SlideShare a Scribd company logo
Making Big Data Your Ally
Using data analytics to improve
compliance, due diligence and
investigations
Thursday, February 6, 2014 | 3:00 - 4:00 PM
Speakers:
Raul Saccani, Dave Stewart, John Walsh
John Walsh
CEO
SightSpan
Charlotte, NC
Dave Stewart
Director, Fraud and Financial Crimes Practice
SAS Institute
Cary, NC
Raul Saccani
Partner, Forensic and Dispute Services
Deloitte
Buenos Aires
John Walsh
CEO
SightSpan
Charlotte, NC
Dave Stewart
Director, Fraud and Financial Crimes Practice
SAS Institute
Cary, NC
The Challenge
THRIVING IN THE BIG DATA ERA

VOLUME
DATA SIZE

VARIETY
VELOCITY
VALUE

TODAY

THE FUTURE

Copyright © 2012, SAS Institute Inc. All rights reserved.
The Analytics Lifecycle

BUSINESS
MANAGER
Domain Expert
Makes Decisions
Evaluates Processes and ROI

EVALUATE /
MONITOR
RESULTS

IDENTIFY /
FORMULATE
PROBLEM

DATA
PREPARATION

DEPLOY
MODEL

IT SYSTEMS /
MANAGEMENT
Model Validation
Model Deployment
Data Preparation

DATA
SCIENTIST
Data Exploration
Data Visualization
Report Creation

DATA
EXPLORATION

ANALYST
DATA MINER

VALIDATE
MODEL

TRANSFORM
& SELECT
BUILD
MODEL

Exploratory Analysis
Descriptive Segmentation
Predictive Modeling
Case Studies
• Tier I Asian Bank
– Visual analytics of Group Security Operations
– Cross-border sharing of summary data

• Tier I Global Bank
– AML model tuning & optimization
– Large volume peer group analysis

• Tier I Global Bank
– “Safety Net” approach for controlling affiliate risk
– Ad hoc builds of illicit networks
Observations
• New capabilities require new thinking about business
as usual
• Variety of data & techniques requires new skills
within lines of business
• Adopt a pro-active/pre-emptive analytics strategy
• Understand your company’s technology roadmap
and get on board
Raul Saccani
Partner, Forensic and Dispute Services
Deloitte.
Buenos Aires
Raúl Saccani´s presentation contents
• Data privacy standards in Latin America,
compared to US and EU standards, and
• How data privacy rules, limitations on crossborder data sharing can impact compliance
functions and internal investigations
• Role of e-discovery in financial crime
investigations, including internal investigations
• Sources of data in internal investigations,
including structured and unstructured data
Privacy and Data Protection
1)
2)
3)
4)

The context
Data protection and electronic evidence
EU law on privacy and data protection
Practical considerations
(1) Context
Most personal information and most evidence are digital
Lawyers and judges need to know significance of digital
information
Need to know and understand the :
• nature of digital evidence
• data protection rules of the road

Otherwise no :
• remedy for the data subject
• fair trial for the accused
• convictions for the prosecutor
No. of countries with privacy laws

The growth of global privacy laws

Time Period
(2) Data Protection and
Electronic Evidence
•
•
•
•

Overlapping Scope
Data protection rules apply to the courts
Fruits of the Poisoned Tree
precautions to ensure admissibility of eevidence
(3) EU Law on Privacy:
two fundamental rights
(a) the Right to Privacy
ECHR (1950), Article 8
Everyone has the right to respect for
his or her private and family life, home
and correspondence
EU Charter (2000), Article 7 :
…and communications.
(b) the Right to
Protection of Personal Data
an autonomous fundamental right to selfdetermination in the Information Society
Article 16, EU Treaty

EU Charter, Article 8 :
1. Everyone has the right to the protection of
personal data concerning him or her.
2. Such data must be processed fairly for
specified purposes and on the basis of the
consent of the person concerned or some
other legitimate basis laid down by law.
Everyone has the right of access to data
which has been collected concerning him or
her, and the right to have it rectified.
3. Compliance with these rules shall be subject
to control by an independent authority
Data Privacy
• What is a Data Controller?
– Person or entity who determines purpose and manner of
processing
– EU Directive imposes obligation to protect personal data

