SlideShare a Scribd company logo
1 of 40
Download to read offline
Breaking the Real
Time Fraud Barrier
Namit Mahuvakar - Kafka Summit 2024
$whoami
Namit Mahuvakar
Senior Engineer (Data)
Klarna Bank AB
Payment Ecosystem
● Innovative Payment Solutions
○ Pay in 4
○ Pay later
○ Financing
○ Direct Payments and Flexibilities
● Banking infrastructure
Customer Centric Approach
● Payment Ecosystems
○ Flexibility, Freedom and Trust
● Critical role of Data Integrity
● Real time processing
○ Data curation
○ Seamless Customer Experience
Content
01 Frauds in Fintech
Need for real time ?
02 Scenario 1
03 Scenario 2
Promotional Abuse
04 Real Time Platform
Challenges
05 Future of Fraud
06 Conclusion
Synthetic Identity theft
Frauds ?
● Sophisticated Scams
○ Identity thefts, unauthorized
purchases
● Payment Fraud
○ Unauthorized card usage
● Account Takeovers (ATOs)
Navigating Fraud
● Identification
○ Manual Labelling
○ Anomaly detection
○ Digital footprint analysis
● Prevention
○ Access control
○ Data Encryption and Secure
Communication
Navigating Fraud
● Prediction
○ Risk
○ Behavioral Biometrics
● Identification, Prevention, and
Predictive strategies ensures a
robust defense mechanism
Scenario #1 -
Synthetic
Identity Theft
What ? How ?
● Combination of real and fake
information
● Prolonged Fraud Lifecycle
○ Not straightforward Identity theft
○ Might build creditworthiness
● Detection Challenges
○ Hybrid nature
○ Fraud Indicators
What's a Variable ?
● Data points for a genre of data
○ Real time
○ Batched
● To solve our current problem
○ Let us take `incoming_debt` as an
example
● Kafka being the backbone for the
orchestration and creation using
streams
Incoming Debt ?
● Ideal behaviour for a user
● Detect Fraud while it's happening
● Behavior of a fraudulent account ?
○ Maybe initial credibility
○ Bursts of purchase behaviour
○ No payments or settlements
○ Lots of minimal or exorbitant
transactions ?
Prevent and Detect
● Understand order/transaction
behaviours
● Anomaly detection
● Market agnostic
○ Underrated
● Movement in User Incoming debt
for a window
Scenario #2 -
Promotional
Abuse
What ? How ?
● Promotions are a double edged sword
● Exploits offers
○ Bots or Individuals
○ Undermine marketing efforts and
customer experiences
● Unchecked Exploitation
○ Losses
○ Customer trust ?
We need some Real timeness
● First line of defense
● Track multiple events
○ Promotional campaigns
○ Transactions
○ Clickstream
○ Account Activities
A Potential Platform ?
● Immediate results
● Identify suspicious activity ?
○ Velocity Variables
■ IP, Login state, ISP, etc
○ Behaviour Variables
■ Transaction Amount
■ Ordering ?
Mitigation of Promotion Abuse
● Analysis of curated and understood
variables
○ Code redemptions per IP
○ Rapid creations of new accounts
○ Intersecting Account details
● ML models to be trained on new
variables and dimensions
○ Refine and improve
Future of Fraud ?
● Requirements
○ Automated alerts
○ Variable creation
○ Swift and Scalable responses
across the customer base
○ Anomaly/Pattern Detection
○ Market Agnostic
■ EU, AP, US, CA . . .
Vision for Real Timeness
● Broader Approach
● Extendable
○ Maybe a user curated approach
○ Reuse concepts to create better
risk variables
○ Risk based on
■ Merchants
■ Users
■ Payment Behaviour
○ Analytics
Reduce: Risk,
Cost
Improve: Customer
Experience
Challenges
● Engineering meets Analytics
● Multi Region, more markets and data
sources
● Data consistency (Upstream)
● Discovery and curation of market
agnostic logics and data freshness
● Calculation of historic values for
models (Hybrid maybe ?)
● Real Time Processing
○ Not only in detection of Fraud
○ Improving customer experience
● Potential in Viewing and Experimenting
with new Data Sets
● Reduction of cost
● Faster Reaction time
● Increase Security and Reliability of the
organization
Conclusion
Thank you.

More Related Content

Similar to Evolving a Real-time Fraud Barrier with Kafka

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
DataScienceConferenc1
 

Similar to Evolving a Real-time Fraud Barrier with Kafka (20)

WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2
 
Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
 
Trends and practical applications of AI/ML in Fin Tech industry - Milos Kosan...
Trends and practical applications of AI/ML in Fin Tech industry - Milos Kosan...Trends and practical applications of AI/ML in Fin Tech industry - Milos Kosan...
Trends and practical applications of AI/ML in Fin Tech industry - Milos Kosan...
 
