SlideShare a Scribd company logo
1 of 21
Download to read offline
CFCA Annual Meeting & Summer Educational Event
Royal York Hotel , Toronto, Canada
Shift at Work:
Changing Modus
Operandi
Your
Success
is Our
Business
Tal Eisner – Senior Director Product Strategy
2
Telecom Today
Evolution of Fraud Management
Crossroad and Opportunity
Shift at Work
Changing Modus Operandi
Agenda
From “Walled Garden” to “Dumb Pipe”
Telecom Operators Evolution
Network Content Device CustomerConnectivity
4
Operators’ Main Challenges (2013-2015)
Source: Informa, March 2013
 Almost secretive units within the
operator
 Low visibility within the organization
 Low to non-existent involvement in
internal, non-fraud procedures
 Need to justify buying an FMS
 Need to justify the existence of the unit
 Lack of internal procedures and work
methodology
 Highly reactive modus operandi
5
 Exist in most telcos
 Most of the units have a vendor-based FMS
or an internal-built one
 Methodology has evolved and is now
established
 Unit is well recognized as an operative,
“main stream” unit
 Integral part of the internal workflow in
product launches, sales operations, etc.
 Focus is on saving as much money and
preventing as much damage as possible
6
6
7
 Telcos are going
through a gradual
change
 Revenues changed
due to changes in
products & plans
 A shift towards
bundles
 New flat tariff
plans
 All included plans
 Unlimited
Voice/SMS/Data
8
Change in Fraud Management
 If traffic is unlimited …
– No more “high usage” ?
– No more “abnormal” traffic behavior ?
 Change of fraud incentives ?
– Why bother with fraud if it’s all so cheap
and unlimited anyway?
 Change of Fraud Management strategy ?
– Who are we after ?
 In order to stay relevant – Fraud
units must re-assess their strategy
and their work focus
 Detecting more % of fraud – will
not cut it any longer . . .
 So does detecting fraud on new
technologies – All this is “more of
the same” – which is not enough
any more
 A real need for change has
surfaced in order to stay relevant
9
10
If you don’t like
what’s BEING
said CHANGE the
conversation
 Expanding traditional work
“borders” and responsibilities
 Leveraging available databases for
uses outside the fraud realm
 Effective quick and prompt reactions
to different needs of the
organization
 Strong analytical abilities
 Shortening internal process to get
quicker, better insights for the org.
11
12
 Fraud units “sit” on an essential, insightful
mountain of straw – that with the right approach
can turn to valuable gold
 Utilizing existing databases can generate strong
positioning within the organization since no CAPEX
needed
 Increasing cross-department cooperation
 Big Data Analytics
 Turning a challenging time into an opportunity for
growth
12
Big Data Analytics
13
 The need for immediate retrieval
of info from a massive, cross-
channel database
 Significantly helps in areas such
as:
─ LTE – where volumes of data are
enormous
─ Security matters – Info needed
“here and now”
─ Info sharing and intelligence
gathering
─ Cyber security matters
Exploring new grounds
 Fraud units monitor routes of calls,
destination countries; statistics are
available to them
 The percentage of fraud calls to a
specific country means GOLD
 This info is available SOLELY to the
fraud management department
 This should bring recommendations
(close the route/change billing/rates
etc.) and further cooperation with
the relevant department
14
 Detection of abusers/unfair users in
unlimited/bundle plans
 Presenting statistics and trends of
unlimited plans with focus on abuse
 Providing network recommendations
as a result (e.g., automatic actions)
 Establishing policy enforcement
procedures
15
 Provide high level statistics on risks,
threats and fraud findings per LOB
 M2M / Mobile Money/ LTE
 Drill down capabilities
 Present % of fraud per LOB to define
actions accordingly
 Assess future risks and threats and
present them in figures according to
current findings
 Alert on high risk services on regular
basis
16
17
 Provide actionable insights into the business
performance
 Utilizing data from different sources (Risk, Fraud &
RA)
 Support specific LOB and needs (e.g., LTE, Mobile
Money, M2M, Video)
 Shift towards monetary terms and statistics rather
than specific incidents and specific subscribers
 A shift towards trends analysis
 Expend cross company/department cooperation
 Infuse risk factors to marketing strategy
Changing Modus Operandi
Bottom Line
 Creating more value from Revenue
Management operations
 Find new growth engines outside
traditional space
 Reducing revenue related risks
 Improving margins
 Greater visibility of risks and
mitigation
 Enable advanced analytics for other
uses than fraud
 INCREASING BOTTOM LINE
18
19
A leading supplier of Revenue Analytics solutions to
communications and digital service providers
Founded: 2001
300 employees in 15 locations worldwide
Deployed at 7 out of the 10 largest operators in the world
150 customers in 64 countries
Globally processing 150 Billion xDRs per day, 55 Trillion xDRs per year
Contributing over $12 Billion to providers annual revenue
Partnering with world leading vendors
What You Should Know ABOUT US
Website
RA Blog www.ra-blog.org
www.cvidya.com
Your
Success
is Our
Business
Interact with Us
Products
Overview
Customers
Testimonials
Solutions
Demonstration
21