– Potential liability for failure to fulfill obligations
– Responsible for directing and controlling actions of Data
Processor

• What is a Data Processor?
– Processes data on behalf of and at the direction of Data
Controller
– Must follow instructions of Data Controller
Practical Considerations
• Now you are in a position to make the necessary cost-benefit
analysis. Ask yourself the following questions:
– What is the true value of this source of information
relative to (a) other more easily accessible sources of
information and (b) the litigation as a whole?
– What are the projected costs of complying with the EU
Data Protection Directive?
– What are the projected costs of defending a discovery
dispute?
– What are the relative strengths and weaknesses of each
side on discovery issues?
Outsourcing Personal Data Processing
Contractual means:

 All practicable security measures
 Timely return, destruction or deletion
of data
 Prohibition against any use or
disclosure for other purposes
 Prohibition against sub-contracting
 Right to audit and inspect
Forensic Technology
Identification
Preservation
Pre-processing

Processing
Review

* Forensic methodology
* Chain of custody
* Integrity
* Confidentiality
Forensic Technology
Identification
Preservation
(Pre-processing tasks)

Pre-processing

Processing

Review

* Integrity verification
* Formats conversion and standardization
* Chain of custody
* Additional copies
Forensic Technology
Identification
Preservation
Pre-processing

Processing
Review

(Obtain value from information without modifying it)
*Deleted documents or e-mails
*Information in hidden sectors or partitions
*Encrypted files
*Files with modified extensions
*Internet devices, MSN, Y!, social networks
*Applications audit trails / SO
Forensic Technology
Identification
Preservation
Pre-processing

Processing
Review

(Review platform)
*Do not modify evidence
*Eliminate duplicates
*Early Case Assessment (ECA)
*Keywords / tags
*Produce evidence
*Bates stamping
*Audit logs
The Change is Driving Big Data
Petabytes

Terabytes

Gigabytes

Megabytes

Data Complexity, Variety and Velocity
Big Data Is…
Big Data represents the
Trends, Technologies and

Potential for organizations
to obtain valuable insight
from large amounts of
Structured, Unstructured
and fast-moving data.

80%

Unstructured Data

Click Stream
Videos
Images
Text
Sensors
Where Does Big Data Come From?
• Our Data-driven World
– Science

• Data bases from astronomy, genomics,
environmental data, transportation data, …
– Humanities and Social Sciences

• Scanned books, historical documents, social
interactions data, new technology like GPS, …
– Business & Commerce

• Corporate sales, stock market transactions, census,
airline traffic, …
– Entertainment

• Internet images, Hollywood movies, MP3 files, …
– Medicine

• MRI & CT scans, patient records, …
Structured vs unstructured data
• Structured data : information in “tables”
Employee

Manager

Salary

Smith

Jones

50000

Chang

Smith

60000

Ivy

Smith

50000

Typically allows numerical range and exact match
(for text) queries, e.g.,
Salary < 60000 AND Manager = Smith.
Unstructured data
• Typically refers to free text
• Allows
– Keyword-based queries including operators
– More sophisticated “concept” queries, e.g.,
• find all web pages dealing with drug abuse
Forensic Data Analytics - Definition
Core objectives:
Identifying, preserving, recovering, processing, and analyzing structured,
standardized and/or codified digital information for the purpose of
generating evidence that may be used as such in an investigation, and
that may ultimately serve as legal actions support in litigation.

Source of information:
Company’s accounting system (ERP), proprietary or third partydeveloped vertical applications, intersystem interfaces, financial
reporting worksheets.
How data analytics works?
Data Acquisition, Accounting
Integrity Control and Data Mapping
Evaluation of fraud and misconduct
risk indicators
Routines and tests

Identification of unusual or
irregular trends and patterns

Analysis of preidentified
transactions
Usual procedures - Overview

How data analytics works?
– Reviews with focus in red flags detected.
– Master vendor and customer files analysis:
• Databases cross analysis between company databases and public databases
and records. Some examples are:
 Clients related to public biddings
 Vendors/Clients with invalid or incomplete key data
 Vendors/Clients with potential tax irregularities
 Vendors/Clients with unusual activities
 Vendors/Clients with unusual characteristics
 Vendors/Clients with unusual transactional activity
 Duplicate Vendors/Clients
 Vendors/Clients related to employees or other Vendors/Clients
 Employees related to other employees
Employee - Vendor Matching: identical domicile as per external databases

