SAS Forum. Transactional Fraud. Filip Verbeke, Sales Manager Fraud Solutions South West Europe. Copyright 2015, SAS Institute Inc. All right reserved.
|
|
- Mae Stevenson
- 6 years ago
- Views:
Transcription
1 SAS Forum Transactional Fraud Filip Verbeke, Sales Manager Fraud Solutions South West Europe
2 Digital channels are under attack. Key Business drivers A need for multi-layer, analytics-driven & real time detection Increase organisational efficiency Reduce fraud losses and false positives and improves value detection rates Tackling money mules Improve customer experience and bank s reputation
3 Cyber Security CYBER THREAT LANDSCAPE FOR BANKS An ever-changing myriad of attack vectors Mules Pre-pay Debit cards Threat hits people or IT, outcome is fraud or denial of service Business Customers Tamper with payment files Online Retail Customers Phishing / social engineering for credentials Man-in-themiddle attack Account take-over Phone Fax Cards Account teams Payments Payee setup Account creation IT Teams Time-bombed destructive patches False Tx Merchants Stolen cards Weak 3 rd parties with card data Collect CC data Sell CC data Collect CC data Infect machine / execute Tx Spear phishing & infection
4 Cyber Security CYBER FRAUD Data Sources Data Integration / Analytics / Kill chain analysis End user services Logs and alerts Bank Business Tx Enhance data / Networked data Detection and Alerting Prioritised alerts Reporting / explore & search data Firewalls / IDS / SIEM Anti-Virus Pre-filter IT activity Machine logs Web logs External bad lists Pre-filter Pre-filter Business Tx activity Internet activity Hybrid Analytics Model Case Management
5 Cyber Security CYBER SECURITY Data Sources Data Integration / Analytics / Fraud models End user services Logs and alerts Accounts Enhance data / Networked data Detection and Alerting Prioritised alerts Reporting / explore & search data Financial Tx Nonfinancial Tx Pre-filter Tx Staff activity Cyber alerts External bad lists DQ Aggregate Entity Network Hybrid Analytics Model Case Management
6 The technology response CYBER CRIME IS A BIG DATA STORY USER EXPERIENCE & MANAGEMENT Data Input Build Scenarios Simulation / Deployment (Simulation available in GA Release) Alert Generation / Case Management Monitor & Report SAS LASR ANALYTIC SERVER BATCH/ IN-DATABASE SAS DEPLOYMENT ENVIRONMENTS IN-MEMORY REAL-TIME & STREAMING Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d.
7 Event Stream Processor
8 SAS SECURITY INTELLIGENCE LAYERED APPROACH Companies are reevaluating how they tackle security since a fragmented approach is consistently leaving organizations at greater risks of attack. A more holistic approach to security ensures all layers of protection function together. Avivah Litan, VP Distinguished Gartner Analyst Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d.
9 ONLINE BANKING PAYMENTS FRAUD
10 SAS Fraud Framework POINTS OF VULNERABILITY FOR ONLINE FRAUD OPEN BOX SOLUTION COVERING ALL AREAS Point of compromise Score incoming transactions for: Anomalous behaviour Change of details Drain of funds from savings account (me2me transfers) Customer behaviour Score customers over their lifetimes for: Possible mule accounts Victim propensity Appearance on a watch-list Unusual behaviour Point of exit New beneficiaries Velocity of transactions Suspicious session activity Create alerts!
11 Real time, in memory
12 High performance analytics UNIQUE HYBRID APPROACH TO ANALYTICS SNA (example): Links to mule account such as a shared mobile number Predictive modelling (example): Model based on variables such payment amount and balance Anomaly detection (example): The client is accessing their account from a new channel Business rule (example): Transaction above $xx to a new beneficiary Database Searches (example): Looking for matches across the Black-lists Database Searches (example): Looking for matches across the Black-lists Text mining (example): Transaction narrative showing suspicious payments
