SlideShare a Scribd company logo
www.productschool.com
Part-time Product Management Training Courses
and
Corporate Training
Join 40,000+
Product Managers on
Free Resources
Discover great job
opportunities
Job Portal
prdct.school/PSJobPortalprdct.school/events-slack
Alumni graduated
across 20 campuses
Cities all over the world
+100
10,000+
CERTIFICATES
Your Product Management Certificate Path
Product Leadership
Certificate™
Full Stack Product
Management Certificate™
Product Management
Certificate™
20 HOURS40 HOURS40 HOURS
Corporate
Training
Level up your team’s Product
Management skills
Ram
Ravichandran &
Sreekant
Vijayakumar
T O N I G H T ’ S S P E A K E R S
Creating Safe
Digital Experience
Ramkumar Ravichandran – Data science TLM, Google Shopping
Sreekant Vijayakumar – Sr. Product Mgr, Fraud Mitigation & Payments
Disclaimer: Participation in this summit is purely on personal basis and is not meant to represent Adobe or Google’s position on this
or any other subject and in any form or matter. The talk is based on learning from work across industries and firms. Care has been
taken to ensure no proprietary or work related information of any firm is used in any material.
8
https://images.app.goo.gl/9JWr3HY4gsq5o1uP9
OK! Double clicking on the topic first...Digital?
9
Creating Safe Digital Experience
All Digital Assets that are
significant portion of User
Journey (Product, Platform,
Business Model, etc.)
...Safe?
10
Creating Safe Digital Experience
Protect, Resolve,
Recover
...Creating?
11
Creating Safe Digital Experience
Products, Tools & Systems,
Processes, Ownership Matrix,
Culture
● Why?
● What?
● How?
● Why?
Agenda
12
Role of Risk PM is now Strategic & Proactive from
predominantly Financial & Reactive earlier...
13
https://www.flaticon.com/free-icon/bank_755195
$bns in Impact, #Ms Customers Impacted, Brand Impact ($bn), Regulatory Fines ($bn)
Accelerating further because of digitization
Evolving ecosystem complications (touchpoints, form factors, AI driven, Edge AI)
Evolving actors & motivations
Glocalization: Regulations, Privacy Expectations, Payments
https://www.pci.upenn.edu/event-calendar/accelerate-icon/
https://www.sccpre.cat/show/ibboxoi_download-evolution-and-the-social-mind-digital-ecosystem/
https://www.istockphoto.com/illustrations/hacker-logo?sort=best&mediatype=illustration&phrase=hacker%20logo
https://apkpure.com/blue-browser/appinventor.ai_sidney_net.BlueBrowser
● Why?
● What?
● How?
Agenda
14
● What?
Personas Threat Types Vectors
Personas: Classifications of Actors
15
Motivation03
● Financial Motivation (Profit/Arbitrage)
● Malice (Crime, AML, Sabotage)
● Validation (Emotional, Commercial, PR)
● Competitive Intentions
● Strategic Social Engineering
Origin of Threat02
● Internal (Employees, Vendors, Suppliers,
Partners)
● External
Entities by Size,
Sophistication & Scope
01
● Level 1: Individuals
● Level 2: Organized Enterprises
● Level 3: State Sponsored
Threat Types
16
Cybersecurity
Targets Infrastructure,
e.g., GitHub ASN attack,
Wannacry ransomware
Policy Violation
e.g., Money Laundering,
Scams, Counterfeits,
Content
Platform/Service Abuse
Promotions/Returns Abuse,
Platform misuse, e.g.,
AAirpass, Cambridge Analytica
Information Security
Critical Customer Data
targeted, e.g., 2018 Marriott
(500M #), 2017 Equifax (143M#)
Monetary Fraud
Intentional Defrauding-Stolen
Cards, ATO, Non Repayments,
e.g., UB Group, 37% Installed
Software is pirated
02
01
05 04
03
Attack Vectors
17
Acute Growth Rapid Exploitation of single vulnerability, e.g., stolen credentials
Multipoint Exploitation of a connected vulnerability, e.g., Target Hack
Opportunistic/
Strategic
Stay under-the-radar and wait for right timing, e.g., Sony Hack
Signature Spoofing Sophisticated set up that mimics genuine customer behavior
Network Co-ordinated exploitation on multiple fronts, e.g., fake accounts
Target Switching Migrate attack from stronger systems to weaker systems, e.g, Match.com
Common Delivery Mechanisms (not exhaustive)
18
Common Types
Bots Injections Hijacking Spoofing Testing Mimicking
●Pings
●DDos
●Form
Fillers
●SQL
●Ads
●Browsers
●Notificatio
n
●iFrames
●APIs
●Page
Elements
●CTAs
●Credential
s
●Ip spoofing
●Device
●2FA
●Credential
s
●Card
Testing
●APIs
●Network
Creators
●Deep Fake
Algorithms
● Why?
● What?
● How?● How?
Agenda
19
Ecommerce - Risk Overview (illustrative)
Driver Common Risk Types tracked
Merchants
Significantly Not As Described (SNAD), Item Not Received (INR), Merchant-Buyer Collusion,
Merchant-Merchant Collusion, Money Laundering (Fake Sales), Counterfeits, Scams,
Competitor Sabotage, Price Undercutting, Redirecting Sales, Cannibalizing Offers, Fake Ads,
Non-Compliant Inventory, Settlement Frauds, Delayed/Non-Payment of Dues, PII & PAI
Misuse, Subsidy Misuse
Affiliates Traffic & Attribution Fraud, Ad Fraud
Buyers
Buyer Collusion, Returns Abuse/Over Use, Promotions Abuse, Refund Abuse & Fraud,
Referral Frauds, Remorse Returns, Improper Chargebacks, Bulk Buyers, Subscription
