SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Fraud and Breach Prevention Summit Chicago
June 21-22nd, Chicago IL
Anand Sureka | Guardian Analytics
Behavioral Analytics for Preventing
Fraud Today and Tomorrow
Fraud & Breach Prevention Summit Chicago #ISMGSummits2
About the Speaker
Anand Sureka
Senior Solutions Engineer, Guardian Analytics
Anand Sureka is a Senior Solutions Engineer at Guardian Analytics. He has spent over a
decade working with banks to develop and integrate software solutions into online banking
and payment services, including fraud detection, personal financial management, bill pay,
ACH transfers and credit card payment services. Prior to joining Guardian Analytics, Anand
was a principle consultant for the professional services team at Envestnet-Yodlee.
Fraud & Breach Prevention Summit Chicago #ISMGSummits3
• Fraud and Breach Prevention Summit Miami
Behavioral Analytics - Preventing
Fraud Today
• April 12-13, 2016 – Miami, FL
Anand Sureka
Fraud & Breach Prevention Summit Chicago #ISMGSummits4
Banks Facing Unprecedented Trust Issue
§ Demise	in	trust		
§ Legacy	and	silo	approaches	
failing	-	increase	in	fraud	
§ Can’t	hold	back	-	
compe;;ve	pressure	
forcing	innova;on	
§ New	approach	is	needed	
Trust	
Compe,,ve	
pressures	
Third	party	providers	
Compe;;ve	Banks	
Speed	
Convenience	
Simplicity	
Products/Services	
Customer	experience	
Opera6onal	Costs	
Data	breaches	
• 				Malware	
									Social	engineering	
													Single	channel																		
																Cross-channel	
Customer	Access	
Customer	Data
Fraud & Breach Prevention Summit Chicago #ISMGSummits5
New Requirements for Fraud Prevention
Support
payment /channel
innovation
Improve
customer
experience
Increase
operational
efficiency
Address
modern
fraud
Fraud & Breach Prevention Summit Chicago #ISMGSummits6
Meeting The New Requirements
Identity
Threat specific
Payment/channel slice
Behavior
Threat agnostic
Holistic view
Legacy Modern
Rules/scenarios Analytics
Fraud & Breach Prevention Summit Chicago #ISMGSummits7
Success Starts With Broad View of Behavior
OOBAChannelDelete
OOBAChannelEdit
PasswordChange
UserCreate
UserDelete
UserEdit
UserEnrollmentCreate
UserEnrollmentDelete
UserEnrollmentEdit
UserView
Informational
CheckImageView
AccountCreate
AccountDelete
AccountEdit
AlertCreate
AlertDelete
AlertEdit
ExternalAccountLink
InternalAccountLink
MFAOptionsChange
RemoteDepositCapture
ReportView
OOBAChannelCreate
WireTemplateApprove
WireTemplateCreate
WireTemplateDelete
WireTemplateEdit
WireTemplateSubmit
WireTemplateApprove
WireTemplateCreate
WireTemplateDelete
WireTemplateEdit
WireTemplateSubmit
HTTPAcceptEncoding
HTTPAcceptLanguage
HTTPClientIP
HTTPCookie
HTTPForwarded
HTTPForwardedFor
HTTPHost
HTTPLocation
HTTPProxy
HTTPReferer
HTTPRequestURI
BrowserPlugins
Cookie
CookiesEnabled
DeviceID
FontList
JavaEnabled
LanguageBrowser
LanguageSystem
LanguageUser
Latitude
Longitude
Direction
ToAccount
ToAccountType
FromAccounType
AmountinUSDollars
Status
StatusReason
RecurringPayment
ReceivingBankID
ReceivingBankName
Recipient
OtherInstructions
DestinationType
ACHParticipantDelete
ACHParticipantEdit
ACHParticipantSubmit
ACHTemplateApprove
ACHTemplateCreate
ACHTemplateDelete
ACHTemplateEdit
ACHTemplateSubmit
ACHParticipantApprove
ACHParticipantCreate
WireApprove
WireCreate
WireDelete
WireEdit
WireSubmit
WireEvent
BillPayApprove
BillPayCreate
BillPayDelete
BillPayEdit
BillPaySubmit
ACHBatchApprove
ACHBatchCreate
ACHBatchDelete
ACHBatchEdit
ACHBatchSubmit
ACHCreditEntry
ACHDebitEntry
TransferApprove
TransferCreate
TransferDelete
TransferEdit
TransferSubmit
MFA Challenge
Login
UTCTimestamp
SingleSignOn
Logout
DeviceRegistered
Channel
Company ID
ASNs
Network attributes
HTTPVia
HTTPXClusterClientIP
HTTPXForwarded
HTTPXForwardedFor
HTTPXTrusteerRapport
ImmutableCompanyID
ImmutableUserID
IPAddress
IPv6Address
SessionID
SignOnID
OSPlatform
ScreenResolution
TimeZoneOffset
UserAgentString
UserAgentStringDOM
Phone Number
GPS events
Wifi/Bluetooth/NFC
Hardware
HTTPAccept
HTTPAcceptCharsets
PayeeApprove
PayeeCreate
PayeeDelete
PayeeEdit
PayeeSubmit
TransferTemplateApprove
TransferTemplateCreate
TransferTemplateDelete
