SlideShare a Scribd company logo
Fortify Your Enterprise with IBM Smarter 
Counter-Fraud Solutions 
facebook.com/perficient linkedin.com/company/perficient twitter.com/Perficient_IBM
About Perficient 
2 
Perficient is a leading information technology consulting firm serving clients throughout 
North America. 
We help clients implement business-driven technology solutions that integrate business 
processes, improve worker productivity, increase customer loyalty and create a more agile 
enterprise to better respond to new business opportunities.
Perficient Profile 
3 
• Founded in 1997 
• Public, NASDAQ: PRFT 
• 2013 revenue $373 million 
• Major market locations: 
• Allentown, Atlanta, Boston, Charlotte, Chicago, Cincinnati, 
Columbus, Dallas, Denver, Detroit, Fairfax, Houston, 
Indianapolis, Lafayette, Minneapolis, New York City, 
Northern California, Oxford (UK), Philadelphia, Southern 
California, St. Louis, Toronto, Washington, D.C. 
• Global delivery centers in China and India 
• >2,200 colleagues 
• Dedicated solution practices 
• ~90% repeat business rate 
• Alliance partnerships with major technology vendors 
• Multiple vendor/industry technology and growth awards
BUSINESS SOLUTIONS 
Business Intelligence 
Business Process Management 
Customer Experience and CRM 
Enterprise Performance Management 
Enterprise Resource Planning 
Experience Design (XD) 
Management Consulting 
Our Solutions Expertise 
TECHNOLOGY SOLUTIONS 
Business Integration/SOA 
Cloud Services 
Commerce 
Content Management 
Custom Application Development 
Education 
Information Management 
Mobile Platforms 
Platform Integration 
Portal & Social
Smarter Threats, Smarter Counter Fraud 
Aaron Glover, IBM Counter Fraud Management 
Consultant & Financial Crimes SME
Agenda 
6 
Speaker Introduction 
Defining the Fraud Problem – Scope and Dimensionality 
Quantifying the Fraud Problem – Forces, Externalities, 
and Impacts 
Qualifying the Fraud Problem – Barriers and 
Opportunities 
The IBM Smarter Counter Fraud Approach 
The IBM Smarter Counter Fraud Results 
Closing Remarks and Summary
IBM Smarter Counter Fraud 
Big Data 
Analytics 
Statistics 
Fraud 
Prevention & 
Detection 
Information 
Security 
Anti Money 
Laundering 
Banking & 
Financial 
Services 
7 
Aaron J. Glover 
• Joined IBM Counter Fraud Management Software Group in 2014 
• Bank Fraud Analytics & Strategies for Large Super-Regional Bank 
• Account Take Over (Cyber vs. Non-Cyber) 
• Anti Money Laundering (AML) 
• Customer Due Diligence (CDD) 
• Enhanced Due Diligence (EDD) 
• Know Your Customer (KYC) 
• Know Your Customer’s Customer (KYC2) 
• Sanctions Screening 
• Transaction Monitoring 
• Check Deposit Fraud / Kiting 
• Check Fraud 
• Debit / Credit Plastic Card Fraud 
• Emerging Technology Schemes (Remote Deposit Capture, Bitcoin) 
• Hadoop-based Big Data Super Computing Infrastructure 
• Internal / Employee Fraud 
• Regulation E Claims Abuse 
• Reward Points Program Abuse 
• Wire / ACH Fraud 
• Analytics Consulting for Nationwide Home Improvement Retailer 
• Information Security Consulting for Health Insurance Provider 
• Education & Certifications 
• Charted Financial Analyst (CFA) Level III Candidate 
• Master of Business Administration (MBA), Finance & Operations Management, Georgia Institute of 
Technology 
• Master of Science (MSc), Financial Engineering, Georgia Institute of Technology 
• Bachelor of Science (BSc), Statistics, University of Tennessee 
• CompTIA Security+
IBM Smarter Counter Fraud 
8 
Fraud is a deliberate deception or misrepresentation which violates 
a legal statute and is intended to produce an undue financial gain. 
Organized 
Opportunistic 
Staged events 
Money laundering 
Organized Provider 
Individual Employee 
Slip and fall 
Arson 
Tax fraud 
Medical fraud 
Improper billing 
Improper payments 
Procurement 
Financial statement 
Expense 
Scope includes 
Financial crime including money 
laundering, cyber attack and 
illegal security breach. 
Abuse which similar to fraud but 
not determined to violate the law. 
Waste & Error refer to improper 
payments which are the result of 
over paying due to poor policies or 
operational mistakes 
Risk includes financial, 
operational, IT and security risks 
and financial crimes which all 
must be identified, monitored and 
controlled.
IBM Smarter Counter Fraud 
9 
Converging forces are escalating fraud risk, exerting significant 
downward pressure on an organization’s bottom line. 
Increasingly frequent 
and complex fraud 
The explosion in global connectivity 
has escalated the vulnerabilities of 
individuals, enterprises and nations 
to cybercrime 
Intensifying regulatory enforcement 
and operational losses apply 
significant pressure on profitability 
Customer convenience, satisfaction 
and trust drive brand choice and 
must be earned on an ongoing basis 
1 The 2013 Norton Report 
2 United Nations Office on Drug and Crime, Comprehensive Study on Cybercrime, February 2013 
3 The Fiscal Times, Feds Blow $100 Billion Annually on Incorrect Payments, Jan 15, 2014, amount in US $ 
4 Reuters, Dec 11, 2012, amount in US $ 
5 Brand Index, Company perception falls after data breach, Dec 23, 2013, Brand Index ranges from -100 to 100 pts 
6 Entersekt-sponsored Harris Interactive US survey conducted May 14-16, 2013 
schemes 
12 cybercrime victims per 
second1 
80% of schemes are perpetrated 
by organized criminal 
groups2 
Fraud no longer 
acceptable as “cost of 
doing business” 
$100 billion annual improper 
payments by US Fed 
Agencies3 
$1.92 billion largest fine to-date 
in money 
laundering case4 
Customer expectations 
are on the rise 
45 point drop - retail store 
brand perception index 
change one week after 
data breach5 
71% customers who will switch 
banks due to fraud6
IBM Smarter Counter Fraud 
Advantage to the fraudster: isolated data, point solutions and corporate silo 
culture play into the fraudsters hands – especially in emerging markets 
Claims 
Analytics 
Underwriting 
Legal 
Special 
Investigative Unit 
(SIU) – Analysts & 
Investigators 
Risk 
Management 
The challenges: 
Narrow observation space 
Isolated Data 
Reactive versus Proactive 
Accepted cost of doing business 
Departmental band-aides 
Dept A Dept B Dept C Dept D
IBM Smarter Counter Fraud 
IBM’s Point of View is based on advances in technology that can enable 
organizations to stay ahead of the threats, improve the bottom line and 
enhance customer / citizen engagement 
1 | Elevate the agenda 
• Elevate to board-level responsibility 
• Manage fraud risk to improve business impact 
• Establish cross organizational leadership to counter 
fraud and financial crimes 
2 | Act with insight superiority 
• Expand the observation space 
• Apply deep and layered analytics at each 
level of fraud lifecycle 
• Act upon suspicions as they are identified 
3 | Adapt with agility 
• Leverage technology to auto`mate response 
• Implement a lifecycle management approach to 
continuously adapt to evolving threats 
• Tap into and engage with industry-wide, global intelligence 
networks
IBM Smarter Counter Fraud 
IBM Smarter Counter Fraud Management addresses each phase of 
an enterprise fraud approach. 
Detect 
Investigate 
Respond 
Discover 
Detect fraud 
within a 
business 
process 
Turn fraud 
intelligence into 
action with 
investigative analysis 
Apply fraud 
insights to take 
action in real 
time—when it 
matters 
Uncover hidden 
fraud within Big 
Data 

