SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
SAS FOR CLAIMS FRAUD
                                                                                                           MORE INFORMATION




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
GLOBAL INSURANCE CLAIMS FRAUD


                                      •                     US Insurance Information Institute estimate $30 billion losses annually; about 10% incurred losses and loss
                                                            adjustment expenses


                                      •                     FBI estimate costs $40+ billion per annum; costing between $400 and $700 in extra premiums


                                      •                     Insurance Council of Australia estimates that between 10 and 15% of insurance claims across of lines exhibit
                                                            elements of fraud


                                      •                     Swedish Association estimate that 5 to 10% of claims include fraud


                                       •                     ALFA estimate that fraud 15% of claims paid, or 4-8% of premiums collected equating to €2.5bn per annum


                                       •                     ABI estimates that undetected fraud = £2.1bn adding about £50 to average premium


                                       •                     South Africa Insurance Crime Bureau estimate that 30% of short term insurance claims include fraud


                                       •                     Swiss Insurance Association estimate that 10% of claims paid are fraudulent


                                       •                     German Insurance Association estimates that fraud costs circa €4bn per annum



C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
THE SHIFTING LANDSCAPE OF INSURANCE FRAUD



                              Insurance fraud is on the rise & today’s schemes are:
                                  • Increasingly sophisticated
                                  • More agile
                                  • Higher velocity
                                  • Cross industry
                                  • Influenced by regulatory & political climate




                                                                                                Yesterday’s methods are insufficient
                                                                                                to address today’s fraud risk!


C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CHALLENGES TO
                                DEALING WITH DATA
                FRAUD DETECTION


                                        A good fraud detection solution must:
                                                           Integrate data from multiple disparate sources like claims,
                                                            underwriting, human resources, billing/payment systems and 3rd party
                                                            sources


                                                           Match identities across all data sets


                                                           Address data quality issues like misspellings, input errors, typos,
                                                            missing data, acronyms, shorthand and jargon


                                                           Leverage unstructured data text data sources like claims notes and
                                                            service logs


                                                           Provide transparency & adaptability to quickly respond to changing
                                                            fraud threats




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CHALLENGES TO
                                TRANSPARENCY
                FRAUD DETECTION




                                                                                         Push                Pull

                                                                                                vs.
                                                      Reliance on                                     Advanced
                                                       rules / red flags                                detection methods
                                                      Inconsistent                                    Consistent
                                                      First-come,                                     Optimal
                                                       first-served                                     prioritization



C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CHALLENGES TO
                                LEGACY SIU PROCESS
                FRAUD DETECTION


                                                           Multi-claims organized frauds may be difficult for individual adjusters to
                                                            identify


                                                           Organizational structures may be inadequate


                                                           Relationships are increasingly important…and complex


                                                           Business rules are marginally effective


                                                           Supervised predictive models can be biased toward single-claim fraud
                                                            detection


                                                           Distinction between fraud vs. abuse




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
BUSINESS ANALYTICS AND FRAUD DETECTION


                                                           Allows insurers to identify ‘suspicious cases’


                                                           Works underneath the insurers existing processes


                                                           Does not replace expertise of claims team members but ensures cases
                                                            are not missed


                                                           Allows insurers to detect fraud by multi-dimensions
                                                                   Case-by-case
                                                                   Repeat
                                                                   Organised rings




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
FRAMEWORK-BASED
                       END-TO-END SOLUTION
             APPROACH




                 Data                                                                           Detection             Reporting                Administration
                 • Structured &                                                                 • Business Rules      • Advanced Ranking       • Self administered
                   Unstructured Data                                                            • Anomaly Detection     Technology             • Custom alert queues
                   Sources                                                                                            • Easy to use web
                                                                                                • Advanced                                     • Alert suppression &
                 • Batch or real time                                                             Predictive Models     based interface          routing rules
                   processing                                                                                         • Advanced Query
                                                                                                • Watch Lists                                  • Workflow analysis
                 • Data Cleansing                                                                                       of integrated data
                                                                                                • Social Network                               • Direct integration
                 • Data Integration                                                               Analysis            • Full business            with Case
                 • Variable Extraction                                                                                  intelligence             Management
                                                                                                • Network-level         reporting capability
                   & Sentiment                                                                    analytics
                   Analysis with Text                                                                                 • Claim system
                   Mining                                                                       • Hybrid Technology     integration




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
SAS FRAUD
                         FRAMEWORK FOR PROCESS FLOW
                             INSURANCE