Cancellation (Trial Policy Abuse), Account Sharing, False Rating & Comment Abuse,
Resellers, Networks
Fraudsters
Account Take Over (ATO)- Buyers/Sellers/Partners, Stolen Cards (SC), Negative Balance at
Settlement (NBL),Stolen Packages, Spamming, Credential Spoofing
Partners
Lost/Damaged in Transit, Missing Packages, Bad Delivery, Vulnerable Systems, Operational
Issues, Insider Risk
Key Steps in Protection
21
Profile
Define and evaluate
various customers risk
profiles
Feedback
Ongoing feedback
from the false
positive/negative
analysis
Monitor
Tracking of customer
interactions for risky
behaviour
Mitigate
Measures to
segregate and nullify
the fraud vector
Identify
Means to identify
various vectors
without causing
friction
Detect and
Mitigate Threat
Enterprise Security Layers
Platform Overview
Stakeholders
● Build product roadmap and vision
● Educate stakeholders
● Drive initiatives
● Customer Experience
● Platform
Product
Management
● Scalable solution design
● Build platform capabilities
● Architects
● Developers
Engineering
● Identify and leverage data sources
● Build models to power capabilities
● Monitoring and alerts
● Data Scientist
● Analysts
Data Sciences
● Review orders
● Perform ad-hoc analysis
● Drive intelligence
● Investigations
● Reviewers
● Fraud Analysts
Operations
● Terms and conditions
● Privacy impact
● Traceability matrix
● Privacy
● Legal
● Compliance
● Audit
Enforcement
● Campaign cohorts
● Cohort removal
● Overstatement prevention
● Sales
● Marketing
● Growth
● Finance
Business
Product Management in Risk
25
IterateDeliveryRoadmapGoalsVision
• Define the long term vision
• Communicate to key stakeholders
• Buy-in from management
• Set up time bound goals
• KPIs to measure impact
• Bottomline to business
• Prioritized Initiatives list
• Milestones for each initiative
• Timeline for delivery
• Trade-offs
• Data Driven Optimization
• Support, Operations & Distribution
• Refine, Revamp or Retire?
• ”Learn-Listen-Test” launch
• Usage Protocols : Guide & Comply
25
Data Science in Risk Management
Typical KPIs
Monitoring, Alerts &
Analyses
Predictive Modeling
Investigations
Actual Loss Rate (#, $, %), Attempted Rate (%), Prevented Loss Rate* (#, $,
%), Successful Contest Rate (%), False Positive Rate, PR AUC, Agent Review
Pass Through Rate (%), Abuse Rate (%), Customers Impacted (#), CS Calls (#)
& CS Time Spent
Key Monitoring Reports & Analyses Readouts, Threshold & Custom Alerts
(Segments/Geos/Accounts)
Confusion Matrix Measurements & Feedback Loop, Threat Intelligence
Reports, Central Repository, Dark Web Monitoring, New Patterns
Identification & Quantification
Predictive Models, Forecasting, Entity Resolution, Anomaly Detection,
Unsupervised Clusters, Graphs Identifications (Network/Paths/Profiling),
Survival Modeling
Building a culture of “Security first”
● Drive awareness & importance of risk: Newsletters, Executive Sponsors, Summits, Office
Hours, Hackathons, All Hands, Bounty Programs, Blue/Red Targeting, MRC Memberships
● Education: Training Programs for External Facing Teams, Risk Audits for
Designs/Flows/Campaigns/Systems/Partners, Annual Certifications for Employees.
● Customer Educations: Educational Content for Customers/Partners/Regulators. Work with
Industry bodies (MRC), Auditors & Regulators to drive “Security Consciousness”.
● Business Continuity & Disaster Recovery Protocols: Strategic, Financial & Operational
Plans to identify events, investigate & respond “responsibly” to the world outside.
● Reserve a seat on the table for the Policy Team
The parting words...
28
• Holistic AI driven Risk Platform, paired with strong processes & protocols
(prevention, incident response & impact mitigation) are vital to succeed.
Key takeaways
• Risk arena is getting ever more complicated and it takes a strong “culture”,
Executive Sponsorship and Cross Functional Ownership to deliver on goals.
• Impact of Risk is beyond Financial only - it affects Brand, Trust, Customer
Confidence & Regulatory support. But it’s a delicate balance.
• Actors, Motivations & Vectors and their mechanisms are always evolving, so
you ain’t gonna be bored ever.
• Key Players are Product Management, Engineering, Legal/Policy, Data
Science & Operations.
29
Thank you! We would love to hear from you...
https://twitter.com/decisions_2_0
http://www.slideshare.net/RamkumarRavichandran
https://www.youtube.com/channel/UCODSVC0WQws607clv0k8mQA/videos
https://www.linkedin.com/pub/ramkumar-ravichandran/10/545/67a
RAMKUMAR RAVICHANDRAN
SREEKANT VIJAYAKUMAR
https://www.linkedin.com/in/sreekantvijayakumar/
30
UPCOMING EVENTS
Thursday, December 5
Everything is
Connected: Systems
Thinking in PM
Wednesday, December 4
Defining Product
Success
UPCOMING Product Management Training Courses
Tuesdays & Thursdays
January 7 - February 27
6:30am - 9:00pm
7 SPOTS LEFT
Saturdays
December 7 - February 8
9:30am - 3:30pm
3 SPOTS LEFT
www.productschool.com
Part-time Product Management Training Courses
and
Corporate Training