IBM Smarter Counter Fraud 
IBM Smarter Counter Fraud framework defines our recommended 
structure for both Technology and Services to reduce fraud.
IBM Smarter Counter Fraud 
A comprehensive set of integrated market-leading software and 
services capabilities designed to combat today’s new threats. 
Counter: Fraud management 
Detect 
decision time 
Respond 
stop or proceed 
Investigate 
suspicious activity 
Discover 
retrospective 
Prevent: Fraud defense 
Cybercrime Protection 
Security Intelligence 
Controls, Policies and 
Processes 
Governance 
Intelligence
IBM Smarter Counter Fraud 
IBM Counter Financial Crimes software plus services delivers a holistic solution. 
Detect 
Predictive analytics 
Entity Analytics 
Rules 
Decision 
management 
Respond 
Operational system 
integration 
Action 
Guidance 
Rules 
Discover 
Selection 
Evaluation 
Anomalies 
Identification 
Investigate 
Case management 
Content analytics 
Relationship 
visualization 
Forensic analysis 
Expanded observation space 
Report 
Dashboards 
Operational 
reporting 
Case briefing 
Feedback 
Operational systems 
Advanced industry libraries 
Data models | Predictive models | Rules | Reports | Process | External fraud data and more 
Real time | In-line Back-office analytics 
Information 
domains 
External 
sources 
Big data 
Evolving unstructured 
sources 
Internal 
sources 
Target operating model 
how you run and operate 
Enablement 
standing up the capabilities 
Strategy and roadmap 
what you should do and when 
Services
IBM Smarter Counter Fraud 
Detect Prevent Detect Respond DDiissccoovevrer InInvveessttigigataete RReeppoortrt 
Business 
Rules 
Entity 
Analytics 
Predictive 
Model 
Optimize 
Decision 
Manager 
Anomaly 
Detection 
Detection 
Transactions 
(Financial) 
Forensic Investigation 
Reporting and 
Dashboards 
Entity Analytics 
Real Time Alert 
New Investigation 
Case Management 
Customer 
Criminal 
Discovery 
Emerging 
model library 
Selection 
Evaluation 
Identification 
Observation Space 
Customer 
Actions ?
IBM Smarter Counter Fraud 
Entity Analytics – Resolving Who’s Who and Who’s Related to Who 
• There are no consistent standards for names. Some countries mandate certain standards 
but they differ from country to country, and most countries have no standards. 
• Names can contain a variety of OPTIONAL information that can make the same name 
appear very differently. 
Typos, Misspellings: 
 SMITH~SIMTH, JOHNSON~JPHNSON 
Noise 
 THOMPSON~TH9MP2ON 
Concatenations: 
 Andrews~AndrewsJR 
Truncations/Initials: 
 Ivanov~Ivanovsky, Patrick~P 
 Abdul ~ Abdul Rahman 
Name Order (parsing): 
 George Michael ~ Michael George 
 Maria del Carmen Bustamante de la Fuente 
Qualifiers, Titles, Suffixes, Prefixes: 
 Jr., Dr., Hajj, -oglu, Fitz, Rev., Abdul… 
Nicknames/Shortened Names: 
 Dave Young / David Young. 
 Francisco Garcia / Paco Garcia. 
 Mhd Al-Fadhil / Muhammed Al-Fadhil. 
 GPE Sanchez / Guadalupe Sanchez. 
Phonetics: 
 Leighton ~ Layton 
Variant Spellings 
 Mohammed ~ Imed 
Transliteration 
 محمد عمر عايد على جادالله “ ~ Mohammed Omar 
Ayed Ali Jadallah
IBM Smarter Counter Fraud 
Entity Analytics – Resolving Who’s Who and Who’s Related to Whom
IBM Smarter Counter Fraud 
Detect – Rules and Analytics 
Graphical UI makes it easy to integrate multiple data sources and multiple different 
types of analytics into a single flow without coding.
IBM Smarter Counter Fraud 
Detect – Content Analytics powered by Watson 
Watson Content Analytics are seamlessly integrated into Counter Fraud 
Management to mine, search and analyze unstructured data. 
• Automatically enrich information 
so analysts can focus on 
decision making, not research 
• Often, the links between things 
are buried in unstructured 
information (e.g. how do you 
know that Joe works with Bill? 
From email or website.) 
• Search across all cases, 
documentation, claims, policies, 
web pages, lists, public records
IBM Smarter Counter Fraud 
Respond – Case Management and Investigation 