More Related Content

What's hot

Are You in Touch with Your Innovative Side?
Are You in Touch with Your Innovative Side?Are You in Touch with Your Innovative Side?
Are You in Touch with Your Innovative Side?FIS
 
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...Cloudera, Inc.
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEYFortuneCMO, LLC
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009edcervantes
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightN-iX
 
Is your bank operating in the dark?
Is your bank operating in the dark? Is your bank operating in the dark?
Is your bank operating in the dark? Gresham Computing
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesimmixGroup
 
CloudAnalytics_RiskMgt
CloudAnalytics_RiskMgtCloudAnalytics_RiskMgt
CloudAnalytics_RiskMgtTarun Arora
 
Correlation Between Modern Management Practices And IT Trends
Correlation Between Modern Management Practices And IT TrendsCorrelation Between Modern Management Practices And IT Trends
Correlation Between Modern Management Practices And IT TrendsPradeep Tewani
 
Constituency Management or What To Do About Rogue - Shadow IT
Constituency Management or What To Do About Rogue - Shadow ITConstituency Management or What To Do About Rogue - Shadow IT
Constituency Management or What To Do About Rogue - Shadow ITCraig Bickel
 
Maximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, AffordablyMaximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, Affordably Intelligent Software Solutions
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesGrant Thornton LLP
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwareBMC Software
 

What's hot (19)

Are You in Touch with Your Innovative Side?
Are You in Touch with Your Innovative Side?Are You in Touch with Your Innovative Side?
Are You in Touch with Your Innovative Side?
 
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...
Hadoop World 2011: The State of Big Data Adoption in the Enterprise - Tony Ba...
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
 
Is your bank operating in the dark?
Is your bank operating in the dark? Is your bank operating in the dark?
Is your bank operating in the dark?
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
CloudAnalytics_RiskMgt
CloudAnalytics_RiskMgtCloudAnalytics_RiskMgt
CloudAnalytics_RiskMgt
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Correlation Between Modern Management Practices And IT Trends
Correlation Between Modern Management Practices And IT TrendsCorrelation Between Modern Management Practices And IT Trends
Correlation Between Modern Management Practices And IT Trends
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
Constituency Management or What To Do About Rogue - Shadow IT
Constituency Management or What To Do About Rogue - Shadow ITConstituency Management or What To Do About Rogue - Shadow IT
Constituency Management or What To Do About Rogue - Shadow IT
 
Maximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, AffordablyMaximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, Affordably
 
Adding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activitiesAdding internal audit value: Strategically leveraging compliance activities
Adding internal audit value: Strategically leveraging compliance activities
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
 

Viewers also liked

Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...cVidya Networks
 
Polycom Kirk 4080 user guide
Polycom Kirk 4080 user guidePolycom Kirk 4080 user guide
Polycom Kirk 4080 user guidebest4systems
 
Tesinas 2.5 copia
Tesinas 2.5   copiaTesinas 2.5   copia
Tesinas 2.5 copiaViku Tanghe
 
Meta-story and Franchise Alchemy
Meta-story and Franchise AlchemyMeta-story and Franchise Alchemy
Meta-story and Franchise Alchemy"Mowrer" Meta-story
 
Ujian percubaan upsr 2015 n9 - matematik kertas 2
Ujian percubaan upsr 2015   n9 - matematik kertas 2Ujian percubaan upsr 2015   n9 - matematik kertas 2
Ujian percubaan upsr 2015 n9 - matematik kertas 2Wan Fadh
 
Vad är agilt i ideelt - Fredrik Jonsson
Vad är agilt i ideelt - Fredrik JonssonVad är agilt i ideelt - Fredrik Jonsson
Vad är agilt i ideelt - Fredrik Jonssonmanssandstrom
 