Masters

External databases

CODE
VENDOR
DOMICILE
100911 TRANSPORTES PARANÁ ARANÁ 1
P

CODE
EMPLOYEE
502435 JUAN PEREZ

CITY
Taxpayer ID
CAP. FED. 30-70867893-0

DOMICILE
CITY
Employee ID
AV PUEYRREDÓN 1111 AP. FED. 23-20667877-4
C

Apparently
unrelated

COMPANY
ALTERNATIVE
DOMICILE
NAME
DOMICILE
30-70867893-0MARÍA PEREZ PARANÁ 1
AV. CÓRDOBA 999 PISO 3
Taxpayer ID

Employee ID
NAME
DOMICILE
CITY
23-20667877-4JUAN PEREZ CÓRDOBA 999 PISO 3 FED.
CAP.

The difference might
arise from the
fantasy name –
company name

Unusual
relationship
Examples of results per vendor
He/she external public
Based onwould be
working under a
sources, he/she would be
working under a contract
contract of
of employment
employment

Individual
Individual

Related to
Related to a a
potentially irregular
potentially irregular
entity
entity

services

Sequentially
Sequentially
numbered invoices
numbered invoices

Entity showing no
tax activity

Company name
does not match the
information filed
with AFIP

Vendor :

Vendor C: Provider
Provider of
of advertising
advertising
services

Significant number
of legal actions
Data quality issues
(incomplete
information)

Vendor :
Advisory
services fees
Vendor

Name

High risk fraud alert

Unusual activity

Master data changes

Unusual Behaviour

Inconsistent names

Potential tax irregularities

Connected entities

Suspicious tax payer ID

Suspicious address

Suspicious telephone

Unusual information

Other Potential irregularities

Data Quality - Invalid key data

Data Quality - Missing key data

Duplicates

TOTAL SCORING

Test 001

Test 002

Test 100

TOTAL TESTS

Vendors with higher scoring

100123
100981
100789
101000
102078

Vendor 1
Vendor 2
Vendor 3
Vendor 4
Vendor 5

100
100
100
100
100

10
10
10
0
0

0
0
0
0
0

0
1
0
0
0

0
0
0
0
0

3
2
3
2
1

7
8
4
7
3

0
0
0
0
0

0
0
0
0
0

0
0
0
0
0

2
0
0
0
2

0
0
3
0
1

0
0
0
0
0

0
0
0
0
0

2
4
3
4
5

122
121
120
109
107

1
1
1
0
0

0
1
0
0
0

0
0
0
1
1

1
2
1
1
1

Each routine is classified into these groups considering the
estimated risk inherent to each test.
Note: for instance, only three routines are identified in the chart.
The complete analysis includes over 200 routines.
Manual Journal Entries Ranking

•

Night shifts

•

Unbalanced entries

•

Reclassifications

•

Weekends

•

Rarely used accounts

•

Benford Law

•

Holidays

•

Adjustments

•

Round numbers

•

Reversals
Your
Questions

More Related Content

What's hot

Unit i big data introduction
Unit  i big data introductionUnit  i big data introduction
Unit i big data introduction
SujaMaryD
 
What is big data - Architectures and Practical Use Cases
What is big data - Architectures and Practical Use CasesWhat is big data - Architectures and Practical Use Cases
What is big data - Architectures and Practical Use Cases
Tony Pearson
 
ADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
ADV Slides: When and How Data Lakes Fit into a Modern Data ArchitectureADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
ADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
DATAVERSITY
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
Allied Consultants
 
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
Neo4j
 
Modern Integrated Data Environment - Whitepaper | Qubole
Modern Integrated Data Environment - Whitepaper | QuboleModern Integrated Data Environment - Whitepaper | Qubole
Modern Integrated Data Environment - Whitepaper | Qubole
Vasu S
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data Lake
Caserta
 