Graphical UI makes it easy to investigate, triage, and reach actionable decisions.
IBM Smarter Counter Fraud 
Investigate – Social Network Analysis 
Graphical UI makes it easy to investigate and uncover non-obvious interconnected 
relationships through social network analysis techniques.
IBM Smarter Counter Fraud 
Discover – Business Intelligence and Reporting 
Reporting seamlessly leverages the data from detection and investigation to 
manage the business and visualize patterns. 
Timelines 
Program Efficiency Money flows 
& Effectiveness 
Fraud risk heat maps 
Exposure by Type by Geo
IBM Smarter Counter Fraud 
Discover – Business Intelligence and Reporting 
Management Summary Reports Examples
IBM Smarter Counter Fraud 
The IBM Smarter Counter Fraud Results for a Large North American Bank 
25 12/9/2014
IBM Smarter Counter Fraud 
The IBM Smarter Counter Fraud Results 
Results achieved at a leading Bank 
• Identification of $9.4M in fraudulent ATM deposits annualized, that had 
not been flagged for investigation by the Bank’s existing alerting system 
• 10% reduction in false positive alerts, which translated to a doubling in 
accuracy when identifying truly fraudulent deposits 
• 130% increase in detecting of ATM fraud 
IBM’s capabilities that achieved these results 
• Leverage Big Data/Analytics capabilities to enhance algorithmic and 
models 
• High speed storage 
• Ability to understand and apply unstructured data 
• Real-time or near real-time decision making 
• Increased data linkage 
• Risk Scoring of customers and transactions 
• Predictive analytics 
26 12/9/2014
IBM Smarter Counter Fraud 
The IBM Smarter Counter Fraud Results 
Business Challenge: Money Services Business (MSB) faced pressure to keep up with 
fraud and compliance regulations affecting the international business landscape. 
The Solution: Understanding who its clients are is helping the business identify and 
stop fraudulent, unauthorized money transfers, thereby addressing a common problem 
for financial institutions worldwide. Using a powerful, algorithms-based software 
platform, the company has new insight into “who’s who?” “who knows whom?” and 
“who does what?” as it analyzes transactions to identify known and unknown people 
attempting to move money. 
With the solution, the business can quickly identify questionable patterns, proactively 
enact processing rules, and quickly become compliant with new regulations, preventing 
thousands of customers from losing funds to fraud. 
$37.7 million halted 
in fraud in one year 
40% increase 
in ability to identify fraudulent 
transactions 
72% reduction 
in consumer fraud complaints in 
one year
IBM Smarter Counter Fraud 
Closing Remarks and Next Steps 
Aaron Glover, IBM Counter Fraud Management 
Consultant & Financial Crimes SME 
aaron.glover@us.ibm.com
Counter Fraud Partner 
Joel Thimsen 
Director, IBM Smarter Cities Consulting, Perficient
Perficient and IBM 
30 
IBM Counter Fraud 
• Perficient SMEs in Financial Services, 
Healthcare, and Retail/Consumer 
Goods to ensure your success 
• Dedicated delivery team focused on 
Counter Fraud solutions 
• Perficient’s fraud experts have 
experience turning intelligence into 
action through investigative analytics 
• 15+ year history of partnering with IBM 
IBM i2 
Also experienced in i2 solutions: 
• i2 Analysis Notebook Premium 
• i2 Enterprise Intelligence Analysis 
• i2 Intelligence Analysis Platform 
• and more
As a reminder, please submit your 
questions in the chat box. 
We will get to as many as possible. 
12/9/2014
Thank you for joining us today. 
Please fill out the survey at the close of this session.
Daily unique content 
about content 
management, user 
experience, portals 
and other enterprise 
information technology 
solutions across a 
variety of industries. 
Perficient.com/SocialMedia 
Perficient.com/IBM 
Facebook.com/Perficient 
Twitter.com/Perficient 
For more information contact: 
Katie.Hull@Perficient.com