More Related Content

Similar to Risk Product Management - Creating Safe Digital Experiences, Product School 2019

Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
EnterpriseGRC Solutions, Inc.
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
Priyanka Aash
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
Goutama Bachtiar
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Co builder - Enterpreneur Mobile Companion
Co builder - Enterpreneur Mobile CompanionCo builder - Enterpreneur Mobile Companion
Co builder - Enterpreneur Mobile Companion
SCALE
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
Infosys
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
Invensis Learning
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
elizabethrdusek
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
elizabethrdusek
 
The Perfect Martech stack ?
The Perfect Martech stack ?The Perfect Martech stack ?
The Perfect Martech stack ?
Smart Insights
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
Infosec train
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
priyanshamadhwal2
 
Bridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapBridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit Gap
Jerod Brennen
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
Ty Sbano
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
Abdulbasit Almauly
 

Similar to Risk Product Management - Creating Safe Digital Experiences, Product School 2019 (20)

Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Co builder - Enterpreneur Mobile Companion
Co builder - Enterpreneur Mobile CompanionCo builder - Enterpreneur Mobile Companion
Co builder - Enterpreneur Mobile Companion
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
 
The Perfect Martech stack ?
The Perfect Martech stack ?The Perfect Martech stack ?
The Perfect Martech stack ?
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
Bridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapBridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit Gap
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 

More from Ramkumar Ravichandran

Advancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organizationAdvancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organization
Ramkumar Ravichandran
 
Leadership, analytics & you
Leadership, analytics & youLeadership, analytics & you
Leadership, analytics & you
Ramkumar Ravichandran
 
