SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IBM Software                                        Thought Leadership White Paper
WebSphere




Transactional fraud detection:
A modular approach
Addressing the next generation of financial crimes
2    Transactional fraud detection: A modular approach




Contents                                                         This white paper discusses the benefits of collaboration and
                                                                 constructively challenging the status quo by integrating different
    2 The deployed software model versus the evolution           technologies to form a comprehensive fraud detection and
      of fraud                                                   prevention solution that meets specific business requirements. It
    2 Challenge currently deployed solutions                     also provides key considerations for developing a strategic road
                                                                 map for detecting and preventing enterprise financial crimes.
    2 Finding the right transactional fraud detection vendors

    2 Leverage multiple technologies to stop persistent
                                                                 The deployed software model versus the
      fraudsters                                                 evolution of fraud
                                                                 As fraud detection professionals know, fraud is a constantly
    3 React quickly with real-time fraud detection               evolving organism. Like a virus, it evolves and mutates to seek
                                                                 out weaknesses in an incumbent detection system and, once
    3 Know the leading nonmonetary fraud indicators
                                                                 found, will quickly exploit those weaknesses before moving—or
    3 Base solutions on integrated technology                    changing—to ensure continuous income for the fraudster or
                                                                 organized group. Prevention methods that work today cannot be
    4 Look beyond packaged solutions                             guaranteed to work tomorrow. The reality of this limitation is
                                                                 that deployed, packaged software applications require costly and
Introduction                                                     bulky upgrades or retraining over time just to keep pace with
The increasing prevalence of enterprise financial crimes has      fraud trends. The applications are only effective for a short time
made fraud prevention and investments in prevention technol-     before they must be upgraded or replaced. Today, more effective
ogy a long-overdue priority to organizations around the world.   technologies are enabled by deploying components through
As a result, organizations are learning that the consolidated    cloud computing and through more mature software as a service
software platform approach to fraud detection is fundamentally   (SaaS) models.
flawed and falls short on detecting and preventing fraudulent
transactions.                                                    Challenge currently deployed solutions
                                                                 Fraud software today is significantly richer in feature functional-
Instead, there are more effective ways to help fraud strategy    ity than legacy solutions. But organizations should question if
managers and their organizations avoid the many pitfalls of      their current solutions are keeping pace with the continuous
deployment, deliver on the promise of holistic coverage          evolution of fraud or if they are merely providing a richer user
and increase the chances of successful delivery aligned with     interface that employs the same detection routines as its legacy
business goals. A “one-size-fits-all” offering is unlikely to     counterparts. For instance, one example of an ongoing problem
deliver enterprise-class performance with results that benefit    with legacy solutions is high false positive rates (FPRs) and
the organization and the customer. To achieve high perform-      inappropriate transaction declines, both of which negatively
ance, organizations must align strategic vision with industry    impact customer service. To maintain competitive advantage,
knowledge.                                                       organizations must treat valued customers as such. Decisions
IBM Software    3




about transactional viability should be based on sound, clearly      reported, these vendors can make data available to antifraud
understood logic and they should be modifiable as needed.             group consortium members to assist in catching fraudsters and
“Black-box” detection paradigms, typically based on neural           closing down concurrent attacks across multiple institutions.
networks and other, similar, paradigms, are not the only means       Effective data management and security coupled with strong
of providing effective fraud detection that is tempered with         analytical capabilities provide the technological backbone for
respectful customer service.                                         implementing effective detection strategies that can be shared
                                                                     across consortium participants.
Finding the right transactional fraud
detection vendors                                                    React quickly with real-time fraud
It is important to note that just because it is possible to access   detection
data in a transaction system for fraud detection, it does not        Legislative, technological and competitive pressures are
mean that fraud technology vendors have the ability to design a      shortening the timeframe for reacting to fraud threats.
transactional fraud detection system. For instance, antimoney-       Real-time fraud detection may be the only effective way to
laundering (AML) systems are designed to ensure compliance           block fraudulent transactions. Additionally, as organizations
with regulatory requirements, not to catch fast-moving fraud.        move toward real-time capabilities, those that have not adopted
Typically, an AML system will not flag a low FPR, given that          this functionality will be even more exposed as fraudsters learn
auditors and compliance resources may prefer to decline more         that a weak link exists. For instance, in the United Kingdom,
transactions to err on the side of caution. Requiring an AML         real-time funds availability and the “faster payments” initiative
system to do the opposite and provide high-quality alerts with       mean that “day 2” fraud processes will become obsolete in a few
low FPRs is nearly impossible since the system is being asked to     years. Next-generation technology must be able to adapt and
do something for which it was not designed. Reengineering the        grow as market dynamics continue to change to justify any
system for this purpose is usually ineffective.                      strategic investment.

