SlideShare une entreprise Scribd logo
1  sur  13
FOR FINANCIAL CRIME
THREAT MITIGATION
BEHAVIORAL
ANALYSIS
2
CONTENTS
WHAT IS BEHAVIORAL ANALYSIS? (p3)
ENABLERS (p4)
CAPABILITIES (p5)
PROCESS FLOW (p6)
TECHNIQUES FOR DEPLOYMENT (p7)
USE CASES (p8)
VALUE PROPOSITION (p10)
HOW WE CAN HELP (p11)
Copyright © 2018 Accenture. All rights reserved.
WHAT IS BEHAVIORAL ANALYSIS?
Behavioral Analysis is the utilisation of the customer and their network’s financial and non-financial data to understand the degree of
financial crime risk posed to the bank. This is facilitated through data-driven assessment of a customer’s behavior against known
suspicious and non-suspicious behavioral attributes and can be delivered through the deployment of various business and technology
capabilities.
• Today’s Financial Crime Risk Management is often characterized by a reactive, rules-driven, detection approach. Such an approach, which relies on static, filter-driven
data often fails to recognize subtle differences in behavior patterns or links between customers that could be prime indicators of suspicious activity.
• Analytics technology including behavior centric, network-driven analysis create an opportunity for improving outcomes and efficiency in financial crime mitigation.
• Behavioral analysis works by understanding the proximity of customer behavior to indicators of potential financial crime threat. This includes both known threats such as
confirmed money launderers in addition to known patterns of behavior indicative of financial crime risk.
• Behavioral analysis allows financial institutions to go beyond the normal anti-money laundering (AML) investigative protocols and look for and report on unusual patterns
of activity between seemingly unrelated accounts that have no apparent economic purpose. This can lead to an increased chance of detecting suspicious behavior and
aids better prioritization of alerts.
• To improve the effectiveness of behavioral analysis, banks should develop their foundational business and technology capabilities as part of the wider financial crime
ecosystem, including consolidation of data across sources and risk types, behavioral attributes, and entity resolution.
Current State Overview
Traditionally identification
of financial crime risk has
been based on an
individual transaction
view …
… and direct
transactional
relationships …
… supported by
internal data sources
Financial crime risk would
be identified through
customer scoring
indicating proximity to
potential threats
… and by entity resolution
and segmenting of
customers with similar
behaviors
…supported by compilation of
financial and non-financial
information across internal and
external sources
Future State Overview
Copyright © 2018 Accenture. All rights reserved. 3
Consolidation of Data Sources
• Compilation of internal and external data both
financial and non-financial across threat types.
• Continual data monitoring, ingestion and
consolidation over time.
• Add additional data sets to increase the number
of unique features available for holistic threat
assessment and manual investigation.
Behavioral Attributes
• Use of data to create features used to build and
maintain a customer specific risk score or “behavioral
fingerprint.”
• Continual update and timely reflection of a customer’s
changing data attributes within the Customer Risk
Score.
• Ultimately permits the identification of behavior
matched to known AML behavioral patterns.
Internal Client Data e.g. Know Your
Customer (KYC), Fraud and
Transaction History.
Internal Records, e.g. Internal
Watchlists and suspicious Activity
Reports (SARs) Records.
Data from Governmental Bodies e.g.
Watchlists.
News and Social Media Searches.
Paid for 3rd Party Consumer Data e.g.
credit data.
Public Domain, e.g. public accounts.
BEHAVIORAL ANALYSIS - ENABLERS
Customers employment industry
Sector.
Geographic, product and behavioral
risks.
Volume, frequency and sentiment of
media coverage.
Reported to actual income ratio.
Establish connections with high risk
individuals / entities and
geographies.
In order to carry out true Behavioral Analysis, key enablers such as those indicated below should form part of the transaction
monitoring process.
Entity Resolution
• Connection of disparate data sources to allow for
validation, resolution and deduplication of data
attached to customers.
• Continual entity resolution as new data becomes
available and new customer relationships are
established.
• Provide a single customer view to aide customer
segmentation and cluster analysis.
Ingestion and consolidation of
data sets from multiple sources.
Link data which references a
given customer and deduplicate
this data.
Create a singular customer view.
Copyright © 2018 Accenture. All rights reserved.
4
Comparison Against Similar Customers
• Grouping together customers with similar
characteristics and behavioral attributes into a
network cluster.
• Customers can be analyzed against clusters with
expected similar behavioral attributes for behavior
which does not align.
• An understanding of the degree of separation and
identification of physical links between customers
and known suspicious can be established.
Typology Matching
• Past investigations and associated information provide
a wealth of information which can help with future
investigations.
• The historical decisioning and rationale is combined
with case attributes to help trigger future alerts by
applying similar logical decisioning.
BEHAVIORAL ANALYSIS - CAPABILITIES
Behavioral Analysis aids with the identification of suspicious activity by identifying customers whose actions do not align with
expected behavior or are similar to the behavioral attributes of known guilty parties.
Analysis Against Guilty Party Data