                       Operational                                                                Exploratory
                      Data Sources                                                              Data Analysis &
                                                                                                                                             Alert Generation Process
                                                                                                Transformation                       Business           Alert              SAS® Social
                                                                                                                     Fraud            Rules         Administration          Network
                                                                                                                     Data                                                   Analysis
                                                                                                                    Staging
                                                                                                                                                                             Network
                              Providers                                                                                                                                       Rules
                                                                                                                                     Analytics
                                                                                                                                      Anomaly                                Network
                                                                                                                                      Detection                              Analytics
                              Members
                                                                                                                                      Predictive
                                                                                                                                      Modeling


                               Facilities
                                                                                                                                                      Alert Management &
                                                                                                                                                      BI / Reporting
                                                                                                                     Intelligent     Learn and
                                                                                                                  Fraud Repository    Improve
                                  Claims                                                                                               Cycle          Case Management




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
FRAUD ANALYTICS USING A HYBRID APPROACH FOR FRAUD DETECTION




                                                                                                                                       Text
                                                                                                                                       Mining
                                                                                                                                                  Database
                                                                                                        Predictive                                Searches
                                                                                                        Modeling



                                          Anomaly
                                          Detection


                                                                                                Automated             Analytic
                                                                                                Business Rules       Decisioning
                                                                                                                       Engine
                                                                                                                                                        Social
                                                                                                                                                        Network
                                                                                                                                                        Analysis



                                                                                                LEVERAGING SAS HYBRID APPROACH TO SCORE TRANSACTIONS,
                                                                                                 ENTITIES, AND NETWORKS ACROSS MULTIPLE ORGANIZATIONS




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
WHY SAS? MAKING LIFE EASIER




       Establish                                                                       Query     Rank &       Combine &    Analysis   Decision            Final
        Search                                                                        Various   Prioritize    Synthesize      of         to             Analysis &
      Parameters                                                                      Systems    Results     Information   Findings   Proceed?          Summary




                                     Framework-Based Predictive Analytics                                                        Analytical Value-Add




                          “What used to take me most of a day, now takes 10 minutes.”
                          “It completely streamlines where we need to go.”
                                                                                                                                                   -SIU Analyst




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CUSTOMER STORY                                                                       CNA (US)



                                                                                                    Business Problem
                                                                                                    • Detect and prevent fraud in four separate commercial
                                                                                                       lines of business
        Customer Quote                                                                              • Optimally direct its investigation resources on cases with
                                                                                                       higher likelihood of fraud
        We have an excellent
        partnership with SAS.
        They took the time to                                                                       Solution
        meet with us and truly
        understand the nuances                                                                      • SAS Fraud Framework for Insurance
        of CNA so that we could
        build effective predictive
        models for each line of
        our business                                                                                Results
                                                                                                    • $2.1m in fraud recovery / prevention within the first 9
        Tim Wolfe, SIU Director                                                                        months of implementation

                                                                                                    • Detection and investigation of 15 potentially fraudulent
                                                                                                       provider networks – four times what CNA anticipated



C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
WHY SAS?
                                              More suspicious cases identified
                                               •          Including both previously undetected fraudulent networks and extensions to already identified
                                                          fraud

                                                                          “We discovered that 5% of its claims pay-outs were fraudulent, and these can now be
                                                                          corrected and prevented in the future."
                                                                          Assistant General Manager, Market Leader, Southern Europe



                                              Reduction in false positive rates
                                               •          Significant improvement in ‘quality’ of suspicious cases past for investigation
                                                                           “84% of the claims flagged as possibly fraudulent, turned out to be fraud. A 69 % uplift in
                                                                           suspicious claim detection compared with the old system.."
                                                                           SIU Manager, Major Tier 1 USA Insurer



                                              Improved investigation efficiency
                                               •          Each referral taking 1/2 – 1/3 the time to investigate using SAS’ link analysis visualization

                                                                           “What used to take me most of a day, now takes 10 minutes.’’
                                                                           SIU Manager, Major Tier 1 USA Insurer




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
MORE
                                                INFORMATION



                                       •          Contact information:
                                                   Stuart Rose, SAS Global Insurance Marketing Director
                                                   e-mail: Stuart.rose@sas.com
                                                   Blog: Analytic Insurer
                                                   Twitter: @stuartdrose

                                              • White Papers:
                                                 Combatting Insurance Claims Fraud
                                                 Insurance Fraud Race
                                              • Research:
                                                 State of Insurance Fraud Technology

C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
THANK YOU




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .               www.SAS.com

Weitere ähnliche Inhalte

Was ist angesagt?

Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsVivastream
 
A Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud OpportunitiesA Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud OpportunitiesWhitleyPenn
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?cVidya Networks
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
MIG White Papers
MIG White PapersMIG White Papers
MIG White Papersdmadamczyk
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!pdallen
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Independent Banker
Independent BankerIndependent Banker
Independent BankerPatrick Roch
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovationTransUnion
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgCMR WORLD TECH
 

Was ist angesagt? (20)

Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud Threats
 
A Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud OpportunitiesA Lack of IT Controls= Fraud Opportunities
A Lack of IT Controls= Fraud Opportunities
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
MIG White Papers
MIG White PapersMIG White Papers
MIG White Papers
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Independent Banker
Independent BankerIndependent Banker
Independent Banker
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))Data Breach Response Guide (Whitepaper))
Data Breach Response Guide (Whitepaper))
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 

Andere mochten auch

Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Lecture 17 sas framework internal control - james a. hall book chapter 3
Lecture 17  sas framework internal control - james a. hall book chapter 3Lecture 17  sas framework internal control - james a. hall book chapter 3
Lecture 17 sas framework internal control - james a. hall book chapter 3Habib Ullah Qamar
 
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...Decision CAMP
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesRasmus Petersen
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesCambridge Intelligence
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceJohn Liu
 
SAS and Cloudera – Analytics at Scale
SAS and Cloudera – Analytics at ScaleSAS and Cloudera – Analytics at Scale
SAS and Cloudera – Analytics at ScaleCloudera, Inc.
 
SAS Modernization architectures - Big Data Analytics
SAS Modernization architectures - Big Data AnalyticsSAS Modernization architectures - Big Data Analytics
SAS Modernization architectures - Big Data AnalyticsDeepak Ramanathan
 
SAS Customer Analytics for Insurance
SAS Customer Analytics for InsuranceSAS Customer Analytics for Insurance
SAS Customer Analytics for Insurancestuartdrose
 
Creación de un clúster de Hadoop con Cloudera
Creación de un clúster de Hadoop con ClouderaCreación de un clúster de Hadoop con Cloudera
Creación de un clúster de Hadoop con ClouderaDavid Albela Pérez
 
Predictive Analytics: It's The Intervention That Matters
Predictive Analytics: It's The Intervention That MattersPredictive Analytics: It's The Intervention That Matters
Predictive Analytics: It's The Intervention That MattersHealth Catalyst
 
Design Thinking for Big Data Applications
Design Thinking for Big Data Applications  Design Thinking for Big Data Applications
Design Thinking for Big Data Applications Xpand IT
 
Live Seminar Cloudera & Big Data Ecosystem
Live Seminar Cloudera & Big Data Ecosystem Live Seminar Cloudera & Big Data Ecosystem
Live Seminar Cloudera & Big Data Ecosystem Xpand IT
 
Customer Sucess Story: Big Data in EDP
Customer Sucess Story: Big Data in EDP Customer Sucess Story: Big Data in EDP
Customer Sucess Story: Big Data in EDP Xpand IT
 
Big Data Adoption Status
Big Data Adoption Status Big Data Adoption Status
Big Data Adoption Status Xpand IT
 
Polymer 1.0: easier, faster, better!
Polymer 1.0: easier, faster, better!Polymer 1.0: easier, faster, better!
Polymer 1.0: easier, faster, better!Maria Clara Santana
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Andere mochten auch (20)

Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Big Data Needs Big Analytics
Big Data Needs Big AnalyticsBig Data Needs Big Analytics
Big Data Needs Big Analytics
 
Lecture 17 sas framework internal control - james a. hall book chapter 3
Lecture 17  sas framework internal control - james a. hall book chapter 3Lecture 17  sas framework internal control - james a. hall book chapter 3
Lecture 17 sas framework internal control - james a. hall book chapter 3
 
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniques
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key lines
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial Intelligence
 
SAS and Cloudera – Analytics at Scale
SAS and Cloudera – Analytics at ScaleSAS and Cloudera – Analytics at Scale
SAS and Cloudera – Analytics at Scale
 
Introducción a Apache HBase
Introducción a Apache HBaseIntroducción a Apache HBase
Introducción a Apache HBase
 
SAS Modernization architectures - Big Data Analytics
SAS Modernization architectures - Big Data AnalyticsSAS Modernization architectures - Big Data Analytics
SAS Modernization architectures - Big Data Analytics
 
SAS Customer Analytics for Insurance
SAS Customer Analytics for InsuranceSAS Customer Analytics for Insurance
SAS Customer Analytics for Insurance
 
Creación de un clúster de Hadoop con Cloudera
Creación de un clúster de Hadoop con ClouderaCreación de un clúster de Hadoop con Cloudera
Creación de un clúster de Hadoop con Cloudera
 