Leverage multiple technologies to stop                               Know and analyze nonmonetary fraud
persistent fraudsters                                                indicators
Fraud is a problem that transcends individual organizations.         Nonmonetary account activity is a significant indicator of
It does not respect corporate boundaries, and fraudsters will        potentially fraudulent action, and yet, many organizations either
prey on the fact that legal and technological constraints often      ignore or are unable to capture and react to these indicators.
make effective data sharing within organizations impossible. It is   Over time, disparate and seemingly unconnected events, or
common to find that, after multiple fraudulent events, the same       nonevents, associated with an address change request, a password
person or group has been perpetrating similar attacks concur-        change request or PIN change request can be strong indicators
rently on peer institutions. However, some data security vendors     of account takeover or identity theft. The use of powerful
and storage providers act as trusted custodians that can provide     predictive analytics technology and complex event processing
access to transactional detail that shows what is happening at an
industry level. As fraud or suspicious activity is identified or
4   Transactional fraud detection: A modular approach




functionality can help organizations understand the nature of        Look beyond packaged solutions
their fraud problem better before the event. Organizations need      Fraud detection practitioners and strategists need to look beyond
the ability to assess a sequence of events or nonevents and assign   the capabilities provided by packaged solutions. By partnering
a risk/threat level to that combination of activities at the front   with an external consultant, organizations may confirm that
end. Preventing fraud is significantly more desirable than            existing software capabilities and associated operational practices
deploying expensive resources to manage the results of fraud—        are adequate. If not, a consultant can also provide an effective
for the organization and, more importantly, for the customer.        review and recommendations for operational enhancement.
Deploying this mix of technology, analytics and human-centric        Enhancement efforts should complement existing capabilities,
knowledge can provide significant operational efficiencies,           and existing budgetary constraints, while providing a nondisrup-
enhanced detection rates and an improved customer experience.        tive path to improved detection and prevention.

Base solutions on integrated technology                              To implement effective fraud detection, card issuers must
Effective fraud detection capabilities face a multitude of chal-     develop an understanding of the enhanced capabilities
lenges across different payment methods. i.e. online, deposit,       provided by predictive analytics, pattern and name matching /
ATM, check, debit card and ACH/wire. To effectively meet             recognition, complex event processing, business rules, content
these challenges, organizations must be able to move from            analytics and, most importantly, the means for implementation.
fragmented fraud detection and prevention to an environment          IBM’s ability to draw on best-of-breed components ensures that
that is equipped to address the evolving threat of fraudulent        an issuer is not tied to a specific specialization or paradigm, a key
activity in an integrated, holistic, enterprise-wide fashion.        benefit when considering the specific nature of card fraud within
They must ask questions like: Is this technology a viable and        any single geography. IBM and its broad partner ecosystem are
achievable ambition for return on investment? How much               uniquely positioned to assist institutions that are ready to begin
depends on technology and how much on the implementation             this journey.
of industry and domain knowledge? What are the benefits for
the organization and its customers? And in short, is it worth        Conclusion
investing in improvement?                                            The fight against fraud is continuous and evolving at a rapid
                                                                     pace, and the sophistication of fraudulent attacks is ever increas-
The answer is yes. Any organization that stops investing in          ing. In planning the strategy for future prevention and mitiga-
technology to combat evolving and mutating fraudulent activity       tion efforts, organizations should consider external challenges
is effectively writing a blank check for the fraudster. However,     and whether their current solutions are able to address those
investment in technology alone is not sufficient to mitigate         challenges. New technologies can provide more effective ways to
fraudulent activity. Any investment must conform to a clear          monitor and detect fraud and better position the organization
vision and strategy that is likely to be multiphased over several    for success. While examining different solutions, it is important
years and able to evolve over time. While packaged solutions         to develop an understanding of the underlying detection logic.
may seem effective, as outlined in the previous section, a
“one-size-fits-all” solution is destined to fail.
IBM Software   5