• A lot of effort today is spent on defining and ring
fencing non-suspicious behavior.
• By combining regulatory and enforcement agent
data of known guilty parties and their
characteristics, together with known non-
suspicious behavioral attributes, inferences can
be drawn to highlight events or entities requiring
scrutiny.
A subject runs a convenience store
and is grouped into a community
based on similarity of the behavioral
attributes.
Analysis identifies that the subject’s
behavioral attributes are diverging
from the expected behavior of the
segment with large transactions to an
overseas manufacturing firm.
An alert is generated on this subject
for further investigation.
Ingestion of know guilty party
data and associated behavioral
attributes.
Subjects in client database are
analyzed for behavioral similarity
to behavior attributes which
indicate a known higher
propensity for suspicion.
Insights inform alert generation and
prioritization.
Internal data provides a record
of transaction history and past
case outcomes.
Subject’s behavioral attributes
are analyzed for behavioral
similarity to subjects upon which
cases were previously reported.
Insights from analysis hep with case
discounting and alert generation.
Copyright © 2018 Accenture. All rights reserved.
5
BEHAVIORAL ANALYSIS - PROCESS FLOW
Using behavioral and network analysis capabilities can enhance current transaction monitoring processes and permit a holistic
overview and assessment across internal and external data to identify financial crime.
Behavioral Analysis Enablers
Entity
resolution
Behavioral
attributes
Data
consolidation
Behavioral Analysis Capabilities
Comparison against
similar customers
Typology
matching
Analysis against known
guilty party data
Copyright © 2018 Accenture. All rights reserved.
6
BEHAVIORAL ANALYSIS -
TECHNIQUES FOR DEPLOYMENT
Comparison against similar customers
Typology Matching
Analysis against
known guilty party data
Filtering, Weighting, Prioritization
External Data
Consolidation
In addition to the high
level view of the core
components of
our Behavioral
Analysis, what
follows are the key
ecosystem vendor
capabilities to
support this vision.
Copyright © 2018 Accenture. All rights reserved.
Arachnys Information
Services, Ltd.
encompass corporation
Pitney Bowes Inc.
Ripjar Limited
Quantexa Limited
Ripjar Limited
SAS Institute Inc.
ThetaRay Ltd.
Accenture Digital
Ayasdi, Inc.
Nice Ltd (Actimize™)
Oracle Corporation
7
Current vendor capabilities would enable
consolidation of data from external
sources (e.g. negative news searches).
However, access to crime agency /
regulator data and ability to model this
data has not been considered.
Several vendors provide risk scoring and
prioritization as part of their offering. A
tailored solution to consolidate the output of
vendor products and to provide a holistic risk
score would be required, and dependent on
the capabilities deployed.
BEHAVIORAL ANALYSIS - USE CASES (1 OF 2)
USE
CASE #1:
DETECTION
Behavioral Analysis detects
new money-laundering
threats by identifying
emerging communities and
assessing the patterns of
behavioral when compared to
subjects of a similar type.
Ben’s behavioral patterns are identified as
unusual in relation to his peer group.
Contextual analysis on this outlier
identifies Ben and counterparties as part of
an emerging community which pose a
financial crime risk for example Fine Art
Trafficking.
BENEFIT
Targeted behavioral
insights accelerate threat
detection, help discover
new typologies and focus
efforts on higher risk
cases.
USE
CASE #2:
DETECTION
While Ben’s transaction pattern of
behavior is not itself suspicious, Ben is
shown to transact with a known money
launderer.
BENEFIT
Increase in both the quality of
investigation and the ability to
identify previously
unknown suspicious
behavior.
Behavioral Analysis allows an
understanding of the degree of
separation across the
customer base and the
identification of physical links
between individuals.
Confirmed
money
launderer
Behavioral Analysis can assist banks to detect and prioritize potential suspicious behavior for alert investigation.
Copyright © 2018 Accenture. All rights reserved.
8
BEHAVIORAL ANALYSIS - USE CASES (2 OF 2)
USE
CASE #3:
PRIORITIZ-
ATION
Behavioral Analysis can
focus investigators’
efforts on real financial
crime by using
behavioral risk insights
alongside traditional
detection solutions to
prioritize alerts.
Confirmed
Financial
Crime
BENEFIT
Enhanced alert
prioritization, increased
efficiency of
investigations and
reduced cost of
compliance.
Behavioral analysis identifies Amy’s
violation behavior as resembling that of
non-suspicious customers, whereas
Ben has a strong behavioral similarity to
that of a customer who has previously
been escalated for structuring.
USE
CASE #4:
FALSE
POSITIVE
REDUCTION
Behavioral Analysis can
drive down false
positives by identifying
the likelihood of a
subject being involved
in suspicious activity.
BENEFIT
Reduction in false
positives and therefore
investigator workstack,
freeing capacity to work
on more complex cases.
Behavioral analysis demonstrates
that Amy’s behavioral fingerprint
is similar to that of non-
suspicious subjects, for example,
young professional first-time house
buyers, hence there is a low-
likelihood of the transaction being
suspicious and an alert is not
generated.
Alerts are generated
for Amy and Ben
Amy executes a series of
transactions in larger amounts than
her typical transaction – traditional
transaction monitoring systems
would have alerted Amy for a
“change in behavior” scenario.
Behavioral Analysis can assist banks to detect and prioritize potential suspicious behavior for alert investigation.
Copyright © 2018 Accenture. All rights reserved.
9
BEHAVIORAL ANALYSIS – VALUE PROPOSITION
