SlideShare a Scribd company logo
1 of 19
make connections • share ideas • be inspired
 India’s Largest Analytics Forum




Enterprise Fraud Management
B.Radha Krishna
Practice Manager, Risk & Fraud Management
SAS Institute India Pvt. Ltd




     Copyright © 2011, SAS Institute Inc. All rights reserved.
Agenda

                       Business Issues
                       Key Themes of Enterprise Fraud Management
                           • Customer Classification
                           • Detection Methodologies
                           • Investigation
                                      − Alert Management
                                      − Case Management




Copyright © 2011, SAS Institute Inc. All rights reserved.
Business Issues



            REGULATORY EMPHASIS
            INDUSTRY DRIVERS
            CUSTOMER ISSUES
            ANALYST VIEW




Copyright © 2011, SAS Institute Inc. All rights reserved.
Findings of Forensic Security – Guidelines for
prevention of frauds




Copyright © 2011, SAS Institute Inc. All rights reserved.
Working Report on Electronic Banking
 Fraud detection
 a) Detection of fraud
             Despite strong prevention controls aimed at fraud deterrence, fraudsters do manage to perpetrate frauds. In such
             cases, the earlier the fraud is detected, the better the chance of recovery of the losses and bringing the culprits to
             book. System triggers that throw up exceptional transactions, opening up channels that take note of
             customer/employee alerts/disputes, seeding/mystery shopping exercises and encouraging
             employees/customers/ well- wishers to report suspicious transactions/behaviours are some of the
             techniques that are used for detection of frauds. The exceptional/suspicious transactions/activities reported
             through these mechanisms should be investigated in detail.
 b) Transaction monitoring


             Banks should set up a transaction monitoring unit within the fraud risk management group. The transaction
             monitoring team should be responsible for monitoring various types of transactions, especially monitoring of
             potential fraud areas, by means of which, early alarms can be triggered. This unit needs to have the expertise to
             analyse transactions to detect fraud trends. This unit should work in conjunction with the data warehousing
             and analytics team within banks for data extraction, filtering, and sanitisation for transaction analysis for
             determining fraud trends. Banks should put in place automated systems for detection of frauds based on
             advanced statistical algorithms and fraud detection techniques.
 c) Alert generation and redressal mechanisms
             Appropriate mechanisms need to be established in banks, to take note of the disputes/exceptions or suspicions
             highlighted by various stakeholders including transaction monitoring teams in banks and to investigate them
             thoroughly. Banks should have a well publicised whistle blowing mechanism.
                                                                                                      Source : RBI Website
                                                                                                      Chapter 6 : Cyber Fraud
                                                                                                Working Report on Electronic Banking



Copyright © 2011, SAS Institute Inc. All rights reserved.
Financial Crimes in 21st century

  Criminals                                                 Financial Institutions
                          Sophisticated methods                Prevention siloed by line of
                                                               business
                          Dynamic attacks
                                                               Detection is product or
                          Hit multiple channels &
                                                               channel-specific
                          products
                          simultaneously                       Separate investigation teams
                          Engage insiders                      Act on account or customer
                          Networked via web                    Rules and models have high
                                                               false-positive rates
                          Attack from remote
                          jurisdictions                        Changing payments
                                                               landscape: SVC, ACH, Wire,
                          Exploit unwitting                    Mobile
                          customers




Copyright © 2011, SAS Institute Inc. All rights reserved.
Top Business Drivers, Strategies, and
Technology for Fraud and Financial Crimes
Management (2011)- Tower Group
Business Drivers in Financial Crimes Management
Underground fraud                                           Employee fraud           Data breaches/          New delivery channels New sourcing
economy is organized,                                       spurred by               “Wikileaks” raising     open new routes to    strategies expand
sophisticated, efficient                                    underground market       marketplace and         fraud                 supply chain risk
                                                                                     executive fears
New technology (cloud,                                      Anticipated regulatory   New hires and role      Technology upgrades Social networks
grid, virtual) brings new                                   changes necessitate      changes expose new      pushed off for too long expand avenues for
risks computing                                             tech. upgrades           vulnerabilities         must be addressed       fraudsters

FSIs’ Strategic Responses to Reduce Fraud Risks
Manage risk holistically,                                   Manage fraud,           Improve data             Leverage fraud         Merge AML and fraud
including fraud risk                                        security, compliance in governance               information for new    strategy, technology,
                                                            coordinated fashion                              business opportunities and processes
Standardize security and                                    Adopt enterprise fraud Manage valuation,         Use risk-based not        Upgrade technology
business process with                                       management with        liquidity, counterparty   standardized              to comply with new
supply chain                                                LOB responsibility     risk with eye to fraud    approach to fraud         regulations