13 Real Time Decisioning
14 CASE STUDY
15 What was the problem?
16 FMF Project POTENTIAL PHASE I IMPACT AS-IS Average alerts per day 50% detection rate 0,01% of alerts are fraud PHASE I* Average +-40 alerts per day 90% Detection rate 2,5% of alerts are fraud * Indicated by an analysis on historical data no guarantees towards future performance
17 MULE SCORECARD ASSESSMENT ROC CHART ROC on Validation = The ROC chart shows how well the model is able to be specific (catch only bads ) and sensitive (catch all bads simultaneously). Sensitivity and 1-Specificity are displayed for various cutoff values. The more the chart bends to the top left, the better. The ROC measures the area under the curve. The bigger the area, the better the model. A perfect model will have a ROC close from 1. ROC >0.9 very good model ROC > 0.8 good model ROC > 0.7 ok model Sensitivity = True Positive Rate = TP / (TP + FN) Specificity = True Negative Rate = TN / (FP + TN)
18 SCORECARD PAYMENTS EXAMPLE TRANSACTION SCORED Transaction Amount: 3499 eur Beneficiary has a very high mule probability Benef is BNP Customer and Nationality is Belgian Preceding transaction is MetoMe Preceding transaction is in last 15 min Originator has more than 63 year old Originator is french speaking Transaction time is 4pm on friday Communication Field is not blank = = 421 points > CUT-OFF Alert
19 FRAUD ARCHITECTURE OVERVIEW Data Treatment Analytical environment Discovery (Ad-Hoc) Modelling & Scorecards Rule Authoring Simulation Performance Monitoring Analytics DB Detection Fraud Treatment Recurrent Batch Offline Detection Near real-time Alert & Case Management Detection DB Real-Time Real-time Detection Reporting Copyri ght 2013, S A S I nst i t ut e I nc. A l l ri ght s reserved.
20 SAS Fraud Framework SOLUTION BENEFITS More suspicious cases identified Including both previously undetected fraudulent networks and extensions to already identified fraud Reduction in false positive rates Significant improvement in quality of suspicious cases past for investigation Improved investigation efficiency Each referral taking 1/2 1/3 the time to investigate using SAS link analysis visualization One consistent, end to end, underlying platform Platform can also be leveraged for credit risk, card risk, AML and FATCA
21 CARD FRAUD
22 trends CARD FRAUD Unlimited Operation Targeted 2 Payments Processors RAKBANK (United Arab Emirates) Bank of Muscat (Oman) 10 hours 24 countries 36,000 transactions $40 million USD
23 ADVANCED ANALYTICS Advanced patent analytics to detect risk exposure and fraud with less customer inconvenience. Multi-entity Statures Hybrid Model Technology (Custom) Enhanced API Enterprise Platform Single Platform processing for all Products & Channels; Deposit, ACH, Wire, Cards, Payments, Acquirer, Mobile Banking, Online, etc. Copyright 2012, SAS Institute Inc. All rights reserved. SAS Fraud Management Solution Integration Integration with other fraud/risk solutions (Link Analysis, AML, etc.) Fraud Management Operation Multi-Org structure to manage multiclient (Processor) or Silo environment. Separation of data, cases and rules control per business requirements 100% Real-Time Decision Ability to score and decision 100% of all transaction types in real-time, all LOBs.
24 NEURAL NETWORK MODEL COMPONENTS Input Signatures Transaction Geographic data Neural Network Model OUTPUT Score with Reason Codes
25 HSBC Case Study Enterprise Fraud Detection Highlights Ability to decision 100% of ALL transactions in real-time Enhanced signature approach that incorporates cross-product / cross channel data Ability to leverage additional data in fraud decision process (expanded API to include non-monetary, e-banking, mobile channel, etc ) Incremental fraud detection over incumbent SAS detects 47% more fraud at 20:1 AFPR. Enterprise Solution Establish platform for transaction decisioning across all bank products and channels
26 CLIENT EXAMPLE ONE OF AMERICA S LARGEST BANKS Challenges Source data once and use across many different business purposes Modernize analytics approach for banks largest credit cad portfolio Generate more revenue from enhanced risk based approach to credit & fraud decisioning Enterprise analytical approach: s Striking balance between customer experience and fraud losses Real time credit & fraud decisions Replacing home grown system ROI: 100 million $ in Y1, of which 60 million $ from new revenue and 40 million $ from fraud loss reduction. Operational cost reduction: from 3000 rules to 100 rules and a single model Credit and fraud : credit decisioning + fraud decisioning single data source
27 CYBER SECURITY
28 Cyber Security MANY POTENTIAL DATA SOURCES ENTERPRISE STORAGE Netflow / IP traffic Door swipe Web Proxy Business Tx External hotlist HP ArcSight IBM Q1 Labs Quest Software Splunk SIEM ACTIVE DIRECTORY DATABASE INTERNET ROUTER FIREWALL IPS/IDS WORKSTATION APPLICATON SERVER Cisco CheckPoint Cisco Juniper Networks McAfee Kapersky Labs MS SCOM SAP ERM Palo Alto Networks Fortinet Tipping Point SourceFire Trend Micro Semantec SNMP VMWARE
29 SAS solution Current Environment: Hundreds/Thousands of alerts per day Ad-hoc and reactive Rules & Signature based Future State: SAS Advanced Analytics High Performance Analytics + Real Time Decisioning Hybrid Analytics to derive contextual awareness & risk prioritization Identify patterns of behaviors, compromised accounts & high risk activity Ability to identify the threat before the data loss Copyr i g ht 2014, SAS Ins titut e Inc. All rights res er ve d.