Augment the actionability of Analytics with the “Voice of Customer”
Augment the actionability of Analytics with the “Voice of Customer”Augment the actionability of Analytics with the “Voice of Customer”
Augment the actionability of Analytics with the “Voice of Customer”
Ramkumar Ravichandran
 
Prepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolutionPrepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolution
Ramkumar Ravichandran
 
Power of Small Data
Power of Small DataPower of Small Data
Power of Small Data
Ramkumar Ravichandran
 
Optimizing Marketing Decisions
Optimizing Marketing DecisionsOptimizing Marketing Decisions
Optimizing Marketing Decisions
Ramkumar Ravichandran
 
Building & nurturing an Analytics Team
Building & nurturing an Analytics TeamBuilding & nurturing an Analytics Team
Building & nurturing an Analytics Team
Ramkumar Ravichandran
 
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insights
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insightsDigital summit Dallas 2015 - Research brings back the 'human' aspect to insights
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insights
Ramkumar Ravichandran
 
Social media analytics - a delicious treat, but only when handled like a mast...
Social media analytics - a delicious treat, but only when handled like a mast...Social media analytics - a delicious treat, but only when handled like a mast...
Social media analytics - a delicious treat, but only when handled like a mast...
Ramkumar Ravichandran
 
Optimizing product decisions
Optimizing product decisionsOptimizing product decisions
Optimizing product decisions
Ramkumar Ravichandran
 
Moving beyond numbers
Moving beyond numbersMoving beyond numbers
Moving beyond numbers
Ramkumar Ravichandran
 
Taming the Data Lake with Scalable Metrics Model Framework
Taming the Data Lake with Scalable Metrics Model FrameworkTaming the Data Lake with Scalable Metrics Model Framework
Taming the Data Lake with Scalable Metrics Model Framework
Ramkumar Ravichandran
 
Actionability of insights
Actionability of insights Actionability of insights
Actionability of insights
Ramkumar Ravichandran
 
A/B Testing Best Practices - Do's and Don'ts
A/B Testing Best Practices - Do's and Don'tsA/B Testing Best Practices - Do's and Don'ts
A/B Testing Best Practices - Do's and Don'ts
Ramkumar Ravichandran
 
Transform your Analytics Practice into Insights Practice
Transform your Analytics Practice into Insights PracticeTransform your Analytics Practice into Insights Practice
Transform your Analytics Practice into Insights Practice
Ramkumar Ravichandran
 
Selling Text Analytics to your boss
Selling Text Analytics to your bossSelling Text Analytics to your boss
Selling Text Analytics to your boss
Ramkumar Ravichandran
 
Analytics anecdotes
Analytics anecdotesAnalytics anecdotes
Analytics anecdotes
Ramkumar Ravichandran
 
Step by Step guide to executing an analytics project
Step by Step guide to executing an analytics projectStep by Step guide to executing an analytics project
Step by Step guide to executing an analytics project
Ramkumar Ravichandran
 
A high level overview of all that is Analytics
A high level overview of all that is AnalyticsA high level overview of all that is Analytics
A high level overview of all that is Analytics
Ramkumar Ravichandran
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkits
Ramkumar Ravichandran
 

More from Ramkumar Ravichandran (20)

Advancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organizationAdvancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organization
 
Leadership, analytics & you
Leadership, analytics & youLeadership, analytics & you
Leadership, analytics & you
 
Augment the actionability of Analytics with the “Voice of Customer”
Augment the actionability of Analytics with the “Voice of Customer”Augment the actionability of Analytics with the “Voice of Customer”
Augment the actionability of Analytics with the “Voice of Customer”
 
Prepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolutionPrepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolution
 
Power of Small Data
Power of Small DataPower of Small Data
Power of Small Data
 
Optimizing Marketing Decisions
Optimizing Marketing DecisionsOptimizing Marketing Decisions
Optimizing Marketing Decisions
 
Building & nurturing an Analytics Team
Building & nurturing an Analytics TeamBuilding & nurturing an Analytics Team
Building & nurturing an Analytics Team
 
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insights
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insightsDigital summit Dallas 2015 - Research brings back the 'human' aspect to insights
Digital summit Dallas 2015 - Research brings back the 'human' aspect to insights
 
Social media analytics - a delicious treat, but only when handled like a mast...
Social media analytics - a delicious treat, but only when handled like a mast...Social media analytics - a delicious treat, but only when handled like a mast...
Social media analytics - a delicious treat, but only when handled like a mast...
 
