SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
The Role of Data Science in 
Enterprise Risk Management 
By John Liu, PhD, CFA
Question 
of the Day 
¡ How do you tell the difference between a 
Bayesian Statistician and Data Scientist? 
¡ Answer: What’s the p-value?
Big Data: Big Risks 
¡ Healthcare 
¡ Financial Services 
¡ Insurance 
¡ Transportation 
¡ National Security 
¡ Dating
Key 
Takeaways 
¡ What is Enterprise Risk Management 
(ERM)? 
¡ What is the Role of Data Science in 
ERM? 
¡ What Data Analytics are used for ERM?
What is 
Enterprise Risk 
Management?
What is 
Risk Management? 
¡ A structured approach to manage uncertainty 
¡ Management strategies: 
Risk Avoidance Risk Transfer Risk Mitigation
Risk Management - Defense 
Insurance Approach 
Reward 
Do Nothing 
Probability of Success
Risk Management - Offense 
Opportunistic Approach 
Reward 
Carpe Diem 
Do Nothing 
Probability of Success
What is ERM? 
¡ Risk-based approach to managing an enterprise 
¡ Risk-aware: every major tangible and intangible 
factor contributing toward failure in every process at 
every level of the enterprise 
¡ Enterprise value maximized with optimal balance 
between profitability/growth and related risks 
¡ Management better prepared to seize opportunities 
for growth and value creation
ERM 
Components 
Identify 
Quantify 
Respond 
Monitor & Report 
Effectiveness 
Monitor 
Comprehensive 
Approach To 
Managing 
Uncertainty 
Identify/Assess Internal 
and External Risks 
Risk Scoring 
& Modeling 
Respond and Control
ERM 
Goals 
¡ Provide holistic view across an organization 
leveraging firm experience and knowledge 
¡ Provide greater transparency to factors that can 
impair value preservation and business profitability 
¡ Understand & test assumptions & interpretations in 
business decision-making
ERM 
Risk Types 
¡ • Resource Capital Management 
• Business Disruption, IT Operational 
• Credit Exposure 
• Exchange Rate, Cash flow, Funding Financial 
• Privacy, Security, Safety 
• Regulatory and Statutory Compliance 
• Financial Reporting 
• Regulatory Reporting Reporting 
• Natural Catastrophe 
• Market Panics Hazard 
• Business Planning 
• Marketing, Reputation Strategic
RM vs ERM 
HQ: EUR exposure Subsidiary: USD exposure 
Sells EUR, Buys USD Sells USD, Buys EUR 
RM: Subsidiaries/Business Units manage risks separately 
ERM: Manage NET exposure across entire enterprise
Data Science 
and ERM
ERM 
Framework 
Enterprise Structure, Risks Objectives & Components 
Compliance 
Financial 
Compliance 
Reporting 
Hazard 
Strategic 
Entity Wide 
Division 
Business Unit 
Comprehensive 
Approach 
Leverage Data & 
Analytic Resources 
Predictive Modeling
Common 
Challenges 
¡ Data warehousing & sharing across entity 
¡ Prioritization methodology 
¡ Consolidated reporting 
¡ Timeliness 
¡ Data security 
¡ The risk management process itself!
Role of 
Data Science 
¡ Data science methods provide: 
¡ Enterprise Data Management 
¡ Comprehensive warehousing 
¡ Data quality and abundance 
¡ Risk Analytics 
¡ Predictive Modeling 
¡ Loss Distributions 
¡ Reporting 
¡ Real-time visualization, dashboards 
¡ Regulatory requirements 
Reporting
Typical 
Corporate EDW 
¡ Big data warehouse ≠ useful data (quite the opposite)
Data Management 
¡ Comprehensive data warehouse 
¡ Coherent data collection (maybe) 
¡ Facilitate data sharing across entity 
¡ No useful analytics without abundant, high quality data 
Data Big Data 
Excel BigTable 
PostgreSQL Cassandra, HIVE, HBase 
MongoDB Vertica, KDB
Risk 
Analytics 
¡ Benefits beyond Business Intelligence 
Descriptive 
Analytics 
Predictive 
Analytics 
Prescriptive 
Analytics 
What happened? What’s likely to occur? Why would it occur? 
Hindsight Foresight Insight 
Summary Statistics Data mining Heuristic Optimization 
web analytics, BI, 
credit scoring, trend 
operations planning, 
inventory reporting 
analysis, sentiment 
stochastic methods 
¡ Newest: cognitive analytics = What is the best answer?
Rich Set of Visualization & 
Reporting Tools 
Aggregate Risk 
Dashboards 
Continuous & 
Comprehensive 
Risk Monitors 
Source: IBM Cognos
Data Analytics 
Applications for ERM 
¡ • Scenario Analysis Operational & Stress Testing 
Financial • Credit Scoring 
Compliance • IT Security Anomaly Detection 
Reporting • Risk Dashboard 
Hazard • Catastrophe & Market Risk Hedging 
Strategic • Marketing Analytics
Data Analytics 
for ERM
Definition of 
Risk 
¡ Risk = Frequency of Loss x Severity of Loss 
¡ Loss Distribution 
Unexpected Loss