30 New release NETFLOW ANALYTICS FEATURES Contextual data enrichment. Augments network flow with business information and external threat data to detect cyberrisks based on your specific business workflows "Right-timed," multilayered analytics. Optimizes the speed and complexity of analytics across the real-time, near-time and "any-time" continuum for faster and deeper situational awareness Visual data exploration. Enables risk exploration without requiring previous analytics knowledge or expertise Continuously updated intelligence. Behavioral analytics automatically evolve cyberanalytic models based on new events, new data and new context. Cost-efficient, optimized data storage. Reduces your storage footprint by saving only the relevant data for analysis on commodity hardware.
31 SAS Forum
PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD
PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD FOCUS MARKETS SAS Addressable Market Size $US Billions $14.7 2015 2019 $10.6 $9.6 $7.0 $7.9 $5.0 $2.6 $3.7 $5.7 $4.4 $3.0 $4.2 BUSINESS INTELLIGENCE
More informationAn all-in-one risk management platform delivering fraud detection, transactions screening and customer due diligence capabilities
CGI Centaur An all-in-one risk management platform delivering fraud detection, transactions screening and customer due diligence capabilities What is CGI Centaur? CGI Centaur is a versatile and complex
More informationFighting online payments fraud. SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS
Fighting online payments fraud SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS Fraud is everywhere Internet Application Online Shopping Transfer Payment Credit Card Claims Darknet
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to build and operate security operations centers (SOC) of any size (large, med,
More informationThe web seminar has not yet started: A sound check will be performed 5 minutes before the start time.
The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. COPYRIGHT NOTICE USE OF WEBEX LOGIN/PASSWORD FOR ACAMS WEB SEMINARS Each site license entitles registrant
More informationPREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm
PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm WELCOME Audio is streamed over your computer Dial in numbers and codes are
More informationHow to Harness Data Analytics in Financial Crime Control Taming 'Big Data' to Improve Enforcement, Compliance and Regulation
How to Harness Data Analytics in Financial Crime Control Taming 'Big Data' to Improve Enforcement, Compliance and Regulation Saturday, May 18, 2013 10:45-12:00 PM Speakers: Brian Golden, JR Helmig, Jack
More informationC opyr i g ht 2016, SAS Ins titut e Inc. All rights res er ve d. Bienvenue
C opyr i g ht 2016, SAS Ins titut e Inc. All rights res er ve d. Bienvenue Data Analytics in Manufacturing Bert Seegers Head of Manufacturing industry C opyr i g ht 2016, SAS Ins titut e Inc. All rights
More informationNo digitalization without risks
No digitalization without risks How to equip your organization against the new fraud threads? Frédéric Hennequin Senior Solution Specialist Fraud & Compliance Agenda SAS Introduction Online Fraud in Belgium
More informationIBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights
IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the
More informationIBM AML compliance solution
IBM AML compliance solution Staying ahead of financial crimes Highlights Continuously harnesses a powerful array of advanced analytics that are available to proactively fight the long-term war against
More informationActimize Essentials. Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance
Actimize Essentials Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance FIs of All Sizes Face Increasing Pressures From Financial Crime and Tightening Regulations As regulations
More informationFinancial Crime Mitigation
Financial Crime Mitigation A uniquely flexible range of intelligent, versatile solutions for financial institutions, large and small, to combat financial crime. Introduction Our Financial Crime Mitigation