Faster Payments on the Blockchain
Faster Payments on the BlockchainFaster Payments on the Blockchain
Faster Payments on the Blockchain
 
Artificial Intelligence in Finance
Artificial Intelligence in FinanceArtificial Intelligence in Finance
Artificial Intelligence in Finance
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
PSD2 & Open Banking
PSD2 & Open BankingPSD2 & Open Banking
PSD2 & Open Banking
 
[APIdays Singapore 2019] Implementing a Successful Open Banking Architecture
[APIdays Singapore 2019] Implementing a Successful Open Banking Architecture[APIdays Singapore 2019] Implementing a Successful Open Banking Architecture
[APIdays Singapore 2019] Implementing a Successful Open Banking Architecture
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Trends in Mobile FinTech
Trends in Mobile FinTechTrends in Mobile FinTech
Trends in Mobile FinTech
 
Trading Online – Getting started and how to grow your business
Trading Online – Getting started and how to grow your businessTrading Online – Getting started and how to grow your business
Trading Online – Getting started and how to grow your business
 
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
 
AI, Bitcoin, and the Future of Mortgage Webinar
AI, Bitcoin, and the Future of Mortgage WebinarAI, Bitcoin, and the Future of Mortgage Webinar
AI, Bitcoin, and the Future of Mortgage Webinar
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About Crypto
 
Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments Fraud
 
Fraud detection in klarna
Fraud detection in klarnaFraud detection in klarna
Fraud detection in klarna
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
Webinar 3 - Transaction Monitoring: Manual Strategies Don't Scale
Webinar 3 - Transaction Monitoring: Manual Strategies Don't ScaleWebinar 3 - Transaction Monitoring: Manual Strategies Don't Scale
Webinar 3 - Transaction Monitoring: Manual Strategies Don't Scale
 

More from HostedbyConfluent

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
 
Evolution of NRT Data Ingestion Pipeline at Trendyol
Evolution of NRT Data Ingestion Pipeline at TrendyolEvolution of NRT Data Ingestion Pipeline at Trendyol
Evolution of NRT Data Ingestion Pipeline at Trendyol
HostedbyConfluent
 

More from HostedbyConfluent (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Renaming a Kafka Topic | Kafka Summit London
Renaming a Kafka Topic | Kafka Summit LondonRenaming a Kafka Topic | Kafka Summit London
Renaming a Kafka Topic | Kafka Summit London
 
Evolution of NRT Data Ingestion Pipeline at Trendyol
Evolution of NRT Data Ingestion Pipeline at TrendyolEvolution of NRT Data Ingestion Pipeline at Trendyol
Evolution of NRT Data Ingestion Pipeline at Trendyol
 
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
Ensuring Kafka Service Resilience: A Dive into Health-Checking TechniquesEnsuring Kafka Service Resilience: A Dive into Health-Checking Techniques
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
 
Exactly-once Stream Processing with Arroyo and Kafka
Exactly-once Stream Processing with Arroyo and KafkaExactly-once Stream Processing with Arroyo and Kafka
Exactly-once Stream Processing with Arroyo and Kafka
 
Fish Plays Pokemon | Kafka Summit London
Fish Plays Pokemon | Kafka Summit LondonFish Plays Pokemon | Kafka Summit London
Fish Plays Pokemon | Kafka Summit London
 
Tiered Storage 101 | Kafla Summit London
Tiered Storage 101 | Kafla Summit LondonTiered Storage 101 | Kafla Summit London
Tiered Storage 101 | Kafla Summit London
 
Building a Self-Service Stream Processing Portal: How And Why
Building a Self-Service Stream Processing Portal: How And WhyBuilding a Self-Service Stream Processing Portal: How And Why
Building a Self-Service Stream Processing Portal: How And Why
 
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
 
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
 
Navigating Private Network Connectivity Options for Kafka Clusters
Navigating Private Network Connectivity Options for Kafka ClustersNavigating Private Network Connectivity Options for Kafka Clusters
Navigating Private Network Connectivity Options for Kafka Clusters
 
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
Apache Flink: Building a Company-wide Self-service Streaming Data PlatformApache Flink: Building a Company-wide Self-service Streaming Data Platform
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
 
Explaining How Real-Time GenAI Works in a Noisy Pub
Explaining How Real-Time GenAI Works in a Noisy PubExplaining How Real-Time GenAI Works in a Noisy Pub
Explaining How Real-Time GenAI Works in a Noisy Pub
 
TL;DR Kafka Metrics | Kafka Summit London
TL;DR Kafka Metrics | Kafka Summit LondonTL;DR Kafka Metrics | Kafka Summit London
TL;DR Kafka Metrics | Kafka Summit London
 
A Window Into Your Kafka Streams Tasks | KSL
A Window Into Your Kafka Streams Tasks | KSLA Window Into Your Kafka Streams Tasks | KSL
A Window Into Your Kafka Streams Tasks | KSL
 
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
Mastering Kafka Producer Configs: A Guide to Optimizing PerformanceMastering Kafka Producer Configs: A Guide to Optimizing Performance
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
 
Data Contracts Management: Schema Registry and Beyond
Data Contracts Management: Schema Registry and BeyondData Contracts Management: Schema Registry and Beyond
Data Contracts Management: Schema Registry and Beyond
 