TransferTemplateEdit
TransferTemplateSubmit
Login/Access
Account Activity
Transactions
Fraud & Breach Prevention Summit Chicago #ISMGSummits8
Real-time Behavior-based Risk Scoring
Login/Access
Account Activity
Transactions
Risk	score	
every	event	
Each	event	
updates	risk	
L	
L	
M	
L	
H	
Rule	
Rule	
Behavioral Analytics
• Individual • Population
• 
Risk	Data	
Machine Learning
Fraud & Breach Prevention Summit Chicago #ISMGSummits9
Risk-based Intervention
Login/Access
Account Activity
Transactions
Risk	score	
every	event	
Each	event	
updates	risk	
L	
L	
M	
L	
H	
Rule	
Rule	
• Behavioral Analytics
• Individual • Population
• 
Risk	Data	
Rules-driven interdiction
Risk-driven interdiction
Policies	drive	
interdic;on	ac;ons	
(for	any	risk	score)
Fraud & Breach Prevention Summit Chicago #ISMGSummits10 • 10
Guardian Analytics Protects
Fraud & Breach Prevention Summit Chicago #ISMGSummits11
Partnership with The Norman Group
“To stay competitive, financial institutions need to
continually enhance their customer-facing products and
back-end technology platforms, and in parallel, rapidly
advance their capabilities to protect offerings and
channels. We are excited to combine our technical and
project management expertise in conjunction with
Guardian Analytics Omni-Channel Fraud Prevention
solutions to help financial institutions maintain a strong
pace of innovation without increasing their fraud risk.”
- Rob Grzeszczak, President and Managing Director
Fraud & Breach Prevention Summit Chicago #ISMGSummits12
Use Case #1 – Reducing Challenges for Large
Commercial Bank
Domes;c	Cash	
Movement	
Applica;on	
Global	Cash	
Movement	
Applica;on	
Wire	
Processing	
System	
ACH		
Processing	
System	
Client	
Business	Banking	
Private	Banking	
Wealth		
Management	
Performance	Analysis/
Risk	Mgmt	
Market	Investment/	
Fund	Mgmt	
External	Deposit	Services	
Foreign	Exchange	
Benefits	Management	
Benefits	Par,cipant	
Retail	Banking	
Business	Banking	Central	
Authen;ca;on	
• Guardian Analytics Online Behavioral Analytics
Risk scores
drive stepped up
authentication
Fraud & Breach Prevention Summit Chicago #ISMGSummits13
Use Case #2 – ACH, Same Day ACH
•  NACHA	files	
transmiMed	or	
uploaded	
•  Files	processed	
upon	receipt	
•  Alerts	published	
within	minutes	
ODFI	
$$	to	
customer	
Guardian Analytics ACH Behavioral Analytics
ACH Batch
Risk scores
ACH Batch
Risk scores
ACH Batch
Risk scores
Fraud & Breach Prevention Summit Chicago #ISMGSummits14
Use Case #3 – Wire Fraud
Detec%on Rates
Alert
Volumes
Low
Low
High
High
Trust too li:le
Know when to trust
Know when NOT to trust
Trust too much
Over	$100K	
And	interna;onal	
And	new	recipient	
Over	$100K	
Or	interna;onal	
Or	new	recipient	
The Wire Fraud Challenge
Fraud & Breach Prevention Summit Chicago #ISMGSummits15
Analytics Innovations to Raise and Lower Trust
Learn	each	individual	originator	behavior	over	;me	to	determine	risk	
Learn	new	recipient	
ra;o,	typical	
beneficiary	paMerns	
(i.e.	keeps	false	posi;ves	
for	;tle	companies	down)	
Look	to	see	if	we	can	
raise	or	lower	trust	of	a	
beneficiary	
If multiple wires to same “bene”
spread out, can raise trust
If many in rapid
succession, less trust
worthy
Use	what	we’ve	
learned	from	other	
fraud	
Mule	
Match in mule db?
Recipient
Originator
Fraud & Breach Prevention Summit Chicago #ISMGSummits16
Putting It All Together
Would	beneficiary	be	expected?		
(new	beneficiary	ra6o,	beneficiary	and		FI	loca6on/
region)	
Are	the	originator’s	wire	ac,ons	normal?		
(6ming,	velocity,	type,	accounts,	direc6on,	use	of	
instruc6ons,	content	of	instruc6ons)	
Are	the	wires	typical?		
(type,	amount)	
Originator	Model	
Wire	Behavioral	Analy,cs	
Cross-ins,tu,on	risk	data	
(Network	effect)	
Beneficiary	Model	
Is	this	a	high	or	low	risk	beneficiary?	
(beneficiary	history	with	other	originators,	name/	
account	number	match,	suspected	mule)		
Self	learning	
No	rules	to	write	
Not	threat	specific	
Adapts	to	new	threat	
Automa;c	updates	to	analy;cs	
100+	aMributes	
from	wire	system
Fraud & Breach Prevention Summit Chicago #ISMGSummits17
Approach Highly Effective With BEC
New	beneficiaries	common	(40%	
of	wires	to	new	beneficiaries)	
	