Typology Matching
False Positives
can reach up to
20%
SUGGESTED APPROACH
Alert volume
reductions
can reach up
40%
Machine Learning was used to analyze
customers‘ transactions and prioritize most likely
suspicious transactions for investigation, isolating
those of lower risk.
Comparison Against
Similar Customers
Behavioral Analysis enhances identification of potential financial crime threats and facilitates complex investigation by exposing the
link between customer behavior and likely suspicious activity.
Filtering, Weighting
and Prioritization
SUGGESTED APPROACH
Through the use of Predictive Analytics, historical
investigations and case information were analyzed to
identify the relative risk of each alerted activity. A
self-learning algorithm delivered ever improving
refinement and ongoing alert reduction.
An increased number of identified lower risk
alerts, a significant reduction In false positives
which allowed resources and efforts to be
reassigned to higher risk customers and
behavior.
OUTCOME
By combining the capabilities of network and cluster analysis, internal typology development and filtering, weighting and prioritization, behavioral analysis allows banks
to better prioritize alerts, help reduce false positives and enable more focused investigation efforts on higher risk customers and behavior.
Use Network and Cluster Analysis to group
customers and transactions into specific segments
and understand links or behavioral similarity to
potential suspicious entities.
OUTCOME
SUGGESTED APPROACH
Enable investigation effort to be
focused on higher risk alerts, improving
quality and compliance and
generating efficiencies.
OUTCOME
False Positives
reductions can
reach up to
30%
Using machine learning to spot and identify
patterns in behavior at a micro segment
level, we have been able to better apply risk
and detection rules and drive a reduction in
false positive alerts.
Copyright © 2018 Accenture. All rights reserved.
10
BEHAVIORAL ANALYSIS - HOW WE CAN HELP
Accenture is uniquely positioned to support financial institutions in their Financial Crime Compliance journey. Building on our deep
experience in analytics, data and technology transformations, we are able to bring industry leading knowledge, assets and scalable
capabilities to deliver desired outcomes for clients.
Key Capabilities
People
Data Foundation
At Accenture we understand the importance of balancing
trustworthiness and quality with relevance and variability. Our
intelligent data foundation is built on four key capabilities:
• Data ingestion, provisioning and modelling
• Features engineering – identifying which key “features” are
important in financial crime risk identification
• Data trust and quality
• Data governance
Advanced Analytics and Machine Learning
Across a number of assignments, Accenture uses analytical tooling to help
reduce false positives, improve detection and increase operational
effectiveness. Capabilities include:
• Contextual scoring
• Customer segmentation
• Negative news screening
• Text mining
Partners and Vendor Relationships
Copyright © 2018 Accenture. All rights reserved.
Arachnys Information
Services, Ltd.
Ayasdi, Inc.
Fenergo Ltd
ForgeRock Inc.
Oracle Corporation
Quantexa Limited
Ripjar Limited
SAS Institute Inc.
ThetaRay Ltd.
Trulioo Inc.
11
Accenture’s alliances & relationships with leading vendors
allows us to deliver at pace across the Financial Crime Ecosystem:
• Digital ID, single customer view and entity resolution
• Threat identification and risk scoring
• Lifecycle management, workflow and intelligent investigation
• Data monitoring
• Data aggregation and segmentation
• Foundation technology
• Visualization
Accenture’s blended and scalable workforce capabilities and skills means we can provide knowledge and know-how across an array of
services, spanning globally. We can also provide financial services institutions with a unique combination of delivery experience alongside
tailored digital assets to support them in their Financial Crime Compliance journey.
• Predictive analytics
• Network analysis
• Digital identity
BEHAVIORAL ANALYSIS
About Accenture
Accenture is a leading global professional services company, providing a broad range
of services and solutions in strategy, consulting, digital, technology and operations.
Combining unmatched experience and specialized skills across more than 40
industries and all business functions—underpinned by the world’s largest delivery
network—Accenture works at the intersection of business and technology to help
clients improve their performance and create sustainable value for their stakeholders.
With more than 459,000 people serving clients in more than 120 countries, Accenture
drives innovation to improve the way the world works and lives. Visit us at
www.accenture.com
Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Disclaimer
This presentation is intended for general informational purposes only and does not take
into account the reader’s specific circumstances, and may not reflect the most current
developments. Accenture disclaims, to the fullest extent permitted by applicable law,
any and all liability for the accuracy and completeness of the information in this
presentation and for any acts or omissions made based on such
information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers
are responsible for obtaining such advice from their own legal counsel or other
licensed professionals.
TO FIND OUT MORE
Carl Welford
Accenture Financial Services
Senior Manager
carl.welford@accenture.com
Archit Chamaria
Accenture Finance & Risk
Manager
archit.chamaria@accenture.com
Victoria Hale
Accenture Finance & Risk
Manager
victoria.a.hale@accenture.com
Matthew Roderick
Accenture Finance & Risk
Consultant
matthew.roderick@accenture.com