Optimizing product decisions
Optimizing product decisionsOptimizing product decisions
Optimizing product decisions
 
Moving beyond numbers
Moving beyond numbersMoving beyond numbers
Moving beyond numbers
 
Taming the Data Lake with Scalable Metrics Model Framework
Taming the Data Lake with Scalable Metrics Model FrameworkTaming the Data Lake with Scalable Metrics Model Framework
Taming the Data Lake with Scalable Metrics Model Framework
 
Actionability of insights
Actionability of insights Actionability of insights
Actionability of insights
 
A/B Testing Best Practices - Do's and Don'ts
A/B Testing Best Practices - Do's and Don'tsA/B Testing Best Practices - Do's and Don'ts
A/B Testing Best Practices - Do's and Don'ts
 
Transform your Analytics Practice into Insights Practice
Transform your Analytics Practice into Insights PracticeTransform your Analytics Practice into Insights Practice
Transform your Analytics Practice into Insights Practice
 
Selling Text Analytics to your boss
Selling Text Analytics to your bossSelling Text Analytics to your boss
Selling Text Analytics to your boss
 
Analytics anecdotes
Analytics anecdotesAnalytics anecdotes
Analytics anecdotes
 
Step by Step guide to executing an analytics project
Step by Step guide to executing an analytics projectStep by Step guide to executing an analytics project
Step by Step guide to executing an analytics project
 
A high level overview of all that is Analytics
A high level overview of all that is AnalyticsA high level overview of all that is Analytics
A high level overview of all that is Analytics
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkits
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Risk Product Management - Creating Safe Digital Experiences, Product School 2019