More informationApproaching an Analytical Project. Tuba Islam, Analytics CoE, SAS UK
Approaching an Analytical Project Tuba Islam, Analytics CoE, SAS UK Approaching an Analytical Project Starting with questions.. What is the problem you would like to solve? Why do you need analytics? Which
More informationPrevention: Closing In On the Final Mile of Fraud Management O R A C L E W H I T E P A P E R A P R I L
Prevention: Closing In On the Final Mile of Fraud Management O R A C L E W H I T E P A P E R A P R I L 2 0 1 7 Disclaimer The following is intended to outline our general product direction. It is intended
More informationIn-Memory Analytics: Get Faster, Better Insights from Big Data
Discussion Summary In-Memory Analytics: Get Faster, Better Insights from Big Data January 2015 Interview Featuring: Tapan Patel, SAS Institute, Inc. Introduction A successful analytics program should translate
More informationCapgemini Risk Management & Compliance
Risk Management & Compliance the way we do it Capgemini Risk Management & Compliance Bringing tangible results to the world s leading financial services companies Improving Reporting Through a Basel II
More informationThe Fraud Management Hub: No Such Thing As Too Many Tools
The Fraud Management Hub: No Such Thing As Too Many Tools TABLE OF CONTENTS Overview... 3 Fraud Solution Overload... 3 The Cyber-Fraud Challenge... 3 How Fraud Management Hubs Tackle the Too-Much-Information
More informationUsing Splunk for Retail Banking Cross Channel Fraud Analysis, Detection and Investigation
Using Splunk for Retail Banking Cross Channel Fraud Analysis, Detection and Investigation Commercial Bank Of Dubai Rory Blake Splunk Professional Services Staff Consultant Rinaldo Ribeiro Head of IT Risk
More informationCustomer Value Analytics for Banking & Capital Markets
Customer Value Analytics for Banking & Capital Markets Powered by SMART Analytics built on IBM Understand your customers, markets, business opportunities, and risks As money is the heart of a financial
More informationCommon Customer Use Cases in FSI
Common Customer Use Cases in FSI 1 Marketing Optimization 2014 2014 MapR MapR Technologies Technologies 2 Fortune 100 Financial Services Company 104M CARD MEMBERS 3 Financial Services: Recommendation Engine
More informationReal World Use Cases: Hadoop & NoSQL in Production. Big Data Everywhere London 4 June 2015
Real World Use Cases: Hadoop & NoSQL in Production Ted Dunning Big Data Everywhere London 4 June 2015 1 Contact Information Ted Dunning Chief Applications Architect at MapR Technologies Committer & PMC
More informationInformation Technology for Business
Information Technology for Business Business Essentials 9e Ebert/Griffin chapter thirteen After reading this chapter, you should be able to: 1. Discuss the impacts information technology has had on the
More informationWELCOME TO SAS FOR MARKETING
WELCOME TO SAS FOR MARKETING 17 FEBRUARY 2016 Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. AGENDA Time Session 09.30 Registration & refreshments 10.00 Start 10.15 ADVANCED Attribution
More informationPhilippe Mazurier Directeur du business development Fraud & ID
Fraude en ligne et usurpation d identité: Comment ne pas perturber l'expérience utilisateur? Philippe Mazurier Directeur du business development Fraud & ID 2016 Experian Limited. All rights reserved. Experian
More informationSmarter Data Insights. Emmanuel Osanga
Smarter Data Insights Emmanuel Osanga 1 Global Challenges Increasing Stakeholder Pressure Global Megatrends Factors reshaping our world Global Economic & Socio-Political Challenges 2 Disruptive Innovation
More informationSolutions. Card Risk Management Leverage Our Industry-Leading Solutions and Services to Fight the Rising Cost of Fraud
Solutions Card Risk Management Leverage Our Industry-Leading Solutions and Services to Fight the Rising Cost of Fraud 2 Solutions Debit and credit cards are the payment methods of choice for U.S. consumers.