Contenu connexe

Tendances

Business Intelligence Architecture
Business Intelligence ArchitectureBusiness Intelligence Architecture
Business Intelligence ArchitecturePhilippe Julio
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An OverviewSrini Peyyalamitta
 
Advancing internal audit analytics
Advancing internal audit analytics Advancing internal audit analytics
Advancing internal audit analytics PwC
 
Applications of Data Science in Banking and Financial sector.pptx
Applications of Data Science in Banking and Financial sector.pptxApplications of Data Science in Banking and Financial sector.pptx
Applications of Data Science in Banking and Financial sector.pptxkarnika21
 
Big Data & Analytics Architecture
Big Data & Analytics ArchitectureBig Data & Analytics Architecture
Big Data & Analytics ArchitectureArvind Sathi
 
Business intelligence and analytics
Business intelligence and analyticsBusiness intelligence and analytics
Business intelligence and analyticsRajiv Kumar
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big datahktripathy
 
Overview of Data Analytics in Lending Business
Overview of Data Analytics in Lending BusinessOverview of Data Analytics in Lending Business
Overview of Data Analytics in Lending BusinessSanjay Kar
 
Azure Data.pptx
Azure Data.pptxAzure Data.pptx
Azure Data.pptxFedoRam1
 
Business Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and StewardshipBusiness Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and StewardshipPieter De Leenheer
 
Business intelligence vs business analytics
Business intelligence  vs business analyticsBusiness intelligence  vs business analytics
Business intelligence vs business analyticsSuvradeep Rudra
 
How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?Thanakrit Lersmethasakul
 
Artificial Intelligence and Digital Banking - What about fraud prevention ?
Artificial Intelligence and Digital Banking - What about fraud prevention ?Artificial Intelligence and Digital Banking - What about fraud prevention ?
Artificial Intelligence and Digital Banking - What about fraud prevention ?Jérôme Kehrli
 
Prepare your data for machine learning
Prepare your data for machine learningPrepare your data for machine learning
Prepare your data for machine learningIvo Andreev
 
Machine Learning Project - Default credit card clients
Machine Learning Project - Default credit card clients Machine Learning Project - Default credit card clients
Machine Learning Project - Default credit card clients Vatsal N Shah
 
Text analysis and its Importance.pdf
Text analysis and its Importance.pdfText analysis and its Importance.pdf
Text analysis and its Importance.pdfVivekDixit486466
 

Tendances (20)

Unit iv dbms
Unit   iv dbmsUnit   iv dbms
Unit iv dbms
 
Business Intelligence Architecture
Business Intelligence ArchitectureBusiness Intelligence Architecture
Business Intelligence Architecture
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An Overview
 
Text Analytics
Text Analytics Text Analytics
Text Analytics
 
Advancing internal audit analytics
Advancing internal audit analytics Advancing internal audit analytics
Advancing internal audit analytics
 
Applications of Data Science in Banking and Financial sector.pptx
Applications of Data Science in Banking and Financial sector.pptxApplications of Data Science in Banking and Financial sector.pptx
Applications of Data Science in Banking and Financial sector.pptx
 