Code-First Approach: Crafting Efficient Flink Apps
Code-First Approach: Crafting Efficient Flink AppsCode-First Approach: Crafting Efficient Flink Apps
Code-First Approach: Crafting Efficient Flink Apps
 
Debezium vs. the World: An Overview of the CDC Ecosystem
Debezium vs. the World: An Overview of the CDC EcosystemDebezium vs. the World: An Overview of the CDC Ecosystem
Debezium vs. the World: An Overview of the CDC Ecosystem
 
Beyond Tiered Storage: Serverless Kafka with No Local Disks
Beyond Tiered Storage: Serverless Kafka with No Local DisksBeyond Tiered Storage: Serverless Kafka with No Local Disks
Beyond Tiered Storage: Serverless Kafka with No Local Disks
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 

Evolving a Real-time Fraud Barrier with Kafka

  • 1. Breaking the Real Time Fraud Barrier Namit Mahuvakar - Kafka Summit 2024
  • 3.
  • 4.
  • 5. Payment Ecosystem ● Innovative Payment Solutions ○ Pay in 4 ○ Pay later ○ Financing ○ Direct Payments and Flexibilities ● Banking infrastructure
  • 6. Customer Centric Approach ● Payment Ecosystems ○ Flexibility, Freedom and Trust ● Critical role of Data Integrity ● Real time processing ○ Data curation ○ Seamless Customer Experience
  • 7. Content 01 Frauds in Fintech Need for real time ? 02 Scenario 1 03 Scenario 2 Promotional Abuse 04 Real Time Platform Challenges 05 Future of Fraud 06 Conclusion Synthetic Identity theft
  • 8. Frauds ? ● Sophisticated Scams ○ Identity thefts, unauthorized purchases ● Payment Fraud ○ Unauthorized card usage ● Account Takeovers (ATOs)
  • 9.
  • 10. Navigating Fraud ● Identification ○ Manual Labelling ○ Anomaly detection ○ Digital footprint analysis ● Prevention ○ Access control ○ Data Encryption and Secure Communication
  • 11. Navigating Fraud ● Prediction ○ Risk ○ Behavioral Biometrics ● Identification, Prevention, and Predictive strategies ensures a robust defense mechanism
  • 12.
  • 14. What ? How ? ● Combination of real and fake information ● Prolonged Fraud Lifecycle ○ Not straightforward Identity theft ○ Might build creditworthiness ● Detection Challenges ○ Hybrid nature ○ Fraud Indicators
  • 15. What's a Variable ? ● Data points for a genre of data ○ Real time ○ Batched ● To solve our current problem ○ Let us take `incoming_debt` as an example ● Kafka being the backbone for the orchestration and creation using streams
  • 16. Incoming Debt ? ● Ideal behaviour for a user ● Detect Fraud while it's happening ● Behavior of a fraudulent account ? ○ Maybe initial credibility ○ Bursts of purchase behaviour ○ No payments or settlements ○ Lots of minimal or exorbitant transactions ?
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Prevent and Detect ● Understand order/transaction behaviours ● Anomaly detection ● Market agnostic ○ Underrated ● Movement in User Incoming debt for a window
  • 28. What ? How ? ● Promotions are a double edged sword ● Exploits offers ○ Bots or Individuals ○ Undermine marketing efforts and customer experiences ● Unchecked Exploitation ○ Losses ○ Customer trust ?
  • 29. We need some Real timeness ● First line of defense ● Track multiple events ○ Promotional campaigns ○ Transactions ○ Clickstream ○ Account Activities
  • 30. A Potential Platform ? ● Immediate results ● Identify suspicious activity ? ○ Velocity Variables ■ IP, Login state, ISP, etc ○ Behaviour Variables ■ Transaction Amount ■ Ordering ?
  • 31.
  • 32. Mitigation of Promotion Abuse ● Analysis of curated and understood variables ○ Code redemptions per IP ○ Rapid creations of new accounts ○ Intersecting Account details ● ML models to be trained on new variables and dimensions ○ Refine and improve
  • 33. Future of Fraud ? ● Requirements ○ Automated alerts ○ Variable creation ○ Swift and Scalable responses across the customer base ○ Anomaly/Pattern Detection ○ Market Agnostic ■ EU, AP, US, CA . . .
  • 34. Vision for Real Timeness ● Broader Approach ● Extendable ○ Maybe a user curated approach ○ Reuse concepts to create better risk variables ○ Risk based on ■ Merchants ■ Users ■ Payment Behaviour ○ Analytics
  • 35.
  • 38. Challenges ● Engineering meets Analytics ● Multi Region, more markets and data sources ● Data consistency (Upstream) ● Discovery and curation of market agnostic logics and data freshness ● Calculation of historic values for models (Hybrid maybe ?)
  • 39. ● Real Time Processing ○ Not only in detection of Fraud ○ Improving customer experience ● Potential in Viewing and Experimenting with new Data Sets ● Reduction of cost ● Faster Reaction time ● Increase Security and Reliability of the organization Conclusion