Traditional ERM 
¡ Analytic Methods 
¡ Closed-form solutions (…just like most things in life) 
¡ Historical 
¡ Estimate risk using internal and external loss data 
¡ Monte Carlo 
¡ Estimate distribution parameters from real data 
¡ Monte-Carlo sample distribution 
¡ Calculate ensemble measures to estimate overall risk 
¡ Simple to implement, aggregate across entity, but make 
complex assumptions, not robust to outliers
Modern ERM 
¡ Data analytics driven 
¡ Inference based methods 
¡ KRI scoring 
¡ Parallelization 
¡ Natural applications 
¡ credit risk scoring 
¡ Anti-money laundering 
¡ Fraud
Prediction Methods 
Methods 
Transduction 
Tail Bayesian Frequentist 
Extreme-Value 
Expected Deficit 
Naïve Bayes 
HMMs 
Bayes Nets 
Regression, 
Decision Trees 
SVM 
Ensemble Methods 
Bagging, Boosting, Voting
Outliers, Inliers, 
and Just Plain Liars 
¡ Prediction problems fall in two classes: 
Inliers Outliers 
Inherently different problems with different quirks
Main Problems with 
Inlier Prediction 
¡ Parametric model choice 
¡ Estimation error for lower moments (mean, s.d.) 
¡ Incorrectly conjugating priors 
¡ Normal/Gaussian distributions don’t really occur in 
real life 
¡ I.I.D.? Really?
Main Problem with 
Outlier Prediction 
¡ Data Quality and Abundance 
¡ To estimate low probability events, big data may not be big 
enough 
Data: 150 years of daily data 
Predictor: 100 year flood severity 
Relevant Data: 1 or 2 data points
Value-at-Risk (VaR) 
¡ Loss severity measure for a given probability and time 
horizon 
• Estimate potential losses (or 
historical losses) 
• Rank losses based on severity 
• 95% Value-at-Risk is equal to 
the 95th percentile loss 
• Interpretation = Losses won’t 
exceed 65.2m 95% of time 
• Underestimates losses during 
the other 5% of time 
Rank 
Loss 
1 
-­‐0.1 
2 
-­‐0.1 
3 
-­‐0.3 
4 
-­‐0.6 
5 
-­‐0.7 
6 
-­‐0.9 
7 
-­‐1.1 
… 
… 
91 
-­‐59.5 
92 
-­‐63.2 
93 
-­‐64.9 
94 
-­‐65.0 
95 
-­‐65.2 
96 
-­‐66.5 
97 
-­‐67.8 
98 
-­‐93.9 
99 
-­‐110.0 
100 
-­‐273.1 
VaR
Value-at-Risk 
¡ Loss severity measure for a given probability and time 
horizon 
1-day 95% VaR of $1m 
Expect to lose no more than 
$1m in 95 out of every 100 days 
Says nothing about the other 5 
days out of 100. Not very 
reassuring, is it?
Tail Value-at-Risk (TVaR) 
¡ Loss severity measure for a given probability and time 
horizon 
• Estimate potential losses (or 
historical losses) 
• Rank losses based on severity 
• 95% Tail Value-at-Risk is equal 
to average of all losses 
beyond 95th percentile loss 
• Expect to lose on average 
$122m if losses exceed the 
95th percentile 
Rank 
Loss 
1 
-­‐0.1 
2 
-­‐0.1 
3 
-­‐0.3 
4 
-­‐0.6 
5 
-­‐0.7 
6 
-­‐0.9 
7 
-­‐1.1 
… 
… 
91 
-­‐59.5 
92 
-­‐63.2 
93 
-­‐64.9 
94 
-­‐65.0 
95 
-­‐65.2 
96 
-­‐66.5 
97 
-­‐67.8 
98 
-­‐93.9 
99 
-­‐110.0 
100 
-­‐273.1 
TVaR
Tail Value-at-Risk (TVaR) 
¡ Loss severity measure for a given probability and time 
horizon 
1-day 95% TVaR of $122m 
Better Measure of Risk 
Also known as Expected 
Shortfall, CVaR
Application: Operational 
Risk Management 
¡ Definition: The risk of direct and indirect loss resulting 
from inadequate or failed: 
¡ Internal processes 
¡ People 
¡ IT systems 
¡ External events 
Source: NYFed 
Operational 
Risk 
External Criminal 
Activity 
Information 
security failure 
Internal 
Criminal 
Unauthorized Activity 
Activity 
Processing 
Failure 
System Failure 
Control Failure 
Business 
Disruption 
Workplace Safety 
Malpractice
Managing OpRisk 
¡ One Approach 
Source: NYFed 
Assess Scorecard 
Internal 
Loss Data 
Identify 
Weakness 
Risk 
Scenarios 
Risk Model 
OpVar 
Risk 
Capital
Methods 
¡ Scorecard 
3 
5 
9 
¡ KRI scoring models 
2 
3 
5 
¡ Useful where no severity data exists 
1 
2 
3 
Loss Distribution 
Impact 
¡ ¡ Estimation of severity distribution parameters 
¡ MLE Not robust – data not i.i.d., biased upwards, subject to 
Probability 
data paucity & sparsity 
¡ Leads to biased loss exposures and correlation assumptions 
¡ Huge opportunity for inference-based analytics
Looking 
Forward
ERM Trends 
Source: NCSU 
¡ Increasing adoption of ERM
Forensic Data Analytics 
Fraud Detection Top Concern 
But Low Adoption. 
Source: Ernst & Young
Promise of Data Analytics 
¡ EDW remains a huge issue for most corporations 
¡ Legacy zombie systems 
¡ IT reporting lines 
¡ Increased understanding by senior managers and 
C-suite 
¡ Analytics as a Service: growing competition within 
consulting industry 
¡ Talent Gap – same for anything Data Science
Thank 
you