BEC	beneficiary	FIs	vary	(domes;c,	
interna;onal,	banks,	credit	unions)	
Spoofed	CEO	
email		
Spoofed	
supplier	email	
Legi,mate	
user	
(CFO	or	
controller)	
• Online	
• Fax	
• Branch	
• Criminal	beneficiary	
• 	or	mule	
Criminals do their
homework on their
targets and prey on
urgency, sense of
duty and importance
Legitimate user logs into
online banking or
requests the wire
(legacy ATO detection
methods don’t work)
BEC amounts
within typical
range of client
wires
Fraud & Breach Prevention Summit Chicago #ISMGSummits18
Behavioral Analytics Detects Account Takeover
and Business Email Compromise
Spoofed	CEO	email		
Spoofed	supplier	email	
Legi,mate	user	
(CFO	or	
controller)	
• Online	
• Fax	
• Branch	
• Wire	transfer		
Amount	
Expected	OBI	use	
Velocity	
Beneficiary	
Beneficiary	FI	
Beneficiary	Loca,on	
Name/account	number	changes	and	
match	
Individual	and		
Bank	Popula,on	Originator	Models	
Cross-originator	
Beneficiary	Models	
Guardian	Analy,cs	uses	originator,	popula,on	and	cross-originator	beneficiary	models	to	accurately	detect	fraud	with	low	alert	volume;	no	rules	or	
scenarios	to	define	
Criminal	can	spoof	
email	sender,	
content	language,	
style,	wire	amounts		
But	they	cannot	
spoof	how	an	
originator	sends	a	
wire
Fraud & Breach Prevention Summit Chicago #ISMGSummits19
Recent Successes
Fraud	prevented	
$19M	in	last	two	months		
(primarily	BEC,	have	not	missed	
fraud)	
Efficiency	gains	
Bank	reduced	reviews	to	only	
high	risk	wires		
(50-100	wires/day)	
Client	experience	
Reduced	callbacks	
Reduc;on	in	alerts	has	freed	
;me	to	discuss	possible	BEC	with	
clients	in	more	detail	
Bank	with	~4,000	wires	per	day	
Fraud	prevented	
$500K	in	last	six	months		
(BEC	and	ATO,	have	not	missed	
any	fraud)	
	