Big data analytics, research report
Big data analytics, research reportBig data analytics, research report
Big data analytics, research reportJULIO GONZALEZ SANZ
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
Datameer
 
BIG DATA and USE CASES
BIG DATA and USE CASESBIG DATA and USE CASES
BIG DATA and USE CASES
Bhaskara Reddy Sannapureddy
 
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Denodo
 
Business case for Big Data Analytics
Business case for Big Data AnalyticsBusiness case for Big Data Analytics
Business case for Big Data Analytics
Vijay Rao
 
Telco Big Data Workshop Sample
Telco Big Data Workshop SampleTelco Big Data Workshop Sample
Telco Big Data Workshop Sample
Alan Quayle
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
Umma Khatuna Jannat
 
5 Big Data Use Cases for 2013
5 Big Data Use Cases for 20135 Big Data Use Cases for 2013
5 Big Data Use Cases for 2013
Infochimps, a CSC Big Data Business
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
Denodo
 
Business intelligence 3.0 and the data lake
Business intelligence 3.0 and the data lakeBusiness intelligence 3.0 and the data lake
Business intelligence 3.0 and the data lake
Data Science Thailand
 
000 introduction to big data analytics 2021
000   introduction to big data analytics  2021000   introduction to big data analytics  2021
000 introduction to big data analytics 2021
Dendej Sawarnkatat
 
Callcenter HPE IDOL overview
Callcenter HPE IDOL overviewCallcenter HPE IDOL overview
Callcenter HPE IDOL overview
Tania Akinina
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
Srinivasan Sankar
 

What's hot (20)

Unit i big data introduction
Unit  i big data introductionUnit  i big data introduction
Unit i big data introduction
 
What is big data - Architectures and Practical Use Cases
What is big data - Architectures and Practical Use CasesWhat is big data - Architectures and Practical Use Cases
What is big data - Architectures and Practical Use Cases
 
ADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
ADV Slides: When and How Data Lakes Fit into a Modern Data ArchitectureADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
ADV Slides: When and How Data Lakes Fit into a Modern Data Architecture
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
 
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
An Agile & Adaptive Approach to Addressing Financial Services Regulations and...
 
Modern Integrated Data Environment - Whitepaper | Qubole
Modern Integrated Data Environment - Whitepaper | QuboleModern Integrated Data Environment - Whitepaper | Qubole
Modern Integrated Data Environment - Whitepaper | Qubole
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data Lake
 
Big data analytics, research report
Big data analytics, research reportBig data analytics, research report
Big data analytics, research report
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
 
BIG DATA and USE CASES
BIG DATA and USE CASESBIG DATA and USE CASES
BIG DATA and USE CASES
 
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
 
Business case for Big Data Analytics
Business case for Big Data AnalyticsBusiness case for Big Data Analytics
Business case for Big Data Analytics
 
Telco Big Data Workshop Sample
Telco Big Data Workshop SampleTelco Big Data Workshop Sample
Telco Big Data Workshop Sample
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
5 Big Data Use Cases for 2013
5 Big Data Use Cases for 20135 Big Data Use Cases for 2013
5 Big Data Use Cases for 2013
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
 
Business intelligence 3.0 and the data lake
Business intelligence 3.0 and the data lakeBusiness intelligence 3.0 and the data lake
Business intelligence 3.0 and the data lake
 
000 introduction to big data analytics 2021
000   introduction to big data analytics  2021000   introduction to big data analytics  2021
000 introduction to big data analytics 2021
 
Callcenter HPE IDOL overview
Callcenter HPE IDOL overviewCallcenter HPE IDOL overview
Callcenter HPE IDOL overview
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
 

Viewers also liked

"How to create an efficient API.. with a business model?" by Nicolas Grenié
"How to create an efficient API.. with a business model?" by Nicolas Grenié"How to create an efficient API.. with a business model?" by Nicolas Grenié
"How to create an efficient API.. with a business model?" by Nicolas Grenié
TheFamily
 
Freire model api
Freire model apiFreire model api
Freire model api
The European Library
 
