SlideShare a Scribd company logo
December 6, 2017
Preventing Fraud with a
Multi-Channel Approach
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 2
Jesus Ortiz
VP Product Development
Margarete Mucker
EVP, Operations
Karen Webster
CEO
Preventing Fraud with a Multi-Channel Approach
Guardian Analytics Presents
Featuring:
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 3
• Founded in 1956
• Headquartered in Silicon Valley, CA
• More than $9 billion in assets
• 100,000 Members
• Ranked 10th in total assets among
6,500 credit unions nationally
• Ranked #1 by the Credit Union
National Association for the past 4
years for member giveback
About Star One Credit
Union
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 4
The year 2006 brought a dramatic change in how FIs and technology
companies could work together to reduce fraud.
Emerging Fraud & New Requirements
Emerging fraud
FFIEC MFA guidelines
Member protection
Rules can’t compete
MFA doesn’t stop fraud
Machine learning offers
true protection
Star One’s Perspective Guardian Analytics’ Perspective
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 5
• We see a wide range of online attacks
• You never know which tactic a criminal will use
• Criminals can get past controls
• You may not know you have “fraud”
• Not all online account takeovers end in an
unauthorized online transaction
• Cross-channel fraud starts online
• It’s not a matter of if, but when
Star One’s Perspective on Threats
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 6
Star One’s Attitude on Fraud Prevention
• Starting with payment fraud is too
late
• We must protect our members
from themselves
• Looking at behaviors, not
transactions, offers true protection
Results from a Decade of
Behavioral Analytics-Driven
Fraud Detection
Case Studies from Star One Credit
Union
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 8
1. Fraudster used phishing email to steal member account
credentials
2. Fraudster logged in to account and created a new bill pay payee
3. $4,500 was sent to the payee – a victim of a romance scam
cultivated by the fraudster
4. Upon receiving the money, the romance scam victim wired the
money back to the fraudster
5. After Star One reversed the transaction and credited the
member’s account, the romance scam victim suffered the $4,500
loss
Takeaways: The source of this fraud was the Phishing e-mail and
the entry into Online Banking. If we would have had Guardian
Analytics in place at the time of this fraud, we feel, it would have
been prevented and would have revealed the suspicious activity at
the time of the initial unauthorized login.
Case Study: Before Guardian Analytics
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 9
Case Study: In Beta With Guardian Analytics
1. Fraudster used social engineering to obtain member login credentials &
personal info
2. Fraudster contacted call center to change account phone number
3. Fraudster logged into member account and viewed cleared drafts to learn
member’s signature
4. Fraudster initiated wire transfer of $98k to bank in Texas
5. Since signature matched and phone number routed to fraudster, Star One
approved the transaction
6. Member discovered the loss when reviewing monthly statement
7. When Guardian Analytics reconstructed the login analysis of the account,
they produced a Red alert on the first fraudulent login
Takeaways: The source of this fraud was the public/private info the fraudster
had in order to social engineer our call center. We feel, and have the proof,
that the Guardian solution would have discovered this fraud even though it
involved both online and offline activity.
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 10
1. Guardian Analytics surfaced a red risk alert for an
account login
2. Further investigation into activity from the login
showed check image views and password & MFA
question updates
3. Star One member claimed good security practices,
felt no breach to his system was possible
4. Upon running a malware program, member
discovered a key logger on his system
Takeaway: Even practicing good security habits can
leave a PC vulnerable. With a solution in place that really
guards against unauthorized logins, we feel we have
extended the security on our valuable Online Banking
members who are amongst the most savvy and profitable
to us.
Case Study: Fraud Prevented
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 11
1. Member disputed Visa charges that occurred in person and
online
2. Star One looked at Guardian Analytics data and found no
anomalous activity
3. When faced with results of the investigation, member
“remembered” that she had in fact made the purchases she
was disputing and rescinded her affidavit
Takeaways: The Guardian system helped us detect when there
was no fraud present. We feel that after explaining our methods
of investigating online fraud and specifically the use of the login
analysis tool, that our member realized that we have were aware
of actual verified logins performed by the member at the time
she clamed there was fraudulent activity.
Case Study: Fraud from Within
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 12
7,540 average daily logins
0.26% red and yellow alerts
3.35% of alerts require
qualifying
17% of qualified
alerts are
actionable
Efficiency: Average Daily Alert Volume
Guardian Analytics leads to
• Fewer total alerts
• More qualified alerts
• Less time spent reviewing
false positives
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 13
Prevented Fraud Loss in 2017
Loss prevented from 9 Bill-Pay
transaction alerts
Loss prevented from Reg E ACH
disputes across 40 transactions
Loss prevented from Wire Transfer
fraud across 4 transactions
$160,469 $197,180 $878,47
2
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 14
Guardian Analytics Approach to Fraud
Prevention
Collect user data
from online activity
and transactions
Compare to known
user ‘behavior’
Flag behavior that is
statistically anomalous for
that user
Create action to
mitigate risk
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 15
Building an End-to-End Solution
2017: AML
Beta
2016:
Omni-
Channel
Visual
Analytics
2015: ACH
RDFI
2014: ACH
ODFI &
Wire
2012:
Mobile
2007:
Online
Retail
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 16
• We have brought online losses to near $0
• We experience low alert rates
• We have no rules/scenarios to write
• There is no change to our customer
experience and we market our security as
an advantage to our members
• Examiners & the board are happy
• It feels like criminals do not attack us as
much anymore because nothing gets
through!
Star One Perspective:
Why Guardian Analytics?
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 17
Guardian Analytics Customers See Results
Cut fraudulent transactions by 90%
Lower false positives by 5x
Reduce callbacks by 80%
Capture fraud in real time
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 18
Modern Financial Crime Platform Architecture
Omni-Channel Risk Engine
Enterprise API Integrated Risk Database
Fraud Cockpit
Omni-Channel Visual Analytics
Online Mobile ACH Wire Supplier
Portal
AML
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 19
Financial
institutions
Commercial & retail
account holders
Banking
activities
450 40M 5B
Guardian Analytics at a Glance
© 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 20
Q&A
Please add your questions to the
questions module on your control panel.