Efficiency	gains	
Reduced	reviews	70%	(75/
day)	
Increased	wire	risk	
management	coverage	400%		
Client	experience	
Faster	processing	
Fewer	callbacks		
(1-5/day)	
Bank	with	nearly	2,000	wires	per	day
Fraud & Breach Prevention Summit Chicago #ISMGSummits20
Behavioral Analytics In The
Future
Anand Sureka
Fraud & Breach Prevention Summit Chicago #ISMGSummits21
Meeting The New Requirements
Identity
Threat specific
Payment/channel slice
Behavior
Threat agnostic
Holistic view
Behavior + context
Threat agnostic
Omni-channel
Legacy Modern Next-Generation
Rules/scenarios Analytics Analytics
Fraud & Breach Prevention Summit Chicago #ISMGSummits22
Unified Omni-channel Fraud Prevention
• Channels
• Payments
• ATM
• Contact Center
• POS
• Branch
• Online
• Mobile
• Bill Pay
• Debit
• Wire
• ACH
• P2P
Customers are omni-channel. Criminals are omni-channel.
Fraud & Breach Prevention Summit Chicago #ISMGSummits23
Unified Omni-channel Fraud Prevention
Channels
Payments
• ATM
• Contact Center
• POS
• Branch
• Online
• Mobile
• Bill Pay
• Debit
• Wire
• ACH
• P2P
Fraud prevention should be omni-channel, too
Enterprise API
Omni-Channel
Risk Engine
Omni-Channel
Visual Analytics
Payments Channels Devices Locations Risk Data
Fraud & Breach Prevention Summit Chicago #ISMGSummits24
New Requirements for Fraud Prevention
Support
payment /channel
innovation
Improve
customer
experience
Increase
operational
efficiency
Address
modern
fraud
Questions?
Follow Guardian Analytics
Thank You for Attending!