The most effective solution sets are those that can adapt quickly,    About the authors
offer industry and enterprise breadth, can function in real-time      Richard Collard
and monitor cross-channel activity.                                   IBM Worldwide Subject Matter Expert
                                                                      Transactional Fraud Detection, AML and Risk Management
IBM’s approach to fraud detection and prevention is aligned and       richard.collard@uk.ibm.com
effectively executed through the technological and commercial
vision that IBM customer and business partner FIS offers. FIS’        Richard Collard comes to IBM as part of the acquisition, in
depth of experience and acquisition strategy, which includes          2009, of ILOG. He draws on a business-based career with
Certegy and Metavante among others, ensures that its core             major global fraud analytics organizations and specializes in the
offerings are infused with ideas and best practices from different,   provision of fraud detection solutions and consulting for credit
but aligned, industries.                                              and debit card issuers and for AML. Prior to joining ILOG, he
                                                                      worked to develop a radical, new approach to rules-based fraud
For more information                                                  detection through the automated generation of rules using
For more information about fraud detection solutions from             genetic algorithms and evolutionary computing techniques. This
IBM, contact your IBM representative or IBM Business Partner,         technique is holistic and non-prescriptive, espousing the belief
or visit: ibm.com                                                     that there is no such thing as a “one-size-fits-all solution,” and is
                                                                      aligned with IBM’s modular approach to the challenges facing
For more information about fraud in the United Kingdom, visit         the card industry.
the UK Cards Association at theukcardsassociation.org.uk/
                                                                      Richard’s operational reviews for card issuers in South Africa
Additionally, financing solutions from IBM Global Financing            have generated significant savings and operational efficiencies.
can enable effective cash management, protection from technol-        They have also been instrumental in the recent adoption of
ogy obsolescence, improved total cost of ownership and return         business rules management systems (BRMS) technology as a
on investment. Also, our Global Asset Recovery Services help          major component of a hosted fraud detection solution. Richard’s
address environmental concerns with new, more energy-efficient        ability to draw on global experience allows significant knowledge
solutions. For more information on IBM Global Financing, visit:       transfer of global best practices. His approach is consultative and
ibm.com/financing                                                      respectful of geography and culture, ensuring that the thought-
                                                                      leadership that he provides is positively received—traits that
                                                                      have earned him significant respect through his engagements.
Aaron Calipari
Director, Product Strategy
Transaction Risk Products
Risk, Fraud and Compliance Solutions
www.fisglobal.com
                                                                    © Copyright IBM Corporation 2011
Aaron Calipari is Director of Transactional Fraud for FIS, where    IBM Corporation
he is responsible for risk and fraud management and profitability    Software Group
                                                                    Route 100
solution strategy and delivery. Calipari has successfully managed
                                                                    Somers, NY 10589 U.S.A.
one of the original, commercially available fraud case manage-
                                                                    Produced in the United States of America
ment software packages while executing a strategy to bring
                                                                    June 2011
innovative new enterprise fraud case management capabilities to     All Rights Reserved
market. He co-developed and currently manages a check fraud
                                                                    IBM, the IBM logo and ibm.com are trademarks or registered trademarks
prevention service that has repeatedly outperformed traditional     of International Business Machines Corporation in the United States, other
fraud detection methods by combining bank data with industry        countries, or both. If these and other IBM trademarked terms are marked on
data sources and analytics.                                         their first occurrence in this information with a trademark symbol (® or ™),
                                                                    these symbols indicate U.S. registered or common law trademarks owned by
                                                                    IBM at the time this information was published. Such trademarks may also
Prior to his role in account management solutions, Calipari         be registered or common law trademarks in other countries. A current list of
was a member of an elite team of market-focused solution            IBM trademarks is available on the web at “Copyright and trademark
                                                                    information” at ibm.com/legal/copytrade.shtml
strategists charged with bringing next-generation risk manage-
ment capabilities to market through integration with various        Other company, product or service names may be trademarks or service
                                                                    marks of others.
FIS technologies. His interest and deep domain expertise in
fraud has been applied to improve performance in the areas of       The information contained in this documentation is provided for
                                                                    informational purposes only. While efforts were made to verify the
credit card, check and mortgage fraud.                              completeness and accuracy of the information contained in this
                                                                    documentation, it is provided “as is” without warranty of any kind,
Calipari holds a bachelor’s degree in marketing from the            express or implied. In addition, this information is based on IBM’s current
                                                                    product plans and strategy, which are subject to change by IBM without
University of South Florida.                                        notice. IBM shall not be responsible for any damages arising out of the use
                                                                    of, or otherwise related to, this documentation or any other documentation.
                                                                    Nothing contained in this documentation is intended to, nor shall have the
                                                                    effect of, creating any warranties or representations from IBM (or its
                                                                    suppliers or licensors), or altering the terms and conditions of the applicable
                                                                    license agreement governing the use of IBM software.

