SlideShare uma empresa Scribd logo
1 de 37
IBM Financial Crime Management Solution Overview and Solution Demo
Financial Crime   I s  O n the  R ise! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],58% Source: Ponemon Institute/Guardian Analytics study, March, 2010 80% 87% 40% 20% A poll of 500 executives and owners of small and medium businesses showed:
Fraud activities continue to rise 48% of fraud cases involve insiders 5% fraud activities cause 5% of pre-tax income for U.S. financial institutions  $1,000,000 Average loss when a high-level executive is involved 400% When an insider is involved, loss increases by an average 400% A study in U.S. found:
Example: Common Types of Credit Card Fraud Fraudulent possession of card details (CNP Fraud) Counterfeit Lost or Stolen Mail non-receipt fraud Identity theft Detect at application, activation and account maintenance Detect at Activation Detect at trax authorization 14% 7% 30% 26% 23% Often organized crime Western Countries Detect at trax authorization Detect at trax authorization
Challenge #1 – Follow up instead of intercept Off-line Analysis and Investigation Asynchronous Monitoring and Confirmation Real-Time Automatic Decisioning and Approval Precise Rules and High Performance System
Challenge 2 – Traditional Technology Can’t Process Large Transaction Volume For example, a large international or regional bank’s credit card center will have to detect over 10M transactions a day = 623/second  (99% confidence level)  or 644/second  (99.9%confidence level)  or 663/second  (99.99% confidence level)
Challenge 3 – Traditional Technology Only Monitor Single Transactions Multiple  activities  usually involve in a fraud  event Many fraud patterns involve diverse systems and seemingly unrelated activities, e.g. multiple login attempts, followed by a combination of changes in PIN and contact information followed by an unusually large withdraw or transfer.
Challenge #4 – False Positive Rate Too High Event What is Happening? When to Act? What Action? Event Rules Business Rules Precise Event Rules and Business Rules Reduce False Positive Rate !
Solution from Package Vendors Transaction Score Action Model Blackbox? Need vendor to change ? Other events (Change of Address, PIN error, replacement card, call center query, etc.) 1000’s Trax/Sec Is environment developing too fast to train the models?  Performance? Mode Description Disadvantage Real-Time Transaction scores in real time  &  recommendation send to authorization decision ing High  HW  requirement Online Plus Score is based on last transaction, send to authorization server for decision making 1st  fraud transaction is lost Online Enables analyst response, but no feedback to authorization ,[object Object],[object Object],Near Online / Frequent Batch Score batch send to analyst workstations at pre-determined time intervals Time lag from transaction execution to analyst action may reduce effectiveness ? ? ? ? ? ? ? ? ? ? ? ?
Banks Require a  Flexible and Expandable Platform Leverage strengths of existing systems that are cost effective, adopt best-of-breed alternatives to address deficiencies ,[object Object],[object Object],[object Object],[object Object],A consolidated and integrated operational organization (to the extent possible) addresses customer-based alerts Integrated environment generates improved Business Intelligence which benefits tactical functions and enables strategic thinking ,[object Object],[object Object],[object Object],[object Object]
IBM’s Smarter Way of Fighting Financial Crime + + Instrumented Interconnected Intelligent
IBM’s Smarter Way of Fighting Financial Crime Attitudinal Data Interaction Data Behavioral Data Demographic Data Event Rules Profile Rules Management Console Transactional & Channel Systems Historical Data IBM Financial Crime  Real-Time Detection & Prevention  Solution Event Detector IBM Financial  Crime  Case Mgmt  Solution IBM Financial  Crime Analytics  Solution
Effectively Prevent and Manage Financial Crime  Case Analysts use  IBM Financial Crime Analytics Solution  to discover patterns Investigators use  IBM Financial Crime Case Management Solution  for investigation and collaboration with bank’s auditing department and law enforcement Financial Crime Cases Business Rules Analysts use  IBM Financial Crime Real-Time Detection & Prevention Solution  to turn patterns into rules that can be deployed for real-time detection and prevention
IBM’s  Smarter  Way for Real-Time Financial Crime Detection Events Score Actions 1000’s trax/sec Other Financial Crime-Related Activities Watch List Filtered financial  crime  Event Event Rules Profile Rules Rules that can be customized and continually optimized by banks Pre-filtering allows 100% potential events to pass through decisioning real-time without hurting performance Automatically generated watch lists are used to monitoring selected fraud activities Monitor any events relevant to financial crime activities Change Password Password Error Report of Lost Card Online Activation Change of Addr ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------
IBM  Financial Crime Management Solution Architecture Banking Existing IT System Business event XML/JMS WBE  Event association judgment Filtered event and type XML/JMS ILOG anti fraud rule Event score Case management Change Password Report of Lost Card Online Activation Change of Addr Payment Event rule Customer history behaviors Anti fraud database