More informationHow to improve your AML detection? Christopher Ghenne Principal Manager Fraud & Security Intelligence EMEA
How to improve your AML detection? Christopher Ghenne Principal Manager Fraud & Security Intelligence EMEA Years of 14,010 SAS employees worldwide 93 of the top 100 on the 40 #1 BUSINESS ANALYTICS companies
More informationActimize Essentials AML. Cloud Based Anti-Money Laundering Solutions
Actimize Essentials AML Cloud Based Anti-Money Laundering Solutions Essential Anti-Money Laundering Compliance Capabilities Growing Compliance Burdens for Financial Institutions of All Sizes As recent
More informationDigital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience
Digital Insight Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd. Contents Introduction Business
More informationVULNERABILITY MANAGEMENT BUYER S GUIDE
VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE 01 Introduction 2 02 Key Components 3 03 Other Considerations 10 About Rapid7 11 01 INTRODUCTION Exploiting weaknesses in browsers,
More informationMachine Learning 101
Machine Learning 101 Mike Alperin September, 2016 Copyright 2000-2016 TIBCO Software Inc. Agenda What is Machine Learning? Decision Tree Models Customer Analytics Examples Manufacturing Examples Fraud
More informationSmarter Analytics for Big Data
Smarter Analytics for Big Data Anjul Bhambhri IBM Vice President, Big Data February 27, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT The resulting explosion of information
More informationUnit-4: Security Environment:
Unit 1: E-Business: E-Business Fundamentals E-Business framework, E-Business application Technology Infrastructure for E-Business Strategies for Electronic Business, Business Models for E-business Web
More informationThe Analytical Revolution
The Analytical Revolution Colin Shearer Global Executive, Advanced Analytic Solutions IBM Our world is becoming smarter Instrumented Interconnected Intelligent enabling organizations to make faster, better-informed
More informationBanking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities
Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental
More informationCustomer Value Analytics for Banking & Capital Markets
Customer Value Analytics for Banking & Capital Markets Powered by SMART Analytics built on IBM Understand your customers, markets, business opportunities and risks As money is the heart of a financial
More informationSAP Predictive Analytics Suite
SAP Predictive Analytics Suite Tania Pérez Asensio Where is the Evolution of Business Analytics Heading? Organizations Are Maturing Their Approaches to Solving Business Problems Reactive Wait until a problem
More informationComprehensive Enterprise Solution for Compliance and Risk Monitoring
Comprehensive Enterprise Solution for Compliance and Risk Monitoring 30 Wall Street, 8th Floor New York, NY 10005 E inquiries@surveil-lens.com T (212) 804-5734 F (212) 943-2300 UNIQUE FEATURES OF SURVEILLENS
More informationSAS PARTNER KICK-OFF 2016
2016 FEBRUARY 22, 2016 ANNUAL REVENUE 1976 2014 2015 REVENUE PERCENTAGES BY INDUSTRY 2015 REVENUE PERCENTAGES BY REGION 2014 GLOBAL PARTNERING IMPACT SAS NSR Partner Sourced NSR Partner Impacted NSR LEADERSHIP
More informationSecurity intelligence for service providers
Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security
More informationSAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016
SAP Enterprise Threat Detection Overview & Roadmap Martin Plummer, SAP SE November 2016 Disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without
More informationA brief history of fraud. Physical theft. Sale of fake and stolen payment cards. Identity theft and application fraud
Like many aspects of our lives, technology is providing consumers with more options when it comes to making financial transactions. From relatively new interactions, such as mobile commerce and peerto-peer
More informationAn Approach to Detect Fraud at Account Level
An Approach to Detect Fraud at Account Level Pankaj Richhariya #1, Dr. Prashant Kumar Singh #2 #1 PhD Scholar, CSE, Dr K.N.Modi University, Newai India Abstract With the arrival of new technologies for
More informationA technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability
December 2002 IBM Tivoli Monitoring solutions for performance and availability 2 Contents 2 Performance and availability monitoring 3 Tivoli Monitoring software 4 Resource models 6 Built-in intelligence
More informationFraud and identity verification consulting case study maximize bookings and reduce operational costs by using the right data
Fraud and identity verification consulting case study maximize bookings and reduce operational costs by using the right data Client Top-tier U.S. card issuer Chris Ryan Experian Experian and the marks
More informationRDC Risk Management in 2015
RDC Risk Management in 2015 John Leekley, Founder & CEO RemoteDepositCapture.com Be sure to tweet about the #RDCSummit and mention @RDCTweet Setting the Stage Discussion Objectives Definition of RDC Risk
More informationGrowing and retaining your customer base with customer analytics
Vivian Braun, WW Solutions Marketing Manager 2 July 2015 Growing and retaining your customer base with customer analytics Content 2 The way customers engage with organizations is changing Organizations
More informationAnti Money Laundering Compliance Solutions. Copyright 2016 Allsec Technologies. All rights reserved.
Anti Money Laundering Compliance Solutions Copyright 2016 Allsec Technologies. All rights reserved. Contents Allsec Overview Information Security Credentials AML-as-a-Service Case Study 2016 Allsec Technologies.