Contenu connexe

Tendances

How to conduct an AML risk assessment
How to conduct an AML risk assessmentHow to conduct an AML risk assessment
How to conduct an AML risk assessmentAsia Pacific AML
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Employee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesEmployee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesSSDlaw
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Excel as a potent forensic accounting tool
Excel as a potent forensic accounting toolExcel as a potent forensic accounting tool
Excel as a potent forensic accounting toolDhruv Seth
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk ManagementAsad Hameed
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk AssessmentTahir Abbas
 

Tendances (20)

Regulatory Reporting - Best Practices
Regulatory Reporting - Best Practices Regulatory Reporting - Best Practices
Regulatory Reporting - Best Practices
 
How to conduct an AML risk assessment
How to conduct an AML risk assessmentHow to conduct an AML risk assessment
How to conduct an AML risk assessment
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Employee Fraud Prevention and Remedies
Employee Fraud Prevention and RemediesEmployee Fraud Prevention and Remedies
Employee Fraud Prevention and Remedies
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Operational risks
Operational risksOperational risks
Operational risks
 
AML presentation
AML presentationAML presentation
AML presentation
 
Excel as a potent forensic accounting tool
Excel as a potent forensic accounting toolExcel as a potent forensic accounting tool
Excel as a potent forensic accounting tool
 
Credit Reporting
Credit ReportingCredit Reporting
Credit Reporting
 
Risk indicators
Risk indicatorsRisk indicators
Risk indicators
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
Leading a Compliance Program
Leading a Compliance Program Leading a Compliance Program
Leading a Compliance Program
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
it grc
it grc it grc
it grc
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 