More Related Content

What's hot

Bridger Insight brochure
Bridger Insight brochureBridger Insight brochure
Bridger Insight brochure
LexisNexisDiligence
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
Imperva
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
derektop
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?
Jari Koister
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
Laurent Pacalin
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
Matt Moneypenny
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
Roberto Sponchioni
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Meg Weber
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurance
stuartdrose
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
Ken Lam
 
Heartland
HeartlandHeartland
Heartland
grimesjo
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
Ankit Dua
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 

What's hot (17)

Bridger Insight brochure
Bridger Insight brochureBridger Insight brochure
Bridger Insight brochure
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurance
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Heartland
HeartlandHeartland
Heartland
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 

Similar to Preventing Fraud with a Multi-Channel Approach

Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
IRJET Journal
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
Wynyard Group
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
Laurent Pacalin
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance Specifics
Joseph Brunsman
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
bpeacher
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
TransUnion
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
Laurent Pacalin
 
IDTmemberGuide
IDTmemberGuideIDTmemberGuide
IDTmemberGuide
Cynthia Chang
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
Angela Carrier- Founder, Business Leader Forum
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
Joan Weber
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud Detection
Laurent Pacalin
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
ForgeRock
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
Geo Coelho
 

Similar to Preventing Fraud with a Multi-Channel Approach (20)

Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
CPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance SpecificsCPA firm Cyber Insurance Specifics
CPA firm Cyber Insurance Specifics
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
 
IDTmemberGuide
IDTmemberGuideIDTmemberGuide
IDTmemberGuide
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
New Frontiers in Fraud Detection
New Frontiers in Fraud DetectionNew Frontiers in Fraud Detection
New Frontiers in Fraud Detection
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 

More from Guardian Analytics

Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Guardian Analytics
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Guardian Analytics
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
Guardian Analytics
 
Infographic: New Requirements of Fraud Prevention
Infographic: New Requirements of Fraud PreventionInfographic: New Requirements of Fraud Prevention
Infographic: New Requirements of Fraud Prevention
Guardian Analytics
 
How Do You View Fraud Risk?
How Do You View Fraud Risk? How Do You View Fraud Risk?
How Do You View Fraud Risk?
Guardian Analytics
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
Guardian Analytics
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
Guardian Analytics
 
ACH Payments - Banking Fraud
ACH Payments - Banking FraudACH Payments - Banking Fraud
ACH Payments - Banking Fraud
Guardian Analytics
 

More from Guardian Analytics (8)

Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
Infographic: New Requirements of Fraud Prevention
Infographic: New Requirements of Fraud PreventionInfographic: New Requirements of Fraud Prevention
Infographic: New Requirements of Fraud Prevention
 