Mais conteúdo relacionado

Mais procurados

Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0Software AG
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy European Merchant Services
 
Protecting the bank
Protecting the bankProtecting the bank
Protecting the bankCGI Suomi
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of FraudEZ-R Stats, LLC
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...CA Technologies
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Capgemini
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website SecuritySucuri
 

Mais procurados (18)

Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
In sync10 grc_suite
In sync10 grc_suiteIn sync10 grc_suite
In sync10 grc_suite
 
Protecting the bank
Protecting the bankProtecting the bank
Protecting the bank
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of Fraud
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Big data research
Big data researchBig data research
Big data research
 

Destaque

SPRAT - Spreadsheet API Tester
SPRAT - Spreadsheet API TesterSPRAT - Spreadsheet API Tester
SPRAT - Spreadsheet API TesterJulian Higman
 
Need for Speed – The Reality of Real-Time Payments in the U.S.
Need for Speed – The Reality of Real-Time Payments in the U.S. Need for Speed – The Reality of Real-Time Payments in the U.S.
Need for Speed – The Reality of Real-Time Payments in the U.S. Nasreen Quibria
 
FSAE ACH Pos Pay
FSAE ACH Pos PayFSAE ACH Pos Pay
FSAE ACH Pos PayBen Graybar
 
PCH Peering Survey 2016
PCH Peering Survey 2016PCH Peering Survey 2016
PCH Peering Survey 2016APNIC
 
Leave the Check Behind
Leave the Check BehindLeave the Check Behind
Leave the Check BehindFIS
 
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b... 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...taxman taxman
 
ACHeck21 Reseller Overview 5.21.10
ACHeck21 Reseller Overview 5.21.10ACHeck21 Reseller Overview 5.21.10
ACHeck21 Reseller Overview 5.21.10ACHeck21
 
Abigail Resume copy revised
Abigail Resume copy revisedAbigail Resume copy revised
Abigail Resume copy revisedgail winbush
 
ACH Processing and Reconciliation Guide
ACH Processing and Reconciliation GuideACH Processing and Reconciliation Guide
ACH Processing and Reconciliation GuideDiamond Mind
 

Destaque (12)

Same Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster PaymentSame Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster Payment
 
SPRAT - Spreadsheet API Tester
SPRAT - Spreadsheet API TesterSPRAT - Spreadsheet API Tester
SPRAT - Spreadsheet API Tester
 
How Do You View Fraud Risk?
How Do You View Fraud Risk? How Do You View Fraud Risk?
How Do You View Fraud Risk?
 
Need for Speed – The Reality of Real-Time Payments in the U.S.
Need for Speed – The Reality of Real-Time Payments in the U.S. Need for Speed – The Reality of Real-Time Payments in the U.S.
Need for Speed – The Reality of Real-Time Payments in the U.S.
 
FSAE ACH Pos Pay
FSAE ACH Pos PayFSAE ACH Pos Pay
FSAE ACH Pos Pay
 
PCH Peering Survey 2016
PCH Peering Survey 2016PCH Peering Survey 2016
PCH Peering Survey 2016
 
Leave the Check Behind
Leave the Check BehindLeave the Check Behind
Leave the Check Behind
 
FAQ About Credit Cards and ACH Payments
FAQ About Credit Cards and ACH PaymentsFAQ About Credit Cards and ACH Payments
FAQ About Credit Cards and ACH Payments
 
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b... 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 
ACHeck21 Reseller Overview 5.21.10
ACHeck21 Reseller Overview 5.21.10ACHeck21 Reseller Overview 5.21.10
ACHeck21 Reseller Overview 5.21.10
 
Abigail Resume copy revised
Abigail Resume copy revisedAbigail Resume copy revised
Abigail Resume copy revised
 
ACH Processing and Reconciliation Guide
ACH Processing and Reconciliation GuideACH Processing and Reconciliation Guide
ACH Processing and Reconciliation Guide
 

Semelhante a Behavioral Analytics for Preventing Fraud Today and Tomorrow

Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - DiscussionAditya Madiraju
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?SAS Canada
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationAyapparaj SKS
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
StartUpOpen 2011 - Projekat20
StartUpOpen 2011 - Projekat20StartUpOpen 2011 - Projekat20
StartUpOpen 2011 - Projekat20BlogOpen
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpointalaskanrogue
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionDataStax
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random ForestIRJET Journal
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?Penser
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...CA Technologies
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 

Semelhante a Behavioral Analytics for Preventing Fraud Today and Tomorrow (20)

Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - Discussion
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
StartUpOpen 2011 - Projekat20
StartUpOpen 2011 - Projekat20StartUpOpen 2011 - Projekat20
StartUpOpen 2011 - Projekat20
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Behavioral Analytics for Preventing Fraud Today and Tomorrow