More informationAsset Performance Management from GE Digital. Enabling intelligent asset strategies to optimize performance
Asset Performance Management from GE Digital Enabling intelligent asset strategies to optimize performance How can you make your operation safer and more reliable while helping to ensure optimal performance
More informationThomson Reuters: Anti-Money Laundering Survey Insights
Thomson Reuters: Anti-Money Laundering Survey Insights 2 Introduction With rising regulatory pressure, increasing cost of compliance and disruptive technologies entering Know Your Customer (KYC) and Anti-Money
More informationThe Changing Landscape of Card Acceptance
The Changing Landscape of Card Acceptance Troy Byram Vice-President Sr. E-Receivables Consultant February 6, 2015 Agenda EMV (Chip and Pin) PCI Compliance and Data Security New Regulations for Municipalities
More informationC&H Financial Services. PCI and Tin Compliance Basics
C&H Financial Services PCI and Tin Compliance Basics What Is PCI? (Payment Card Industry) Developed by the PCI Security Standards Council and major payment brands For enhancing payment account data security
More informationACHIEVING OPTIMAL IFRS9 COMPLIANCE
ACHIEVING OPTIMAL IFRS9 COMPLIANCE MARTIM ROCHA SEPTEMBER 2015 Copyright 2013, SAS Institute Inc. All rights reserved. Agenda IFRS9 background SAS solution for IFRS9 Monthly run, consolidation, reporting
More informationAPI Gateway Digital access to meaningful banking content
API Gateway Digital access to meaningful banking content Unlocking The Core Jason Williams, VP Solution Architecture April 10 2017 APIs In Banking A Shift to Openness Major shift in Banking occurring whereby
More informationIBM Tivoli Monitoring
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Proactively monitor critical components Help reduce total IT operational
More informationReal-time payment transfer fraud detection
Real-time payment transfer fraud detection Wim Bartsoen Head of Information Security Governance, Norms, Monitoring & Control BNP Paribas Fortis 14/10/2014 1 Electronic Transfer Fraud: FMF Project Problem
More informationWHITE PAPER. Results Delivers Value
WHITE PAPER SAS Title Results Delivers Value ii Contents Building on a foundation of analytics... 1 SAS Results: The right tools for the job... 1 Fill the analytical skills gap...2 Address limited IT support...2
More informationRISK AND FINANCE INTEGRATION IN THE CAPITAL PLANNING PROCESS
RISK AND FINANCE INTEGRATION IN THE CAPITAL PLANNING PROCESS MARTIM ROCHA RISK COE OCTOBER 2015 Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. RISK AND CAPITAL MANAGEMENT AGENDA Context
More informationHotScan Risk Screening Solutions Suite
HotScan Risk Screening Solutions Suite Reduce risk and stay ahead of the regulatory curve Contents A modular approach to effective & efficient financial crime risk mitigation HotScan Payments Filter HotScan
More informationHarnessing the Power of IBM Business Analytics Through Application Specific Licensing
Harnessing the Power of IBM Business Analytics Through Application Specific Licensing David Albert WW ASL Business Development and Technical Manager Business Analytics Business Analytics software Agenda
More informationFraud Detection for SWIFT and Payments
Fraud Detection for SWIFT and Payments March 28, 2017 2:00 3:00 pm EST Dan Barta, Sr. Enterprise Fraud Specialist SAS Institute Question and Answer If you have a question during the presentation, please
More informationPRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe Analytics (2015v1) The Products and Services described in this PDM are either On-demand Services or Managed Services (as outlined below) and are governed
More informationHarnessing the power of GIS
Harnessing the power of GIS Geospatial World Forum May 25, 2016 2 The changing geospatial landscape Historical perspective Copyright 2016 2016 Deloitte Development LLC. LLC. All All rights rights reserved.
More informationAll Events. One Platform.