Best Practices for SharePoint Timer Jobs
Best Practices for SharePoint Timer JobsBest Practices for SharePoint Timer Jobs
Best Practices for SharePoint Timer Jobs
Shailen Sukul
 
Be My API How to Implement an API Strategy Everyone will Love
Be My API How to Implement an API Strategy Everyone will Love Be My API How to Implement an API Strategy Everyone will Love
Be My API How to Implement an API Strategy Everyone will Love
CA API Management
 
APIs in the Enterprise -Lessons Learned
APIs in the Enterprise -Lessons LearnedAPIs in the Enterprise -Lessons Learned
APIs in the Enterprise -Lessons Learned
Apigee | Google Cloud
 
API Strategy Evolution at Netflix
API Strategy Evolution at NetflixAPI Strategy Evolution at Netflix
API Strategy Evolution at Netflix
Michael Hart
 
Office 365 api vs share point app model
Office 365 api vs share point app modelOffice 365 api vs share point app model
Office 365 api vs share point app model
BIWUG
 
Google Cloud Platform : The API model
Google Cloud Platform : The API modelGoogle Cloud Platform : The API model
Google Cloud Platform : The API model
LaFrenchMobile
 
API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)Apigee | Google Cloud
 
Integral Calculus
Integral CalculusIntegral Calculus
Integral Calculusitutor
 
API Frenzy: API Strategy 101
API Frenzy: API Strategy 101API Frenzy: API Strategy 101
API Frenzy: API Strategy 101
Akana
 
Welcome to the API Economy: Developing Your API Strategy
Welcome to the API Economy: Developing Your API StrategyWelcome to the API Economy: Developing Your API Strategy
Welcome to the API Economy: Developing Your API Strategy
MuleSoft
 
Architecting an Enterprise API Management Strategy
Architecting an Enterprise API Management StrategyArchitecting an Enterprise API Management Strategy
Architecting an Enterprise API Management Strategy
WSO2
 

Viewers also liked (14)

"How to create an efficient API.. with a business model?" by Nicolas Grenié
"How to create an efficient API.. with a business model?" by Nicolas Grenié"How to create an efficient API.. with a business model?" by Nicolas Grenié
"How to create an efficient API.. with a business model?" by Nicolas Grenié
 
Freire model api
Freire model apiFreire model api
Freire model api
 
Best Practices for SharePoint Timer Jobs
Best Practices for SharePoint Timer JobsBest Practices for SharePoint Timer Jobs
Best Practices for SharePoint Timer Jobs
 
Be My API How to Implement an API Strategy Everyone will Love
Be My API How to Implement an API Strategy Everyone will Love Be My API How to Implement an API Strategy Everyone will Love
Be My API How to Implement an API Strategy Everyone will Love
 
APIs in the Enterprise -Lessons Learned
APIs in the Enterprise -Lessons LearnedAPIs in the Enterprise -Lessons Learned
APIs in the Enterprise -Lessons Learned
 
API Strategy Evolution at Netflix
API Strategy Evolution at NetflixAPI Strategy Evolution at Netflix
API Strategy Evolution at Netflix
 
Office 365 api vs share point app model
Office 365 api vs share point app modelOffice 365 api vs share point app model
Office 365 api vs share point app model
 
Google Cloud Platform : The API model
Google Cloud Platform : The API modelGoogle Cloud Platform : The API model
Google Cloud Platform : The API model
 
API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)
 
Integration Ppt
Integration PptIntegration Ppt
Integration Ppt
 
Integral Calculus
Integral CalculusIntegral Calculus
Integral Calculus
 
API Frenzy: API Strategy 101
API Frenzy: API Strategy 101API Frenzy: API Strategy 101
API Frenzy: API Strategy 101
 
Welcome to the API Economy: Developing Your API Strategy
Welcome to the API Economy: Developing Your API StrategyWelcome to the API Economy: Developing Your API Strategy
Welcome to the API Economy: Developing Your API Strategy
 
Architecting an Enterprise API Management Strategy
Architecting an Enterprise API Management StrategyArchitecting an Enterprise API Management Strategy
Architecting an Enterprise API Management Strategy
 

Similar to Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due diligence and performance

Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
Fintan Swanton
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
StephenGwadi
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
FLUZO
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
Marc St-Pierre
 