  • 1. Fraud and Breach Prevention Summit Chicago June 21-22nd, Chicago IL Anand Sureka | Guardian Analytics Behavioral Analytics for Preventing Fraud Today and Tomorrow
  • 2. Fraud & Breach Prevention Summit Chicago #ISMGSummits2 About the Speaker Anand Sureka Senior Solutions Engineer, Guardian Analytics Anand Sureka is a Senior Solutions Engineer at Guardian Analytics. He has spent over a decade working with banks to develop and integrate software solutions into online banking and payment services, including fraud detection, personal financial management, bill pay, ACH transfers and credit card payment services. Prior to joining Guardian Analytics, Anand was a principle consultant for the professional services team at Envestnet-Yodlee.
  • 3. Fraud & Breach Prevention Summit Chicago #ISMGSummits3 • Fraud and Breach Prevention Summit Miami Behavioral Analytics - Preventing Fraud Today • April 12-13, 2016 – Miami, FL Anand Sureka
  • 4. Fraud & Breach Prevention Summit Chicago #ISMGSummits4 Banks Facing Unprecedented Trust Issue § Demise in trust § Legacy and silo approaches failing - increase in fraud § Can’t hold back - compe;;ve pressure forcing innova;on § New approach is needed Trust Compe,,ve pressures Third party providers Compe;;ve Banks Speed Convenience Simplicity Products/Services Customer experience Opera6onal Costs Data breaches •  Malware Social engineering Single channel Cross-channel Customer Access Customer Data
  • 5. Fraud & Breach Prevention Summit Chicago #ISMGSummits5 New Requirements for Fraud Prevention Support payment /channel innovation Improve customer experience Increase operational efficiency Address modern fraud
  • 6. Fraud & Breach Prevention Summit Chicago #ISMGSummits6 Meeting The New Requirements Identity Threat specific Payment/channel slice Behavior Threat agnostic Holistic view Legacy Modern Rules/scenarios Analytics
  • 7. Fraud & Breach Prevention Summit Chicago #ISMGSummits7 Success Starts With Broad View of Behavior OOBAChannelDelete OOBAChannelEdit PasswordChange UserCreate UserDelete UserEdit UserEnrollmentCreate UserEnrollmentDelete UserEnrollmentEdit UserView Informational CheckImageView AccountCreate AccountDelete AccountEdit AlertCreate AlertDelete AlertEdit ExternalAccountLink InternalAccountLink MFAOptionsChange RemoteDepositCapture ReportView OOBAChannelCreate WireTemplateApprove WireTemplateCreate WireTemplateDelete WireTemplateEdit WireTemplateSubmit WireTemplateApprove WireTemplateCreate WireTemplateDelete WireTemplateEdit WireTemplateSubmit HTTPAcceptEncoding HTTPAcceptLanguage HTTPClientIP HTTPCookie HTTPForwarded HTTPForwardedFor HTTPHost HTTPLocation HTTPProxy HTTPReferer HTTPRequestURI BrowserPlugins Cookie CookiesEnabled DeviceID FontList JavaEnabled LanguageBrowser LanguageSystem LanguageUser Latitude Longitude Direction ToAccount ToAccountType FromAccounType AmountinUSDollars Status StatusReason RecurringPayment ReceivingBankID ReceivingBankName Recipient OtherInstructions DestinationType ACHParticipantDelete ACHParticipantEdit ACHParticipantSubmit ACHTemplateApprove ACHTemplateCreate ACHTemplateDelete ACHTemplateEdit ACHTemplateSubmit ACHParticipantApprove ACHParticipantCreate WireApprove WireCreate WireDelete WireEdit WireSubmit WireEvent BillPayApprove BillPayCreate BillPayDelete BillPayEdit BillPaySubmit ACHBatchApprove ACHBatchCreate ACHBatchDelete ACHBatchEdit ACHBatchSubmit ACHCreditEntry ACHDebitEntry TransferApprove TransferCreate TransferDelete TransferEdit TransferSubmit MFA Challenge Login UTCTimestamp SingleSignOn Logout DeviceRegistered Channel Company ID ASNs Network attributes HTTPVia HTTPXClusterClientIP HTTPXForwarded HTTPXForwardedFor HTTPXTrusteerRapport ImmutableCompanyID ImmutableUserID IPAddress IPv6Address SessionID SignOnID OSPlatform ScreenResolution TimeZoneOffset UserAgentString UserAgentStringDOM Phone Number GPS events Wifi/Bluetooth/NFC Hardware HTTPAccept HTTPAcceptCharsets PayeeApprove PayeeCreate PayeeDelete PayeeEdit PayeeSubmit TransferTemplateApprove TransferTemplateCreate TransferTemplateDelete TransferTemplateEdit TransferTemplateSubmit Login/Access Account Activity Transactions