Big Data & Analytics Architecture
Big Data & Analytics ArchitectureBig Data & Analytics Architecture
Big Data & Analytics Architecture
 
Business intelligence and analytics
Business intelligence and analyticsBusiness intelligence and analytics
Business intelligence and analytics
 
Data science in finance industry
Data science in finance industryData science in finance industry
Data science in finance industry
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big data
 
Overview of Data Analytics in Lending Business
Overview of Data Analytics in Lending BusinessOverview of Data Analytics in Lending Business
Overview of Data Analytics in Lending Business
 
Azure Data.pptx
Azure Data.pptxAzure Data.pptx
Azure Data.pptx
 
Business Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and StewardshipBusiness Semantics for Data Governance and Stewardship
Business Semantics for Data Governance and Stewardship
 
Business intelligence vs business analytics
Business intelligence  vs business analyticsBusiness intelligence  vs business analytics
Business intelligence vs business analytics
 
How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?How different between Big Data, Business Intelligence and Analytics ?
How different between Big Data, Business Intelligence and Analytics ?
 
Artificial Intelligence and Digital Banking - What about fraud prevention ?
Artificial Intelligence and Digital Banking - What about fraud prevention ?Artificial Intelligence and Digital Banking - What about fraud prevention ?
Artificial Intelligence and Digital Banking - What about fraud prevention ?
 
Prepare your data for machine learning
Prepare your data for machine learningPrepare your data for machine learning
Prepare your data for machine learning
 
Machine Learning Project - Default credit card clients
Machine Learning Project - Default credit card clients Machine Learning Project - Default credit card clients
Machine Learning Project - Default credit card clients
 
Text analysis and its Importance.pdf
Text analysis and its Importance.pdfText analysis and its Importance.pdf
Text analysis and its Importance.pdf
 

Similaire à Behavioral Analysis for Financial Crime Threat Mitigation

AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2Eric Young
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiagauravmiishra701
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiaaparnatikekar4
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiasathish kriishnan
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNishantSisodiya
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNina Yadav
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNishantSisodiya
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY Indiasathish kriishnan
 
Analytics in banking services
Analytics in banking servicesAnalytics in banking services
Analytics in banking servicesMariyageorge
 
Active Analytics Overview - 1 pager - DISTRIBUTE
Active Analytics Overview - 1 pager - DISTRIBUTEActive Analytics Overview - 1 pager - DISTRIBUTE
Active Analytics Overview - 1 pager - DISTRIBUTEJustin Offen
 
Keys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycleKeys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycleGrant Thornton LLP
 
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfUnveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfKajal Digital
 
Empowering Your Business with Advanced Data Analytics Services
 Empowering Your Business with Advanced Data Analytics Services Empowering Your Business with Advanced Data Analytics Services
Empowering Your Business with Advanced Data Analytics ServicesCorotsystems
 
leewayhertz.com-Data analysis workflow using Scikit-learn.pdf
leewayhertz.com-Data analysis workflow using Scikit-learn.pdfleewayhertz.com-Data analysis workflow using Scikit-learn.pdf
leewayhertz.com-Data analysis workflow using Scikit-learn.pdfKristiLBurns
 
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold  Digging Beneath The Surface Of Data MiningAll That Glitters Is Not Gold  Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold Digging Beneath The Surface Of Data MiningJim Webb
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?Penser
 
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptx
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptxBUSINESS_INTELLIGENT_AND_ANALYTICS.pptx
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptxobaroadewale
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsJane Roberts
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 

Similaire à Behavioral Analysis for Financial Crime Threat Mitigation (20)

AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
 
Analytics in banking services
Analytics in banking servicesAnalytics in banking services
Analytics in banking services
 
Active Analytics Overview - 1 pager - DISTRIBUTE
Active Analytics Overview - 1 pager - DISTRIBUTEActive Analytics Overview - 1 pager - DISTRIBUTE
Active Analytics Overview - 1 pager - DISTRIBUTE
 
Keys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycleKeys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycle
 
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfUnveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
 
Empowering Your Business with Advanced Data Analytics Services
 Empowering Your Business with Advanced Data Analytics Services Empowering Your Business with Advanced Data Analytics Services
Empowering Your Business with Advanced Data Analytics Services
 
leewayhertz.com-Data analysis workflow using Scikit-learn.pdf
leewayhertz.com-Data analysis workflow using Scikit-learn.pdfleewayhertz.com-Data analysis workflow using Scikit-learn.pdf
leewayhertz.com-Data analysis workflow using Scikit-learn.pdf
 
Insurance value chain
Insurance value chainInsurance value chain
Insurance value chain
 