All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights 2 Motadata brought a refreshing experience against
More informationPCI COMPLIANCE PCI COMPLIANCE RESPONSE BREACH VULNERABLE SECURITY TECHNOLOGY INTERNET ISSUES STRATEGY APPS INFRASTRUCTURE LOGS
TRAILS INSIDERS LOGS MODEL PCI Compliance What It Is And How To Maintain It PCI COMPLIANCE WHAT IT IS AND HOW TO MAINTAIN IT HACKERS APPS BUSINESS PCI AUDIT BROWSER MALWARE COMPLIANCE VULNERABLE PASSWORDS
More informationData: Foundation Of Digital Transformation
Data: Foundation Of Digital Transformation DellEMC Forum Madrid - 2017 Dave Kloc - Head of Data Sales EMEA Franck Sidi - Head of Pivotal Data Engineering EMEA Copyright 2017 Pivotal Software, Inc. All
More informationEXECUTIVE SUMMARY FINANCIAL (ADMINISTRATOR)
FINANCIAL (ADMINISTRATOR) Vanguard Administrator is security software specifically for identity and entitlements administration with intelligence tools for auditing, monitoring and reporting. Vanguard
More informationVisa Digital Solutions. Rocio Beckham Community Issuers
Visa Digital Solutions Rocio Beckham Community Issuers Notice of Confidentiality This presentation is furnished to you solely in your capacity as a customer of Visa and/or participant in the Visa payments
More informationBringing the Power of SAS to Hadoop Title
WHITE PAPER Bringing the Power of SAS to Hadoop Title Combine SAS World-Class Analytics With Hadoop s Low-Cost, Distributed Data Storage to Uncover Hidden Opportunities ii Contents Introduction... 1 What
More informationRSA ADAPTIVE AUTHENTICATION FOR ECOMMERCE ANALYTICS APPLICATION
DATASHEET RSA ADAPTIVE AUTHENTICATION FOR ECOMMERCE ANALYTICS APPLICATION COMPREHENSIVE VIEW OF YOUR 3D SECURE TRANSACTIONS RSA Adaptive Authentication for ecommerce is a risk-based fraud management solution
More informationAdvanced Analytics in Cyber Security
Advanced Analytics in Cyber Security Michael McFadden Fraud, Security & Compliance August 1, 2017 2017 Fair Isaac Corporation.. This presentation is provided 2017 Fair for the Isaac recipient Corporation.
More informationUser s Starter Kit. For Home or Small Office Use. fcbbanks.com
D E P O S I T User s Starter Kit For Home or Small Office Use fcbbanks.com Table of Contents 2 4 6 8 10 12 About Fast Track Deposit Frequently Asked Questions Scanner & Software Information Your Rights
More informationAdvance Analytic Game Changer in FSI Industry. Greg Wong, Director Analytics Centre of Excellence BI & PA
Advance Analytic Game Changer in FSI Industry Greg Wong, Director Analytics Centre of Excellence BI & PA How mbank used SAP Advance Analytics to drive their business? mbank: Delivering a Personalized Banking
More informationUser and Entity Behavior Analytics Use Cases. White Paper
User and Entity Behavior Analytics Use Cases White Paper White Paper Introduction Security and risk management leaders should leverage user and entity behavior analytics to improve their organization s
More informationReduce Money Laundering Risks with Rapid, Predictive Insights
SOLUTION brief Digital Bank of the Future Financial Services Reduce Money Laundering Risks with Rapid, Predictive Insights Executive Summary Money laundering is the process by which the illegal origin
More informationEl Nuevo Entorno del BI & Analytics: Tecnologías, Roles y Resultados
El Nuevo Entorno del BI & Analytics: Tecnologías, Roles y Resultados Michael Corcoran Senior VP & Chief Marketing Officer, Information Builders Dr. Rado Kotorov Chief Innovation Officer & VP Market Strategy
More informationSolutions. Credit Union Platforms Integrated Technology to Fit Your Enterprise Needs
Solutions Integrated Technology to Fit Your Enterprise Needs Solutions Your goals aren t new, but how you achieve them is. Only Fiserv provides a single connection to enterprise-wide technologies technologies
More informationMicrosoft BI Product Suite
Microsoft BI Product Suite On Premises and In the Cloud What is Business Intelligence? How is the BI industry evolving? What are the typical components of a BI solution? How can BI be deployed within your
More informationSolution Overview : The IBM Government Industry Framework
Meng Tay Software Consultant IBM Vietnam Solution Overview : The IBM Government Industry Framework 2010 IBM Corporation Challenges governments face in this economic environment Reduce costs Virtualization
More informationRiskTech Quadrant 2016
Independent research by RiskTech Quadrant 2016 AML and transaction monitoring solutions April 2016 About Chartis Chartis is the leading provider of research and analysis on the global market for risk technology.
More informationUse of Data Mining and Machine. Use of Data Mining and Machine. Learning for Fraud Detection. Learning for Fraud Detection. Welcome!