блог для баркемпа
блог для баркемпаблог для баркемпа
блог для баркемпаVadimKh
 
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™ April ...
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™   April ...Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™   April ...
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™ April ...Knowledge Values
 
Rigid Plastic Packaging market 2014-2024
Rigid Plastic Packaging market 2014-2024Rigid Plastic Packaging market 2014-2024
Rigid Plastic Packaging market 2014-2024Visiongain
 
Bad Hair Day / 6 grade / 2010
Bad Hair Day  / 6 grade / 2010Bad Hair Day  / 6 grade / 2010
Bad Hair Day / 6 grade / 2010natalia w
 
The Top 10 Strange Scenic Regions In The World
The Top 10  Strange Scenic Regions In The WorldThe Top 10  Strange Scenic Regions In The World
The Top 10 Strange Scenic Regions In The WorldRain Wang
 

Viewers also liked (15)

Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
Smart Margin Analytics: Why Bolting on a Margin Assurance Capability to an Ex...
 
Bto teamflorens
Bto teamflorensBto teamflorens
Bto teamflorens
 
Polycom Kirk 4080 user guide
Polycom Kirk 4080 user guidePolycom Kirk 4080 user guide
Polycom Kirk 4080 user guide
 
Tesinas 2.5 copia
Tesinas 2.5   copiaTesinas 2.5   copia
Tesinas 2.5 copia
 
Piacere flod!
Piacere flod!Piacere flod!
Piacere flod!
 
Meta-story and Franchise Alchemy
Meta-story and Franchise AlchemyMeta-story and Franchise Alchemy
Meta-story and Franchise Alchemy
 
Ujian percubaan upsr 2015 n9 - matematik kertas 2
Ujian percubaan upsr 2015   n9 - matematik kertas 2Ujian percubaan upsr 2015   n9 - matematik kertas 2
Ujian percubaan upsr 2015 n9 - matematik kertas 2
 
Vad är agilt i ideelt - Fredrik Jonsson
Vad är agilt i ideelt - Fredrik JonssonVad är agilt i ideelt - Fredrik Jonsson
Vad är agilt i ideelt - Fredrik Jonsson
 
блог для баркемпа
блог для баркемпаблог для баркемпа
блог для баркемпа
 
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™ April ...
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™   April ...Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™   April ...
Geavanceerd Kennis Gebaseerd Werken Met Advanced Knowledge Services™ April ...
 
Rigid Plastic Packaging market 2014-2024
Rigid Plastic Packaging market 2014-2024Rigid Plastic Packaging market 2014-2024
Rigid Plastic Packaging market 2014-2024
 
Money
MoneyMoney
Money
 
Bad Hair Day / 6 grade / 2010
Bad Hair Day  / 6 grade / 2010Bad Hair Day  / 6 grade / 2010
Bad Hair Day / 6 grade / 2010
 
Llibret expo
Llibret expoLlibret expo
Llibret expo
 
The Top 10 Strange Scenic Regions In The World
The Top 10  Strange Scenic Regions In The WorldThe Top 10  Strange Scenic Regions In The World
The Top 10 Strange Scenic Regions In The World
 

Similar to Shift at work of Fraud Management

The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...cVidya Networks
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesPerficient, Inc.
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leoguiabusinessmedia
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptxMuhammad Khalid
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - finalDanijel Božić
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesHortonworks
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
The CFO in the Age of Digital Analytics
The CFO in the Age of Digital AnalyticsThe CFO in the Age of Digital Analytics
The CFO in the Age of Digital AnalyticsAnametrix
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)dansimms
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Creating a Mobile Strategy
Creating a Mobile StrategyCreating a Mobile Strategy
Creating a Mobile Strategydreamforce2006
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 

Similar to Shift at work of Fraud Management (20)

The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive Opportunities
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - final
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
The CFO in the Age of Digital Analytics
The CFO in the Age of Digital AnalyticsThe CFO in the Age of Digital Analytics
The CFO in the Age of Digital Analytics
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Using Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of FinanceUsing Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of Finance
 
Creating a Mobile Strategy
Creating a Mobile StrategyCreating a Mobile Strategy
Creating a Mobile Strategy
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
The IT archipelago
The IT archipelagoThe IT archipelago
The IT archipelago
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Shift at work of Fraud Management

