Delivered by Michael Down at Gartner Data & Analytics Summit London 2024 - Your enemies use GenAI too: Staying ahead of fraud with Neo4j.
Fraudsters exploit the latest technologies like generative AI to stay undetected. Static applications can’t adapt quickly enough. Learn why you should build flexible fraud detection apps on Neo4j’s native graph database combined with advanced data science algorithms. Uncover complex fraud patterns in real-time and shut down schemes before they cause damage.
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j
In today’s rapidly evolving financial landscape, the role of technology is pivotal in driving innovation and efficiency. Graph Technology has emerged as a powerful tool, offering unique capabilities to uncover hidden insights, streamline processes, and comply with for CDD-, Fraud- and AML-requirements. This webinar delves into the transformative potential of Graph Technology, focusing on its impact on financial institutions. Specifically, we will get an overview into Rabobank’s innovative implementation of Graph Technology.
9 Trends in Identity Verification (2023) by RegulaRegula
Regula held an internal panel discussion and compiled nine expert opinion-based identity verification trends to watch and leverage in 2023. You can find the full text in our blog: https://regulaforensics.com/blog/identity-verification-trends-2023/
Credit card plays a very vital role in todays economy and the usage of credit cards has dramatically increased. Credit card has become one of the most common method of payment for both online and offline as well as for regular purchases of a common man. It is very necessary to distinguish fraudulent credit card transactions by the credit card organizations so their clients are not charged for the purchases that they didn’t make. Despite the fact that using credit card gives huge benefits when used responsibly carefully and however significant credit and financial damages could be caused by fraudulent activities as well. Numerous methods have been proposed to stop these fraudulent activities. The project illustrates the model of a dataset to predict fraud transactions using machine learning. The model then detects if it is a fraudulent or a genuine transaction. The model also analyses and pre processes the dataset along with deployment of multiple anomaly detection using algorithms such as Local forest outlier and Isolation forest. Nikitha Pradeep | Dr. A Rengarajan "Credit Card Fraud Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41289.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41289/credit-card-fraud-detection/nikitha-pradeep
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j
In today’s rapidly evolving financial landscape, the role of technology is pivotal in driving innovation and efficiency. Graph Technology has emerged as a powerful tool, offering unique capabilities to uncover hidden insights, streamline processes, and comply with for CDD-, Fraud- and AML-requirements. This webinar delves into the transformative potential of Graph Technology, focusing on its impact on financial institutions. Specifically, we will get an overview into Rabobank’s innovative implementation of Graph Technology.
9 Trends in Identity Verification (2023) by RegulaRegula
Regula held an internal panel discussion and compiled nine expert opinion-based identity verification trends to watch and leverage in 2023. You can find the full text in our blog: https://regulaforensics.com/blog/identity-verification-trends-2023/
Credit card plays a very vital role in todays economy and the usage of credit cards has dramatically increased. Credit card has become one of the most common method of payment for both online and offline as well as for regular purchases of a common man. It is very necessary to distinguish fraudulent credit card transactions by the credit card organizations so their clients are not charged for the purchases that they didn’t make. Despite the fact that using credit card gives huge benefits when used responsibly carefully and however significant credit and financial damages could be caused by fraudulent activities as well. Numerous methods have been proposed to stop these fraudulent activities. The project illustrates the model of a dataset to predict fraud transactions using machine learning. The model then detects if it is a fraudulent or a genuine transaction. The model also analyses and pre processes the dataset along with deployment of multiple anomaly detection using algorithms such as Local forest outlier and Isolation forest. Nikitha Pradeep | Dr. A Rengarajan "Credit Card Fraud Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41289.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41289/credit-card-fraud-detection/nikitha-pradeep
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
Balancing Security and Customer ExperienceTransUnion
Using Device Insight to Balance Fraud Prevention and Customer Experience
Today, your customer’s device has become their proxy for a large percentage of their online retail and banking activity. By using insight from those devices, you can reduce risk and ensure a smooth experience along the entire customer journey.
In this webinar, you’ll learn from Max Anhoury, our VP of Global partnerships, about:
* Today’s fraud and security trends
* What a fraud ring looks like
* The evolving online experience with EMV
* How to create frictionless security across the consumer journey
One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
BLOG.wedotechnologies.com a is space for sharing knowledge and experiences about Enterprise Business Assurance with voluntary contributions from WeDo Technologies' staff, our customers and special guests.
Read a selections of the best articles published on BLOG.wedotechnologies.com in 2014.