  • 1. www.productschool.com Part-time Product Management Training Courses and Corporate Training
  • 2. Join 40,000+ Product Managers on Free Resources Discover great job opportunities Job Portal prdct.school/PSJobPortalprdct.school/events-slack
  • 3. Alumni graduated across 20 campuses Cities all over the world +100 10,000+
  • 4. CERTIFICATES Your Product Management Certificate Path Product Leadership Certificate™ Full Stack Product Management Certificate™ Product Management Certificate™ 20 HOURS40 HOURS40 HOURS
  • 5. Corporate Training Level up your team’s Product Management skills
  • 6. Ram Ravichandran & Sreekant Vijayakumar T O N I G H T ’ S S P E A K E R S
  • 7. Creating Safe Digital Experience Ramkumar Ravichandran – Data science TLM, Google Shopping Sreekant Vijayakumar – Sr. Product Mgr, Fraud Mitigation & Payments Disclaimer: Participation in this summit is purely on personal basis and is not meant to represent Adobe or Google’s position on this or any other subject and in any form or matter. The talk is based on learning from work across industries and firms. Care has been taken to ensure no proprietary or work related information of any firm is used in any material.
  • 9. OK! Double clicking on the topic first...Digital? 9 Creating Safe Digital Experience All Digital Assets that are significant portion of User Journey (Product, Platform, Business Model, etc.)
  • 10. ...Safe? 10 Creating Safe Digital Experience Protect, Resolve, Recover
  • 11. ...Creating? 11 Creating Safe Digital Experience Products, Tools & Systems, Processes, Ownership Matrix, Culture
  • 12. ● Why? ● What? ● How? ● Why? Agenda 12
  • 13. Role of Risk PM is now Strategic & Proactive from predominantly Financial & Reactive earlier... 13 https://www.flaticon.com/free-icon/bank_755195 $bns in Impact, #Ms Customers Impacted, Brand Impact ($bn), Regulatory Fines ($bn) Accelerating further because of digitization Evolving ecosystem complications (touchpoints, form factors, AI driven, Edge AI) Evolving actors & motivations Glocalization: Regulations, Privacy Expectations, Payments https://www.pci.upenn.edu/event-calendar/accelerate-icon/ https://www.sccpre.cat/show/ibboxoi_download-evolution-and-the-social-mind-digital-ecosystem/ https://www.istockphoto.com/illustrations/hacker-logo?sort=best&mediatype=illustration&phrase=hacker%20logo https://apkpure.com/blue-browser/appinventor.ai_sidney_net.BlueBrowser
  • 14. ● Why? ● What? ● How? Agenda 14 ● What? Personas Threat Types Vectors
  • 15. Personas: Classifications of Actors 15 Motivation03 ● Financial Motivation (Profit/Arbitrage) ● Malice (Crime, AML, Sabotage) ● Validation (Emotional, Commercial, PR) ● Competitive Intentions ● Strategic Social Engineering Origin of Threat02 ● Internal (Employees, Vendors, Suppliers, Partners) ● External Entities by Size, Sophistication & Scope 01 ● Level 1: Individuals ● Level 2: Organized Enterprises ● Level 3: State Sponsored
  • 16. Threat Types 16 Cybersecurity Targets Infrastructure, e.g., GitHub ASN attack, Wannacry ransomware Policy Violation e.g., Money Laundering, Scams, Counterfeits, Content Platform/Service Abuse Promotions/Returns Abuse, Platform misuse, e.g., AAirpass, Cambridge Analytica Information Security Critical Customer Data targeted, e.g., 2018 Marriott (500M #), 2017 Equifax (143M#) Monetary Fraud Intentional Defrauding-Stolen Cards, ATO, Non Repayments, e.g., UB Group, 37% Installed Software is pirated 02 01 05 04 03
  • 17. Attack Vectors 17 Acute Growth Rapid Exploitation of single vulnerability, e.g., stolen credentials Multipoint Exploitation of a connected vulnerability, e.g., Target Hack Opportunistic/ Strategic Stay under-the-radar and wait for right timing, e.g., Sony Hack Signature Spoofing Sophisticated set up that mimics genuine customer behavior Network Co-ordinated exploitation on multiple fronts, e.g., fake accounts Target Switching Migrate attack from stronger systems to weaker systems, e.g, Match.com
  • 18. Common Delivery Mechanisms (not exhaustive) 18 Common Types Bots Injections Hijacking Spoofing Testing Mimicking ●Pings ●DDos ●Form Fillers ●SQL ●Ads ●Browsers ●Notificatio n ●iFrames ●APIs ●Page Elements ●CTAs ●Credential s ●Ip spoofing ●Device ●2FA ●Credential s ●Card Testing ●APIs ●Network Creators ●Deep Fake Algorithms
  • 19. ● Why? ● What? ● How?● How? Agenda 19
  • 20. Ecommerce - Risk Overview (illustrative) Driver Common Risk Types tracked Merchants Significantly Not As Described (SNAD), Item Not Received (INR), Merchant-Buyer Collusion, Merchant-Merchant Collusion, Money Laundering (Fake Sales), Counterfeits, Scams, Competitor Sabotage, Price Undercutting, Redirecting Sales, Cannibalizing Offers, Fake Ads, Non-Compliant Inventory, Settlement Frauds, Delayed/Non-Payment of Dues, PII & PAI Misuse, Subsidy Misuse Affiliates Traffic & Attribution Fraud, Ad Fraud Buyers Buyer Collusion, Returns Abuse/Over Use, Promotions Abuse, Refund Abuse & Fraud, Referral Frauds, Remorse Returns, Improper Chargebacks, Bulk Buyers, Subscription Cancellation (Trial Policy Abuse), Account Sharing, False Rating & Comment Abuse, Resellers, Networks Fraudsters Account Take Over (ATO)- Buyers/Sellers/Partners, Stolen Cards (SC), Negative Balance at Settlement (NBL),Stolen Packages, Spamming, Credential Spoofing Partners Lost/Damaged in Transit, Missing Packages, Bad Delivery, Vulnerable Systems, Operational Issues, Insider Risk