IBM  Financial Crime Management Online Monitor Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit card online monitor process Process? meet Y N N Y R R R R Pass >500 Y : Yes B : No R : Read W W <500 Pass Base event and behavior rule Event rule filter Auth request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customer info Account info Merchant info ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Case management process UI Triggered rule Card  info Transaction log investigate ,[object Object],[object Object],[object Object],[object Object],Submit to higher level to process Channel info Transaction log
WBE event process server overview Event cloud Protocol exchange Format exchange Events connector Actions WBE Runtime connector Database JMS Push History module Topics Dashboard SOAP RDBMS HTTP SMTP FTP File XSL JMS JDBC JDBC & SOAP SOAP RDBMS HTTP SMTP FTP File XSL JMS Topics WBE development  Relativity cache Information  based time sequence Event cloud WBE object store lab
Pre-Built Rules &  Design  Interface - WBE
Rule engine component view Design Maintain Share Deploy Line Of Business Production Development Rule Solutions for Office Rule Studio  Rule Team Server Decision Validation Services Rule Repository Transparent Decision Services Rule Execution Server Rules for COBOL Custom Web Applications
Event rule sample case Condition A: Transaction occurs between 0:00am to 6:00am Condition B: Transaction ammount is lager then 2000 Condition C: 3+ times transactions  in passed 1 hour and Potential transaction TM01 Condition A: Password was modified within today Condition B: 3+ times transactions  in passed 1 hour Condition C: Accumulative total amount  is larger than 8000 and Potential transaction TM02
Pre-Built Rules &  Design  Interface - iLog
Event rule implement sample
ILOG base score based on event type ,[object Object],[object Object],[object Object],规则流 base score table based on event type Event type A Event type A Score table A Score table B Event type C Event type and score table relationship ( N:1)
ILOG score base on customer behavior ,[object Object],Score table base on customer behavior model
Data Model
Generate potential fraud case Input column : First column : potential fraud type Second column : transaction score Output column : First column : final fraud type Second column : description of fraud Generate potential fraud case based on event type and score
Management UI
Card Fraud Reference Deployment Model Credit Card System  (IBM Z) ATM & Debit Card Internet Banking ACH etc Credit Card  Authorization Module Other Systems Event Engine Watchlist Generation Rules Fraud Decisioning Rules Event engine detects and maintains dynamic watchlists using pre-defined event rules 1 Rules engine as a stage of the authorization process 2 Rules engine calls the dynamic watchlists and relevant CIF and historical data to make fraud scoring decision 3 Historical & Customer Data Rule Engine Essentis / Triad Event Engine supports high-performing detection on CICS Contact Center / CRM CIF Dynamic Watchlist Event Detectors supports all major platforms Transaction Systems Credit Card ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------
Retail Banking Fraud Reference Deployment Source 1 Router Source 2 … … … Transaction Processing  System 1 Transactions come from all sources 2 Router makes a duplicate 3 Main copy flows via existing route Duplicate copy is sent to IBM Financial Crime Mgmt Solution ,[object Object],[object Object],[object Object],5 Need to reverse transaction is blocked by Router based on decision from IBM Financial Crime Mgmt Solution 7 Router combines decision from existing system and IBM Financial Crime Management Solution and returns result to source system 6 4
Deliver project team sample ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Configuration Option ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Starter Configuration Extreme  Configuration Event Engine WebSphere Business Events  WebSphere Business Events for  Z/OS Rules Engine ILOG JRules ,[object Object],[object Object],[object Object],Event Detector CICS Events for WebSphere Business Events SupportPac  (enable CICS TS v3 as an emitter of events in a format directly consumable by WebSphere Business Events) Rules Development ILOG Rule Studio ILOG Rule Team Server  ILOG Rules Solution for Office  WebSphere Business Events Design Tool Monitoring (Optional) WebSphere Business Monitor Integration (option) WebSphere Message Broker, WebSphere DataPower, WebSphere MQ
Demo 1: Card Fraud Detection
Demo 2: Online Banking Fraud Detection
Summary
IBM Solution is Uniquely Positioned ???  Powerful technical support from IBM. Implementaiton “ It depends”? Fully supporting IBM Z/OS and providing decisioning capability at high performance. Performance Single-purpose, point solution reduces ROI. Banks can utilize this platform for future AML, customer churn management and real-time cross-selling projects. Expandability Trade off between performance and effectiveness? IBM event engine produces real-time, dynamic watchlists for rules engine to make precide decisions. Capability of Real-Time Detection Mostly only for transaction decisioning with high false positive rates. IBM complex event engine uses event detector to monitor different systems to increase accuracy of decisioning Capability to monitor multiple systems “ Black box” Rules and models are owned and managed by bank Rules and Model Mgmt Legacy Solutions from ISVs IBM Financial Crime Management Solution
Prospecting Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Protecting the bank
Protecting the bankProtecting the bank
Protecting the bankCGI Suomi
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Alessa
 
Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningStefano Tempesta
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer NeedsAlisa Karybina
 
François-Eric Perquel, 5th Digital Banking Forum
François-Eric Perquel, 5th Digital Banking ForumFrançois-Eric Perquel, 5th Digital Banking Forum
François-Eric Perquel, 5th Digital Banking ForumStarttech Ventures
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformEZ-R Stats, LLC
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 

Mais procurados (12)

Protecting the bank
Protecting the bankProtecting the bank
Protecting the bank
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
 
goAML
goAMLgoAML
goAML
 
Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine Learning
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs5 AI Solutions Every Chief Risk Officer Needs
5 AI Solutions Every Chief Risk Officer Needs
 
François-Eric Perquel, 5th Digital Banking Forum
François-Eric Perquel, 5th Digital Banking ForumFrançois-Eric Perquel, 5th Digital Banking Forum
François-Eric Perquel, 5th Digital Banking Forum
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 

Destaque

How to Detect & Prevent Fraud in SCM pdf
How to Detect & Prevent Fraud in SCM pdfHow to Detect & Prevent Fraud in SCM pdf
How to Detect & Prevent Fraud in SCM pdfReysun De Vera M.
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Financial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard CharteredFinancial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard CharteredTEDxMongKok
 
McKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury, LLP
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingAperio Intelligence
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T UEcom Ftu
 
Occupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to KnowOccupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to Knowgppcpa
 
Medical fraud and its implications Dr Vaikuthan Rajaratnam
Medical fraud and its implications Dr Vaikuthan RajaratnamMedical fraud and its implications Dr Vaikuthan Rajaratnam
Medical fraud and its implications Dr Vaikuthan RajaratnamVaikunthan Rajaratnam
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefingBovill
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Institute India Pvt. Ltd
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
Corporate Governance Project
Corporate Governance Project Corporate Governance Project
Corporate Governance Project riya_thakkar
 
Flexible working: the competitive advantage
Flexible working: the competitive advantageFlexible working: the competitive advantage
Flexible working: the competitive advantageHydrogen Group
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 

Destaque (20)

Financial Crimes
Financial CrimesFinancial Crimes
Financial Crimes
 
How to Detect & Prevent Fraud in SCM pdf
How to Detect & Prevent Fraud in SCM pdfHow to Detect & Prevent Fraud in SCM pdf
How to Detect & Prevent Fraud in SCM pdf
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Financial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard CharteredFinancial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard Chartered
 
biteck
biteckbiteck
biteck
 
McKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But When
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective Training
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T U
 
Occupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to KnowOccupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to Know
 
Medical fraud and its implications Dr Vaikuthan Rajaratnam
Medical fraud and its implications Dr Vaikuthan RajaratnamMedical fraud and its implications Dr Vaikuthan Rajaratnam
Medical fraud and its implications Dr Vaikuthan Rajaratnam
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
 