Predictive Analytics: It's The Intervention That Matters
Predictive Analytics: It's The Intervention That MattersPredictive Analytics: It's The Intervention That Matters
Predictive Analytics: It's The Intervention That Matters
 
Bases de Datos No Relacionales (NoSQL): Cassandra, CouchDB, MongoDB y Neo4j
Bases de Datos No Relacionales (NoSQL): Cassandra, CouchDB, MongoDB y Neo4jBases de Datos No Relacionales (NoSQL): Cassandra, CouchDB, MongoDB y Neo4j
Bases de Datos No Relacionales (NoSQL): Cassandra, CouchDB, MongoDB y Neo4j
 
Design Thinking for Big Data Applications
Design Thinking for Big Data Applications  Design Thinking for Big Data Applications
Design Thinking for Big Data Applications
 
Live Seminar Cloudera & Big Data Ecosystem
Live Seminar Cloudera & Big Data Ecosystem Live Seminar Cloudera & Big Data Ecosystem
Live Seminar Cloudera & Big Data Ecosystem
 
Customer Sucess Story: Big Data in EDP
Customer Sucess Story: Big Data in EDP Customer Sucess Story: Big Data in EDP
Customer Sucess Story: Big Data in EDP
 
Big Data Adoption Status
Big Data Adoption Status Big Data Adoption Status
Big Data Adoption Status
 
Polymer 1.0: easier, faster, better!
Polymer 1.0: easier, faster, better!Polymer 1.0: easier, faster, better!
Polymer 1.0: easier, faster, better!
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Ähnlich wie SAS for Claims Fraud

Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudCognizant
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 
Jerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data InvestigationJerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data InvestigationSaratoga
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Patrick Florer
 
Constructor magazine Fraud article
Constructor magazine Fraud articleConstructor magazine Fraud article
Constructor magazine Fraud articleAnn Dee Allen
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wrightPaul Wright MSc
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryFerrariT1
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Mar 5 6 Internal Controls
Mar 5 6 Internal ControlsMar 5 6 Internal Controls
Mar 5 6 Internal ControlsTommy Seah
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers PatternIRJET Journal
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plansarahb171
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 

Ähnlich wie SAS for Claims Fraud (20)

Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims Fraud
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
Jerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data InvestigationJerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data Investigation
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Constructor magazine Fraud article
Constructor magazine Fraud articleConstructor magazine Fraud article
Constructor magazine Fraud article
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wright
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care Industry
 
Icm Kl Ls
Icm Kl LsIcm Kl Ls
Icm Kl Ls
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Mar 5 6 Internal Controls
Mar 5 6 Internal ControlsMar 5 6 Internal Controls
Mar 5 6 Internal Controls
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
 
Insurance Fraud Whitepaper
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud Whitepaper
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 