En vedette

Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Getting Started With Data Science At Your Organization, Presented by Daniel Dunn
Getting Started With Data Science At Your Organization, Presented by Daniel DunnGetting Started With Data Science At Your Organization, Presented by Daniel Dunn
Getting Started With Data Science At Your Organization, Presented by Daniel DunnNashvilleTechCouncil
 
Information Visualization - Visualizing Digital Collections at Archive-It
Information Visualization - Visualizing Digital Collections at Archive-ItInformation Visualization - Visualizing Digital Collections at Archive-It
Information Visualization - Visualizing Digital Collections at Archive-ItMichele Weigle
 
Big- Data and Risk Management - Ido Lustig, PayPal
Big- Data and Risk Management - Ido Lustig, PayPalBig- Data and Risk Management - Ido Lustig, PayPal
Big- Data and Risk Management - Ido Lustig, PayPalCodemotion Tel Aviv
 
Geo Analysis Visualization and Performance with JReport 13
Geo Analysis Visualization and Performance with JReport 13Geo Analysis Visualization and Performance with JReport 13
Geo Analysis Visualization and Performance with JReport 13Mia Yuan Cao
 
Risk engineering decision tools for risk management support
Risk engineering decision tools for risk management supportRisk engineering decision tools for risk management support
Risk engineering decision tools for risk management supportGlobal Risk Forum GRFDavos
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityBiZZdesign
 
How to Reveal Hidden Relationships in Data and Risk Analytics
How to Reveal Hidden Relationships in Data and Risk AnalyticsHow to Reveal Hidden Relationships in Data and Risk Analytics
How to Reveal Hidden Relationships in Data and Risk AnalyticsOntotext
 
Data & Analytics Club - Data Visualization Workshop
Data & Analytics Club - Data Visualization WorkshopData & Analytics Club - Data Visualization Workshop
Data & Analytics Club - Data Visualization Workshopnsrivast
 
Data Visualization in Health
Data Visualization in HealthData Visualization in Health
Data Visualization in HealthRamon Martinez
 
Big data for cio 2015
Big data for cio 2015Big data for cio 2015
Big data for cio 2015Zohar Elkayam
 
Big Data: Real-life Examples of Business Value Generation
Big Data: Real-life Examples of Business Value GenerationBig Data: Real-life Examples of Business Value Generation
Big Data: Real-life Examples of Business Value GenerationCapgemini
 
Scaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data ScienceScaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data ScienceeRic Choo
 
Indexing thousands of writes per second with redis
Indexing thousands of writes per second with redisIndexing thousands of writes per second with redis
Indexing thousands of writes per second with redispauldix
 
Greenplum- an opensource
Greenplum- an opensourceGreenplum- an opensource
Greenplum- an opensourceRosy Mani
 

En vedette (20)

Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Getting Started With Data Science At Your Organization, Presented by Daniel Dunn
Getting Started With Data Science At Your Organization, Presented by Daniel DunnGetting Started With Data Science At Your Organization, Presented by Daniel Dunn
Getting Started With Data Science At Your Organization, Presented by Daniel Dunn
 
Information Visualization - Visualizing Digital Collections at Archive-It
Information Visualization - Visualizing Digital Collections at Archive-ItInformation Visualization - Visualizing Digital Collections at Archive-It
Information Visualization - Visualizing Digital Collections at Archive-It
 
Jobs report-final
Jobs report-finalJobs report-final
Jobs report-final
 
Big- Data and Risk Management - Ido Lustig, PayPal
Big- Data and Risk Management - Ido Lustig, PayPalBig- Data and Risk Management - Ido Lustig, PayPal
Big- Data and Risk Management - Ido Lustig, PayPal
 
Geo Analysis Visualization and Performance with JReport 13
Geo Analysis Visualization and Performance with JReport 13Geo Analysis Visualization and Performance with JReport 13
Geo Analysis Visualization and Performance with JReport 13
 
Risk engineering decision tools for risk management support
Risk engineering decision tools for risk management supportRisk engineering decision tools for risk management support
Risk engineering decision tools for risk management support
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
How to Reveal Hidden Relationships in Data and Risk Analytics
How to Reveal Hidden Relationships in Data and Risk AnalyticsHow to Reveal Hidden Relationships in Data and Risk Analytics
How to Reveal Hidden Relationships in Data and Risk Analytics
 