Economic crimes
Economic crimesEconomic crimes
Economic crimes
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
Corporate Governance Project
Corporate Governance Project Corporate Governance Project
Corporate Governance Project
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Flexible working: the competitive advantage
Flexible working: the competitive advantageFlexible working: the competitive advantage
Flexible working: the competitive advantage
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 

Semelhante a Ibm financial crime management solution 3

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Office Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsOffice Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsMike Walker
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight OverviewMike Telem
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudKyriba Corporation
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...Vesta Corporation
 
Online Trading
Online TradingOnline Trading
Online Tradingkoolzub
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEM
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEMCONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEM
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEMGeorge Krasadakis
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banksPankaj Baid
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
#Paymentasiareviews - Risk Management Model Ecommerce Industry
#Paymentasiareviews   - Risk Management Model Ecommerce Industry#Paymentasiareviews   - Risk Management Model Ecommerce Industry
#Paymentasiareviews - Risk Management Model Ecommerce IndustryPayment Asia
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detectionconfluent
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Michael Abernathy
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 

Semelhante a Ibm financial crime management solution 3 (20)

Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Office Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsOffice Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAs
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Online Trading
Online TradingOnline Trading
Online Trading
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEM
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEMCONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEM
CONSUMER CREDIT RISK ASSESMENT, PREDICTION & MANAGEMENT SYSTEM
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banks
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Financial Supply Chain Management
Financial Supply Chain ManagementFinancial Supply Chain Management
Financial Supply Chain Management
 
#Paymentasiareviews - Risk Management Model Ecommerce Industry
#Paymentasiareviews   - Risk Management Model Ecommerce Industry#Paymentasiareviews   - Risk Management Model Ecommerce Industry
#Paymentasiareviews - Risk Management Model Ecommerce Industry
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detection
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Ibm financial crime management solution 3