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold  Digging Beneath The Surface Of Data MiningAll That Glitters Is Not Gold  Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
 
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptx
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptxBUSINESS_INTELLIGENT_AND_ANALYTICS.pptx
BUSINESS_INTELLIGENT_AND_ANALYTICS.pptx
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analytics
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 

Plus de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Behavioral Analysis for Financial Crime Threat Mitigation

  • 1. FOR FINANCIAL CRIME THREAT MITIGATION BEHAVIORAL ANALYSIS
  • 2. 2 CONTENTS WHAT IS BEHAVIORAL ANALYSIS? (p3) ENABLERS (p4) CAPABILITIES (p5) PROCESS FLOW (p6) TECHNIQUES FOR DEPLOYMENT (p7) USE CASES (p8) VALUE PROPOSITION (p10) HOW WE CAN HELP (p11) Copyright © 2018 Accenture. All rights reserved.
  • 3. WHAT IS BEHAVIORAL ANALYSIS? Behavioral Analysis is the utilisation of the customer and their network’s financial and non-financial data to understand the degree of financial crime risk posed to the bank. This is facilitated through data-driven assessment of a customer’s behavior against known suspicious and non-suspicious behavioral attributes and can be delivered through the deployment of various business and technology capabilities. • Today’s Financial Crime Risk Management is often characterized by a reactive, rules-driven, detection approach. Such an approach, which relies on static, filter-driven data often fails to recognize subtle differences in behavior patterns or links between customers that could be prime indicators of suspicious activity. • Analytics technology including behavior centric, network-driven analysis create an opportunity for improving outcomes and efficiency in financial crime mitigation. • Behavioral analysis works by understanding the proximity of customer behavior to indicators of potential financial crime threat. This includes both known threats such as confirmed money launderers in addition to known patterns of behavior indicative of financial crime risk. • Behavioral analysis allows financial institutions to go beyond the normal anti-money laundering (AML) investigative protocols and look for and report on unusual patterns of activity between seemingly unrelated accounts that have no apparent economic purpose. This can lead to an increased chance of detecting suspicious behavior and aids better prioritization of alerts. • To improve the effectiveness of behavioral analysis, banks should develop their foundational business and technology capabilities as part of the wider financial crime ecosystem, including consolidation of data across sources and risk types, behavioral attributes, and entity resolution. Current State Overview Traditionally identification of financial crime risk has been based on an individual transaction view … … and direct transactional relationships … … supported by internal data sources Financial crime risk would be identified through customer scoring indicating proximity to potential threats … and by entity resolution and segmenting of customers with similar behaviors …supported by compilation of financial and non-financial information across internal and external sources Future State Overview Copyright © 2018 Accenture. All rights reserved. 3
  • 4. Consolidation of Data Sources • Compilation of internal and external data both financial and non-financial across threat types. • Continual data monitoring, ingestion and consolidation over time. • Add additional data sets to increase the number of unique features available for holistic threat assessment and manual investigation. Behavioral Attributes • Use of data to create features used to build and maintain a customer specific risk score or “behavioral fingerprint.” • Continual update and timely reflection of a customer’s changing data attributes within the Customer Risk Score. • Ultimately permits the identification of behavior matched to known AML behavioral patterns. Internal Client Data e.g. Know Your Customer (KYC), Fraud and Transaction History. Internal Records, e.g. Internal Watchlists and suspicious Activity Reports (SARs) Records. Data from Governmental Bodies e.g. Watchlists. News and Social Media Searches. Paid for 3rd Party Consumer Data e.g. credit data. Public Domain, e.g. public accounts. BEHAVIORAL ANALYSIS - ENABLERS Customers employment industry Sector. Geographic, product and behavioral risks. Volume, frequency and sentiment of media coverage. Reported to actual income ratio. Establish connections with high risk individuals / entities and geographies. In order to carry out true Behavioral Analysis, key enablers such as those indicated below should form part of the transaction monitoring process. Entity Resolution • Connection of disparate data sources to allow for validation, resolution and deduplication of data attached to customers. • Continual entity resolution as new data becomes available and new customer relationships are established. • Provide a single customer view to aide customer segmentation and cluster analysis. Ingestion and consolidation of data sets from multiple sources. Link data which references a given customer and deduplicate this data. Create a singular customer view. Copyright © 2018 Accenture. All rights reserved. 4