How Do You View Fraud Risk?
How Do You View Fraud Risk? How Do You View Fraud Risk?
How Do You View Fraud Risk?
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
ACH Payments - Banking Fraud
ACH Payments - Banking FraudACH Payments - Banking Fraud
ACH Payments - Banking Fraud
 

Recently uploaded

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 

Recently uploaded (20)

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 

Preventing Fraud with a Multi-Channel Approach

  • 1. December 6, 2017 Preventing Fraud with a Multi-Channel Approach
  • 2. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 2 Jesus Ortiz VP Product Development Margarete Mucker EVP, Operations Karen Webster CEO Preventing Fraud with a Multi-Channel Approach Guardian Analytics Presents Featuring:
  • 3. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 3 • Founded in 1956 • Headquartered in Silicon Valley, CA • More than $9 billion in assets • 100,000 Members • Ranked 10th in total assets among 6,500 credit unions nationally • Ranked #1 by the Credit Union National Association for the past 4 years for member giveback About Star One Credit Union
  • 4. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 4 The year 2006 brought a dramatic change in how FIs and technology companies could work together to reduce fraud. Emerging Fraud & New Requirements Emerging fraud FFIEC MFA guidelines Member protection Rules can’t compete MFA doesn’t stop fraud Machine learning offers true protection Star One’s Perspective Guardian Analytics’ Perspective
  • 5. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 5 • We see a wide range of online attacks • You never know which tactic a criminal will use • Criminals can get past controls • You may not know you have “fraud” • Not all online account takeovers end in an unauthorized online transaction • Cross-channel fraud starts online • It’s not a matter of if, but when Star One’s Perspective on Threats
  • 6. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 6 Star One’s Attitude on Fraud Prevention • Starting with payment fraud is too late • We must protect our members from themselves • Looking at behaviors, not transactions, offers true protection
  • 7. Results from a Decade of Behavioral Analytics-Driven Fraud Detection Case Studies from Star One Credit Union
  • 8. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 8 1. Fraudster used phishing email to steal member account credentials 2. Fraudster logged in to account and created a new bill pay payee 3. $4,500 was sent to the payee – a victim of a romance scam cultivated by the fraudster 4. Upon receiving the money, the romance scam victim wired the money back to the fraudster 5. After Star One reversed the transaction and credited the member’s account, the romance scam victim suffered the $4,500 loss Takeaways: The source of this fraud was the Phishing e-mail and the entry into Online Banking. If we would have had Guardian Analytics in place at the time of this fraud, we feel, it would have been prevented and would have revealed the suspicious activity at the time of the initial unauthorized login. Case Study: Before Guardian Analytics
  • 9. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 9 Case Study: In Beta With Guardian Analytics 1. Fraudster used social engineering to obtain member login credentials & personal info 2. Fraudster contacted call center to change account phone number 3. Fraudster logged into member account and viewed cleared drafts to learn member’s signature 4. Fraudster initiated wire transfer of $98k to bank in Texas 5. Since signature matched and phone number routed to fraudster, Star One approved the transaction 6. Member discovered the loss when reviewing monthly statement 7. When Guardian Analytics reconstructed the login analysis of the account, they produced a Red alert on the first fraudulent login Takeaways: The source of this fraud was the public/private info the fraudster had in order to social engineer our call center. We feel, and have the proof, that the Guardian solution would have discovered this fraud even though it involved both online and offline activity.
  • 10. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 10 1. Guardian Analytics surfaced a red risk alert for an account login 2. Further investigation into activity from the login showed check image views and password & MFA question updates 3. Star One member claimed good security practices, felt no breach to his system was possible 4. Upon running a malware program, member discovered a key logger on his system Takeaway: Even practicing good security habits can leave a PC vulnerable. With a solution in place that really guards against unauthorized logins, we feel we have extended the security on our valuable Online Banking members who are amongst the most savvy and profitable to us. Case Study: Fraud Prevented
  • 11. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 11 1. Member disputed Visa charges that occurred in person and online 2. Star One looked at Guardian Analytics data and found no anomalous activity 3. When faced with results of the investigation, member “remembered” that she had in fact made the purchases she was disputing and rescinded her affidavit Takeaways: The Guardian system helped us detect when there was no fraud present. We feel that after explaining our methods of investigating online fraud and specifically the use of the login analysis tool, that our member realized that we have were aware of actual verified logins performed by the member at the time she clamed there was fraudulent activity. Case Study: Fraud from Within
  • 12. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 12 7,540 average daily logins 0.26% red and yellow alerts 3.35% of alerts require qualifying 17% of qualified alerts are actionable Efficiency: Average Daily Alert Volume Guardian Analytics leads to • Fewer total alerts • More qualified alerts • Less time spent reviewing false positives
  • 13. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 13 Prevented Fraud Loss in 2017 Loss prevented from 9 Bill-Pay transaction alerts Loss prevented from Reg E ACH disputes across 40 transactions Loss prevented from Wire Transfer fraud across 4 transactions $160,469 $197,180 $878,47 2
  • 14. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 14 Guardian Analytics Approach to Fraud Prevention Collect user data from online activity and transactions Compare to known user ‘behavior’ Flag behavior that is statistically anomalous for that user Create action to mitigate risk
  • 15. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 15 Building an End-to-End Solution 2017: AML Beta 2016: Omni- Channel Visual Analytics 2015: ACH RDFI 2014: ACH ODFI & Wire 2012: Mobile 2007: Online Retail
  • 16. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 16 • We have brought online losses to near $0 • We experience low alert rates • We have no rules/scenarios to write • There is no change to our customer experience and we market our security as an advantage to our members • Examiners & the board are happy • It feels like criminals do not attack us as much anymore because nothing gets through! Star One Perspective: Why Guardian Analytics?
  • 17. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 17 Guardian Analytics Customers See Results Cut fraudulent transactions by 90% Lower false positives by 5x Reduce callbacks by 80% Capture fraud in real time
  • 18. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 18 Modern Financial Crime Platform Architecture Omni-Channel Risk Engine Enterprise API Integrated Risk Database Fraud Cockpit Omni-Channel Visual Analytics Online Mobile ACH Wire Supplier Portal AML
  • 19. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 19 Financial institutions Commercial & retail account holders Banking activities 450 40M 5B Guardian Analytics at a Glance
  • 20. © 2017 Guardian Analytics. All Rights Reserved – Confidential and Proprietary. 20 Q&A Please add your questions to the questions module on your control panel.