More Related Content

What's hot

Creating a Business Case for Big Data
Creating a Business Case for Big DataCreating a Business Case for Big Data
Creating a Business Case for Big Data
Perficient, Inc.
 
Console Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy CustomersConsole Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy Customers
Perficient, Inc.
 
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
Perficient, Inc.
 
How PIH Is Using Office 365 to Improve Global Collaboration
How PIH Is Using Office 365 to Improve Global CollaborationHow PIH Is Using Office 365 to Improve Global Collaboration
How PIH Is Using Office 365 to Improve Global Collaboration
Perficient, Inc.
 
Using MDM to Lay the Foundation for Big Data and Analytics in Healthcare
Using MDM to Lay the Foundation for Big Data and Analytics in HealthcareUsing MDM to Lay the Foundation for Big Data and Analytics in Healthcare
Using MDM to Lay the Foundation for Big Data and Analytics in HealthcarePerficient, Inc.
 
The Top 5 CTMS Enhancements You Can Make
The Top 5 CTMS Enhancements You Can MakeThe Top 5 CTMS Enhancements You Can Make
The Top 5 CTMS Enhancements You Can Make
Perficient, Inc.
 
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital ExperienceHealthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Perficient, Inc.
 
SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014
SLVA Information Security
 
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Perficient, Inc.
 
Targeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
Targeted Analytics: Using Core Measures to Jump-Start Enterprise AnalyticsTargeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
Targeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
Perficient, Inc.
 
Transforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle SolutionsTransforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle Solutions
Perficient, Inc.
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case
Perficient, Inc.
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
Perficient, Inc.
 
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Perficient, Inc.
 
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
Perficient, Inc.
 
Building a Better Healthcare Dashboard
Building a Better Healthcare DashboardBuilding a Better Healthcare Dashboard
Building a Better Healthcare Dashboard
Perficient, Inc.
 
Analytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2BAnalytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2B
Veronica Kirn
 
IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI
Perficient, Inc.
 
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Perficient, Inc.
 
Extend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content NavigatorExtend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content Navigator
Perficient, Inc.
 

What's hot (20)

Creating a Business Case for Big Data
Creating a Business Case for Big DataCreating a Business Case for Big Data
Creating a Business Case for Big Data
 
Console Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy CustomersConsole Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy Customers
 
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...
 
How PIH Is Using Office 365 to Improve Global Collaboration
How PIH Is Using Office 365 to Improve Global CollaborationHow PIH Is Using Office 365 to Improve Global Collaboration
How PIH Is Using Office 365 to Improve Global Collaboration
 
Using MDM to Lay the Foundation for Big Data and Analytics in Healthcare
Using MDM to Lay the Foundation for Big Data and Analytics in HealthcareUsing MDM to Lay the Foundation for Big Data and Analytics in Healthcare
Using MDM to Lay the Foundation for Big Data and Analytics in Healthcare
 
The Top 5 CTMS Enhancements You Can Make
The Top 5 CTMS Enhancements You Can MakeThe Top 5 CTMS Enhancements You Can Make
The Top 5 CTMS Enhancements You Can Make
 
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital ExperienceHealthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
 
SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014
 
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
Increase Financial Firms' Sales Performance & Compliance with Compensation Ma...
 
Targeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
Targeted Analytics: Using Core Measures to Jump-Start Enterprise AnalyticsTargeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
Targeted Analytics: Using Core Measures to Jump-Start Enterprise Analytics
 
Transforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle SolutionsTransforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle Solutions
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
 
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
Through the Eyes of the Connected Consumer: Gain Visibility and Insights to I...
 
Building a Better Healthcare Dashboard
Building a Better Healthcare DashboardBuilding a Better Healthcare Dashboard
Building a Better Healthcare Dashboard
 
Analytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2BAnalytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2B
 
IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI
 
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
 
Extend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content NavigatorExtend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content Navigator
 

Viewers also liked

Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)
IBM Sverige
 
Nice service to sales sales deck final
Nice service to sales   sales deck finalNice service to sales   sales deck final
Nice service to sales sales deck finalxmendel
 
How to Build a World-Class Back Office
How to Build a World-Class Back OfficeHow to Build a World-Class Back Office
How to Build a World-Class Back Office
Bay Bridge Decision Technologies
 
KYC - How long can you go?
KYC - How long can you go?KYC - How long can you go?
KYC - How long can you go?Camilo Tellez
 
FircoSoft Company Overview
FircoSoft Company OverviewFircoSoft Company Overview
FircoSoft Company Overview
FircoSoft
 
Guiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing AdoptionGuiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing Adoption
Kumar Arikrishnan
 
Corporate presentation october_2011
Corporate presentation october_2011Corporate presentation october_2011
Corporate presentation october_2011Robin Schaffer
 
Various Solutions to the Problem of Points
Various Solutions to the Problem of PointsVarious Solutions to the Problem of Points
Various Solutions to the Problem of Points
wgyn
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
Virginia Fernandez
 
201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection
Rik Van Bruggen
 
IBM Counter Fraud Management
IBM Counter Fraud ManagementIBM Counter Fraud Management
IBM Counter Fraud Management
Angela Tuminello
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
Amazon Web Services
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EU
Muthu Siva
 
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
Pierre Feillet
 
Cartographie du big data
Cartographie du big dataCartographie du big data
Cartographie du big data
acogoluegnes
 
Cloud Application Development Lifecycle
Cloud Application Development LifecycleCloud Application Development Lifecycle
Cloud Application Development Lifecycle
Suhas Kelkar
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Framework
nikatmalik
 
Real-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and KafkaReal-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and Kafka
Alexey Kharlamov
 

Viewers also liked (20)

Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)
 
Nice service to sales sales deck final
Nice service to sales   sales deck finalNice service to sales   sales deck final
Nice service to sales sales deck final
 
How to Build a World-Class Back Office
How to Build a World-Class Back OfficeHow to Build a World-Class Back Office
How to Build a World-Class Back Office
 
KYC - How long can you go?
KYC - How long can you go?KYC - How long can you go?
KYC - How long can you go?
 
FircoSoft Company Overview
FircoSoft Company OverviewFircoSoft Company Overview
FircoSoft Company Overview
 
Guiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing AdoptionGuiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing Adoption
 
Corporate presentation october_2011
Corporate presentation october_2011Corporate presentation october_2011
Corporate presentation october_2011
 
Various Solutions to the Problem of Points
Various Solutions to the Problem of PointsVarious Solutions to the Problem of Points
Various Solutions to the Problem of Points
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection201411203 goto night on graphs for fraud detection
201411203 goto night on graphs for fraud detection
 
IBM Counter Fraud Management
IBM Counter Fraud ManagementIBM Counter Fraud Management
IBM Counter Fraud Management
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EU
 
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
Best practices in deploying IBM Operation Decision Manager Standard 8.8.0
 
Cartographie du big data
Cartographie du big dataCartographie du big data
Cartographie du big data
 
Cloud Application Development Lifecycle
Cloud Application Development LifecycleCloud Application Development Lifecycle
Cloud Application Development Lifecycle
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Framework
 
Real-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and KafkaReal-Time Fraud Detection with Storm and Kafka
Real-Time Fraud Detection with Storm and Kafka
 

Similar to Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions

Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
Joan Weber
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
bpeacher
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
Penser
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
CBIZ, Inc.
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
Laurent Pacalin
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
Lalith Kumar Vemali
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Institute of Contemporary Sciences
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
European Merchant Services
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
basilmph
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBAlan Greggo
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
Matt Moneypenny
 
Data Leaders Summit Barcelona 2018
Data Leaders Summit Barcelona 2018Data Leaders Summit Barcelona 2018
Data Leaders Summit Barcelona 2018
Harvinder Atwal
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 

Similar to Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions (20)

Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
Data Leaders Summit Barcelona 2018
Data Leaders Summit Barcelona 2018Data Leaders Summit Barcelona 2018
Data Leaders Summit Barcelona 2018
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 

More from Perficient, Inc.