  • 5. Comparison Against Similar Customers • Grouping together customers with similar characteristics and behavioral attributes into a network cluster. • Customers can be analyzed against clusters with expected similar behavioral attributes for behavior which does not align. • An understanding of the degree of separation and identification of physical links between customers and known suspicious can be established. Typology Matching • Past investigations and associated information provide a wealth of information which can help with future investigations. • The historical decisioning and rationale is combined with case attributes to help trigger future alerts by applying similar logical decisioning. BEHAVIORAL ANALYSIS - CAPABILITIES Behavioral Analysis aids with the identification of suspicious activity by identifying customers whose actions do not align with expected behavior or are similar to the behavioral attributes of known guilty parties. Analysis Against Guilty Party Data • A lot of effort today is spent on defining and ring fencing non-suspicious behavior. • By combining regulatory and enforcement agent data of known guilty parties and their characteristics, together with known non- suspicious behavioral attributes, inferences can be drawn to highlight events or entities requiring scrutiny. A subject runs a convenience store and is grouped into a community based on similarity of the behavioral attributes. Analysis identifies that the subject’s behavioral attributes are diverging from the expected behavior of the segment with large transactions to an overseas manufacturing firm. An alert is generated on this subject for further investigation. Ingestion of know guilty party data and associated behavioral attributes. Subjects in client database are analyzed for behavioral similarity to behavior attributes which indicate a known higher propensity for suspicion. Insights inform alert generation and prioritization. Internal data provides a record of transaction history and past case outcomes. Subject’s behavioral attributes are analyzed for behavioral similarity to subjects upon which cases were previously reported. Insights from analysis hep with case discounting and alert generation. Copyright © 2018 Accenture. All rights reserved. 5
  • 6. BEHAVIORAL ANALYSIS - PROCESS FLOW Using behavioral and network analysis capabilities can enhance current transaction monitoring processes and permit a holistic overview and assessment across internal and external data to identify financial crime. Behavioral Analysis Enablers Entity resolution Behavioral attributes Data consolidation Behavioral Analysis Capabilities Comparison against similar customers Typology matching Analysis against known guilty party data Copyright © 2018 Accenture. All rights reserved. 6
  • 7. BEHAVIORAL ANALYSIS - TECHNIQUES FOR DEPLOYMENT Comparison against similar customers Typology Matching Analysis against known guilty party data Filtering, Weighting, Prioritization External Data Consolidation In addition to the high level view of the core components of our Behavioral Analysis, what follows are the key ecosystem vendor capabilities to support this vision. Copyright © 2018 Accenture. All rights reserved. Arachnys Information Services, Ltd. encompass corporation Pitney Bowes Inc. Ripjar Limited Quantexa Limited Ripjar Limited SAS Institute Inc. ThetaRay Ltd. Accenture Digital Ayasdi, Inc. Nice Ltd (Actimize™) Oracle Corporation 7 Current vendor capabilities would enable consolidation of data from external sources (e.g. negative news searches). However, access to crime agency / regulator data and ability to model this data has not been considered. Several vendors provide risk scoring and prioritization as part of their offering. A tailored solution to consolidate the output of vendor products and to provide a holistic risk score would be required, and dependent on the capabilities deployed.
  • 8. BEHAVIORAL ANALYSIS - USE CASES (1 OF 2) USE CASE #1: DETECTION Behavioral Analysis detects new money-laundering threats by identifying emerging communities and assessing the patterns of behavioral when compared to subjects of a similar type. Ben’s behavioral patterns are identified as unusual in relation to his peer group. Contextual analysis on this outlier identifies Ben and counterparties as part of an emerging community which pose a financial crime risk for example Fine Art Trafficking. BENEFIT Targeted behavioral insights accelerate threat detection, help discover new typologies and focus efforts on higher risk cases. USE CASE #2: DETECTION While Ben’s transaction pattern of behavior is not itself suspicious, Ben is shown to transact with a known money launderer. BENEFIT Increase in both the quality of investigation and the ability to identify previously unknown suspicious behavior. Behavioral Analysis allows an understanding of the degree of separation across the customer base and the identification of physical links between individuals. Confirmed money launderer Behavioral Analysis can assist banks to detect and prioritize potential suspicious behavior for alert investigation. Copyright © 2018 Accenture. All rights reserved. 8