Editor's Notes

  1. Keystroke logging malware and man in the middle browser attacks. FFIEC came out with new guidelines for multifactor authentication. Star One realized even with the new MFA members were not protected from online fraud. Keystroke logging malware and man in the middle browser attacks would continue and make members vulnerable to fraud. We also knew that education would not solve this problem either. Ultimately, any fraud or losses would be Star One responsibility and we would make our member whole. Our view was that all members pcs are compromised and to built a security strategy to protect members and detect criminal online activity. In late 2006, GA called to pitch a new fraud monitoring system that was not solely based on rules but in their concept also included behavioral detection. We were intrigued as we knew that the MFA wasn’t a fraud solution so we invited GA in and they pitched their idea and we were sold. Not only did their behavioral analysis made them different, they also promised less false positives, ….and here we are today!! When Guardian Analytics was founded in 2005, the original founders had determined that financial institutions, and their customers, were not adequately protected from fraud.   At that time, FIs were relying on rules-based systems that could not keep up with the changing tactics from fraudsters. In addition, the rules were unnecessarily cumbersome for legitimate customers trying to conduct banking transactions.   The abundance of alerts generated by overly conservative rules resulted in some fraud analysts ignoring alerts, which allowed persistent fraudsters many opportunities to breach customer accounts.   Ultimately a new approach was needed and this paved the way for machine learning.   Guardian Analytics developed the first fraud detection platform that used machine learning and behavior-based anomaly detection to help financial institutions prevent fraud.   Through machine learning and behavioral analytics, the Guardian Analytics platform is able to automatically adapt to new types of fraud, reduce false positives, and remove friction between financial institutions and their customers.
  2. Criminals can get past controls (limits, authentication, email alerts) Cross-channel fraud starts online (check fraud, call center fraud, faxed wire fraud)
  3. Most FI’s at that time didn’t realize that some of the payment fraud originated with compromised online banking logins and focused where the fraud occurred not where it generated. Star One learned that lesson when working with Guardian during the beta realizing that some of the online banking credentials were compromised resulting in fraud through other channels as wire fraud or ACH. Most of the FI at that time thought that MFA would suffice. A few signed up with another competitor in the space which was rule based alerts and generated a lot of false positives. I like to use a phrase from my web service manager, our members can tattoo their account logins on their fore head and they are protected. By using guardian we are protecting our members from themselves. We can catch fraud before it occurs by an alert from GA and as we contact our members to validate the login we can block the fraudster from using the information or if a request comes through we already know that the members has been compromised. Any unusual requests via online or faxes for large $ withdrawal (wire, Ach, Transfer or check requests) staff would check with Web services against the alerts from Guardian. We have that much confidence in the tool we raised our mobile deposit limit from $ 25K to $200 k and have now eliminated the limit completely. We also at that time knew that behavior analysis was the key, not transactional.
  4. Discovery: Our member noticed that their Bill Pay account had a new entry and a charge for $4,500 that she did not authorize. Setup: A fraudster performed an unauthorized login into our members online account and set up a new Bill Pay payee/payment for $4,500 (sent to a person he met in an online romance internet chat room). Result: The fraudster obtained our members login info, we feel, from a Phishing e-mail and used the existing Bill Pay account to send his chat companion $4,500. The fraudster then asked the unknowing chat accomplice to wire him $4,500 from her account to pay him back. After we put the funds back into our members account and reversed the transaction, the unknowing accomplice was out the $4,500. Takeaways: The source of this fraud was the Phishing e-mail and the entry into Online Banking. If we would have had the Guardian Solution in place at the time of this fraud, we feel, it would have been prevented and would have revealed the suspicious activity at the time of the initial unauthorized login.