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
Perficient, Inc.
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
Perficient, Inc.
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
Perficient, Inc.
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Perficient, Inc.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
Perficient, Inc.
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
Perficient, Inc.
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
Perficient, Inc.
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Perficient, Inc.
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Perficient, Inc.
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
Perficient, Inc.
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
Perficient, Inc.
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
Perficient, Inc.
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
Perficient, Inc.
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
Perficient, Inc.
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
Perficient, Inc.
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
Perficient, Inc.
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
Perficient, Inc.
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
Perficient, Inc.
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
Perficient, Inc.
 

More from Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions

  • 1. Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions facebook.com/perficient linkedin.com/company/perficient twitter.com/Perficient_IBM
  • 2. About Perficient 2 Perficient is a leading information technology consulting firm serving clients throughout North America. We help clients implement business-driven technology solutions that integrate business processes, improve worker productivity, increase customer loyalty and create a more agile enterprise to better respond to new business opportunities.
  • 3. Perficient Profile 3 • Founded in 1997 • Public, NASDAQ: PRFT • 2013 revenue $373 million • Major market locations: • Allentown, Atlanta, Boston, Charlotte, Chicago, Cincinnati, Columbus, Dallas, Denver, Detroit, Fairfax, Houston, Indianapolis, Lafayette, Minneapolis, New York City, Northern California, Oxford (UK), Philadelphia, Southern California, St. Louis, Toronto, Washington, D.C. • Global delivery centers in China and India • >2,200 colleagues • Dedicated solution practices • ~90% repeat business rate • Alliance partnerships with major technology vendors • Multiple vendor/industry technology and growth awards
  • 4. BUSINESS SOLUTIONS Business Intelligence Business Process Management Customer Experience and CRM Enterprise Performance Management Enterprise Resource Planning Experience Design (XD) Management Consulting Our Solutions Expertise TECHNOLOGY SOLUTIONS Business Integration/SOA Cloud Services Commerce Content Management Custom Application Development Education Information Management Mobile Platforms Platform Integration Portal & Social
  • 5. Smarter Threats, Smarter Counter Fraud Aaron Glover, IBM Counter Fraud Management Consultant & Financial Crimes SME
  • 6. Agenda 6 Speaker Introduction Defining the Fraud Problem – Scope and Dimensionality Quantifying the Fraud Problem – Forces, Externalities, and Impacts Qualifying the Fraud Problem – Barriers and Opportunities The IBM Smarter Counter Fraud Approach The IBM Smarter Counter Fraud Results Closing Remarks and Summary
  • 7. IBM Smarter Counter Fraud Big Data Analytics Statistics Fraud Prevention & Detection Information Security Anti Money Laundering Banking & Financial Services 7 Aaron J. Glover • Joined IBM Counter Fraud Management Software Group in 2014 • Bank Fraud Analytics & Strategies for Large Super-Regional Bank • Account Take Over (Cyber vs. Non-Cyber) • Anti Money Laundering (AML) • Customer Due Diligence (CDD) • Enhanced Due Diligence (EDD) • Know Your Customer (KYC) • Know Your Customer’s Customer (KYC2) • Sanctions Screening • Transaction Monitoring • Check Deposit Fraud / Kiting • Check Fraud • Debit / Credit Plastic Card Fraud • Emerging Technology Schemes (Remote Deposit Capture, Bitcoin) • Hadoop-based Big Data Super Computing Infrastructure • Internal / Employee Fraud • Regulation E Claims Abuse • Reward Points Program Abuse • Wire / ACH Fraud • Analytics Consulting for Nationwide Home Improvement Retailer • Information Security Consulting for Health Insurance Provider • Education & Certifications • Charted Financial Analyst (CFA) Level III Candidate • Master of Business Administration (MBA), Finance & Operations Management, Georgia Institute of Technology • Master of Science (MSc), Financial Engineering, Georgia Institute of Technology • Bachelor of Science (BSc), Statistics, University of Tennessee • CompTIA Security+
  • 8. IBM Smarter Counter Fraud 8 Fraud is a deliberate deception or misrepresentation which violates a legal statute and is intended to produce an undue financial gain. Organized Opportunistic Staged events Money laundering Organized Provider Individual Employee Slip and fall Arson Tax fraud Medical fraud Improper billing Improper payments Procurement Financial statement Expense Scope includes Financial crime including money laundering, cyber attack and illegal security breach. Abuse which similar to fraud but not determined to violate the law. Waste & Error refer to improper payments which are the result of over paying due to poor policies or operational mistakes Risk includes financial, operational, IT and security risks and financial crimes which all must be identified, monitored and controlled.