SAS for Claims Fraud

  • 1. SAS FOR CLAIMS FRAUD MORE INFORMATION C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 2. GLOBAL INSURANCE CLAIMS FRAUD • US Insurance Information Institute estimate $30 billion losses annually; about 10% incurred losses and loss adjustment expenses • FBI estimate costs $40+ billion per annum; costing between $400 and $700 in extra premiums • Insurance Council of Australia estimates that between 10 and 15% of insurance claims across of lines exhibit elements of fraud • Swedish Association estimate that 5 to 10% of claims include fraud • ALFA estimate that fraud 15% of claims paid, or 4-8% of premiums collected equating to €2.5bn per annum • ABI estimates that undetected fraud = £2.1bn adding about £50 to average premium • South Africa Insurance Crime Bureau estimate that 30% of short term insurance claims include fraud • Swiss Insurance Association estimate that 10% of claims paid are fraudulent • German Insurance Association estimates that fraud costs circa €4bn per annum C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 3. THE SHIFTING LANDSCAPE OF INSURANCE FRAUD Insurance fraud is on the rise & today’s schemes are: • Increasingly sophisticated • More agile • Higher velocity • Cross industry • Influenced by regulatory & political climate Yesterday’s methods are insufficient to address today’s fraud risk! C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 4. CHALLENGES TO DEALING WITH DATA FRAUD DETECTION A good fraud detection solution must:  Integrate data from multiple disparate sources like claims, underwriting, human resources, billing/payment systems and 3rd party sources  Match identities across all data sets  Address data quality issues like misspellings, input errors, typos, missing data, acronyms, shorthand and jargon  Leverage unstructured data text data sources like claims notes and service logs  Provide transparency & adaptability to quickly respond to changing fraud threats C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 5. CHALLENGES TO TRANSPARENCY FRAUD DETECTION Push Pull vs.  Reliance on  Advanced rules / red flags detection methods  Inconsistent  Consistent  First-come,  Optimal first-served prioritization C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 6. CHALLENGES TO LEGACY SIU PROCESS FRAUD DETECTION  Multi-claims organized frauds may be difficult for individual adjusters to identify  Organizational structures may be inadequate  Relationships are increasingly important…and complex  Business rules are marginally effective  Supervised predictive models can be biased toward single-claim fraud detection  Distinction between fraud vs. abuse C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 7. BUSINESS ANALYTICS AND FRAUD DETECTION  Allows insurers to identify ‘suspicious cases’  Works underneath the insurers existing processes  Does not replace expertise of claims team members but ensures cases are not missed  Allows insurers to detect fraud by multi-dimensions  Case-by-case  Repeat  Organised rings C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 8. FRAMEWORK-BASED END-TO-END SOLUTION APPROACH Data Detection Reporting Administration • Structured & • Business Rules • Advanced Ranking • Self administered Unstructured Data • Anomaly Detection Technology • Custom alert queues Sources • Easy to use web • Advanced • Alert suppression & • Batch or real time Predictive Models based interface routing rules processing • Advanced Query • Watch Lists • Workflow analysis • Data Cleansing of integrated data • Social Network • Direct integration • Data Integration Analysis • Full business with Case • Variable Extraction intelligence Management • Network-level reporting capability & Sentiment analytics Analysis with Text • Claim system Mining • Hybrid Technology integration C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 9. SAS FRAUD FRAMEWORK FOR PROCESS FLOW INSURANCE Operational Exploratory Data Sources Data Analysis & Alert Generation Process Transformation Business Alert SAS® Social Fraud Rules Administration Network Data Analysis Staging Network Providers Rules Analytics Anomaly Network Detection Analytics Members Predictive Modeling Facilities Alert Management & BI / Reporting Intelligent Learn and Fraud Repository Improve Claims Cycle Case Management C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 10. FRAUD ANALYTICS USING A HYBRID APPROACH FOR FRAUD DETECTION Text Mining Database Predictive Searches Modeling Anomaly Detection Automated Analytic Business Rules Decisioning Engine Social Network Analysis LEVERAGING SAS HYBRID APPROACH TO SCORE TRANSACTIONS, ENTITIES, AND NETWORKS ACROSS MULTIPLE ORGANIZATIONS C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 11. WHY SAS? MAKING LIFE EASIER Establish Query Rank & Combine & Analysis Decision Final Search Various Prioritize Synthesize of to Analysis & Parameters Systems Results Information Findings Proceed? Summary Framework-Based Predictive Analytics Analytical Value-Add “What used to take me most of a day, now takes 10 minutes.” “It completely streamlines where we need to go.” -SIU Analyst C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 12. CUSTOMER STORY CNA (US) Business Problem • Detect and prevent fraud in four separate commercial lines of business Customer Quote • Optimally direct its investigation resources on cases with higher likelihood of fraud We have an excellent partnership with SAS. They took the time to Solution meet with us and truly understand the nuances • SAS Fraud Framework for Insurance of CNA so that we could build effective predictive models for each line of our business Results • $2.1m in fraud recovery / prevention within the first 9 Tim Wolfe, SIU Director months of implementation • Detection and investigation of 15 potentially fraudulent provider networks – four times what CNA anticipated C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 13. WHY SAS?  More suspicious cases identified • Including both previously undetected fraudulent networks and extensions to already identified fraud “We discovered that 5% of its claims pay-outs were fraudulent, and these can now be corrected and prevented in the future." Assistant General Manager, Market Leader, Southern Europe  Reduction in false positive rates • Significant improvement in ‘quality’ of suspicious cases past for investigation “84% of the claims flagged as possibly fraudulent, turned out to be fraud. A 69 % uplift in suspicious claim detection compared with the old system.." SIU Manager, Major Tier 1 USA Insurer  Improved investigation efficiency • Each referral taking 1/2 – 1/3 the time to investigate using SAS’ link analysis visualization “What used to take me most of a day, now takes 10 minutes.’’ SIU Manager, Major Tier 1 USA Insurer C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 14. MORE INFORMATION • Contact information: Stuart Rose, SAS Global Insurance Marketing Director e-mail: Stuart.rose@sas.com Blog: Analytic Insurer Twitter: @stuartdrose • White Papers: Combatting Insurance Claims Fraud Insurance Fraud Race • Research: State of Insurance Fraud Technology C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 15. THANK YOU C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d . www.SAS.com