Enjoy it!
#StarfishBanks. The Banking Fraud is evolving and disrupting the proper functioning of banks, costing the banks in billions across the globe. This presentation showers light on the phenomenon called banking fraud and how it has diversified across major economies of the globe. This presentation also lets the reader know about the future avenues of fraud and how it is going to evolve.
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
Presentation at the 2016 Big Sky Developers' Conference.
Overview of the dismal state of security on the Web, some suggestions for better app development processes to mitigate problems.
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
The rapid digitalization of the Insurance Industry has not only opened up access channels for customers, but also created targets for fraudsters. The time is now to protect your business from fraud as you convert to digital. In this webinar, we’ll analyze the 5 Strategic Approaches to Digital Optimization and Transformation in Insurance that Gartner laid out in their report and explore possible fraud threats that can arise as a result of such transformation.
Register today to learn more from us about:
- Combating fraud threats introduced by the move to digital, such as ghost broking
- Detecting and preventing growing account takeover
- Protecting the entire customer lifecycle
- How to arm your SIU to more effectively fight fraudulent claims
- Improve identity verification to reduce early term losses
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, & ML Are Transforming the Fight Against Fraud, AML & Cybersecurity -Nadeem Asghar
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
In our rapidly changing healthcare environment, dentists need to understand not only what compliance requirements they need to meet, but how to use that compliance to strengthen their practice and build trust with patients.
nTrust’s P2P Money Transfer Service Puts Security First
In this case study you’ll learn how:
Shared global intelligence stops financial fraud
Device recognition offers advanced fraud intelligence to evaluate risk
Business rules can be easily customized for powerful, specific use case results
nTrust lets customers send money instantly from any location using a smartphone, tablet or computer. Fraudsters target money transfer services to open up accounts using stolen credit cards, add money, and then quickly transfer the money out. nTrust uses iovation’s sophisticated device recognition technology to access a globally-shared, cross-industry consortium of 2.5 billion devices and 25 million client-reported fraud records to evaluate risk up front in real-time and stop fraud.
The reputational and financial damage from cyber security breaches for banks are so enormous that they cannot any longer afford to be reactive. Big Data Analytics lets them preempt attacks.
Regulations, compliance and overall risk management place a significant operational burden on financial services.
Online lenders are no different. You have to comply with multiple regulatory requirements, and you are- like any other financial service- very susceptible to fraud.
If you want to prevent and reduce loan application fraud, your strategy and fraud detection system should include a combination of identity verification, account onboarding protection, and account monitoring.
In this post, we’ll explain how identity verification and Know Your Customer processes are related, and how you can expand them for better fraud coverage.
We’ve also provided specific recommendations for identity verification security tests, and account origination protection strategies that can help you prevent fraud during the loan application process.
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...Neo4j
Romain CAMPOURCY – Architecte Solution, Sopra Steria
Patrick MEYER – Architecte IA Groupe, Sopra Steria
La Génération de Récupération Augmentée (RAG) permet la réponse à des questions d’utilisateur sur un domaine métier à l’aide de grands modèles de langage. Cette technique fonctionne correctement lorsque la documentation est simple mais trouve des limitations dès que les sources sont complexes. Au travers d’un projet que nous avons réalisé, nous vous présenterons l’approche GraphRAG, une nouvelle approche qui utilise une base Neo4j générée pour améliorer la compréhension des documents et la synthèse d’informations. Cette méthode surpasse l’approche RAG en fournissant des réponses plus holistiques et précises.
More Related Content
Similar to Your enemies use GenAI too - staying ahead of fraud with Neo4j
BLOG.wedotechnologies.com a is space for sharing knowledge and experiences about Enterprise Business Assurance with voluntary contributions from WeDo Technologies' staff, our customers and special guests.
Read a selections of the best articles published on BLOG.wedotechnologies.com in 2014.
Enjoy it!
#StarfishBanks. The Banking Fraud is evolving and disrupting the proper functioning of banks, costing the banks in billions across the globe. This presentation showers light on the phenomenon called banking fraud and how it has diversified across major economies of the globe. This presentation also lets the reader know about the future avenues of fraud and how it is going to evolve.
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
Presentation at the 2016 Big Sky Developers' Conference.
Overview of the dismal state of security on the Web, some suggestions for better app development processes to mitigate problems.