  • 9. IBM Smarter Counter Fraud 9 Converging forces are escalating fraud risk, exerting significant downward pressure on an organization’s bottom line. Increasingly frequent and complex fraud The explosion in global connectivity has escalated the vulnerabilities of individuals, enterprises and nations to cybercrime Intensifying regulatory enforcement and operational losses apply significant pressure on profitability Customer convenience, satisfaction and trust drive brand choice and must be earned on an ongoing basis 1 The 2013 Norton Report 2 United Nations Office on Drug and Crime, Comprehensive Study on Cybercrime, February 2013 3 The Fiscal Times, Feds Blow $100 Billion Annually on Incorrect Payments, Jan 15, 2014, amount in US $ 4 Reuters, Dec 11, 2012, amount in US $ 5 Brand Index, Company perception falls after data breach, Dec 23, 2013, Brand Index ranges from -100 to 100 pts 6 Entersekt-sponsored Harris Interactive US survey conducted May 14-16, 2013 schemes 12 cybercrime victims per second1 80% of schemes are perpetrated by organized criminal groups2 Fraud no longer acceptable as “cost of doing business” $100 billion annual improper payments by US Fed Agencies3 $1.92 billion largest fine to-date in money laundering case4 Customer expectations are on the rise 45 point drop - retail store brand perception index change one week after data breach5 71% customers who will switch banks due to fraud6
  • 10. IBM Smarter Counter Fraud Advantage to the fraudster: isolated data, point solutions and corporate silo culture play into the fraudsters hands – especially in emerging markets Claims Analytics Underwriting Legal Special Investigative Unit (SIU) – Analysts & Investigators Risk Management The challenges: Narrow observation space Isolated Data Reactive versus Proactive Accepted cost of doing business Departmental band-aides Dept A Dept B Dept C Dept D
  • 11. IBM Smarter Counter Fraud IBM’s Point of View is based on advances in technology that can enable organizations to stay ahead of the threats, improve the bottom line and enhance customer / citizen engagement 1 | Elevate the agenda • Elevate to board-level responsibility • Manage fraud risk to improve business impact • Establish cross organizational leadership to counter fraud and financial crimes 2 | Act with insight superiority • Expand the observation space • Apply deep and layered analytics at each level of fraud lifecycle • Act upon suspicions as they are identified 3 | Adapt with agility • Leverage technology to auto`mate response • Implement a lifecycle management approach to continuously adapt to evolving threats • Tap into and engage with industry-wide, global intelligence networks
  • 12. IBM Smarter Counter Fraud IBM Smarter Counter Fraud Management addresses each phase of an enterprise fraud approach. Detect Investigate Respond Discover Detect fraud within a business process Turn fraud intelligence into action with investigative analysis Apply fraud insights to take action in real time—when it matters Uncover hidden fraud within Big Data 
  • 13. IBM Smarter Counter Fraud IBM Smarter Counter Fraud framework defines our recommended structure for both Technology and Services to reduce fraud.
  • 14. IBM Smarter Counter Fraud A comprehensive set of integrated market-leading software and services capabilities designed to combat today’s new threats. Counter: Fraud management Detect decision time Respond stop or proceed Investigate suspicious activity Discover retrospective Prevent: Fraud defense Cybercrime Protection Security Intelligence Controls, Policies and Processes Governance Intelligence
  • 15. IBM Smarter Counter Fraud IBM Counter Financial Crimes software plus services delivers a holistic solution. Detect Predictive analytics Entity Analytics Rules Decision management Respond Operational system integration Action Guidance Rules Discover Selection Evaluation Anomalies Identification Investigate Case management Content analytics Relationship visualization Forensic analysis Expanded observation space Report Dashboards Operational reporting Case briefing Feedback Operational systems Advanced industry libraries Data models | Predictive models | Rules | Reports | Process | External fraud data and more Real time | In-line Back-office analytics Information domains External sources Big data Evolving unstructured sources Internal sources Target operating model how you run and operate Enablement standing up the capabilities Strategy and roadmap what you should do and when Services
  • 16. IBM Smarter Counter Fraud Detect Prevent Detect Respond DDiissccoovevrer InInvveessttigigataete RReeppoortrt Business Rules Entity Analytics Predictive Model Optimize Decision Manager Anomaly Detection Detection Transactions (Financial) Forensic Investigation Reporting and Dashboards Entity Analytics Real Time Alert New Investigation Case Management Customer Criminal Discovery Emerging model library Selection Evaluation Identification Observation Space Customer Actions ?