                                                                    References in these materials to IBM products, programs, or services do not
                                                                    imply that they will be available in all countries in which IBM operates.
                                                                    Product release dates and/or capabilities referenced in these materials may
                                                                    change at any time at IBM’s sole discretion based on market opportunities or
                                                                    other factors, and are not intended to be a commitment to future product or
                                                                    feature availability in any way.


                                                                              Please Recycle




                                                                                                                           WSW14165-USEN-00

Más contenido relacionado

La actualidad más candente

Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUNormShield
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk ManagementTommy Seah
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgCMR WORLD TECH
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
What Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackWhat Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackBooz Allen Hamilton
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...South Tyrol Free Software Conference
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 

La actualidad más candente (16)

Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
What Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackWhat Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target Attack
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 

Destacado

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Nick Galbreath
 
DIFFERENT CHANNELS OF BANKING
DIFFERENT CHANNELS OF BANKINGDIFFERENT CHANNELS OF BANKING
DIFFERENT CHANNELS OF BANKINGRavi Arora
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITEMAC Consulting Group
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
A Multi-Channel Strategy for Banks
A Multi-Channel Strategy for BanksA Multi-Channel Strategy for Banks
A Multi-Channel Strategy for BanksYaël Levey
 

Destacado (10)

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
Mutual Evaluation of Hungary - 2016
Mutual Evaluation of Hungary - 2016Mutual Evaluation of Hungary - 2016
Mutual Evaluation of Hungary - 2016
 
NAT-16-133 AML Benchmarking-FINAL
NAT-16-133 AML Benchmarking-FINALNAT-16-133 AML Benchmarking-FINAL
NAT-16-133 AML Benchmarking-FINAL
 
DIFFERENT CHANNELS OF BANKING
DIFFERENT CHANNELS OF BANKINGDIFFERENT CHANNELS OF BANKING
DIFFERENT CHANNELS OF BANKING
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
A Multi-Channel Strategy for Banks
A Multi-Channel Strategy for BanksA Multi-Channel Strategy for Banks
A Multi-Channel Strategy for Banks
 