Data & Analytics Club - Data Visualization Workshop
Data & Analytics Club - Data Visualization WorkshopData & Analytics Club - Data Visualization Workshop
Data & Analytics Club - Data Visualization Workshop
 
Data Visualization in Health
Data Visualization in HealthData Visualization in Health
Data Visualization in Health
 
bond and its types
bond and its typesbond and its types
bond and its types
 
Yuchen Resume
Yuchen ResumeYuchen Resume
Yuchen Resume
 
Big data for cio 2015
Big data for cio 2015Big data for cio 2015
Big data for cio 2015
 
Big data and analytics - Petteri Alahuhta
Big data and analytics - Petteri AlahuhtaBig data and analytics - Petteri Alahuhta
Big data and analytics - Petteri Alahuhta
 
Big Data: Real-life Examples of Business Value Generation
Big Data: Real-life Examples of Business Value GenerationBig Data: Real-life Examples of Business Value Generation
Big Data: Real-life Examples of Business Value Generation
 
Scaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data ScienceScaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data Science
 
Indexing thousands of writes per second with redis
Indexing thousands of writes per second with redisIndexing thousands of writes per second with redis
Indexing thousands of writes per second with redis
 
Greenplum- an opensource
Greenplum- an opensourceGreenplum- an opensource
Greenplum- an opensource
 

Similaire à The Role of Data Science in Enterprise Risk Management, Presented by John Liu

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Using Analytics to Audit T&E
Using Analytics to Audit T&EUsing Analytics to Audit T&E
Using Analytics to Audit T&Emcoello
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...MITRE - ATT&CKcon
 
PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Group Ltd
 
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentationEnergized Work
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and securityM. Isaiah McGowan
 
Economically driven Cyber Risk Management
Economically driven Cyber Risk ManagementEconomically driven Cyber Risk Management
Economically driven Cyber Risk ManagementOsama Salah
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10Ed Tobias
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning Big Data Week
 

Similaire à The Role of Data Science in Enterprise Risk Management, Presented by John Liu (20)

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Using Analytics to Audit T&E
Using Analytics to Audit T&EUsing Analytics to Audit T&E
Using Analytics to Audit T&E
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
 
PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016
 
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentation
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
Economically driven Cyber Risk Management
Economically driven Cyber Risk ManagementEconomically driven Cyber Risk Management
Economically driven Cyber Risk Management
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
Managing the business_risk_of_fraud
Managing the business_risk_of_fraudManaging the business_risk_of_fraud
Managing the business_risk_of_fraud
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
 

Dernier

Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
convolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfconvolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfSubhamKumar3239
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 

Dernier (20)

Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
convolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfconvolutional neural network and its applications.pdf
convolutional neural network and its applications.pdf
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 