  • 17. IBM Smarter Counter Fraud Entity Analytics – Resolving Who’s Who and Who’s Related to Who • There are no consistent standards for names. Some countries mandate certain standards but they differ from country to country, and most countries have no standards. • Names can contain a variety of OPTIONAL information that can make the same name appear very differently. Typos, Misspellings:  SMITH~SIMTH, JOHNSON~JPHNSON Noise  THOMPSON~TH9MP2ON Concatenations:  Andrews~AndrewsJR Truncations/Initials:  Ivanov~Ivanovsky, Patrick~P  Abdul ~ Abdul Rahman Name Order (parsing):  George Michael ~ Michael George  Maria del Carmen Bustamante de la Fuente Qualifiers, Titles, Suffixes, Prefixes:  Jr., Dr., Hajj, -oglu, Fitz, Rev., Abdul… Nicknames/Shortened Names:  Dave Young / David Young.  Francisco Garcia / Paco Garcia.  Mhd Al-Fadhil / Muhammed Al-Fadhil.  GPE Sanchez / Guadalupe Sanchez. Phonetics:  Leighton ~ Layton Variant Spellings  Mohammed ~ Imed Transliteration  محمد عمر عايد على جادالله “ ~ Mohammed Omar Ayed Ali Jadallah
  • 18. IBM Smarter Counter Fraud Entity Analytics – Resolving Who’s Who and Who’s Related to Whom
  • 19. IBM Smarter Counter Fraud Detect – Rules and Analytics Graphical UI makes it easy to integrate multiple data sources and multiple different types of analytics into a single flow without coding.
  • 20. IBM Smarter Counter Fraud Detect – Content Analytics powered by Watson Watson Content Analytics are seamlessly integrated into Counter Fraud Management to mine, search and analyze unstructured data. • Automatically enrich information so analysts can focus on decision making, not research • Often, the links between things are buried in unstructured information (e.g. how do you know that Joe works with Bill? From email or website.) • Search across all cases, documentation, claims, policies, web pages, lists, public records
  • 21. IBM Smarter Counter Fraud Respond – Case Management and Investigation Graphical UI makes it easy to investigate, triage, and reach actionable decisions.
  • 22. IBM Smarter Counter Fraud Investigate – Social Network Analysis Graphical UI makes it easy to investigate and uncover non-obvious interconnected relationships through social network analysis techniques.
  • 23. IBM Smarter Counter Fraud Discover – Business Intelligence and Reporting Reporting seamlessly leverages the data from detection and investigation to manage the business and visualize patterns. Timelines Program Efficiency Money flows & Effectiveness Fraud risk heat maps Exposure by Type by Geo
  • 24. IBM Smarter Counter Fraud Discover – Business Intelligence and Reporting Management Summary Reports Examples
  • 25. IBM Smarter Counter Fraud The IBM Smarter Counter Fraud Results for a Large North American Bank 25 12/9/2014
  • 26. IBM Smarter Counter Fraud The IBM Smarter Counter Fraud Results Results achieved at a leading Bank • Identification of $9.4M in fraudulent ATM deposits annualized, that had not been flagged for investigation by the Bank’s existing alerting system • 10% reduction in false positive alerts, which translated to a doubling in accuracy when identifying truly fraudulent deposits • 130% increase in detecting of ATM fraud IBM’s capabilities that achieved these results • Leverage Big Data/Analytics capabilities to enhance algorithmic and models • High speed storage • Ability to understand and apply unstructured data • Real-time or near real-time decision making • Increased data linkage • Risk Scoring of customers and transactions • Predictive analytics 26 12/9/2014
  • 27. IBM Smarter Counter Fraud The IBM Smarter Counter Fraud Results Business Challenge: Money Services Business (MSB) faced pressure to keep up with fraud and compliance regulations affecting the international business landscape. The Solution: Understanding who its clients are is helping the business identify and stop fraudulent, unauthorized money transfers, thereby addressing a common problem for financial institutions worldwide. Using a powerful, algorithms-based software platform, the company has new insight into “who’s who?” “who knows whom?” and “who does what?” as it analyzes transactions to identify known and unknown people attempting to move money. With the solution, the business can quickly identify questionable patterns, proactively enact processing rules, and quickly become compliant with new regulations, preventing thousands of customers from losing funds to fraud. $37.7 million halted in fraud in one year 40% increase in ability to identify fraudulent transactions 72% reduction in consumer fraud complaints in one year
  • 28. IBM Smarter Counter Fraud Closing Remarks and Next Steps Aaron Glover, IBM Counter Fraud Management Consultant & Financial Crimes SME aaron.glover@us.ibm.com
  • 29. Counter Fraud Partner Joel Thimsen Director, IBM Smarter Cities Consulting, Perficient
  • 30. Perficient and IBM 30 IBM Counter Fraud • Perficient SMEs in Financial Services, Healthcare, and Retail/Consumer Goods to ensure your success • Dedicated delivery team focused on Counter Fraud solutions • Perficient’s fraud experts have experience turning intelligence into action through investigative analytics • 15+ year history of partnering with IBM IBM i2 Also experienced in i2 solutions: • i2 Analysis Notebook Premium • i2 Enterprise Intelligence Analysis • i2 Intelligence Analysis Platform • and more
  • 31. As a reminder, please submit your questions in the chat box. We will get to as many as possible. 12/9/2014
  • 32. Thank you for joining us today. Please fill out the survey at the close of this session.
  • 33. Daily unique content about content management, user experience, portals and other enterprise information technology solutions across a variety of industries. Perficient.com/SocialMedia Perficient.com/IBM Facebook.com/Perficient Twitter.com/Perficient For more information contact: Katie.Hull@Perficient.com