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
The rapid digitalization of the Insurance Industry has not only opened up access channels for customers, but also created targets for fraudsters. The time is now to protect your business from fraud as you convert to digital. In this webinar, we’ll analyze the 5 Strategic Approaches to Digital Optimization and Transformation in Insurance that Gartner laid out in their report and explore possible fraud threats that can arise as a result of such transformation.
Register today to learn more from us about:
- Combating fraud threats introduced by the move to digital, such as ghost broking
- Detecting and preventing growing account takeover
- Protecting the entire customer lifecycle
- How to arm your SIU to more effectively fight fraudulent claims
- Improve identity verification to reduce early term losses
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, & ML Are Transforming the Fight Against Fraud, AML & Cybersecurity -Nadeem Asghar
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
In our rapidly changing healthcare environment, dentists need to understand not only what compliance requirements they need to meet, but how to use that compliance to strengthen their practice and build trust with patients.
nTrust’s P2P Money Transfer Service Puts Security First
In this case study you’ll learn how:
Shared global intelligence stops financial fraud
Device recognition offers advanced fraud intelligence to evaluate risk
Business rules can be easily customized for powerful, specific use case results
nTrust lets customers send money instantly from any location using a smartphone, tablet or computer. Fraudsters target money transfer services to open up accounts using stolen credit cards, add money, and then quickly transfer the money out. nTrust uses iovation’s sophisticated device recognition technology to access a globally-shared, cross-industry consortium of 2.5 billion devices and 25 million client-reported fraud records to evaluate risk up front in real-time and stop fraud.
The reputational and financial damage from cyber security breaches for banks are so enormous that they cannot any longer afford to be reactive. Big Data Analytics lets them preempt attacks.
Regulations, compliance and overall risk management place a significant operational burden on financial services.
Online lenders are no different. You have to comply with multiple regulatory requirements, and you are- like any other financial service- very susceptible to fraud.
If you want to prevent and reduce loan application fraud, your strategy and fraud detection system should include a combination of identity verification, account onboarding protection, and account monitoring.
In this post, we’ll explain how identity verification and Know Your Customer processes are related, and how you can expand them for better fraud coverage.
We’ve also provided specific recommendations for identity verification security tests, and account origination protection strategies that can help you prevent fraud during the loan application process.
Similar to Your enemies use GenAI too - staying ahead of fraud with Neo4j (20)
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...Neo4j
Romain CAMPOURCY – Architecte Solution, Sopra Steria
Patrick MEYER – Architecte IA Groupe, Sopra Steria
La Génération de Récupération Augmentée (RAG) permet la réponse à des questions d’utilisateur sur un domaine métier à l’aide de grands modèles de langage. Cette technique fonctionne correctement lorsque la documentation est simple mais trouve des limitations dès que les sources sont complexes. Au travers d’un projet que nous avons réalisé, nous vous présenterons l’approche GraphRAG, une nouvelle approche qui utilise une base Neo4j générée pour améliorer la compréhension des documents et la synthèse d’informations. Cette méthode surpasse l’approche RAG en fournissant des réponses plus holistiques et précises.
ADEO - Knowledge Graph pour le e-commerce, entre challenges et opportunités ...Neo4j
Charles Gouwy, Business Product Leader, Adeo Services (Groupe Leroy Merlin)
Alors que leur Knowledge Graph est déjà intégré sur l’ensemble des expériences d’achat de leur plateforme e-commerce depuis plus de 3 ans, nous verrons quelles sont les nouvelles opportunités et challenges qui s’ouvrent encore à eux grâce à leur utilisation d’une base de donnée de graphes et l’émergence de l’IA.
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
Petr Matuska, Sales & Sales Engineering Lead, GraphAware
Western Australia Police Force’s adoption of Neo4j and the GraphAware Hume graph analytics platform marks a significant advancement in data-driven policing. Facing the challenges of growing volumes of valuable data scattered in disconnected silos, the organisation successfully implemented Neo4j database and Hume, consolidating data from various sources into a dynamic knowledge graph. The result was a connected view of intelligence, making it easier for analysts to solve crime faster. The partnership between Neo4j and GraphAware in this project demonstrates the transformative impact of graph technology on law enforcement’s ability to leverage growing volumes of valuable data to prevent crime and protect communities.
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesNeo4j
David Pond, Lead Product Manager, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Shirley Bacso, Data Architect, Ingka Digital
“Linked Metadata by Design” represents the integration of the outcomes from human collaboration, starting from the design phase of data product development. This knowledge is captured in the Data Knowledge Graph. It not only enables data products to be robust and compliant but also well-understood and effectively utilized.