The Role of Data Science in Enterprise Risk Management, Presented by John Liu

  • 1. The Role of Data Science in Enterprise Risk Management By John Liu, PhD, CFA
  • 2. Question of the Day ¡ How do you tell the difference between a Bayesian Statistician and Data Scientist? ¡ Answer: What’s the p-value?
  • 3. Big Data: Big Risks ¡ Healthcare ¡ Financial Services ¡ Insurance ¡ Transportation ¡ National Security ¡ Dating
  • 4. Key Takeaways ¡ What is Enterprise Risk Management (ERM)? ¡ What is the Role of Data Science in ERM? ¡ What Data Analytics are used for ERM?
  • 5. What is Enterprise Risk Management?
  • 6. What is Risk Management? ¡ A structured approach to manage uncertainty ¡ Management strategies: Risk Avoidance Risk Transfer Risk Mitigation
  • 7. Risk Management - Defense Insurance Approach Reward Do Nothing Probability of Success
  • 8. Risk Management - Offense Opportunistic Approach Reward Carpe Diem Do Nothing Probability of Success
  • 9. What is ERM? ¡ Risk-based approach to managing an enterprise ¡ Risk-aware: every major tangible and intangible factor contributing toward failure in every process at every level of the enterprise ¡ Enterprise value maximized with optimal balance between profitability/growth and related risks ¡ Management better prepared to seize opportunities for growth and value creation
  • 10. ERM Components Identify Quantify Respond Monitor & Report Effectiveness Monitor Comprehensive Approach To Managing Uncertainty Identify/Assess Internal and External Risks Risk Scoring & Modeling Respond and Control
  • 11. ERM Goals ¡ Provide holistic view across an organization leveraging firm experience and knowledge ¡ Provide greater transparency to factors that can impair value preservation and business profitability ¡ Understand & test assumptions & interpretations in business decision-making
  • 12. ERM Risk Types ¡ • Resource Capital Management • Business Disruption, IT Operational • Credit Exposure • Exchange Rate, Cash flow, Funding Financial • Privacy, Security, Safety • Regulatory and Statutory Compliance • Financial Reporting • Regulatory Reporting Reporting • Natural Catastrophe • Market Panics Hazard • Business Planning • Marketing, Reputation Strategic
  • 13. RM vs ERM HQ: EUR exposure Subsidiary: USD exposure Sells EUR, Buys USD Sells USD, Buys EUR RM: Subsidiaries/Business Units manage risks separately ERM: Manage NET exposure across entire enterprise
  • 15. ERM Framework Enterprise Structure, Risks Objectives & Components Compliance Financial Compliance Reporting Hazard Strategic Entity Wide Division Business Unit Comprehensive Approach Leverage Data & Analytic Resources Predictive Modeling
  • 16. Common Challenges ¡ Data warehousing & sharing across entity ¡ Prioritization methodology ¡ Consolidated reporting ¡ Timeliness ¡ Data security ¡ The risk management process itself!
  • 17. Role of Data Science ¡ Data science methods provide: ¡ Enterprise Data Management ¡ Comprehensive warehousing ¡ Data quality and abundance ¡ Risk Analytics ¡ Predictive Modeling ¡ Loss Distributions ¡ Reporting ¡ Real-time visualization, dashboards ¡ Regulatory requirements Reporting
  • 18. Typical Corporate EDW ¡ Big data warehouse ≠ useful data (quite the opposite)
  • 19. Data Management ¡ Comprehensive data warehouse ¡ Coherent data collection (maybe) ¡ Facilitate data sharing across entity ¡ No useful analytics without abundant, high quality data Data Big Data Excel BigTable PostgreSQL Cassandra, HIVE, HBase MongoDB Vertica, KDB
  • 20. Risk Analytics ¡ Benefits beyond Business Intelligence Descriptive Analytics Predictive Analytics Prescriptive Analytics What happened? What’s likely to occur? Why would it occur? Hindsight Foresight Insight Summary Statistics Data mining Heuristic Optimization web analytics, BI, credit scoring, trend operations planning, inventory reporting analysis, sentiment stochastic methods ¡ Newest: cognitive analytics = What is the best answer?
  • 21. Rich Set of Visualization & Reporting Tools Aggregate Risk Dashboards Continuous & Comprehensive Risk Monitors Source: IBM Cognos
  • 22. Data Analytics Applications for ERM ¡ • Scenario Analysis Operational & Stress Testing Financial • Credit Scoring Compliance • IT Security Anomaly Detection Reporting • Risk Dashboard Hazard • Catastrophe & Market Risk Hedging Strategic • Marketing Analytics
  • 24. Definition of Risk ¡ Risk = Frequency of Loss x Severity of Loss ¡ Loss Distribution Unexpected Loss