Important Technology Trends in Financial Crimes Management
Layered security and new Converging risk,                                            Develop cloud security Adaptive analytics         Enterprise case tool
authentication approaches security, and fraud                                        strategy and vendor                               with governance, risk
for regulatory compliance platforms                                                  short-list                                        mgmt. emphasis
Proactive scanning for new Cross-channel                                             Adaptive life-cycle     Visualization tools for   Compliance module
patterns in real- time, risk- profiling, security, and                               monitoring and          root cause and early      enrichment (red flags,
based mode                    event coordination                                     adjustments             warning                   SARs, etc.)
Source: TowerGroup


Copyright © 2011, SAS Institute Inc. All rights reserved.
Top 10 Fraud Types
        Automated clearing house (ACH) and wire transfer fraud
        Attacks on Institution Networks
        ATM Skimming
        Credit Account ‘Bust-Outs’
        Variations on Phishing Schemes
        Increasing Check Fraud
        Internal Fraud
        Mobile Phone Scams
        Online Application Fraud
        Prepaid Cards


Source: Chartis Research


 Copyright © 2011, SAS Institute Inc. All rights reserved.
Enterprise Fraud Management
            Key Themes



            CUSTOMER CLASSIFICATION
            DETECTION METHODOLOGIES
            INVESTIGATION
               ALERT MANAGEMENT
               CASE MANAGEMENT



Copyright © 2011, SAS Institute Inc. All rights reserved.
Enterprise Financial Crimes
Breadth of disciplines as defined by the market
   Anti-money Laundering
             Compliance




                                                            Fraud




                                                                                     Brokerage
                           Activity Monitoring                      Cards                        Broker
                           Sanctions Blocking                       Deposit                      Surveillance
                           Know Your                                Payments                     Trade
                           Customer/Customer                                                     Surveillance
                                                                    Remote Banking
                           Due Diligence
                                                                    Internal
                                                                    Loans
                                                                    Rings




                              Enterprise Investigations Management (Case Management)




Copyright © 2011, SAS Institute Inc. All rights reserved.
Customer Risk Classification

                   High/Medium/Low                               Account              Score               Classify
                                                                 Opening             Weighted
                   Risk Classifications                        Questionnaire        Responses              H/M/L


                   Transactional and
                   list-based classifiers                        Parties            Products            Services

                   on monthly basis.                        • PEPs, NGOs,
                                                              MSBs
                                                                                • Correspondent
                                                                                  Banking
                                                                                                    • Wires
                                                                                                    • On-line
                                                            • Cash Intensive,   • Private Banking     Banking
                   Periodic review and                        etc.

                   suggestion of new
                   Risk Classification
                   for the customer                          Lists                  Behavior                H/M/L
                   during Assessment
                   process.



Copyright © 2011, SAS Institute Inc. All rights reserved.
Detection Methodologies
                                         Using a Hybrid Approach for Fraud Detection
     Enterprise Data                                   Suitable for known    Suitable for unknown     Suitable for complex    Suitable for associative
                                                            patterns                patterns                patterns               link patterns

                                                            Rules                Anomaly             Predictive Models         Social Network
Customer                  Account                                                Detection                                       Analysis
                                                  Rules to filter           Detect individual and    Predictive assessment    Knowledge discovery
                                                  fraudulent transactions   aggregated abnormal      against known fraud      through associative
    Trans-                  Appli-
                                                  and behaviors             patterns                 cases                    link analysis
    action                 cations
                                                  Examples:                 Example:                 Example:                 Example:

                          Internal                • Mort. payments from     • ACH transactions on    • Like credit / debit    • Association to known
Employee                                            different accounts        account exceed norm      transaction patterns     fraud
                         Bad Lists
                                                  • Check serial # out of   • # unsecured loans on   • Like account opening   • Identity manipulation
                                                    range                     network exceed norm      & closure patterns
                                                                                                                              • Transactions to
  3rd Party                 Call
   Flags                   Center                 • Card order follows      • Check velocity         • Like network growth      suspicious
                            Logs                    address change            exceeds norm             rate (velocity)          counterparties
                                                  • New ACH payee



                                                                                        Hybrid Approach
                                                             combination of all 4 approaches at account, customer, and network levels