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
Delivered by Sreenath Gopalakrishna, Director of Software Engineering at BT, and Dr Jim Webber, Chief Scientist at Neo4j, at Gartner Data & Analytics Summit London 2024 this presentation examines how knowledge graphs and GenAI combine in real-world solutions.
BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Future innovation plans include the exploration of uses of EKG + Generative AI.
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanNeo4j
Look beyond the hype and unlock practical techniques to responsibly activate intelligence across your organization’s data with GenAI. Explore how to use knowledge graphs to increase accuracy, transparency, and explainability within generative AI systems. You’ll depart with hands-on experience combining relationships and LLMs for increased domain-specific context and enhanced reasoning.
Workshop 1. Architecting Innovative Graph Applications
Join this hands-on workshop for beginners led by Neo4j experts guiding you to systematically uncover contextual intelligence. Using a real-life dataset we will build step-by-step a graph solution; from building the graph data model to running queries and data visualization. The approach will be applicable across multiple use cases and industries.
LARUS - Galileo.XAI e Gen-AI: la nuova prospettiva di LARUS per il futuro del...Neo4j
Roberto Sannino, Larus Business Automation
Nel panorama sempre più complesso dei progetti basati su grafi, LARUS ha consolidato una solida esperienza pluriennale, costruendo un rapporto di fiducia e collaborazione con Neo4j. Attraverso il LARUS Labs, ha sviluppato componenti e connettori che arricchiscono l’ecosistema Neo4j, contribuendo alla sua continua evoluzione. Tutto questo know-how è stato incanalato nell’innovativa soluzione Galileo.XAI di LARUS, un prodotto all’avanguardia che, integrato con la Generative AI, offre una nuova prospettiva nel mondo dell’Intelligenza Artificiale Spiegabile applicata ai grafi. In questo speech, si esplorerà il percorso di crescita di LARUS in questo settore, mettendo in luce le potenzialità della soluzione Galileo.XAI nel guidare l’innovazione e la trasformazione digitale.
GraphSummit Milan - Visione e roadmap del prodotto Neo4jNeo4j
van Zoratti, VP of Product Management, Neo4j
Scoprite le ultime innovazioni di Neo4j che consentono un’intelligenza guidata dalle relazioni su scala. Scoprite le più recenti integrazioni nel cloud e i miglioramenti del prodotto che rendono Neo4j una scelta essenziale per gli sviluppatori che realizzano applicazioni con dati interconnessi e IA generativa.
GraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with GraphNeo4j
Dr Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
LARUS - Galileo.XAI e Gen-AI: la nuova prospettiva di LARUS per il futuro del...Neo4j
Roberto Sannino, Product Owner, Larus Business Automation
Nel panorama sempre più complesso dei progetti basati su grafi, LARUS ha consolidato una solida esperienza pluriennale, costruendo un rapporto di fiducia e collaborazione con Neo4j. Attraverso il LARUS Labs, ha sviluppato componenti e connettori che arricchiscono l’ecosistema Neo4j, contribuendo alla sua continua evoluzione. Tutto questo know-how è stato incanalato nell’innovativa soluzione Galileo.XAI di LARUS, un prodotto all’avanguardia che, integrato con la Generative AI, offre una nuova prospettiva nel mondo dell’Intelligenza Artificiale Spiegabile applicata ai grafi. In questo speech, si esplorerà il percorso di crescita di LARUS in questo settore, mettendo in luce le potenzialità della soluzione Galileo.XAI nel guidare l’innovazione e la trasformazione digitale.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. 2
Fraud Losses
are
Skyrocketing
Fraud is expected to
surge 20% annually in
coming years1
$42B Lost to fraud globally
in 20222
Neo4j Inc. All rights reserved 2024
1. Experian Research: Identity Theft Is on the Rise, Both in Incidents and Losses 2. PwC’s Global Economic Crime and Fraud
Survey 3. BioCatch: 2023 APAC Digital Banking Fraud Trends Report 4. WalletHub: Credit Card Fraud Statistics
Additional costs for each dollar
of credit card fraud losses4
$3.75
200% Surge in voice scams
from 2022 to 20233
3. 3
A.I. is About to Supercharge Financial Fraud
and make it much harder to spot
Beware Of FraudGPT,
The Rogue AI Chatbot
Deepfake Imposter Scams
Are Driving a
New Wave of Fraud
Financial firms must
boost protections
against AI scams, UK
regulator to warn
I Cloned Myself With AI.