Similar a Transactional Fraud Detection A Modular Approach

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...Opus
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Copy of The Ongoing Threat of Ransomware on Small to Medium-Si
Copy of The Ongoing Threat of Ransomware on Small to Medium-SiCopy of The Ongoing Threat of Ransomware on Small to Medium-Si
Copy of The Ongoing Threat of Ransomware on Small to Medium-SiAlleneMcclendon878
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSally Ewalt
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementJelger Groenland
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesDiane M. Metcalf
 
Cyber Management vfd
Cyber Management vfdCyber Management vfd
Cyber Management vfdLadd Muzzy
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3elithomas202
 

Similar a Transactional Fraud Detection A Modular Approach (20)

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Copy of The Ongoing Threat of Ransomware on Small to Medium-Si
Copy of The Ongoing Threat of Ransomware on Small to Medium-SiCopy of The Ongoing Threat of Ransomware on Small to Medium-Si
Copy of The Ongoing Threat of Ransomware on Small to Medium-Si
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINAL
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_management
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
Cyber Management vfd
Cyber Management vfdCyber Management vfd
Cyber Management vfd
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3
 

Más de Noreen Buckley

Quality ratings of thought leadership for the second half of 2013 february ...
Quality ratings of thought leadership for the second half of 2013   february ...Quality ratings of thought leadership for the second half of 2013   february ...
Quality ratings of thought leadership for the second half of 2013 february ...Noreen Buckley
 
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Noreen Buckley
 
Chief Procurement Officer Study May 2013
Chief Procurement Officer Study May 2013Chief Procurement Officer Study May 2013
Chief Procurement Officer Study May 2013Noreen Buckley
 
Rebuilding Customer Trust in Retail Banking
Rebuilding Customer Trust in Retail BankingRebuilding Customer Trust in Retail Banking
Rebuilding Customer Trust in Retail BankingNoreen Buckley
 
Leading through Connections
Leading through ConnectionsLeading through Connections
Leading through ConnectionsNoreen Buckley
 
IBM UKI Strategic Outsourcing Innovation Briefing November 2011
IBM UKI Strategic Outsourcing Innovation Briefing   November 2011IBM UKI Strategic Outsourcing Innovation Briefing   November 2011
IBM UKI Strategic Outsourcing Innovation Briefing November 2011Noreen Buckley
 
From Stretched to Strengthen
From Stretched to StrengthenFrom Stretched to Strengthen
From Stretched to StrengthenNoreen Buckley
 
Connected Consumer Challenge
Connected Consumer ChallengeConnected Consumer Challenge
Connected Consumer ChallengeNoreen Buckley
 

Más de Noreen Buckley (9)

Quality ratings of thought leadership for the second half of 2013 february ...
Quality ratings of thought leadership for the second half of 2013   february ...Quality ratings of thought leadership for the second half of 2013   february ...
Quality ratings of thought leadership for the second half of 2013 february ...
 
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
 
Chief Procurement Officer Study May 2013
Chief Procurement Officer Study May 2013Chief Procurement Officer Study May 2013
Chief Procurement Officer Study May 2013
 
Rebuilding Customer Trust in Retail Banking
Rebuilding Customer Trust in Retail BankingRebuilding Customer Trust in Retail Banking
Rebuilding Customer Trust in Retail Banking
 
Leading through Connections
Leading through ConnectionsLeading through Connections
Leading through Connections
 
IBM UKI Strategic Outsourcing Innovation Briefing November 2011
IBM UKI Strategic Outsourcing Innovation Briefing   November 2011IBM UKI Strategic Outsourcing Innovation Briefing   November 2011
IBM UKI Strategic Outsourcing Innovation Briefing November 2011
 
From Stretched to Strengthen
From Stretched to StrengthenFrom Stretched to Strengthen
From Stretched to Strengthen
 
Connected Consumer Challenge
Connected Consumer ChallengeConnected Consumer Challenge
Connected Consumer Challenge
 
CIO Study 2011
CIO Study 2011 CIO Study 2011
CIO Study 2011
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Transactional Fraud Detection A Modular Approach

