SlideShare a Scribd company logo
www.thetaray.com
Company Confidential
This presentation and the information herein, are the exclusive properties of ThetaRay Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for
which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express
prior written permission of ThetaRay Ltd. Ltd may update, amend, supplement or otherwise alter the information without prior notice
Mark Gazit
April 2019
UNCOVER THE UNKNOWN
Clear. Confident. Action
 @NOAHConference
 @noah_conference
 @noah-conference
 @NOAHConference
FOLLOW USONSOCIAL
The amount of data
is endless
By 2020 there will be
for every person on the planet
4.3 connected devices
Every two days we create as much information
as was created
From the beginning
of time until 2003
By 2020, approximately 26 billion objects
will be linked together in the internet.
5
The world of financial
crime has changed forever
1. Banks are losing money at unprecedented rates
2. Cyber crime and money laundering are flourishing
3. Fraud losses exceeded $16 billion in 2017
4. Already in 2018 we have seen large fines and
criminal prosecutions
The World Bank and International Monetary Fund
have estimated the volume of Money Laundering
to be between 3% and 5% of world GDP,
approximately $2.2– $3.7 Trillion annually.
Criminal sophistication &
innovation
Global openness
& consistency
Cost & efficiency
Transformation
Complexity of
big data
Digital & connected
channels
Market Pains
1 2 3
4 5 6
New World of Financial Crime
Online FraudATM Fraud
Cryptocurrency Laundering
Existing systems and traditional
AI do not work anymore
1. Rules are only as good as the people
that write them
2. Produces many false alarms
3. Can’t detect the unknown
4. Signatures do not exist
The real threat is coming from where
you don’t expect it!
It is increasingly difficult to keep up with the
pace of change…
Sophistication of Attacks
Hyper-Dimensional, Multi-Domain, Big Data Analytics™
ThetaRay Advanced Analytics Platform
Machine
Data
Network
Traffic & Logs
Financial
Data
Business
Transactions
Multi Domain
Data
Anomaly Detection
Engine
Investigation Center
Connecting the Dots
1. Intuitive AI
2. Distinct form the traditional AI approach
3. Augmented unsupervised machine learning
AML
1. Legacy tech-regulatory issues
2. 120k to 4.2k
3. 70 days earlier
4. Effective and efficient
1. Connected devices
2. Almost impossible to detect using
traditional tools
3. Over $1B stolen
4. Effective and efficient detection using AI
ATM
Unmatched detection
rates
Industry-low false
positive rates
Rule-free, unsupervised,
non-heuristic
1 2 3
Stay resilient with future proof technology
This presentation brought to you by ThetaRay Ltd
Mark Gazit
Chief Executive Officer
+1 (202) 569-0729 | +972-54-7777577mark.gazit@thetaray.com www.thetaray.com
Questions & Answers

More Related Content

What's hot

Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
Andrew Manoske
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mohammad Husain
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
Sajib Sen
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
Mohammad Husain
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
Charlie Lewis M.S.
 
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Hafizah Jupri
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
Charlie Lewis M.S.
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating Ransomware
CSNP
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
Michael Sexton
 
Ecommerce darknet
Ecommerce darknetEcommerce darknet
Ecommerce darknet
markdejesusmedj
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
Joe Morris
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
McafeeCareers
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
studentinternetdeals33
 
Is It Worth Saving on SAM?
Is It Worth Saving on SAM?Is It Worth Saving on SAM?
Is It Worth Saving on SAM?
Laszlo Fabian
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
Paige Rasid
 

What's hot (17)

Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating Ransomware
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Ecommerce darknet
Ecommerce darknetEcommerce darknet
Ecommerce darknet
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Is It Worth Saving on SAM?
Is It Worth Saving on SAM?Is It Worth Saving on SAM?
Is It Worth Saving on SAM?
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 

Similar to ThetaRay - NOAH19 Tel Aviv

Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Running Head CYBER SECURITY IN AFRICA .docx
Running Head CYBER SECURITY IN AFRICA                            .docxRunning Head CYBER SECURITY IN AFRICA                            .docx
Running Head CYBER SECURITY IN AFRICA .docx
todd271
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
briancrawford30935
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
Chirag Thumar
 
The Limitless Possibilities in Data Science.pdf
The Limitless Possibilities in Data Science.pdfThe Limitless Possibilities in Data Science.pdf
The Limitless Possibilities in Data Science.pdf
USDSI
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
- Mark - Fullbright
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future Agenda
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
Karina Matos
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
CA. (Dr.) Rajkumar Adukia
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Your Digital Identity Travels With You in Web3
Your Digital Identity Travels With You in Web3 Your Digital Identity Travels With You in Web3
Your Digital Identity Travels With You in Web3
Sandy Carter
 

Similar to ThetaRay - NOAH19 Tel Aviv (20)

Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Running Head CYBER SECURITY IN AFRICA .docx
Running Head CYBER SECURITY IN AFRICA                            .docxRunning Head CYBER SECURITY IN AFRICA                            .docx
Running Head CYBER SECURITY IN AFRICA .docx
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
 