  5. Discovery: Our member noticed there was $98,000 missing from his Savings Account and that it had been transferred into his HELOC and then the funds were withdrawn. All of this occurred over a 5 day period. He noticed it after reviewing his monthly statement. Setup: A fraudster performed an unauthorized login into our members Online account and viewed his cleared drafts over and over (in order to learn and copy the signature of our member). The fraudster then transferred $98,000 into the HELOC account using Online Banking. The next day we received a signed faxed request for a Wire Transfer in the amount of $98,000 to a bank in Texas. We performed the normal due diligence (verified signature and contacted our member based upon our host system info) and completed the transaction. Result: The fraudster obtained our members personal info and used social engineering and our call center to change the phone number of record (changed to his number) and the Online Banking password. Thus when we did our due diligence, we ended up calling the actual fraudster to confirm the transfer as well as confirming the signature. Upon the member alerting us (in a panic), we asked Guardian to reconstruct the login analysis of this member (we were in beta testing with their pilot program at the time). The results were stunning. On the initial date of the login (1 day prior to the call center manipulation), FraudMap discovered the online profile anomaly and alerted “Red”. Takeaways: The source of this fraud was the public/private info the fraudster had in order to social engineer our call center. We feel, and have the proof, that the Guardian solution would have discovered this fraud even though it involved both online and offline activity.
  6. Discovery: Guardian alerted “Red” for a login into a members account. Further investigation revealed that the person who performed the unauthorized login looked at check images and changed the password and Multi Factor question. Setup: The fraudster, we believed at the time, used a Trojan or key logging program or a Phishing e-mail to gain the users member number/password/Multi Factor question and answer. Because the check images were viewed, we felt that further fraud might be brought to this account. Result: We placed contacts on the account and contacted the member. The member was sure that it was not anything on his system because he claimed he kept his PC clean and practiced good security. We recommended he run an adware or malware program to further clean the machine. Upon doing so, he in fact found a key logger on his system and couldn’t thank us enough. Takeaways: Even practicing good security habits can leave a PC vulnerable. With a solution in place that really guards against unauthorized logins, we feel we have extended the security on our valuable Online Banking members who are amongst the most savvy and profitable to us.
  7. Discovery: A member filled out a Visa dispute form for charges that she claimed she or her daughter had not authorized. Oddly, she claimed that some payments to her Visa had also been made online. Setup: The member actually disputed a large number of transactions until we used the Guardian system to find out that there were no unauthorized logins and in fact the profile was quite normal for the dates she claimed withdrawals and payments were being made. Result: Upon realizing that we were not completely sure that there was fraud involved, the mother “remembered” that she in fact had made the purchases and payments for her daughter and rescinded her affidavit after pressure from her spouse. Takeaways: The Guardian system helped us detect when there was no fraud present. We feel that after explaining our methods of investigating online fraud and specifically the use of the login analysis tool, that our member realized that we have were aware of actual verified logins performed by the daughter and mother at the time she clamed there was fraudulent activity.
  8. an approximately 2,760,000 login attempts. Of those, 1,745 were red alerts and 5295 were yellow alerts representing a combined 0.26% of our total logins. This resulted in approximately 19 (red and yellow) events per 7540 login events on average per day. On a typical mid-week day, we see on average 5-7 red alerts. Those are highly qualified alerts and the low false positive figure allows us to concentrate staff time on investigation real probable fraud scenarios. Of those Red/ Yellow events 236 required qualifying. Of those, 41 were qualified action events (required follow up /placing a contact on the host or contacting the member).
  9. Bill Pay alerts - 9 transactions, $160,469.41 Reg E ACH Disputes - 40 transactions, $197,179.64 Wire Transfer fraud - 4 transactions, $878,471.84 Additional Results 2017 – received wire form from a suspicions IP address Wire Fraud attempted $230,000 2016 – suspicious login, call center social engineering Fraud attempted $130,000 2015 – suspicious alert, member confirmed fraudulent Fraud attempted $65,000 2013 – suspicious login, compromised computer. EFT and BP. Fraud attempted $322,000, loss sustained $65,000