Copyright © 2011, SAS Institute Inc. All rights reserved.
Risk Ranking Alerts


                                                                                    History
                                                                       Risk                            Score
                                                                       Factor

                                                            Scenario



                                                                                                                                       Alerts
                Application + Activities
                  Scoring Duration = length of time that one alert should be considered when scoring a possible future alert



                       Execution Probability Rate                                 Risk Ranking                         Bayes Weight

                 •The     number    of   distinct                        •Ranks alerts based on the            •The percentage of scenario
                  entities to match a scenario or                         scenario(s) that are matched,         suspects that would engage
                  risk factor during the scoring                          any risk factors that apply to        in the behaviour. The most
                  duration divided by the total                           the same entity, as well as           common scenario schemes
                  number of entities of the                               any scenarios and risk factors        should be assigned a value of
                  appropriate subject                                     matched within the scoring            10, and rare schemes should
                                                                          duration.                             be assigned a value of 1.




Copyright © 2011, SAS Institute Inc. All rights reserved.
Scenarios and Risk Factors in Practice



 Customers
  Accounts
Transactions
                                                             Filtering

                                                                                                        Alert with low risk score
 Customers                                                                                              Alert with medium risk score
  Accounts                                                                                              Possible alert
Transactions
                                                                                                        Alert with high risk score


 Customers
  Accounts
Transactions                                                             = scenario/ risk factor hits




 Copyright © 2011, SAS Institute Inc. All rights reserved.
Effective Fraud Management Program
Key Drivers
                       Data Quality
                       Integrated view of relationship
                       Hybrid Detection techniques
                       Case Management




Copyright © 2011, SAS Institute Inc. All rights reserved.
SAS Enterprise Financial Crimes Platform
Integrated Analytics & Case Investigation – Our Competitive Differentiators

        Product
                                                                                                   Enterprise
                                                     SAS Fraud         SAS Fraud     Anti-Money
                                                                                                     Case
                                                    Management         Framework     Laundering
                                                                                                  Management


          Target
                                                                        Banking                     Banking
       Industry
                                                                                      Banking
                                                                       Government                 Government


                                                             Banking    Insurance                  Insurance


                                                                       Health Care                Health Care
                                                                                     Insurance
                                                                          Telco                      Other




 Copyright © 2011, SAS Institute Inc. All rights reserved.
SAS Enterprise Financial Crimes Framework
Insurance
                                                                  Agent, Call Center Company



                                    Open                                                            Update     Close
                                                                       Manage
                                    Claim                                                            Claim     Claim




                                                                              Simple Case
                                                                      Call Center, Company

                                                                               Or SIU
                                                                                               Complex Case
                                                            SAS Fraud Framework

                                                               Data Management
                                                                                                              SIU
                                                                   Modeling

                                                                   Detection

                                                             Alert & Case Initiation

                                                                 Investigation




Copyright © 2011, SAS Institute Inc. All rights reserved.
Q&A




Copyright © 2011, SAS Institute Inc. All rights reserved.
make connections • share ideas • be inspired
India’s Largest Analytics Forum




Thank You
B.Radha Krishna
radhakrishna.b@sas.com




     Copyright © 2010, SAS Institute Inc. All rights reserved.

More Related Content

What's hot

Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response TriageAlbert Hui
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxAzra'ee Mamat
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation SlidesHow To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation SlidesSlideTeam
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services accenture
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterTuan Phan
 

What's hot (20)

Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation SlidesHow To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Finance Analytics
Finance AnalyticsFinance Analytics
Finance Analytics
 

Viewers also liked

SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurancestuartdrose
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Institute India Pvt. Ltd
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 
Presentatie achmea ggz ss
Presentatie achmea ggz ssPresentatie achmea ggz ss
Presentatie achmea ggz ssZilveren Kruis
 
Location Intelligence en waterschade preventie, Achmea
Location Intelligence en waterschade preventie, AchmeaLocation Intelligence en waterschade preventie, Achmea
Location Intelligence en waterschade preventie, AchmeaEsriGISConferentie
 
Cybersource ecommerce summit
Cybersource ecommerce summitCybersource ecommerce summit
Cybersource ecommerce summitEcommerce Summit
 
Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamPaul Denhup
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactionsvincentg64
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesRasmus Petersen
 

Viewers also liked (20)

SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurance
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
Presentatie achmea ggz ss
Presentatie achmea ggz ssPresentatie achmea ggz ss
Presentatie achmea ggz ss
 