  • 1. IBM Software Thought Leadership White Paper WebSphere Transactional fraud detection: A modular approach Addressing the next generation of financial crimes
  • 2. 2 Transactional fraud detection: A modular approach Contents This white paper discusses the benefits of collaboration and constructively challenging the status quo by integrating different 2 The deployed software model versus the evolution technologies to form a comprehensive fraud detection and of fraud prevention solution that meets specific business requirements. It 2 Challenge currently deployed solutions also provides key considerations for developing a strategic road map for detecting and preventing enterprise financial crimes. 2 Finding the right transactional fraud detection vendors 2 Leverage multiple technologies to stop persistent The deployed software model versus the fraudsters evolution of fraud As fraud detection professionals know, fraud is a constantly 3 React quickly with real-time fraud detection evolving organism. Like a virus, it evolves and mutates to seek out weaknesses in an incumbent detection system and, once 3 Know the leading nonmonetary fraud indicators found, will quickly exploit those weaknesses before moving—or 3 Base solutions on integrated technology changing—to ensure continuous income for the fraudster or organized group. Prevention methods that work today cannot be 4 Look beyond packaged solutions guaranteed to work tomorrow. The reality of this limitation is that deployed, packaged software applications require costly and Introduction bulky upgrades or retraining over time just to keep pace with The increasing prevalence of enterprise financial crimes has fraud trends. The applications are only effective for a short time made fraud prevention and investments in prevention technol- before they must be upgraded or replaced. Today, more effective ogy a long-overdue priority to organizations around the world. technologies are enabled by deploying components through As a result, organizations are learning that the consolidated cloud computing and through more mature software as a service software platform approach to fraud detection is fundamentally (SaaS) models. flawed and falls short on detecting and preventing fraudulent transactions. Challenge currently deployed solutions Fraud software today is significantly richer in feature functional- Instead, there are more effective ways to help fraud strategy ity than legacy solutions. But organizations should question if managers and their organizations avoid the many pitfalls of their current solutions are keeping pace with the continuous deployment, deliver on the promise of holistic coverage evolution of fraud or if they are merely providing a richer user and increase the chances of successful delivery aligned with interface that employs the same detection routines as its legacy business goals. A “one-size-fits-all” offering is unlikely to counterparts. For instance, one example of an ongoing problem deliver enterprise-class performance with results that benefit with legacy solutions is high false positive rates (FPRs) and the organization and the customer. To achieve high perform- inappropriate transaction declines, both of which negatively ance, organizations must align strategic vision with industry impact customer service. To maintain competitive advantage, knowledge. organizations must treat valued customers as such. Decisions
  • 3. IBM Software 3 about transactional viability should be based on sound, clearly reported, these vendors can make data available to antifraud understood logic and they should be modifiable as needed. group consortium members to assist in catching fraudsters and “Black-box” detection paradigms, typically based on neural closing down concurrent attacks across multiple institutions. networks and other, similar, paradigms, are not the only means Effective data management and security coupled with strong of providing effective fraud detection that is tempered with analytical capabilities provide the technological backbone for respectful customer service. implementing effective detection strategies that can be shared across consortium participants. Finding the right transactional fraud detection vendors React quickly with real-time fraud It is important to note that just because it is possible to access detection data in a transaction system for fraud detection, it does not Legislative, technological and competitive pressures are mean that fraud technology vendors have the ability to design a shortening the timeframe for reacting to fraud threats. transactional fraud detection system. For instance, antimoney- Real-time fraud detection may be the only effective way to laundering (AML) systems are designed to ensure compliance block fraudulent transactions. Additionally, as organizations with regulatory requirements, not to catch fast-moving fraud. move toward real-time capabilities, those that have not adopted Typically, an AML system will not flag a low FPR, given that this functionality will be even more exposed as fraudsters learn auditors and compliance resources may prefer to decline more that a weak link exists. For instance, in the United Kingdom, transactions to err on the side of caution. Requiring an AML real-time funds