  • 21. Key Steps in Protection 21 Profile Define and evaluate various customers risk profiles Feedback Ongoing feedback from the false positive/negative analysis Monitor Tracking of customer interactions for risky behaviour Mitigate Measures to segregate and nullify the fraud vector Identify Means to identify various vectors without causing friction Detect and Mitigate Threat
  • 24. Stakeholders ● Build product roadmap and vision ● Educate stakeholders ● Drive initiatives ● Customer Experience ● Platform Product Management ● Scalable solution design ● Build platform capabilities ● Architects ● Developers Engineering ● Identify and leverage data sources ● Build models to power capabilities ● Monitoring and alerts ● Data Scientist ● Analysts Data Sciences ● Review orders ● Perform ad-hoc analysis ● Drive intelligence ● Investigations ● Reviewers ● Fraud Analysts Operations ● Terms and conditions ● Privacy impact ● Traceability matrix ● Privacy ● Legal ● Compliance ● Audit Enforcement ● Campaign cohorts ● Cohort removal ● Overstatement prevention ● Sales ● Marketing ● Growth ● Finance Business
  • 25. Product Management in Risk 25 IterateDeliveryRoadmapGoalsVision • Define the long term vision • Communicate to key stakeholders • Buy-in from management • Set up time bound goals • KPIs to measure impact • Bottomline to business • Prioritized Initiatives list • Milestones for each initiative • Timeline for delivery • Trade-offs • Data Driven Optimization • Support, Operations & Distribution • Refine, Revamp or Retire? • ”Learn-Listen-Test” launch • Usage Protocols : Guide & Comply 25
  • 26. Data Science in Risk Management Typical KPIs Monitoring, Alerts & Analyses Predictive Modeling Investigations Actual Loss Rate (#, $, %), Attempted Rate (%), Prevented Loss Rate* (#, $, %), Successful Contest Rate (%), False Positive Rate, PR AUC, Agent Review Pass Through Rate (%), Abuse Rate (%), Customers Impacted (#), CS Calls (#) & CS Time Spent Key Monitoring Reports & Analyses Readouts, Threshold & Custom Alerts (Segments/Geos/Accounts) Confusion Matrix Measurements & Feedback Loop, Threat Intelligence Reports, Central Repository, Dark Web Monitoring, New Patterns Identification & Quantification Predictive Models, Forecasting, Entity Resolution, Anomaly Detection, Unsupervised Clusters, Graphs Identifications (Network/Paths/Profiling), Survival Modeling
  • 27. Building a culture of “Security first” ● Drive awareness & importance of risk: Newsletters, Executive Sponsors, Summits, Office Hours, Hackathons, All Hands, Bounty Programs, Blue/Red Targeting, MRC Memberships ● Education: Training Programs for External Facing Teams, Risk Audits for Designs/Flows/Campaigns/Systems/Partners, Annual Certifications for Employees. ● Customer Educations: Educational Content for Customers/Partners/Regulators. Work with Industry bodies (MRC), Auditors & Regulators to drive “Security Consciousness”. ● Business Continuity & Disaster Recovery Protocols: Strategic, Financial & Operational Plans to identify events, investigate & respond “responsibly” to the world outside. ● Reserve a seat on the table for the Policy Team
  • 29. • Holistic AI driven Risk Platform, paired with strong processes & protocols (prevention, incident response & impact mitigation) are vital to succeed. Key takeaways • Risk arena is getting ever more complicated and it takes a strong “culture”, Executive Sponsorship and Cross Functional Ownership to deliver on goals. • Impact of Risk is beyond Financial only - it affects Brand, Trust, Customer Confidence & Regulatory support. But it’s a delicate balance. • Actors, Motivations & Vectors and their mechanisms are always evolving, so you ain’t gonna be bored ever. • Key Players are Product Management, Engineering, Legal/Policy, Data Science & Operations. 29
  • 30. Thank you! We would love to hear from you... https://twitter.com/decisions_2_0 http://www.slideshare.net/RamkumarRavichandran https://www.youtube.com/channel/UCODSVC0WQws607clv0k8mQA/videos https://www.linkedin.com/pub/ramkumar-ravichandran/10/545/67a RAMKUMAR RAVICHANDRAN SREEKANT VIJAYAKUMAR https://www.linkedin.com/in/sreekantvijayakumar/ 30
  • 31. UPCOMING EVENTS Thursday, December 5 Everything is Connected: Systems Thinking in PM Wednesday, December 4 Defining Product Success
  • 32. UPCOMING Product Management Training Courses Tuesdays & Thursdays January 7 - February 27 6:30am - 9:00pm 7 SPOTS LEFT Saturdays December 7 - February 8 9:30am - 3:30pm 3 SPOTS LEFT
  • 33. www.productschool.com Part-time Product Management Training Courses and Corporate Training