  10. Let’s talk a little bit about how machine learning actually works to identify fraud.   Machine Learning models follow a well-defined pattern that is used across Data Science.  The model collects user data from online activity and transactions. This data allows the model to learn the behavior of each user.  Each new user activity provides the model with more information to learn (such as location from where transactions is being made, amount of transactions, type of computer, type of browser, recipient, etc.).    When a new transaction is made by the user, the Machine Learning model compares the behavior of the new transaction against the already learned behavior across many data points (is this a new type of computer, is the location different, etc.).  If the behavior is anomalous – meaning it doesn’t fit the pattern that the system has seen in the past from that user — the system flags the transaction so that it can be reviewed. This allows fraud analysts to take action to mitigate the risk and learn from it.   Thus, our platform knows that Customer A uses a PC and only logs in to online banking from home on Friday nights. When the system detects this customer trying to log in from an iPhone in Italy, it knows that the behavior is highly unusual for him, even if it wouldn’t otherwise be noteworthy for a different customer.
  11. Having the online protection and saw how it protected our members and Star One, it was an easy decision to incorporate the mobile channel when GA came to us for testing. Even though our fraud is low compared to some other FI’s we wanted to ensure that all channels had some type of monitoring. GA knew that Star One processed a lot of wires and any wire requests was checked against online logins for unusual behavior. That protected online members not all. So when GA came out with a wire fraud tool Star One was first in line again as well as for ODFI ACH. Even though our originating ACH files are small they are at higher risk so we implemented ODFI as well. We really wanted the RDFI, that’s where our volume is. We feel that all these tools work together and provide a good picture of our members transaction behavior so looking to GA for an AML solution was second nature. We have one in place currently because GA didn’t have one, but we would love to switch over AML to GA as well. We like the Omni channel analytics but to be honest we haven't signed up for it just yet. We use FraudMAP for external funds transfer name mismatch validation and additional context We monitor account activity We investigate Bill Pay signups We validate member “claims” about activity, for example: Email address changes by ex-wife “Fraudulent” Bill Pay by members “Account takeover” by member’s mother
  12. Fraudulent transactions (bill pay, wire, etc.) Account reconnaissance (view check images, change email address, etc.) Guardian has allowed us to take more risks and make our members happier Full range of online and mobile services Increase external transfer limits Increase RDC from $2,500 to $200,000
  13. The benefits that Star One described are representative of what we are seeing across our customer base. To validate these results, we engaged Nucleus Research Group who worked directly with our customers to analyze the impact from using Guardian Analytics.  As you can see the benefits are impressive. Based on our customer data, fraudulent transactions were cut by 90%, False positives reduced by 5x, and Callbacks reduced by 80% -- all of which lead to helping FIs capture Fraud before it occurs.
  14. Our financial crime prevention platform provides end-to-end protection to financial institutions and their customers.   We provide Visual Analytics that allow fraud teams to get a 360-degree view of customer behavior. And our increasingly comprehensive views of multi-channel activity bring us closer to making true Omni Channel a reality for our customers. We cover the whole scope of banking interactions, from login to the actual transactions. These insights into customer behavior provide advanced protection and real-time control over fraudsters and fraud risk.  And it’s all built on the industry’s leading behavioral analytics and machine learning risk engine.    Our Enterprise API enables machine-to-machine integration and gives our customers the best protection against fraudulent attacks. On top of all of this, our new business intelligence dashboard, Fraud Cockpit, provides full business insights into Fraud Operations.
  15. We truly mean business when it comes to protecting our customers’ financial assets.  With more than 450 financial institutions as our customers, ranging in scope from millions in assets to $600Billion, we analyze the behavior of over 40M commercial and retail account holders, and protect over $5B in banking activities each year, making us the #1 behavioral analytics platform for Fraud detection.