  • 8. Fraud & Breach Prevention Summit Chicago #ISMGSummits8 Real-time Behavior-based Risk Scoring Login/Access Account Activity Transactions Risk score every event Each event updates risk L L M L H Rule Rule Behavioral Analytics • Individual • Population •  Risk Data Machine Learning
  • 9. Fraud & Breach Prevention Summit Chicago #ISMGSummits9 Risk-based Intervention Login/Access Account Activity Transactions Risk score every event Each event updates risk L L M L H Rule Rule • Behavioral Analytics • Individual • Population •  Risk Data Rules-driven interdiction Risk-driven interdiction Policies drive interdic;on ac;ons (for any risk score)
  • 10. Fraud & Breach Prevention Summit Chicago #ISMGSummits10 • 10 Guardian Analytics Protects
  • 11. Fraud & Breach Prevention Summit Chicago #ISMGSummits11 Partnership with The Norman Group “To stay competitive, financial institutions need to continually enhance their customer-facing products and back-end technology platforms, and in parallel, rapidly advance their capabilities to protect offerings and channels. We are excited to combine our technical and project management expertise in conjunction with Guardian Analytics Omni-Channel Fraud Prevention solutions to help financial institutions maintain a strong pace of innovation without increasing their fraud risk.” - Rob Grzeszczak, President and Managing Director
  • 12. Fraud & Breach Prevention Summit Chicago #ISMGSummits12 Use Case #1 – Reducing Challenges for Large Commercial Bank Domes;c Cash Movement Applica;on Global Cash Movement Applica;on Wire Processing System ACH Processing System Client Business Banking Private Banking Wealth Management Performance Analysis/ Risk Mgmt Market Investment/ Fund Mgmt External Deposit Services Foreign Exchange Benefits Management Benefits Par,cipant Retail Banking Business Banking Central Authen;ca;on • Guardian Analytics Online Behavioral Analytics Risk scores drive stepped up authentication
  • 13. Fraud & Breach Prevention Summit Chicago #ISMGSummits13 Use Case #2 – ACH, Same Day ACH •  NACHA files transmiMed or uploaded •  Files processed upon receipt •  Alerts published within minutes ODFI $$ to customer Guardian Analytics ACH Behavioral Analytics ACH Batch Risk scores ACH Batch Risk scores ACH Batch Risk scores
  • 14. Fraud & Breach Prevention Summit Chicago #ISMGSummits14 Use Case #3 – Wire Fraud Detec%on Rates Alert Volumes Low Low High High Trust too li:le Know when to trust Know when NOT to trust Trust too much Over $100K And interna;onal And new recipient Over $100K Or interna;onal Or new recipient The Wire Fraud Challenge
  • 15. Fraud & Breach Prevention Summit Chicago #ISMGSummits15 Analytics Innovations to Raise and Lower Trust Learn each individual originator behavior over ;me to determine risk Learn new recipient ra;o, typical beneficiary paMerns (i.e. keeps false posi;ves for ;tle companies down) Look to see if we can raise or lower trust of a beneficiary If multiple wires to same “bene” spread out, can raise trust If many in rapid succession, less trust worthy Use what we’ve learned from other fraud Mule Match in mule db? Recipient Originator