She Fooled My Bank
and My Family
Criminals Have
Created Their Own
ChatGPT Clones
Neo4j Inc. All rights reserved 2024
4. Neo4j Inc. All rights reserved 2024
4
Fraud Frontiers: Examples
Push
Payment
Fraud
Credit
Fraud
Insurance Claims Fraud
Digital Wallet or
Retail Fraud
Supply Chain Fraud,
Procurement Fraud
Internal
Fraud
Checks
Pandemic Fraud/Medical
Insurance Fraud
Tax Fraud/ Criminal
Investigation
Many
Others
5. 5 Neo4j Inc. All rights reserved 2024
Criminals exploit vulnerabilities
in real-time by rapidly adopting
new technologies like AI, while
enterprises struggle to adapt
due to legacy systems and data
silos, taking weeks or months to
detect new fraud schemes.
Why Fraudsters
Have the
Upper Hand
6. 6
Existing Systems Fall Short
Inability to
Uncover
Complex Fraud
Patterns
Difficult to
Adapt to
Evolving
Threats
Neo4j Inc. All rights reserved 2024
Can’t Scale to
Deliver Rapid
Analysis
Analyzing data without
relationships doesn’t work
Pathfinding and entity
resolution need
specific algorithms
Identifying complex, cross-
entity fraud becomes
difficult or impossible
Finding recursive fraud
patterns doesn’t scale
Fraud evades detection
because queries take too long
Hard to connect disparate
data sets without refactoring
the whole database
Coding fraud patterns in SQL
is time-consuming and results
in brittle queries
7. 7 Neo4j Inc. All rights reserved 2024
Neo4j Graph Database and Analytics
8. 8 Neo4j Inc. All rights reserved 2024
Data to Knowledge
Connecting data
adds context and
improves outcomes.
9. Identify suspicious activity
quickly and accurately with
pattern matching
Scale with any cloud and
speed up fraud detection
and investigation
9
Build Powerful
Fraud
Applications
to Uncover
Hidden Patterns
Improve and evolve fraud
applications with a developer-
friendly schema
10. 10
Identify Suspicious Activity Quickly and Accurately
Discover and investigate hard-to-find fraud
quickly with pattern matching
Find fraud patterns 1000x faster
than relational databases
Expose intermediaries and find fake profiles
through pathfinding and entity resolution
Neo4j Inc. All rights reserved 2024
11. 11
Improve and Evolve Fraud Applications
Reduce exposure to fraud by linking
disparate and disconnected data sets
Stay ahead of fraudsters by detecting
new or emerging fraud patterns quickly
Enable wider and easier use of data by connecting
siloed data into an intuitive data model
Neo4j Inc. All rights reserved 2024
12. 12
Scale with any Cloud and Speed up Fraud
Detection and Investigation
Deploy your applications anywhere
Find fraud in ever-larger data sets and scale up number
of users and concurrent transactions
Integrate with your existing enterprise ecosystem
Neo4j Inc. All rights reserved 2024
13. Flexible Cloud Deployment Models
Fully-managed SaaS
Consumption-
based pricing
For private
and hybrid
cloud, or on-prem
White-glove
managed service by
Neo4j experts
13 Neo4j Inc. All rights reserved 2024
Self-Hosted
Cloud Managed Services
Graph-as-a-Service
Cloud-native
Self-service deployment
Fully customizable deployment
model and service levels
Operate In own data centers
or Virtual Private Cloud
Bring your own license
Full control of your environment
Run in any cloud, in your account
14. Neo4j Inc. All rights reserved 2024
14
TODO1 Increases Fraud Detection by 200% with Neo4j
Impact
Using Neo4j, TODO1's iuviPROFILER
increased fraud detection by
200% while maintaining the
same false positive rate.
Challenge
Latin America's rapidly growing digital
banks must instantly assess transaction
risks to maintain seamless user
experiences, but traditional databases
are inadequate for real-time detection.
Solution
TODO1 created iuviPROFILER, using
Neo4j, to efficiently process data and
assess risk, enabling banks to securely
conduct transactions with minimal
friction, even during peak demand times.
iuviPROFILER’s
Graph by the Numbers
–
250 million nodes
–
2.2 billion relationships
Graph Performance
by the Numbers
–
>500 transactions
per second
–
100 milliseconds
per query
For the same false positive rate,
we’re able to achieve twice the
detection rate.’ he said. ‘And that
in the end is less friction for the
customer, less losses for the bank,
and a better feeling in terms of
protection for their customers.