Data mining
Data mining Data mining
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
jainutkarsh078
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
IAB Bulgaria
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
Lee Schlenker
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Data mining
Data mining Data mining
Data mining
sayalipatil528
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
James Deiotte
 
Final ppt sec.data.coll
Final ppt sec.data.collFinal ppt sec.data.coll
Final ppt sec.data.collRam Sonawane
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 

Similar to Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due diligence and performance (20)

Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Data mining
Data mining Data mining
Data mining
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Data mining
Data mining Data mining
Data mining
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
 
Final ppt sec.data.coll
Final ppt sec.data.collFinal ppt sec.data.coll
Final ppt sec.data.coll
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due diligence and performance

  • 1. Making Big Data Your Ally Using data analytics to improve compliance, due diligence and investigations Thursday, February 6, 2014 | 3:00 - 4:00 PM Speakers: Raul Saccani, Dave Stewart, John Walsh
  • 3. Dave Stewart Director, Fraud and Financial Crimes Practice SAS Institute Cary, NC
  • 4. Raul Saccani Partner, Forensic and Dispute Services Deloitte Buenos Aires
  • 6. Dave Stewart Director, Fraud and Financial Crimes Practice SAS Institute Cary, NC
  • 7. The Challenge THRIVING IN THE BIG DATA ERA VOLUME DATA SIZE VARIETY VELOCITY VALUE TODAY THE FUTURE Copyright © 2012, SAS Institute Inc. All rights reserved.
  • 8. The Analytics Lifecycle BUSINESS MANAGER Domain Expert Makes Decisions Evaluates Processes and ROI EVALUATE / MONITOR RESULTS IDENTIFY / FORMULATE PROBLEM DATA PREPARATION DEPLOY MODEL IT SYSTEMS / MANAGEMENT Model Validation Model Deployment Data Preparation DATA SCIENTIST Data Exploration Data Visualization Report Creation DATA EXPLORATION ANALYST DATA MINER VALIDATE MODEL TRANSFORM & SELECT BUILD MODEL Exploratory Analysis Descriptive Segmentation Predictive Modeling
  • 9. Case Studies • Tier I Asian Bank – Visual analytics of Group Security Operations – Cross-border sharing of summary data • Tier I Global Bank – AML model tuning & optimization – Large volume peer group analysis • Tier I Global Bank – “Safety Net” approach for controlling affiliate risk – Ad hoc builds of illicit networks
  • 10. Observations • New capabilities require new thinking about business as usual • Variety of data & techniques requires new skills within lines of business • Adopt a pro-active/pre-emptive analytics strategy • Understand your company’s technology roadmap and get on board
  • 11. Raul Saccani Partner, Forensic and Dispute Services Deloitte. Buenos Aires
  • 12. Raúl Saccani´s presentation contents • Data privacy standards in Latin America, compared to US and EU standards, and • How data privacy rules, limitations on crossborder data sharing can impact compliance functions and internal investigations • Role of e-discovery in financial crime investigations, including internal investigations • Sources of data in internal investigations, including structured and unstructured data
  • 13. Privacy and Data Protection 1) 2) 3) 4) The context Data protection and electronic evidence EU law on privacy and data protection Practical considerations
  • 14. (1) Context Most personal information and most evidence are digital Lawyers and judges need to know significance of digital information Need to know and understand the : • nature of digital evidence • data protection rules of the road Otherwise no : • remedy for the data subject • fair trial for the accused • convictions for the prosecutor
  • 15. No. of countries with privacy laws The growth of global privacy laws Time Period
  • 16. (2) Data Protection and Electronic Evidence • • • • Overlapping Scope Data protection rules apply to the courts Fruits of the Poisoned Tree precautions to ensure admissibility of eevidence
  • 17. (3) EU Law on Privacy: two fundamental rights (a) the Right to Privacy ECHR (1950), Article 8 Everyone has the right to respect for his or her private and family life, home and correspondence EU Charter (2000), Article 7 : …and communications.
  • 18. (b) the Right to Protection of Personal Data an autonomous fundamental right to selfdetermination in the Information Society Article 16, EU Treaty EU Charter, Article 8 : 1. Everyone has the right to the protection of personal data concerning him or her.