availability and the “faster payments” initiative system to do the opposite and provide high-quality alerts with mean that “day 2” fraud processes will become obsolete in a few low FPRs is nearly impossible since the system is being asked to years. Next-generation technology must be able to adapt and do something for which it was not designed. Reengineering the grow as market dynamics continue to change to justify any system for this purpose is usually ineffective. strategic investment. Leverage multiple technologies to stop Know and analyze nonmonetary fraud persistent fraudsters indicators Fraud is a problem that transcends individual organizations. Nonmonetary account activity is a significant indicator of It does not respect corporate boundaries, and fraudsters will potentially fraudulent action, and yet, many organizations either prey on the fact that legal and technological constraints often ignore or are unable to capture and react to these indicators. make effective data sharing within organizations impossible. It is Over time, disparate and seemingly unconnected events, or common to find that, after multiple fraudulent events, the same nonevents, associated with an address change request, a password person or group has been perpetrating similar attacks concur- change request or PIN change request can be strong indicators rently on peer institutions. However, some data security vendors of account takeover or identity theft. The use of powerful and storage providers act as trusted custodians that can provide predictive analytics technology and complex event processing access to transactional detail that shows what is happening at an industry level. As fraud or suspicious activity is identified or
  • 4. 4 Transactional fraud detection: A modular approach functionality can help organizations understand the nature of Look beyond packaged solutions their fraud problem better before the event. Organizations need Fraud detection practitioners and strategists need to look beyond the ability to assess a sequence of events or nonevents and assign the capabilities provided by packaged solutions. By partnering a risk/threat level to that combination of activities at the front with an external consultant, organizations may confirm that end. Preventing fraud is significantly more desirable than existing software capabilities and associated operational practices deploying expensive resources to manage the results of fraud— are adequate. If not, a consultant can also provide an effective for the organization and, more importantly, for the customer. review and recommendations for operational enhancement. Deploying this mix of technology, analytics and human-centric Enhancement efforts should complement existing capabilities, knowledge can provide significant operational efficiencies, and existing budgetary constraints, while providing a nondisrup- enhanced detection rates and an improved customer experience. tive path to improved detection and prevention. Base solutions on integrated technology To implement effective fraud detection, card issuers must Effective fraud detection capabilities face a multitude of chal- develop an understanding of the enhanced capabilities lenges across different payment methods. i.e. online, deposit, provided by predictive analytics, pattern and name matching / ATM, check, debit card and ACH/wire. To effectively meet recognition, complex event processing, business rules, content these challenges, organizations must be able to move from analytics and, most importantly, the means for implementation. fragmented fraud detection and prevention to an environment IBM’s ability to draw on best-of-breed components ensures that that is equipped to address the evolving threat of fraudulent an issuer is not tied to a specific specialization or paradigm, a key activity in an integrated, holistic, enterprise-wide fashion. benefit when considering the specific nature of card fraud within They must ask questions like: Is this technology a viable and any single geography. IBM and its broad partner ecosystem are achievable ambition for return on investment? How much uniquely positioned to assist institutions that are ready to begin depends on technology and how much on the implementation this journey. of industry and domain knowledge? What are the benefits for the organization and its customers? And in short, is it worth Conclusion investing in improvement? The fight against fraud is continuous and evolving at a rapid pace, and the sophistication of fraudulent attacks is ever increas- The answer is yes. Any organization that stops investing in ing. In planning the strategy for future prevention and mitiga- technology to combat evolving and mutating fraudulent activity tion efforts, organizations should consider external challenges is effectively writing a blank check for the fraudster. However, and whether their current solutions are able to address those investment in technology alone is not sufficient to mitigate challenges. New technologies can provide more effective ways to fraudulent activity. Any investment must conform to a clear monitor and detect fraud and better position the organization vision and strategy that is likely to be multiphased over several for success. While examining different solutions, it is important years and able to evolve over time. While packaged solutions to develop an understanding of the underlying detection logic. may seem effective, as outlined in the previous section, a “one-size-fits-all” solution is destined to fail.