The Limitless Possibilities in Data Science.pdf
The Limitless Possibilities in Data Science.pdfThe Limitless Possibilities in Data Science.pdf
The Limitless Possibilities in Data Science.pdf
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
 
Data breach
Data breachData breach
Data breach
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Your Digital Identity Travels With You in Web3
Your Digital Identity Travels With You in Web3 Your Digital Identity Travels With You in Web3
Your Digital Identity Travels With You in Web3
 

More from NOAH Advisors

NOAH16 Berlin Fund Book
NOAH16 Berlin Fund BookNOAH16 Berlin Fund Book
NOAH16 Berlin Fund Book
NOAH Advisors
 
NOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker BookNOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker Book
NOAH Advisors
 
NOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor BookNOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor Book
NOAH Advisors
 
NOAH19 London Startup Book
NOAH19 London Startup BookNOAH19 London Startup Book
NOAH19 London Startup Book
NOAH Advisors
 
NOAH19 London Service Provider Book
NOAH19 London Service Provider BookNOAH19 London Service Provider Book
NOAH19 London Service Provider Book
NOAH Advisors
 
NOAH19 London Investor Book
NOAH19 London Investor BookNOAH19 London Investor Book
NOAH19 London Investor Book
NOAH Advisors
 
NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100
NOAH Advisors
 
NOAH19 Berlin Investor Book
NOAH19 Berlin Investor BookNOAH19 Berlin Investor Book
NOAH19 Berlin Investor Book
NOAH Advisors
 
NOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker BookNOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker Book
NOAH Advisors
 
NOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor BookNOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor Book
NOAH Advisors
 
NOAH18 London Startup Book
NOAH18 London Startup BookNOAH18 London Startup Book
NOAH18 London Startup Book
NOAH Advisors
 
NOAH18 London Speaker Book
NOAH18 London Speaker BookNOAH18 London Speaker Book
NOAH18 London Speaker Book
NOAH Advisors
 
NOAH18 London Service Provider Book
NOAH18 London Service Provider BookNOAH18 London Service Provider Book
NOAH18 London Service Provider Book
NOAH Advisors
 
NOAH18 London Investor Book
NOAH18 London Investor BookNOAH18 London Investor Book
NOAH18 London Investor Book
NOAH Advisors
 
NOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker BookNOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker Book
NOAH Advisors
 
NOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider BookNOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider Book
NOAH Advisors
 
NOAH18 Berlin Investor Book
NOAH18 Berlin Investor BookNOAH18 Berlin Investor Book
NOAH18 Berlin Investor Book
NOAH Advisors
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
NOAH Advisors
 
NOAH17 London Investor Book
NOAH17 London Investor BookNOAH17 London Investor Book
NOAH17 London Investor Book
NOAH Advisors
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
NOAH Advisors
 

More from NOAH Advisors (20)

NOAH16 Berlin Fund Book
NOAH16 Berlin Fund BookNOAH16 Berlin Fund Book
NOAH16 Berlin Fund Book
 
NOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker BookNOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker Book
 
NOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor BookNOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor Book
 
NOAH19 London Startup Book
NOAH19 London Startup BookNOAH19 London Startup Book
NOAH19 London Startup Book
 
NOAH19 London Service Provider Book
NOAH19 London Service Provider BookNOAH19 London Service Provider Book
NOAH19 London Service Provider Book
 
NOAH19 London Investor Book
NOAH19 London Investor BookNOAH19 London Investor Book
NOAH19 London Investor Book
 
NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100
 
NOAH19 Berlin Investor Book
NOAH19 Berlin Investor BookNOAH19 Berlin Investor Book
NOAH19 Berlin Investor Book
 
NOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker BookNOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker Book
 
NOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor BookNOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor Book
 
NOAH18 London Startup Book
NOAH18 London Startup BookNOAH18 London Startup Book
NOAH18 London Startup Book
 
NOAH18 London Speaker Book
NOAH18 London Speaker BookNOAH18 London Speaker Book
NOAH18 London Speaker Book
 
NOAH18 London Service Provider Book
NOAH18 London Service Provider BookNOAH18 London Service Provider Book
NOAH18 London Service Provider Book
 
NOAH18 London Investor Book
NOAH18 London Investor BookNOAH18 London Investor Book
NOAH18 London Investor Book
 
NOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker BookNOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker Book
 
NOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider BookNOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider Book
 
NOAH18 Berlin Investor Book
NOAH18 Berlin Investor BookNOAH18 Berlin Investor Book
NOAH18 Berlin Investor Book
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
 
NOAH17 London Investor Book
NOAH17 London Investor BookNOAH17 London Investor Book
NOAH17 London Investor Book
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
 

Recently uploaded

Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
Sciences of Europe
 
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Leonel Morgado
 
Pests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdfPests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdf
PirithiRaju
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
Frédéric Baudron
 
Alternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart AgricultureAlternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
RDhivya6
 
Methods of grain storage Structures in India.pdf
Methods of grain storage Structures in India.pdfMethods of grain storage Structures in India.pdf
Methods of grain storage Structures in India.pdf
PirithiRaju
 
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
vluwdy49
 
Microbiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdfMicrobiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdf
sammy700571
 
Tissue fluids_etiology_volume regulation_pressure.pptx
Tissue fluids_etiology_volume regulation_pressure.pptxTissue fluids_etiology_volume regulation_pressure.pptx
Tissue fluids_etiology_volume regulation_pressure.pptx
muralinath2
 
Summary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdfSummary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdf
vadgavevedant86
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
Leonel Morgado
 
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Sérgio Sacani
 
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
ABHISHEK SONI NIMT INSTITUTE OF MEDICAL AND PARAMEDCIAL SCIENCES , GOVT PG COLLEGE NOIDA
 
HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1
Shashank Shekhar Pandey
 
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of ProteinsGBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
Areesha Ahmad
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR
 
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
Advanced-Concepts-Team
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
Sérgio Sacani
 
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills MN
 

Recently uploaded (20)

Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
 
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
 
Pests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdfPests of Storage_Identification_Dr.UPR.pdf
Pests of Storage_Identification_Dr.UPR.pdf
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
 
Alternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart AgricultureAlternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart Agriculture
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
 
Methods of grain storage Structures in India.pdf
Methods of grain storage Structures in India.pdfMethods of grain storage Structures in India.pdf
Methods of grain storage Structures in India.pdf
 
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
 
Microbiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdfMicrobiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdf
 
Tissue fluids_etiology_volume regulation_pressure.pptx
Tissue fluids_etiology_volume regulation_pressure.pptxTissue fluids_etiology_volume regulation_pressure.pptx
Tissue fluids_etiology_volume regulation_pressure.pptx
 
Summary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdfSummary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdf
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
 
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
 
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
MICROBIAL INTERACTION PPT/ MICROBIAL INTERACTION AND THEIR TYPES // PLANT MIC...
 
HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1
 
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of ProteinsGBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
 
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
 
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...
 

ThetaRay - NOAH19 Tel Aviv

  • 1. www.thetaray.com Company Confidential This presentation and the information herein, are the exclusive properties of ThetaRay Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of ThetaRay Ltd. Ltd may update, amend, supplement or otherwise alter the information without prior notice Mark Gazit April 2019 UNCOVER THE UNKNOWN Clear. Confident. Action
  • 2.  @NOAHConference  @noah_conference  @noah-conference  @NOAHConference FOLLOW USONSOCIAL
  • 3. The amount of data is endless By 2020 there will be for every person on the planet 4.3 connected devices
  • 4. Every two days we create as much information as was created From the beginning of time until 2003
  • 5. By 2020, approximately 26 billion objects will be linked together in the internet.
  • 6. 5
  • 7. The world of financial crime has changed forever 1. Banks are losing money at unprecedented rates 2. Cyber crime and money laundering are flourishing 3. Fraud losses exceeded $16 billion in 2017 4. Already in 2018 we have seen large fines and criminal prosecutions
  • 8. The World Bank and International Monetary Fund have estimated the volume of Money Laundering to be between 3% and 5% of world GDP, approximately $2.2– $3.7 Trillion annually.
  • 9. Criminal sophistication & innovation Global openness & consistency Cost & efficiency Transformation Complexity of big data Digital & connected channels Market Pains 1 2 3 4 5 6
  • 10. New World of Financial Crime Online FraudATM Fraud Cryptocurrency Laundering
  • 11. Existing systems and traditional AI do not work anymore 1. Rules are only as good as the people that write them 2. Produces many false alarms 3. Can’t detect the unknown 4. Signatures do not exist The real threat is coming from where you don’t expect it!
  • 12. It is increasingly difficult to keep up with the pace of change…
  • 14. Hyper-Dimensional, Multi-Domain, Big Data Analytics™ ThetaRay Advanced Analytics Platform Machine Data Network Traffic & Logs Financial Data Business Transactions Multi Domain Data Anomaly Detection Engine Investigation Center
  • 15.
  • 16. Connecting the Dots 1. Intuitive AI 2. Distinct form the traditional AI approach 3. Augmented unsupervised machine learning
  • 17. AML 1. Legacy tech-regulatory issues 2. 120k to 4.2k 3. 70 days earlier 4. Effective and efficient
  • 18. 1. Connected devices 2. Almost impossible to detect using traditional tools 3. Over $1B stolen 4. Effective and efficient detection using AI ATM
  • 19.
  • 20. Unmatched detection rates Industry-low false positive rates Rule-free, unsupervised, non-heuristic 1 2 3 Stay resilient with future proof technology
  • 21.
  • 22. This presentation brought to you by ThetaRay Ltd
  • 23. Mark Gazit Chief Executive Officer +1 (202) 569-0729 | +972-54-7777577mark.gazit@thetaray.com www.thetaray.com