411 e | kcooper@aveshka.com ANALYST Innovative Analytic Solutions

Editor's Notes

  1. Over the past decade, we are witnessed changes in the risk environment. Risks to companies have increased due to the continued lack of transparency in accounting, leaks, and loss of IP. From a government perspective, the Internet has also increased the ability to perpetuate fraudThere is clearly a need and demand for solutions that can detect these frauds before they occur and investigate them rapidly once they are detected.
  2. Over the past decade, we are witnessed changes in the risk environment. Risks to companies have increased due to the continued lack of transparency in accounting, leaks, and loss of IP. From a government perspective, the Internet has also increased the ability to perpetuate fraudThere is clearly a need and demand for solutions that can detect these frauds before they occur and investigate them rapidly once they are detected.
  3. Traditional investigation is “follow-the-money” approach. Social media information provides a different lens that reveals additional relationships. Traditional investigation involves background searches on individuals of interest, interviews, generating leads, more interviews, etc. Automation of data collection can short-cut this process.
  4. Just as the government is turning to the private sector to manage and consolidate all of its data, the financial sector is as well.New York, London, and Zurich all understand that risk can be managed when the “dots are connected” Analytic platforms can provide linkages in seconds that a team of analysts might not find for years