Location Intelligence en waterschade preventie, Achmea
Location Intelligence en waterschade preventie, AchmeaLocation Intelligence en waterschade preventie, Achmea
Location Intelligence en waterschade preventie, Achmea
 
Cybersource ecommerce summit
Cybersource ecommerce summitCybersource ecommerce summit
Cybersource ecommerce summit
 
Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_Spam
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactions
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniques
 

Similar to Fraud Management Solutions

Transactional Fraud Detection A Modular Approach
Transactional Fraud Detection   A Modular ApproachTransactional Fraud Detection   A Modular Approach
Transactional Fraud Detection A Modular ApproachNoreen Buckley
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012cVidya Networks
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Aml Oracle Data Sheet
Aml Oracle Data SheetAml Oracle Data Sheet
Aml Oracle Data Sheetclaudiablest
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
Fraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxFraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxdhaval3100013
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Industry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied ScienceIndustry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied ScienceSven Von Dem Knesebeck
 
2012 10 bsg uk aml kyc briefing version 1
2012 10 bsg uk aml kyc briefing version 12012 10 bsg uk aml kyc briefing version 1
2012 10 bsg uk aml kyc briefing version 1BSG (UK)
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?cVidya Networks
 
Where Do We Go From Here?
Where Do We Go From Here?Where Do We Go From Here?
Where Do We Go From Here?cVidya Networks
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 

Similar to Fraud Management Solutions (20)

טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Transactional Fraud Detection A Modular Approach
Transactional Fraud Detection   A Modular ApproachTransactional Fraud Detection   A Modular Approach
Transactional Fraud Detection A Modular Approach
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Aml Oracle Data Sheet
Aml Oracle Data SheetAml Oracle Data Sheet
Aml Oracle Data Sheet
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Fraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxFraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptx
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Industry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied ScienceIndustry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied Science
 
2012 10 bsg uk aml kyc briefing version 1
2012 10 bsg uk aml kyc briefing version 12012 10 bsg uk aml kyc briefing version 1
2012 10 bsg uk aml kyc briefing version 1
 
Riskpro aml services
Riskpro aml servicesRiskpro aml services
Riskpro aml services
 
Riskpro Aml Services
Riskpro Aml ServicesRiskpro Aml Services
Riskpro Aml Services
 
Riskpro Aml Services
Riskpro Aml ServicesRiskpro Aml Services
Riskpro Aml Services
 
Riskpro Aml Services
Riskpro Aml ServicesRiskpro Aml Services
Riskpro Aml Services
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
 
Where Do We Go From Here?
Where Do We Go From Here?Where Do We Go From Here?
Where Do We Go From Here?
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 

More from SAS Institute India Pvt. Ltd

Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...SAS Institute India Pvt. Ltd
 
Learnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementationsLearnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementationsSAS Institute India Pvt. Ltd
 
High Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is HereHigh Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is HereSAS Institute India Pvt. Ltd
 
Maximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceMaximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceSAS Institute India Pvt. Ltd
 
Data Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for GovernmentData Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for GovernmentSAS Institute India Pvt. Ltd
 
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...SAS Institute India Pvt. Ltd
 
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...SAS Institute India Pvt. Ltd
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumSAS Institute India Pvt. Ltd
 
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...SAS Institute India Pvt. Ltd
 

More from SAS Institute India Pvt. Ltd (20)

Artificial Intelligence The SAS Perspective
Artificial Intelligence The SAS PerspectiveArtificial Intelligence The SAS Perspective
Artificial Intelligence The SAS Perspective
 
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
Incidents, Indicators, Insights – the emergence of the Security Analytics Pla...
 
Data driven-business
Data driven-businessData driven-business
Data driven-business
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
Business Analytics: A Strategic Imperative
Business Analytics: A Strategic ImperativeBusiness Analytics: A Strategic Imperative
Business Analytics: A Strategic Imperative
 
Asset Liability Management
Asset Liability ManagementAsset Liability Management
Asset Liability Management
 
Big Digital Marketing
Big Digital MarketingBig Digital Marketing
Big Digital Marketing
 
Learnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementationsLearnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementations
 
High performance organisation
High performance organisationHigh performance organisation
High performance organisation
 
Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data
 
Impact of emerging technologies in Business
Impact of emerging technologies in BusinessImpact of emerging technologies in Business
Impact of emerging technologies in Business
 