  • 16. Fraud & Breach Prevention Summit Chicago #ISMGSummits16 Putting It All Together Would beneficiary be expected? (new beneficiary ra6o, beneficiary and FI loca6on/ region) Are the originator’s wire ac,ons normal? (6ming, velocity, type, accounts, direc6on, use of instruc6ons, content of instruc6ons) Are the wires typical? (type, amount) Originator Model Wire Behavioral Analy,cs Cross-ins,tu,on risk data (Network effect) Beneficiary Model Is this a high or low risk beneficiary? (beneficiary history with other originators, name/ account number match, suspected mule) Self learning No rules to write Not threat specific Adapts to new threat Automa;c updates to analy;cs 100+ aMributes from wire system
  • 17. Fraud & Breach Prevention Summit Chicago #ISMGSummits17 Approach Highly Effective With BEC New beneficiaries common (40% of wires to new beneficiaries) BEC beneficiary FIs vary (domes;c, interna;onal, banks, credit unions) Spoofed CEO email Spoofed supplier email Legi,mate user (CFO or controller) • Online • Fax • Branch • Criminal beneficiary •  or mule Criminals do their homework on their targets and prey on urgency, sense of duty and importance Legitimate user logs into online banking or requests the wire (legacy ATO detection methods don’t work) BEC amounts within typical range of client wires
  • 18. Fraud & Breach Prevention Summit Chicago #ISMGSummits18 Behavioral Analytics Detects Account Takeover and Business Email Compromise Spoofed CEO email Spoofed supplier email Legi,mate user (CFO or controller) • Online • Fax • Branch • Wire transfer Amount Expected OBI use Velocity Beneficiary Beneficiary FI Beneficiary Loca,on Name/account number changes and match Individual and Bank Popula,on Originator Models Cross-originator Beneficiary Models Guardian Analy,cs uses originator, popula,on and cross-originator beneficiary models to accurately detect fraud with low alert volume; no rules or scenarios to define Criminal can spoof email sender, content language, style, wire amounts But they cannot spoof how an originator sends a wire
  • 19. Fraud & Breach Prevention Summit Chicago #ISMGSummits19 Recent Successes Fraud prevented $19M in last two months (primarily BEC, have not missed fraud) Efficiency gains Bank reduced reviews to only high risk wires (50-100 wires/day) Client experience Reduced callbacks Reduc;on in alerts has freed ;me to discuss possible BEC with clients in more detail Bank with ~4,000 wires per day Fraud prevented $500K in last six months (BEC and ATO, have not missed any fraud) Efficiency gains Reduced reviews 70% (75/ day) Increased wire risk management coverage 400% Client experience Faster processing Fewer callbacks (1-5/day) Bank with nearly 2,000 wires per day
  • 20. Fraud & Breach Prevention Summit Chicago #ISMGSummits20 Behavioral Analytics In The Future Anand Sureka
  • 21. Fraud & Breach Prevention Summit Chicago #ISMGSummits21 Meeting The New Requirements Identity Threat specific Payment/channel slice Behavior Threat agnostic Holistic view Behavior + context Threat agnostic Omni-channel Legacy Modern Next-Generation Rules/scenarios Analytics Analytics
  • 22. Fraud & Breach Prevention Summit Chicago #ISMGSummits22 Unified Omni-channel Fraud Prevention • Channels • Payments • ATM • Contact Center • POS • Branch • Online • Mobile • Bill Pay • Debit • Wire • ACH • P2P Customers are omni-channel. Criminals are omni-channel.
  • 23. Fraud & Breach Prevention Summit Chicago #ISMGSummits23 Unified Omni-channel Fraud Prevention Channels Payments • ATM • Contact Center • POS • Branch • Online • Mobile • Bill Pay • Debit • Wire • ACH • P2P Fraud prevention should be omni-channel, too Enterprise API Omni-Channel Risk Engine Omni-Channel Visual Analytics Payments Channels Devices Locations Risk Data
  • 24. Fraud & Breach Prevention Summit Chicago #ISMGSummits24 New Requirements for Fraud Prevention Support payment /channel innovation Improve customer experience Increase operational efficiency Address modern fraud
  • 26. Thank You for Attending!