  • 19. 2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified. 3. Compliance with these rules shall be subject to control by an independent authority
  • 20. Data Privacy • What is a Data Controller? – Person or entity who determines purpose and manner of processing – EU Directive imposes obligation to protect personal data – Potential liability for failure to fulfill obligations – Responsible for directing and controlling actions of Data Processor • What is a Data Processor? – Processes data on behalf of and at the direction of Data Controller – Must follow instructions of Data Controller
  • 21. Practical Considerations • Now you are in a position to make the necessary cost-benefit analysis. Ask yourself the following questions: – What is the true value of this source of information relative to (a) other more easily accessible sources of information and (b) the litigation as a whole? – What are the projected costs of complying with the EU Data Protection Directive? – What are the projected costs of defending a discovery dispute? – What are the relative strengths and weaknesses of each side on discovery issues?
  • 22. Outsourcing Personal Data Processing Contractual means:  All practicable security measures  Timely return, destruction or deletion of data  Prohibition against any use or disclosure for other purposes  Prohibition against sub-contracting  Right to audit and inspect
  • 23.
  • 24. Forensic Technology Identification Preservation Pre-processing Processing Review * Forensic methodology * Chain of custody * Integrity * Confidentiality
  • 25. Forensic Technology Identification Preservation (Pre-processing tasks) Pre-processing Processing Review * Integrity verification * Formats conversion and standardization * Chain of custody * Additional copies
  • 26. Forensic Technology Identification Preservation Pre-processing Processing Review (Obtain value from information without modifying it) *Deleted documents or e-mails *Information in hidden sectors or partitions *Encrypted files *Files with modified extensions *Internet devices, MSN, Y!, social networks *Applications audit trails / SO
  • 27. Forensic Technology Identification Preservation Pre-processing Processing Review (Review platform) *Do not modify evidence *Eliminate duplicates *Early Case Assessment (ECA) *Keywords / tags *Produce evidence *Bates stamping *Audit logs
  • 28. The Change is Driving Big Data Petabytes Terabytes Gigabytes Megabytes Data Complexity, Variety and Velocity
  • 29. Big Data Is… Big Data represents the Trends, Technologies and Potential for organizations to obtain valuable insight from large amounts of Structured, Unstructured and fast-moving data. 80% Unstructured Data Click Stream Videos Images Text Sensors
  • 30. Where Does Big Data Come From? • Our Data-driven World – Science • Data bases from astronomy, genomics, environmental data, transportation data, … – Humanities and Social Sciences • Scanned books, historical documents, social interactions data, new technology like GPS, … – Business & Commerce • Corporate sales, stock market transactions, census, airline traffic, … – Entertainment • Internet images, Hollywood movies, MP3 files, … – Medicine • MRI & CT scans, patient records, …
  • 31. Structured vs unstructured data • Structured data : information in “tables” Employee Manager Salary Smith Jones 50000 Chang Smith 60000 Ivy Smith 50000 Typically allows numerical range and exact match (for text) queries, e.g., Salary < 60000 AND Manager = Smith.
  • 32. Unstructured data • Typically refers to free text • Allows – Keyword-based queries including operators – More sophisticated “concept” queries, e.g., • find all web pages dealing with drug abuse
  • 33. Forensic Data Analytics - Definition Core objectives: Identifying, preserving, recovering, processing, and analyzing structured, standardized and/or codified digital information for the purpose of generating evidence that may be used as such in an investigation, and that may ultimately serve as legal actions support in litigation. Source of information: Company’s accounting system (ERP), proprietary or third partydeveloped vertical applications, intersystem interfaces, financial reporting worksheets.
  • 34. How data analytics works? Data Acquisition, Accounting Integrity Control and Data Mapping Evaluation of fraud and misconduct risk indicators Routines and tests Identification of unusual or irregular trends and patterns Analysis of preidentified transactions