Use of Data Mining and Machine Use of Data Mining and Machine Learning for Fraud Detection CPE PIN Code: UKLK Learning for Fraud Detection Welcome! Ramazan Isik, CFE, CIA, CRISC, CRMA Chief Audit Executive
More informationRiskTech Quadrant 2016
Independent research by RiskTech Quadrant 2016 Watchlist monitoring solutions May 2016 About Chartis Chartis is the leading provider of research and analysis on the global market for risk technology. It
More informationKey Factors When Choosing a Shopper Counting Solution An Executive Brief
Key Factors When Choosing a Shopper Counting Solution An Executive Brief July 2015 Table of Contents Preface: Why Numbers Alone Aren t Enough... 1 Realizing Optimum ROI from Shopper Counting Solutions...
More informationSAS Business Knowledge Series
2014 SAS Business Knowledge Series A unique collaboration between SAS and a global network of industry experts who deliver the most current information on business practices, concepts, methodology and
More informationVitria Operational Intelligence
Vitria Operational Intelligence > 1 Table of Contents 1. A New Approach to BPM Why Now 2. Introducing Vitria OI 3. The Benefits 4. How it Works 5. Why it s Different A New Approach to Business Process
More informationVerifone MX 915/925 Payment Devices. with KWI 6.x POS Registers: What s New?
Verifone MX 915/925 Payment Devices with KWI 6.x POS Registers: What s New? Contents Overview... 3 Network and Power Requirements... 5 Network Requirements... 5 Power Requirements... 5 Place Your Order
More informationBeyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests. Vincent Walden, CFE, CPA, CITP
Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests Vincent Walden, CFE, CPA, CITP 2015 Association of Certified Fraud Examiners, Inc. Beyond Rules-Based Tests: The Seven
More informationTop 5 Challenges for Hadoop MapReduce in the Enterprise. Whitepaper - May /9/11
Top 5 Challenges for Hadoop MapReduce in the Enterprise Whitepaper - May 2011 http://platform.com/mapreduce 2 5/9/11 Table of Contents Introduction... 2 Current Market Conditions and Drivers. Customer
More informationMy name is Sam Mulholland and I am the Managing Director of Standby Consulting.
Cyber Security Forum Presentation C.B (Sam) Mulholland Good Afternoon My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Just a little bit about myself. I have worked in IT
More informationKaseya Traverse Unified Cloud, Network, Server & Application Monitoring
PRODUCT BRIEF Kaseya Traverse Unified Cloud, Network, Server & Application Monitoring Kaseya Traverse is a next-generation software solution for monitoring the performance of hybrid cloud and IT infrastructure
More informationEMV IN THE U.S. HOW FAR HAVE WE COME AND WHERE ARE WE GOING? Andy Brown
EMV IN THE U.S. HOW FAR HAVE WE COME AND WHERE ARE WE GOING? Andy Brown andy.brown@ncr.com MAC is an organization comprised of members from Banks, Acquirers, ISOs, Card Associations, Law Enforcement and
More informationOracle Financial Services FCCM Analytics User Guide. Release October 2017
Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Part Number: E85262-01 Oracle Financial
More informationBuilding a Bridge between Risk and Finance to Address IFRS 9 and Stresstesting
SAS FORUM PORTUGAL 2017 Building a Bridge between Risk and Finance to Address IFRS 9 and Stresstesting Martim Rocha SAS Experience your new possible #SASFPT17 C opyr i g ht 2016, SAS Ins titut e Inc. All
More informationUse of analytics in financial services to combat Fraud and Anti Money Laundering.
Use of analytics in financial services to combat Fraud and Anti Money Laundering. The Data Warehouse Institute (TDWI) 3 August 2011 Richard Moore Head of Security Advisory & Investigations, Group Security
More informationIBM SPSS Modeler Personal
IBM SPSS Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables
More informationUsing Software-as-a-Service to Drive Business and IT Productivity
Postini Whitepaper Using Software-as-a-Service to Drive Business and IT Productivity At-A-Glance Challenges Are you worried about increasing message security and compliance challenges? Are you struggling
More informationFinancial Services Compliance
Financial Services Compliance Amidst frequently changing regulations, heightened risk, and a growing volume of disparate data, compliance has become complex, inefficient, and costly. Mitigating new risk
More informationMapR: Converged Data Pla3orm and Quick Start Solu;ons. Robin Fong Regional Director South East Asia
MapR: Converged Data Pla3orm and Quick Start Solu;ons Robin Fong Regional Director South East Asia Who is MapR? MapR is the creator of the top ranked Hadoop NoSQL SQL-on-Hadoop Real Database time streaming
More information