The Road to an Analytical Enterprise
The Road to an Analytical EnterpriseThe Road to an Analytical Enterprise
The Road to an Analytical Enterprise
 
High Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is HereHigh Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is Here
 
Maximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceMaximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax Compliance
 
Data Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for GovernmentData Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for Government
 
SAS Visual Analytics Overview
SAS Visual Analytics OverviewSAS Visual Analytics Overview
SAS Visual Analytics Overview
 
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
 
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data Consortium
 
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Fraud Management Solutions

  • 1. make connections • share ideas • be inspired India’s Largest Analytics Forum Enterprise Fraud Management B.Radha Krishna Practice Manager, Risk & Fraud Management SAS Institute India Pvt. Ltd Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 2. Agenda Business Issues Key Themes of Enterprise Fraud Management • Customer Classification • Detection Methodologies • Investigation − Alert Management − Case Management Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 3. Business Issues REGULATORY EMPHASIS INDUSTRY DRIVERS CUSTOMER ISSUES ANALYST VIEW Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 4. Findings of Forensic Security – Guidelines for prevention of frauds Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 5. Working Report on Electronic Banking Fraud detection a) Detection of fraud Despite strong prevention controls aimed at fraud deterrence, fraudsters do manage to perpetrate frauds. In such cases, the earlier the fraud is detected, the better the chance of recovery of the losses and bringing the culprits to book. System triggers that throw up exceptional transactions, opening up channels that take note of customer/employee alerts/disputes, seeding/mystery shopping exercises and encouraging employees/customers/ well- wishers to report suspicious transactions/behaviours are some of the techniques that are used for detection of frauds. The exceptional/suspicious transactions/activities reported through these mechanisms should be investigated in detail. b) Transaction monitoring Banks should set up a transaction monitoring unit within the fraud risk management group. The transaction monitoring team should be responsible for monitoring various types of transactions, especially monitoring of potential fraud areas, by means of which, early alarms can be triggered. This unit needs to have the expertise to analyse transactions to detect fraud trends. This unit should work in conjunction with the data warehousing and analytics team within banks for data extraction, filtering, and sanitisation for transaction analysis for determining fraud trends. Banks should put in place automated systems for detection of frauds based on advanced statistical algorithms and fraud detection techniques. c) Alert generation and redressal mechanisms Appropriate mechanisms need to be established in banks, to take note of the disputes/exceptions or suspicions highlighted by various stakeholders including transaction monitoring teams in banks and to investigate them thoroughly. Banks should have a well publicised whistle blowing mechanism. Source : RBI Website Chapter 6 : Cyber Fraud Working Report on Electronic Banking Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 6. Financial Crimes in 21st century Criminals Financial Institutions Sophisticated methods Prevention siloed by line of business Dynamic attacks Detection is product or Hit multiple channels & channel-specific products simultaneously Separate investigation teams Engage insiders Act on account or customer Networked via web Rules and models have high false-positive rates Attack from remote jurisdictions Changing payments landscape: SVC, ACH, Wire, Exploit unwitting Mobile customers Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 7. Top Business Drivers, Strategies, and Technology for Fraud and Financial Crimes Management (2011)- Tower Group Business Drivers in Financial Crimes Management Underground fraud Employee fraud Data breaches/ New delivery channels New sourcing economy is organized, spurred by “Wikileaks” raising open new routes to strategies expand sophisticated, efficient underground market marketplace and fraud supply chain risk executive fears New technology (cloud, Anticipated regulatory New hires and role Technology upgrades Social networks grid, virtual) brings new changes necessitate changes expose new pushed off for too long expand avenues for risks computing tech. upgrades vulnerabilities must be addressed fraudsters FSIs’ Strategic Responses to Reduce Fraud Risks Manage risk holistically, Manage fraud, Improve data Leverage fraud Merge AML and fraud including fraud risk security, compliance in governance information for new strategy, technology, coordinated fashion business opportunities and processes Standardize security and Adopt enterprise fraud Manage valuation, Use risk-based not Upgrade technology business process with management with liquidity, counterparty standardized to comply with new supply chain LOB responsibility risk with eye to fraud approach to fraud regulations Important Technology Trends in Financial Crimes Management Layered security and new Converging risk, Develop cloud security Adaptive analytics