the agile approach to fraud€¦ · requirements volume typically data quantities of over a few or...

28
The Agile Approach to Fraud Defending Against Shape- Shifting Threats

Upload: others

Post on 03-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

The Agile Approach to Fraud Defending Against Shape-Shifting Threats

Page 2: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

2

Stu Bradley, Senior Business Director, SAS Fraud & Financial Crimes Global Practice

Andras Cser, VP and Principal Analyst Serving Security and Risk Professionals, Forrester

John Standish, Retired Chief of the Fraud Division, California Department of Insurance

Chris Gray, Global Managing Director for Intelligent Processing Services, Accenture

Page 3: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

3

Andras Cser, VP and Principal Analyst Serving Security and Risk Professionals, Forrester

Fraud Management Trends

Page 4: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

4

Behavior modeling and big data fuel fraud management market growth

Page 5: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

5

Fraud affects profitability, reputation, and compliance

The bottom line

Losses due to fraud

Spend on fraud prevention resources

Brand value and customer loyalty

Regulatory compliance

Know your customer

Anti-money laundering

Fraud affects all verticals

Page 6: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

6

5 Bs of Fraud management trends

Big data (Volume, Velocity, Variety, Veracity and VALUE of data)

Behavioral analytics

BYOD and mobile fraud

BI data from Fraud data

Breadth and Bundling of shared networks’ information

Page 7: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

7

Big Data

Volume

Velocity

Variety

Page 8: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

8

© 2013 Forrester Research, Inc. Reproduction Prohibited 8

(How do we avoid this???)

Page 9: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

9

Big Data Will Transform Fraud Management Requirements

Volume

Typically data quantities of over a few or 10TB is considered Big Data

Velocity

Fast movement of data

Streamed data

Not feasible to persist data (cost or speed issues)

Variety

Log files

Social networks information

Textual information

Device specific data, geolocation data

Low level data (sensors, etc.)

Page 10: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

10

Behavioral analysis

Page 11: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

11

BYOD and mobile device fraud

Page 12: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

12

Need to manage

Many and confusing definitions

NFC chips in mobile devices replacing (or augmenting) EMV chips in plastic credit cards

CNP payment transactions initiated from mobile devices

eWallets (Project Oscar in the UK, Google, Amazon?, Apple?)

From native mobile applications

From mobile web or WAP sites

Mobile billing

SMS / Text message based billing

Page 13: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

13

BI data from Fraud Data: A symbiotic relationship

Page 14: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

14

Breadth of shared and consortium information

Page 15: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

15

John Standish, Retired Chief of the Fraud Division, California Department of Insurance

Enterprise Fraud Solutions: Government and Private Sectors

Page 16: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

16

The Future: Enterprise Solutions

Multiple Programs and Lines of Business: The GAPS

Page 17: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

17

Fraud is Fraud!

Page 18: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

18

Best Practices

Page 19: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

19

Communicate, Collaborate and Coordinate

Page 20: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

20

Chris Gray, Global Managing Director for Intelligent Processing Services, Accenture

New Approached to Delivering Improved Outcomes

Page 21: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

21

Non-Compliance: A Global Business Challenge

US federal government and

states overpaid an estimated $14

billion in unemployment benefits

in fiscal 2011, or roughly 11% of

all jobless benefits paid 1

Fraud detected in France

across Social Security

ministries was €457 million

in 2010

Irish mother of six is jailed

for three years after claiming

social welfare fraud of

$350,000 in 2012

Idaho man pleads

guilty to $1.5 million

in disability fraud –

April, 2009 –The Settle

Pensions claimed for 30

years after death September 2010 –The

Manichi Daily News

Fraud of new

applicants at 24% in

San Diego 2010 –Los Angeles Times

US tax gap

is c.$300

million

EU estimates VAT

fraud to be €100

billion per annum

1 http://money.cnn.com/2012/07/09/news/economy/overpaid-unemployment-benefits/

Page 22: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

22

Moving from Post Transaction Audits To Embed Real Time Risk Scoring into Processing

Enablement

Collections

Registration Forms and Financial

Processing Discovery Audit

Collections and

Debt Mgt

Compliance

CORRECT Post-process review

DETECT Identify potential risks, in-process

Processing

DETECT Identify potential risks, in-process

PREVENT Stop non-compliance at entry

New

rules

New

rules

A more dynamic approach is required

Page 23: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

23

Processing Collections Compliance

New rules

7 Collections &

Debt Management

CORRECT: Post-process review

DETECT: Identify potential risks, in-process

New rules PREVENT: Stop non-compliance at entry

1 Registration

1.1 Identity

Resolution

7.1 Intelligence-Led

Collections

2 Forms & Financial

Processing

2.1 Known Non-

Compliance Identification

2.2 Unknown Non-

Compliance Identification

3 Criminal

Investigations

4 Audit

6 Marketing &

Outreach

5 Discovery &

Non-Filer

3.1 Scheme &

Collusion Detection

4.1 Intelligence-Led

Audit Management

6.1 Customer Education

Campaigns

5.1 Non-Filer

Discovery

8 Enablement

8.2 Talent Management

& Delivery Methods

8.3 Technical & Data

Architecture

8.4 Value Measure

& Manage

8.1 Governance &

Business Integration

Compliance Framework: take a structured approach

Page 24: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

24

Analytic

Models Agency & External

Data Sources

Predictive Models

Expert Rules

Severity Levels

Treatment & Workflow Strategies

Business

Systems

Consolidated

Customer Analytic

Record

Continue Transaction

Flag for Categorised Investigation

Stop Transaction

Treatment & Case

Management Systems

Value Measure

& Manage

Model Evaluation Results

New & Emergent Patterns

Investigation &

Treatment

Activities

Analytics

Laboratory

Analytics

Factory

Challenges: Do I focus on the Laboratory or the Factory

Page 25: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

25

Step 0.

Intake

Step 1.

Define Value

Step 2.

Get Value

Step 3.

See Value

How can we sustain

value into the future?

What is the path to

seeing value?

What is the projected

return for the project?

Should we consider this

project?

Communicate Value

What is the best way to communicate project value?

Challenges: Measuring success and demonstrating value

Page 26: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

26

The following survey of CEO’s shows that 5 out of the top 10 business transformation showstoppers are ‘people and organizational’ issues.

No Change Management Program

Project Team Lacked Skills

Top 10 Barriers to Success

36%

41%

43%

44%

44%

46%

54%

65%

72%

82%

IT Perspective not Integrated

Not Horizontal Process View

Scope Expansion / Uncertainty

Case for Change not Compelling

Poor Project Management

Unrealistic Expectations

Inadequate Sponsorship

Resistance to Change

PERCENT OF FIRMS Copyright © EquaTerra 2007. All rights are reserved.

Challenges: Insight x Business Integration = Value

Page 27: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed

27

Fraud didn’t happen overnight, nor can be solved overnight: a

structured plan and methodologies are needed to help

agencies continually fight fraud.

In order to industrialise the approach and speed up progress

agencies will need to make a decision whether to build or to buy

advanced analytical talent and capabilities

Insight is good but it is worthless if it cannot be used in the front

line. A holistic approach and a strong focus on processes and

business integration is critical.

Structured and Industrialised approach

Page 28: The Agile Approach to Fraud€¦ · Requirements Volume Typically data quantities of over a few or 10TB is considered Big Data Velocity Fast movement of data geolocation Streamed