  • 1. IBM Financial Crime Management Solution Overview and Solution Demo
  • 2.
  • 3. Fraud activities continue to rise 48% of fraud cases involve insiders 5% fraud activities cause 5% of pre-tax income for U.S. financial institutions $1,000,000 Average loss when a high-level executive is involved 400% When an insider is involved, loss increases by an average 400% A study in U.S. found:
  • 4. Example: Common Types of Credit Card Fraud Fraudulent possession of card details (CNP Fraud) Counterfeit Lost or Stolen Mail non-receipt fraud Identity theft Detect at application, activation and account maintenance Detect at Activation Detect at trax authorization 14% 7% 30% 26% 23% Often organized crime Western Countries Detect at trax authorization Detect at trax authorization
  • 5. Challenge #1 – Follow up instead of intercept Off-line Analysis and Investigation Asynchronous Monitoring and Confirmation Real-Time Automatic Decisioning and Approval Precise Rules and High Performance System
  • 6. Challenge 2 – Traditional Technology Can’t Process Large Transaction Volume For example, a large international or regional bank’s credit card center will have to detect over 10M transactions a day = 623/second (99% confidence level) or 644/second (99.9%confidence level) or 663/second (99.99% confidence level)
  • 7. Challenge 3 – Traditional Technology Only Monitor Single Transactions Multiple activities usually involve in a fraud event Many fraud patterns involve diverse systems and seemingly unrelated activities, e.g. multiple login attempts, followed by a combination of changes in PIN and contact information followed by an unusually large withdraw or transfer.
  • 8. Challenge #4 – False Positive Rate Too High Event What is Happening? When to Act? What Action? Event Rules Business Rules Precise Event Rules and Business Rules Reduce False Positive Rate !
  • 9.
  • 10.
  • 11. IBM’s Smarter Way of Fighting Financial Crime + + Instrumented Interconnected Intelligent
  • 12. IBM’s Smarter Way of Fighting Financial Crime Attitudinal Data Interaction Data Behavioral Data Demographic Data Event Rules Profile Rules Management Console Transactional & Channel Systems Historical Data IBM Financial Crime Real-Time Detection & Prevention Solution Event Detector IBM Financial Crime Case Mgmt Solution IBM Financial Crime Analytics Solution
  • 13. Effectively Prevent and Manage Financial Crime Case Analysts use IBM Financial Crime Analytics Solution to discover patterns Investigators use IBM Financial Crime Case Management Solution for investigation and collaboration with bank’s auditing department and law enforcement Financial Crime Cases Business Rules Analysts use IBM Financial Crime Real-Time Detection & Prevention Solution to turn patterns into rules that can be deployed for real-time detection and prevention
  • 14. IBM’s Smarter Way for Real-Time Financial Crime Detection Events Score Actions 1000’s trax/sec Other Financial Crime-Related Activities Watch List Filtered financial crime Event Event Rules Profile Rules Rules that can be customized and continually optimized by banks Pre-filtering allows 100% potential events to pass through decisioning real-time without hurting performance Automatically generated watch lists are used to monitoring selected fraud activities Monitor any events relevant to financial crime activities Change Password Password Error Report of Lost Card Online Activation Change of Addr ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------
  • 15. IBM Financial Crime Management Solution Architecture Banking Existing IT System Business event XML/JMS WBE Event association judgment Filtered event and type XML/JMS ILOG anti fraud rule Event score Case management Change Password Report of Lost Card Online Activation Change of Addr Payment Event rule Customer history behaviors Anti fraud database
  • 16.
  • 17.
  • 18. WBE event process server overview Event cloud Protocol exchange Format exchange Events connector Actions WBE Runtime connector Database JMS Push History module Topics Dashboard SOAP RDBMS HTTP SMTP FTP File XSL JMS JDBC JDBC & SOAP SOAP RDBMS HTTP SMTP FTP File XSL JMS Topics WBE development Relativity cache Information based time sequence Event cloud WBE object store lab
  • 19. Pre-Built Rules & Design Interface - WBE
  • 20. Rule engine component view Design Maintain Share Deploy Line Of Business Production Development Rule Solutions for Office Rule Studio Rule Team Server Decision Validation Services Rule Repository Transparent Decision Services Rule Execution Server Rules for COBOL Custom Web Applications
  • 21. Event rule sample case Condition A: Transaction occurs between 0:00am to 6:00am Condition B: Transaction ammount is lager then 2000 Condition C: 3+ times transactions in passed 1 hour and Potential transaction TM01 Condition A: Password was modified within today Condition B: 3+ times transactions in passed 1 hour Condition C: Accumulative total amount is larger than 8000 and Potential transaction TM02
  • 22. Pre-Built Rules & Design Interface - iLog
  • 24.
  • 25.
  • 27. Generate potential fraud case Input column : First column : potential fraud type Second column : transaction score Output column : First column : final fraud type Second column : description of fraud Generate potential fraud case based on event type and score
  • 29. Card Fraud Reference Deployment Model Credit Card System (IBM Z) ATM & Debit Card Internet Banking ACH etc Credit Card Authorization Module Other Systems Event Engine Watchlist Generation Rules Fraud Decisioning Rules Event engine detects and maintains dynamic watchlists using pre-defined event rules 1 Rules engine as a stage of the authorization process 2 Rules engine calls the dynamic watchlists and relevant CIF and historical data to make fraud scoring decision 3 Historical & Customer Data Rule Engine Essentis / Triad Event Engine supports high-performing detection on CICS Contact Center / CRM CIF Dynamic Watchlist Event Detectors supports all major platforms Transaction Systems Credit Card ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------ ------
  • 30.
  • 31.
  • 32.
  • 33. Demo 1: Card Fraud Detection
  • 34. Demo 2: Online Banking Fraud Detection
  • 36. IBM Solution is Uniquely Positioned ??? Powerful technical support from IBM. Implementaiton “ It depends”? Fully supporting IBM Z/OS and providing decisioning capability at high performance. Performance Single-purpose, point solution reduces ROI. Banks can utilize this platform for future AML, customer churn management and real-time cross-selling projects. Expandability Trade off between performance and effectiveness? IBM event engine produces real-time, dynamic watchlists for rules engine to make precide decisions. Capability of Real-Time Detection Mostly only for transaction decisioning with high false positive rates. IBM complex event engine uses event detector to monitor different systems to increase accuracy of decisioning Capability to monitor multiple systems “ Black box” Rules and models are owned and managed by bank Rules and Model Mgmt Legacy Solutions from ISVs IBM Financial Crime Management Solution
  • 37.

Notas do Editor

  1. 利用 IBM 金融犯罪管理解决方案有效地预防与管理金融犯罪