  • 25. Traditional ERM ¡ Analytic Methods ¡ Closed-form solutions (…just like most things in life) ¡ Historical ¡ Estimate risk using internal and external loss data ¡ Monte Carlo ¡ Estimate distribution parameters from real data ¡ Monte-Carlo sample distribution ¡ Calculate ensemble measures to estimate overall risk ¡ Simple to implement, aggregate across entity, but make complex assumptions, not robust to outliers
  • 26. Modern ERM ¡ Data analytics driven ¡ Inference based methods ¡ KRI scoring ¡ Parallelization ¡ Natural applications ¡ credit risk scoring ¡ Anti-money laundering ¡ Fraud
  • 27. Prediction Methods Methods Transduction Tail Bayesian Frequentist Extreme-Value Expected Deficit Naïve Bayes HMMs Bayes Nets Regression, Decision Trees SVM Ensemble Methods Bagging, Boosting, Voting
  • 28. Outliers, Inliers, and Just Plain Liars ¡ Prediction problems fall in two classes: Inliers Outliers Inherently different problems with different quirks
  • 29. Main Problems with Inlier Prediction ¡ Parametric model choice ¡ Estimation error for lower moments (mean, s.d.) ¡ Incorrectly conjugating priors ¡ Normal/Gaussian distributions don’t really occur in real life ¡ I.I.D.? Really?
  • 30. Main Problem with Outlier Prediction ¡ Data Quality and Abundance ¡ To estimate low probability events, big data may not be big enough Data: 150 years of daily data Predictor: 100 year flood severity Relevant Data: 1 or 2 data points
  • 31. Value-at-Risk (VaR) ¡ Loss severity measure for a given probability and time horizon • Estimate potential losses (or historical losses) • Rank losses based on severity • 95% Value-at-Risk is equal to the 95th percentile loss • Interpretation = Losses won’t exceed 65.2m 95% of time • Underestimates losses during the other 5% of time Rank Loss 1 -­‐0.1 2 -­‐0.1 3 -­‐0.3 4 -­‐0.6 5 -­‐0.7 6 -­‐0.9 7 -­‐1.1 … … 91 -­‐59.5 92 -­‐63.2 93 -­‐64.9 94 -­‐65.0 95 -­‐65.2 96 -­‐66.5 97 -­‐67.8 98 -­‐93.9 99 -­‐110.0 100 -­‐273.1 VaR
  • 32. Value-at-Risk ¡ Loss severity measure for a given probability and time horizon 1-day 95% VaR of $1m Expect to lose no more than $1m in 95 out of every 100 days Says nothing about the other 5 days out of 100. Not very reassuring, is it?
  • 33. Tail Value-at-Risk (TVaR) ¡ Loss severity measure for a given probability and time horizon • Estimate potential losses (or historical losses) • Rank losses based on severity • 95% Tail Value-at-Risk is equal to average of all losses beyond 95th percentile loss • Expect to lose on average $122m if losses exceed the 95th percentile Rank Loss 1 -­‐0.1 2 -­‐0.1 3 -­‐0.3 4 -­‐0.6 5 -­‐0.7 6 -­‐0.9 7 -­‐1.1 … … 91 -­‐59.5 92 -­‐63.2 93 -­‐64.9 94 -­‐65.0 95 -­‐65.2 96 -­‐66.5 97 -­‐67.8 98 -­‐93.9 99 -­‐110.0 100 -­‐273.1 TVaR
  • 34. Tail Value-at-Risk (TVaR) ¡ Loss severity measure for a given probability and time horizon 1-day 95% TVaR of $122m Better Measure of Risk Also known as Expected Shortfall, CVaR
  • 35. Application: Operational Risk Management ¡ Definition: The risk of direct and indirect loss resulting from inadequate or failed: ¡ Internal processes ¡ People ¡ IT systems ¡ External events Source: NYFed Operational Risk External Criminal Activity Information security failure Internal Criminal Unauthorized Activity Activity Processing Failure System Failure Control Failure Business Disruption Workplace Safety Malpractice
  • 36. Managing OpRisk ¡ One Approach Source: NYFed Assess Scorecard Internal Loss Data Identify Weakness Risk Scenarios Risk Model OpVar Risk Capital
  • 37. Methods ¡ Scorecard 3 5 9 ¡ KRI scoring models 2 3 5 ¡ Useful where no severity data exists 1 2 3 Loss Distribution Impact ¡ ¡ Estimation of severity distribution parameters ¡ MLE Not robust – data not i.i.d., biased upwards, subject to Probability data paucity & sparsity ¡ Leads to biased loss exposures and correlation assumptions ¡ Huge opportunity for inference-based analytics
  • 39. ERM Trends Source: NCSU ¡ Increasing adoption of ERM
  • 40. Forensic Data Analytics Fraud Detection Top Concern But Low Adoption. Source: Ernst & Young
  • 41. Promise of Data Analytics ¡ EDW remains a huge issue for most corporations ¡ Legacy zombie systems ¡ IT reporting lines ¡ Increased understanding by senior managers and C-suite ¡ Analytics as a Service: growing competition within consulting industry ¡ Talent Gap – same for anything Data Science