  • 9. BEHAVIORAL ANALYSIS - USE CASES (2 OF 2) USE CASE #3: PRIORITIZ- ATION Behavioral Analysis can focus investigators’ efforts on real financial crime by using behavioral risk insights alongside traditional detection solutions to prioritize alerts. Confirmed Financial Crime BENEFIT Enhanced alert prioritization, increased efficiency of investigations and reduced cost of compliance. Behavioral analysis identifies Amy’s violation behavior as resembling that of non-suspicious customers, whereas Ben has a strong behavioral similarity to that of a customer who has previously been escalated for structuring. USE CASE #4: FALSE POSITIVE REDUCTION Behavioral Analysis can drive down false positives by identifying the likelihood of a subject being involved in suspicious activity. BENEFIT Reduction in false positives and therefore investigator workstack, freeing capacity to work on more complex cases. Behavioral analysis demonstrates that Amy’s behavioral fingerprint is similar to that of non- suspicious subjects, for example, young professional first-time house buyers, hence there is a low- likelihood of the transaction being suspicious and an alert is not generated. Alerts are generated for Amy and Ben Amy executes a series of transactions in larger amounts than her typical transaction – traditional transaction monitoring systems would have alerted Amy for a “change in behavior” scenario. Behavioral Analysis can assist banks to detect and prioritize potential suspicious behavior for alert investigation. Copyright © 2018 Accenture. All rights reserved. 9
  • 10. BEHAVIORAL ANALYSIS – VALUE PROPOSITION Typology Matching False Positives can reach up to 20% SUGGESTED APPROACH Alert volume reductions can reach up 40% Machine Learning was used to analyze customers‘ transactions and prioritize most likely suspicious transactions for investigation, isolating those of lower risk. Comparison Against Similar Customers Behavioral Analysis enhances identification of potential financial crime threats and facilitates complex investigation by exposing the link between customer behavior and likely suspicious activity. Filtering, Weighting and Prioritization SUGGESTED APPROACH Through the use of Predictive Analytics, historical investigations and case information were analyzed to identify the relative risk of each alerted activity. A self-learning algorithm delivered ever improving refinement and ongoing alert reduction. An increased number of identified lower risk alerts, a significant reduction In false positives which allowed resources and efforts to be reassigned to higher risk customers and behavior. OUTCOME By combining the capabilities of network and cluster analysis, internal typology development and filtering, weighting and prioritization, behavioral analysis allows banks to better prioritize alerts, help reduce false positives and enable more focused investigation efforts on higher risk customers and behavior. Use Network and Cluster Analysis to group customers and transactions into specific segments and understand links or behavioral similarity to potential suspicious entities. OUTCOME SUGGESTED APPROACH Enable investigation effort to be focused on higher risk alerts, improving quality and compliance and generating efficiencies. OUTCOME False Positives reductions can reach up to 30% Using machine learning to spot and identify patterns in behavior at a micro segment level, we have been able to better apply risk and detection rules and drive a reduction in false positive alerts. Copyright © 2018 Accenture. All rights reserved. 10
  • 11. BEHAVIORAL ANALYSIS - HOW WE CAN HELP Accenture is uniquely positioned to support financial institutions in their Financial Crime Compliance journey. Building on our deep experience in analytics, data and technology transformations, we are able to bring industry leading knowledge, assets and scalable capabilities to deliver desired outcomes for clients. Key Capabilities People Data Foundation At Accenture we understand the importance of balancing trustworthiness and quality with relevance and variability. Our intelligent data foundation is built on four key capabilities: • Data ingestion, provisioning and modelling • Features engineering – identifying which key “features” are important in financial crime risk identification • Data trust and quality • Data governance Advanced Analytics and Machine Learning Across a number of assignments, Accenture uses analytical tooling to help reduce false positives, improve detection and increase operational effectiveness. Capabilities include: • Contextual scoring • Customer segmentation • Negative news screening • Text mining Partners and Vendor Relationships Copyright © 2018 Accenture. All rights reserved. Arachnys Information Services, Ltd. Ayasdi, Inc. Fenergo Ltd ForgeRock Inc. Oracle Corporation Quantexa Limited Ripjar Limited SAS Institute Inc. ThetaRay Ltd. Trulioo Inc. 11 Accenture’s alliances & relationships with leading vendors allows us to deliver at pace across the Financial Crime Ecosystem: • Digital ID, single customer view and entity resolution • Threat identification and risk scoring • Lifecycle management, workflow and intelligent investigation • Data monitoring • Data aggregation and segmentation • Foundation technology • Visualization Accenture’s blended and scalable workforce capabilities and skills means we can provide knowledge and know-how across an array of services, spanning globally. We can also provide financial services institutions with a unique combination of delivery experience alongside tailored digital assets to support them in their Financial Crime Compliance journey. • Predictive analytics • Network analysis • Digital identity
  • 12. BEHAVIORAL ANALYSIS About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 459,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Disclaimer This presentation is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.
  • 13. TO FIND OUT MORE Carl Welford Accenture Financial Services Senior Manager carl.welford@accenture.com Archit Chamaria Accenture Finance & Risk Manager archit.chamaria@accenture.com Victoria Hale Accenture Finance & Risk Manager victoria.a.hale@accenture.com Matthew Roderick Accenture Finance & Risk Consultant matthew.roderick@accenture.com