Enterprise case tool authentication approaches security, and fraud strategy and vendor with governance, risk for regulatory compliance platforms short-list mgmt. emphasis Proactive scanning for new Cross-channel Adaptive life-cycle Visualization tools for Compliance module patterns in real- time, risk- profiling, security, and monitoring and root cause and early enrichment (red flags, based mode event coordination adjustments warning SARs, etc.) Source: TowerGroup Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 8. Top 10 Fraud Types Automated clearing house (ACH) and wire transfer fraud Attacks on Institution Networks ATM Skimming Credit Account ‘Bust-Outs’ Variations on Phishing Schemes Increasing Check Fraud Internal Fraud Mobile Phone Scams Online Application Fraud Prepaid Cards Source: Chartis Research Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 9. Enterprise Fraud Management Key Themes CUSTOMER CLASSIFICATION DETECTION METHODOLOGIES INVESTIGATION ALERT MANAGEMENT CASE MANAGEMENT Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 10. Enterprise Financial Crimes Breadth of disciplines as defined by the market Anti-money Laundering Compliance Fraud Brokerage Activity Monitoring Cards Broker Sanctions Blocking Deposit Surveillance Know Your Payments Trade Customer/Customer Surveillance Remote Banking Due Diligence Internal Loans Rings Enterprise Investigations Management (Case Management) Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 11. Customer Risk Classification High/Medium/Low Account Score Classify Opening Weighted Risk Classifications Questionnaire Responses H/M/L Transactional and list-based classifiers Parties Products Services on monthly basis. • PEPs, NGOs, MSBs • Correspondent Banking • Wires • On-line • Cash Intensive, • Private Banking Banking Periodic review and etc. suggestion of new Risk Classification for the customer Lists Behavior H/M/L during Assessment process. Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 12. Detection Methodologies Using a Hybrid Approach for Fraud Detection Enterprise Data Suitable for known Suitable for unknown Suitable for complex Suitable for associative patterns patterns patterns link patterns Rules Anomaly Predictive Models Social Network Customer Account Detection Analysis Rules to filter Detect individual and Predictive assessment Knowledge discovery fraudulent transactions aggregated abnormal against known fraud through associative Trans- Appli- and behaviors patterns cases link analysis action cations Examples: Example: Example: Example: Internal • Mort. payments from • ACH transactions on • Like credit / debit • Association to known Employee different accounts account exceed norm transaction patterns fraud Bad Lists • Check serial # out of • # unsecured loans on • Like account opening • Identity manipulation range network exceed norm & closure patterns • Transactions to 3rd Party Call Flags Center • Card order follows • Check velocity • Like network growth suspicious Logs address change exceeds norm rate (velocity) counterparties • New ACH payee Hybrid Approach combination of all 4 approaches at account, customer, and network levels Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 13. Risk Ranking Alerts History Risk Score Factor Scenario Alerts Application + Activities Scoring Duration = length of time that one alert should be considered when scoring a possible future alert Execution Probability Rate Risk Ranking Bayes Weight •The number of distinct •Ranks alerts based on the •The percentage of scenario entities to match a scenario or scenario(s) that are matched, suspects that would engage risk factor during the scoring any risk factors that apply to in the behaviour. The most duration divided by the total the same entity, as well as common scenario schemes number of entities of the any scenarios and risk factors should be assigned a value of appropriate subject matched within the scoring 10, and rare schemes should duration. be assigned a value of 1. Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 14. Scenarios and Risk Factors in Practice Customers Accounts Transactions Filtering Alert with low risk score Customers Alert with medium risk score Accounts Possible alert Transactions Alert with high risk score Customers Accounts Transactions = scenario/ risk factor hits Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 15. Effective Fraud Management Program Key Drivers Data Quality Integrated view of relationship Hybrid Detection techniques Case Management Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 16. SAS Enterprise Financial Crimes Platform Integrated Analytics & Case Investigation – Our Competitive Differentiators Product Enterprise SAS Fraud SAS Fraud Anti-Money Case Management Framework Laundering Management Target Banking Banking Industry Banking Government Government Banking Insurance Insurance Health Care Health Care Insurance Telco Other Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 17. SAS Enterprise Financial Crimes Framework Insurance Agent, Call Center Company Open Update Close Manage Claim Claim Claim Simple Case Call Center, Company Or SIU Complex Case SAS Fraud Framework Data Management SIU Modeling Detection Alert & Case Initiation Investigation Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 18. Q&A Copyright © 2011, SAS Institute Inc. All rights reserved.
  • 19. make connections • share ideas • be inspired India’s Largest Analytics Forum Thank You B.Radha Krishna radhakrishna.b@sas.com Copyright © 2010, SAS Institute Inc. All rights reserved.