  • 5. IBM Software 5 The most effective solution sets are those that can adapt quickly, About the authors offer industry and enterprise breadth, can function in real-time Richard Collard and monitor cross-channel activity. IBM Worldwide Subject Matter Expert Transactional Fraud Detection, AML and Risk Management IBM’s approach to fraud detection and prevention is aligned and richard.collard@uk.ibm.com effectively executed through the technological and commercial vision that IBM customer and business partner FIS offers. FIS’ Richard Collard comes to IBM as part of the acquisition, in depth of experience and acquisition strategy, which includes 2009, of ILOG. He draws on a business-based career with Certegy and Metavante among others, ensures that its core major global fraud analytics organizations and specializes in the offerings are infused with ideas and best practices from different, provision of fraud detection solutions and consulting for credit but aligned, industries. and debit card issuers and for AML. Prior to joining ILOG, he worked to develop a radical, new approach to rules-based fraud For more information detection through the automated generation of rules using For more information about fraud detection solutions from genetic algorithms and evolutionary computing techniques. This IBM, contact your IBM representative or IBM Business Partner, technique is holistic and non-prescriptive, espousing the belief or visit: ibm.com that there is no such thing as a “one-size-fits-all solution,” and is aligned with IBM’s modular approach to the challenges facing For more information about fraud in the United Kingdom, visit the card industry. the UK Cards Association at theukcardsassociation.org.uk/ Richard’s operational reviews for card issuers in South Africa Additionally, financing solutions from IBM Global Financing have generated significant savings and operational efficiencies. can enable effective cash management, protection from technol- They have also been instrumental in the recent adoption of ogy obsolescence, improved total cost of ownership and return business rules management systems (BRMS) technology as a on investment. Also, our Global Asset Recovery Services help major component of a hosted fraud detection solution. Richard’s address environmental concerns with new, more energy-efficient ability to draw on global experience allows significant knowledge solutions. For more information on IBM Global Financing, visit: transfer of global best practices. His approach is consultative and ibm.com/financing respectful of geography and culture, ensuring that the thought- leadership that he provides is positively received—traits that have earned him significant respect through his engagements.
  • 6. Aaron Calipari Director, Product Strategy Transaction Risk Products Risk, Fraud and Compliance Solutions www.fisglobal.com © Copyright IBM Corporation 2011 Aaron Calipari is Director of Transactional Fraud for FIS, where IBM Corporation he is responsible for risk and fraud management and profitability Software Group Route 100 solution strategy and delivery. Calipari has successfully managed Somers, NY 10589 U.S.A. one of the original, commercially available fraud case manage- Produced in the United States of America ment software packages while executing a strategy to bring June 2011 innovative new enterprise fraud case management capabilities to All Rights Reserved market. He co-developed and currently manages a check fraud IBM, the IBM logo and ibm.com are trademarks or registered trademarks prevention service that has repeatedly outperformed traditional of International Business Machines Corporation in the United States, other fraud detection methods by combining bank data with industry countries, or both. If these and other IBM trademarked terms are marked on data sources and analytics. their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also Prior to his role in account management solutions, Calipari be registered or common law trademarks in other countries. A current list of was a member of an elite team of market-focused solution IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml strategists charged with bringing next-generation risk manage- ment capabilities to market through integration with various Other company, product or service names may be trademarks or service marks of others. FIS technologies. His interest and deep domain expertise in fraud has been applied to improve performance in the areas of The information contained in this documentation is provided for informational purposes only. While efforts were made to verify the credit card, check and mortgage fraud. completeness and accuracy of the information contained in this documentation, it is provided “as is” without warranty of any kind, Calipari holds a bachelor’s degree in marketing from the express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without University of South Florida. notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Please Recycle WSW14165-USEN-00