  • 35. Usual procedures - Overview How data analytics works? – Reviews with focus in red flags detected. – Master vendor and customer files analysis: • Databases cross analysis between company databases and public databases and records. Some examples are:  Clients related to public biddings  Vendors/Clients with invalid or incomplete key data  Vendors/Clients with potential tax irregularities  Vendors/Clients with unusual activities  Vendors/Clients with unusual characteristics  Vendors/Clients with unusual transactional activity  Duplicate Vendors/Clients  Vendors/Clients related to employees or other Vendors/Clients  Employees related to other employees
  • 36. Employee - Vendor Matching: identical domicile as per external databases Masters External databases CODE VENDOR DOMICILE 100911 TRANSPORTES PARANÁ ARANÁ 1 P CODE EMPLOYEE 502435 JUAN PEREZ CITY Taxpayer ID CAP. FED. 30-70867893-0 DOMICILE CITY Employee ID AV PUEYRREDÓN 1111 AP. FED. 23-20667877-4 C Apparently unrelated COMPANY ALTERNATIVE DOMICILE NAME DOMICILE 30-70867893-0MARÍA PEREZ PARANÁ 1 AV. CÓRDOBA 999 PISO 3 Taxpayer ID Employee ID NAME DOMICILE CITY 23-20667877-4JUAN PEREZ CÓRDOBA 999 PISO 3 FED. CAP. The difference might arise from the fantasy name – company name Unusual relationship
  • 37. Examples of results per vendor He/she external public Based onwould be working under a sources, he/she would be working under a contract contract of of employment employment Individual Individual Related to Related to a a potentially irregular potentially irregular entity entity services Sequentially Sequentially numbered invoices numbered invoices Entity showing no tax activity Company name does not match the information filed with AFIP Vendor : Vendor C: Provider Provider of of advertising advertising services Significant number of legal actions Data quality issues (incomplete information) Vendor : Advisory services fees
  • 38. Vendor Name High risk fraud alert Unusual activity Master data changes Unusual Behaviour Inconsistent names Potential tax irregularities Connected entities Suspicious tax payer ID Suspicious address Suspicious telephone Unusual information Other Potential irregularities Data Quality - Invalid key data Data Quality - Missing key data Duplicates TOTAL SCORING Test 001 Test 002 Test 100 TOTAL TESTS Vendors with higher scoring 100123 100981 100789 101000 102078 Vendor 1 Vendor 2 Vendor 3 Vendor 4 Vendor 5 100 100 100 100 100 10 10 10 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 3 2 3 2 1 7 8 4 7 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 2 0 0 3 0 1 0 0 0 0 0 0 0 0 0 0 2 4 3 4 5 122 121 120 109 107 1 1 1 0 0 0 1 0 0 0 0 0 0 1 1 1 2 1 1 1 Each routine is classified into these groups considering the estimated risk inherent to each test. Note: for instance, only three routines are identified in the chart. The complete analysis includes over 200 routines.
  • 39. Manual Journal Entries Ranking • Night shifts • Unbalanced entries • Reclassifications • Weekends • Rarely used accounts • Benford Law • Holidays • Adjustments • Round numbers • Reversals

Editor's Notes

  1. Customers are looking critically at the “Big data” termand asking what all the fuss is about!Big data – however you define it – isn’t going away and it isn’t getting smaller. Big data is a relative term describing a situation where the volume, velocity and variety of data exceed an organization’s storage or compute capacity for accurate and timely decision making.Volumes - Growing volumes of data and how much data need to be processed within a time window Variety - includes structured tables, documents, e-mail, metering data, video, image, audio, stock ticker data, and more. Velocity - How fast data is produced and processed to meet demand. Ability to respond once a problem or opportunity is detected. With the wealth of data coming at them, organizations struggle with managing the information overload. But we do not want the amount , type and speed at which you are collecting data limit the analytics you can do! They also have to identify what is relevant set of data to answer the complex set of questions before they become obsolete. So the concept of “relevance” is really important and will change over time as we get new data. Big data in and of itself is not that interesting! First you need good data management practices to managebig data. Secondly you can leverage “big data” for valuable insights byusing high-performance analytics. It can help to improve decision making at all levels, whether to gain better customer insights, manage risks or improve operational metrics.
  2. The Analytics Life Cycle is a way to automate and production-ize the creation, development, testing and deployment of models in an organization.