  • 1. CFCA Annual Meeting & Summer Educational Event Royal York Hotel , Toronto, Canada Shift at Work: Changing Modus Operandi Your Success is Our Business Tal Eisner – Senior Director Product Strategy
  • 2. 2 Telecom Today Evolution of Fraud Management Crossroad and Opportunity Shift at Work Changing Modus Operandi Agenda
  • 3. From “Walled Garden” to “Dumb Pipe” Telecom Operators Evolution Network Content Device CustomerConnectivity
  • 4. 4 Operators’ Main Challenges (2013-2015) Source: Informa, March 2013
  • 5.  Almost secretive units within the operator  Low visibility within the organization  Low to non-existent involvement in internal, non-fraud procedures  Need to justify buying an FMS  Need to justify the existence of the unit  Lack of internal procedures and work methodology  Highly reactive modus operandi 5  Exist in most telcos  Most of the units have a vendor-based FMS or an internal-built one  Methodology has evolved and is now established  Unit is well recognized as an operative, “main stream” unit  Integral part of the internal workflow in product launches, sales operations, etc.  Focus is on saving as much money and preventing as much damage as possible
  • 6. 6 6
  • 7. 7  Telcos are going through a gradual change  Revenues changed due to changes in products & plans  A shift towards bundles  New flat tariff plans  All included plans  Unlimited Voice/SMS/Data
  • 8. 8 Change in Fraud Management  If traffic is unlimited … – No more “high usage” ? – No more “abnormal” traffic behavior ?  Change of fraud incentives ? – Why bother with fraud if it’s all so cheap and unlimited anyway?  Change of Fraud Management strategy ? – Who are we after ?
  • 9.  In order to stay relevant – Fraud units must re-assess their strategy and their work focus  Detecting more % of fraud – will not cut it any longer . . .  So does detecting fraud on new technologies – All this is “more of the same” – which is not enough any more  A real need for change has surfaced in order to stay relevant 9
  • 10. 10 If you don’t like what’s BEING said CHANGE the conversation
  • 11.  Expanding traditional work “borders” and responsibilities  Leveraging available databases for uses outside the fraud realm  Effective quick and prompt reactions to different needs of the organization  Strong analytical abilities  Shortening internal process to get quicker, better insights for the org. 11
  • 12. 12  Fraud units “sit” on an essential, insightful mountain of straw – that with the right approach can turn to valuable gold  Utilizing existing databases can generate strong positioning within the organization since no CAPEX needed  Increasing cross-department cooperation  Big Data Analytics  Turning a challenging time into an opportunity for growth 12
  • 13. Big Data Analytics 13  The need for immediate retrieval of info from a massive, cross- channel database  Significantly helps in areas such as: ─ LTE – where volumes of data are enormous ─ Security matters – Info needed “here and now” ─ Info sharing and intelligence gathering ─ Cyber security matters Exploring new grounds
  • 14.  Fraud units monitor routes of calls, destination countries; statistics are available to them  The percentage of fraud calls to a specific country means GOLD  This info is available SOLELY to the fraud management department  This should bring recommendations (close the route/change billing/rates etc.) and further cooperation with the relevant department 14
  • 15.  Detection of abusers/unfair users in unlimited/bundle plans  Presenting statistics and trends of unlimited plans with focus on abuse  Providing network recommendations as a result (e.g., automatic actions)  Establishing policy enforcement procedures 15
  • 16.  Provide high level statistics on risks, threats and fraud findings per LOB  M2M / Mobile Money/ LTE  Drill down capabilities  Present % of fraud per LOB to define actions accordingly  Assess future risks and threats and present them in figures according to current findings  Alert on high risk services on regular basis 16
  • 17. 17  Provide actionable insights into the business performance  Utilizing data from different sources (Risk, Fraud & RA)  Support specific LOB and needs (e.g., LTE, Mobile Money, M2M, Video)  Shift towards monetary terms and statistics rather than specific incidents and specific subscribers  A shift towards trends analysis  Expend cross company/department cooperation  Infuse risk factors to marketing strategy Changing Modus Operandi
  • 18. Bottom Line  Creating more value from Revenue Management operations  Find new growth engines outside traditional space  Reducing revenue related risks  Improving margins  Greater visibility of risks and mitigation  Enable advanced analytics for other uses than fraud  INCREASING BOTTOM LINE 18
  • 19. 19 A leading supplier of Revenue Analytics solutions to communications and digital service providers Founded: 2001 300 employees in 15 locations worldwide Deployed at 7 out of the 10 largest operators in the world 150 customers in 64 countries Globally processing 150 Billion xDRs per day, 55 Trillion xDRs per year Contributing over $12 Billion to providers annual revenue Partnering with world leading vendors What You Should Know ABOUT US