Edgar Osuna
Chief Data and Analytics Officer
“ “
Read the full customer story on Neo4j.com
15. Neo4j Inc. All rights reserved 2024
15
Banking &
Financial Services
Technology Telecommunications Energy
E-Commerce
Health & Life
Sciences
1,700+ Organizations Use Neo4j
16. Neo4j Inc. All rights reserved 2024
16
Summary
Identify suspicious activity
quickly and accurately with
pattern matching
Scale with any cloud and
speed up fraud detection
and investigation
Improve and evolve fraud
applications with a developer-
friendly schema
Background. Fraud is pervasive worldwide and is growing.
Experian Research: Identity Theft Is on the Rise, Both in Incidents and Losses
PwC’s Global Economic Crime and Fraud Survey 2022
BioCatch: 2023 APAC Digital Banking Fraud Trends Report
WalletHub: Credit Card Fraud Statistics
Key Takeaway: The Generative AI revolution isn’t just being used for good; fraudsters are using technology to make their fraud harder to spot.
Key Takeaway: Fraud is everywhere
(this slide is a build)
Often we think of fraud as something that only pertains to Banking, Financial Services, and Insurance (BFSI) and retail companies. <click to do the first build> Indeed, these kinds of fraud overwhelmingly affect those kinds of organizations. <click to add the second build> However, there are other types of fraud that affect us much more widely <mention one or two if they are particularly relevant to your prospect>. <click to do the final build>...and of course these are only just examples.
Key Takeaway: Fraudsters are taking advantage of new technologies and techniques faster than we can.
Hard-to-change legacy systems and disparate, disconnected data sources mean that it takes us a long time to discover and adapt to new fraud schemes.
Relational DBMS systems fall short for three broad reasons:
They cannot uncover complex fraud patterns. They do not store relationships natively, and need to use joins and ever-complex queries, and these break down when they go beyond the small and the simple. RDBMSs also dont have algorithms for pathfinding, which are needed to find connections between entities and fraudulent actors.
THey cannot scale to deliver rapid analysis. What happens is that when RDBMSs use joins and SQL queries to attack recursive patterns, they do not return results quickly enough. Instead of millisecond response, they take minutes or hours. Customers won’t wait for that.
RDBMSs are difficult to evolve over time. Bringing new datasets typically requires the existing database schema to be refactored, which also means that queries and application code need to be refactored as well. SQL queries are also “brittle” meaning that when (for example) fraud rings get larger because fraudsters are using more complex techniques to evade detection, the SQL queries need to be rewritten to detect those larger rings - this takes time, both developer time to re-code the queries, and run-time when the queries take longer and longer because of the extra joins.
Key takeaways: Applications built on Neo4j can identify suspicious activity quickly and accurately through pattern matching, fast join-free relationship traversals, exposing intermediaries, and resolving entities to find fake or synthetic profiles.
Key takeaways: Applications built on Neo4j can identify suspicious activity quickly and accurately through pattern matching, fast join-free relationship traversals, exposing intermediaries, and resolving entities to find fake or synthetic profiles.
How does Neo4j help deal with these issues? Neo4j is a native graph database for building fraud applications that can:1. Identify suspicious activity quickly and accurately
2. Improve and evolve over time
3. Be deployed on any cloud and scale up
Let’s look at how…
Key takeaways: Applications built on Neo4j can identify suspicious activity quickly and accurately through pattern matching, fast join-free relationship traversals, exposing intermediaries, and resolving entities to find fake or synthetic profiles.
Key takeaway: Applications built using Neo4j are flexible, allowing them to evolve over time as needs change and as fraudsters get smarter
<the next slide has an animation that plays only once. Make sure to leave some space in your talking points for the audience to absorb the animation before you start talking about it. It only lasts for about 4-5 seconds>
Key takeaway: With Neo4j, you can deploy on a fully managed cloud database on any of the major clouds. That database will grow and scale with you as you scale up, and it has connectors and APIs that work with your existing data ecosystems.
Key takeaway: Deploy in the cloud of your choice with “as-a-Service,” “White glove managed services tailored to your needs,” or “self-hosted” options
Key takeaway: Customers across an array of industries use Neo4j for fraud detection as well as other use cases
Summarize the value proposition again and tie back to your customer’s specific needs.