SlideShare une entreprise Scribd logo
1  sur  12
Data and Risk Management:
A Match Made in FinTech
Adrian Black: CEO, Contego Fraud Solutions Ltd
27 March 2014
Risk
&
Data
A Risk
Typology
Market Risk
Credit Risk
Liquidity Risk
Operational
Risk
Legal &
Regulatory
Risk
Business
Risk
Strategic
Risk
Reputation
Risk
So what do we mean by “risk”?
• The best companies manage
risk by taking a holistic view
of all risks faced by the
enterprise
• Once risk factors are
understood, businesses run,
and regularly re-run, risk
assessments of each risk
factor
• Risk assessments used to
evolve systematic
procedures to reduce
likelihood and impact of key
risk factors
A Risk
Typology
Market
Risk
Credit
Risk
Liquidity
Risk
Operational
Risk
• Fraud
• Inefficiency
Legal &
Regulatory
Risk
• Compliance
failure
Business
Risk
Strategic
Risk
Reputation
Risk
So what do we mean by “risk”?
• The best companies manage
risk by taking a holistic view
of all risks faced by the
enterprise
• Once risk factors are
understood, businesses run,
and regularly re-run, risk
assessments of each risk
factor
• Risk assessments used to
evolve systematic
procedures to reduce
likelihood and impact of key
risk factors
Some key FinTech risks
Fraud
• The annual cost of fraud to the UK economy is huge
• Fraud losses can damage, cripple and kill companies
• Too many think fraud only happens to the guy next door
Operational Inefficiency
• Must be efficient to compete, survive & maximise returns
• Back-office processes often lag behind revenue growth and create performance
drag
Compliance Failure
• Severe penalties for compliance failure in regulated businesses
• Reputation damage can be severe
Opportunity:
aggregate and leverage data
to reduce these risks
£52bn
So what data should you leverage?
Real-time lookup
& risk scoring
Your Internal
Data
Fraud Markers
& Watchlists
Best of breed
commercial data
People & Companies
Law
Enforcement
Intelligence
Open Source data
You’d be amazed!
Fraud Forums,
Trade Associations
& Peers
Shared intelligence
Your
Internal
Systems
Why? – To reduce risks
• Improve compliance
• Reduce fraud
• Improve efficiency
• Lower IT, data & other costs
• Protect reputation
At Contego we aggregate everything we can
The Contego solution
Goal: tap into the universe of data to bring efficiency and certainty
to clients seeking to reduce risk
• Aggregate best-of-breed data on people, companies & other entities
• Provide real time due diligence & risk scoring
• Enhanced KYC, Identity Verification & ID document checks
• Case management module & encrypted cloud storage
• Clients select any combination of:
• SaaS Console for management & manual checks
• API for full integration into client systems
• Customised & branded onboarding forms
Contego Case Study: Regus
Requirements
• Compliance: with Money Laundering Regulations & London Local Authorities Act
• Fraud: detection of high risk & fraudulent new clients
• Efficiency: improve efficiency of client onboarding & compliance processes
• Intelligence sharing: screen against trade association & law enforcement intelligence
Solution
• Customised application form for all clients (limited company, sole trader, etc)
• Automated risk scoring, identity verification & compliance checks
• Management console to process “refer” results & perform deeper due diligence
• Secure upload, scanning & storage of ID documents as part of “compliance pack”
Aggregated Data used to reduce
Operational, Regulatory & Reputation Risk
A final word: Intelligence Sharing
• We know that sharing intelligence reduces collective risk
• Law Enforcement Agencies will share intelligence to reduce harm
• Preventing fraud, money laundering & terrorist financing counts
• Data Protection Act is not a barrier if data used & handled correctly
• DPA is wrongly used as an excuse not to share intelligence
• Using a trusted partner can help
• To analyse & transform data into actionable intelligence
• To ensure information security to a certifiable level
• Encryption & other security measures are important
• Reciprocal intelligence sharing benefits all participants
• It’s not a zero-sum game
So don’t hoard intelligence:
Share it for the collective good!
Thank you – any questions?
adrian@contego.com
Adrian Black
Contego: Manual Console

Contenu connexe

Tendances

Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Steve Hazan
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Avoiding compliance pitfalls
Avoiding compliance pitfallsAvoiding compliance pitfalls
Avoiding compliance pitfallsGary Allemann
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
BKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingBKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingMojoFinancial
 
Deloitte Dbriefs Program Guide | April - June 2014
Deloitte Dbriefs   Program Guide | April - June 2014Deloitte Dbriefs   Program Guide | April - June 2014
Deloitte Dbriefs Program Guide | April - June 2014Franco Ferrario
 
AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck ZIGRAM
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceBillyCheuk
 

Tendances (12)

BSW Family of Services
BSW Family of Services BSW Family of Services
BSW Family of Services
 
Legal Trends for Solo Business Growth Beyond COVID
Legal Trends for Solo Business Growth Beyond COVIDLegal Trends for Solo Business Growth Beyond COVID
Legal Trends for Solo Business Growth Beyond COVID
 
Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Avoiding compliance pitfalls
Avoiding compliance pitfallsAvoiding compliance pitfalls
Avoiding compliance pitfalls
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
BKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingBKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic Accounting
 
Deloitte Dbriefs Program Guide | April - June 2014
Deloitte Dbriefs   Program Guide | April - June 2014Deloitte Dbriefs   Program Guide | April - June 2014
Deloitte Dbriefs Program Guide | April - June 2014
 
AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck
 
Presentation
PresentationPresentation
Presentation
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 

En vedette

North Capital Overview
North Capital OverviewNorth Capital Overview
North Capital Overviewdowdjim
 
KPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for ChangeKPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for ChangeNanda Thiruvengadam
 
ModelDrivers the BCBS239 agile data management framework
ModelDrivers the BCBS239 agile data management frameworkModelDrivers the BCBS239 agile data management framework
ModelDrivers the BCBS239 agile data management frameworkGreg Soulsby
 
Implementing bcbs 239 rdarr
Implementing bcbs 239 rdarrImplementing bcbs 239 rdarr
Implementing bcbs 239 rdarrmzahidgill
 
BCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data AdequacyBCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data Adequacynikatmalik
 
Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239Craig Milroy
 
Second line of defense - advantages and set up
Second line of defense - advantages and set up Second line of defense - advantages and set up
Second line of defense - advantages and set up Jim McClanahan
 
Pp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and controlPp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and controlErwin Morales
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...rahmatmoelyana
 
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Craig Milroy
 

En vedette (12)

North Capital Overview
North Capital OverviewNorth Capital Overview
North Capital Overview
 
Contegofirebarrier Intumescent Latex
Contegofirebarrier Intumescent LatexContegofirebarrier Intumescent Latex
Contegofirebarrier Intumescent Latex
 
KPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for ChangeKPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for Change
 
ModelDrivers the BCBS239 agile data management framework
ModelDrivers the BCBS239 agile data management frameworkModelDrivers the BCBS239 agile data management framework
ModelDrivers the BCBS239 agile data management framework
 
Implementing bcbs 239 rdarr
Implementing bcbs 239 rdarrImplementing bcbs 239 rdarr
Implementing bcbs 239 rdarr
 
BCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data AdequacyBCBS 239 - Risk Data Adequacy
BCBS 239 - Risk Data Adequacy
 
Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239
 
Second line of defense - advantages and set up
Second line of defense - advantages and set up Second line of defense - advantages and set up
Second line of defense - advantages and set up
 
Pp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and controlPp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and control
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
 
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
 
Bcbs 239 v4 30 oct
Bcbs 239 v4 30 octBcbs 239 v4 30 oct
Bcbs 239 v4 30 oct
 

Similaire à Contego Fraud Solutions Ltd fin tech week 2014

Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013Nidhi Gupta
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013Nidhi Gupta
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingAndrew Topa
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013Nidhi Gupta
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introductionNidhi Gupta
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013Nidhi Gupta
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)Sam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Nidhi Gupta
 

Similaire à Contego Fraud Solutions Ltd fin tech week 2014 (20)

Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions Consulting
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 

Dernier

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Contego Fraud Solutions Ltd fin tech week 2014

  • 1. Data and Risk Management: A Match Made in FinTech Adrian Black: CEO, Contego Fraud Solutions Ltd 27 March 2014
  • 3. A Risk Typology Market Risk Credit Risk Liquidity Risk Operational Risk Legal & Regulatory Risk Business Risk Strategic Risk Reputation Risk So what do we mean by “risk”? • The best companies manage risk by taking a holistic view of all risks faced by the enterprise • Once risk factors are understood, businesses run, and regularly re-run, risk assessments of each risk factor • Risk assessments used to evolve systematic procedures to reduce likelihood and impact of key risk factors
  • 4. A Risk Typology Market Risk Credit Risk Liquidity Risk Operational Risk • Fraud • Inefficiency Legal & Regulatory Risk • Compliance failure Business Risk Strategic Risk Reputation Risk So what do we mean by “risk”? • The best companies manage risk by taking a holistic view of all risks faced by the enterprise • Once risk factors are understood, businesses run, and regularly re-run, risk assessments of each risk factor • Risk assessments used to evolve systematic procedures to reduce likelihood and impact of key risk factors
  • 5. Some key FinTech risks Fraud • The annual cost of fraud to the UK economy is huge • Fraud losses can damage, cripple and kill companies • Too many think fraud only happens to the guy next door Operational Inefficiency • Must be efficient to compete, survive & maximise returns • Back-office processes often lag behind revenue growth and create performance drag Compliance Failure • Severe penalties for compliance failure in regulated businesses • Reputation damage can be severe Opportunity: aggregate and leverage data to reduce these risks £52bn
  • 6. So what data should you leverage? Real-time lookup & risk scoring Your Internal Data Fraud Markers & Watchlists Best of breed commercial data People & Companies Law Enforcement Intelligence Open Source data You’d be amazed! Fraud Forums, Trade Associations & Peers Shared intelligence Your Internal Systems Why? – To reduce risks • Improve compliance • Reduce fraud • Improve efficiency • Lower IT, data & other costs • Protect reputation
  • 7. At Contego we aggregate everything we can
  • 8. The Contego solution Goal: tap into the universe of data to bring efficiency and certainty to clients seeking to reduce risk • Aggregate best-of-breed data on people, companies & other entities • Provide real time due diligence & risk scoring • Enhanced KYC, Identity Verification & ID document checks • Case management module & encrypted cloud storage • Clients select any combination of: • SaaS Console for management & manual checks • API for full integration into client systems • Customised & branded onboarding forms
  • 9. Contego Case Study: Regus Requirements • Compliance: with Money Laundering Regulations & London Local Authorities Act • Fraud: detection of high risk & fraudulent new clients • Efficiency: improve efficiency of client onboarding & compliance processes • Intelligence sharing: screen against trade association & law enforcement intelligence Solution • Customised application form for all clients (limited company, sole trader, etc) • Automated risk scoring, identity verification & compliance checks • Management console to process “refer” results & perform deeper due diligence • Secure upload, scanning & storage of ID documents as part of “compliance pack” Aggregated Data used to reduce Operational, Regulatory & Reputation Risk
  • 10. A final word: Intelligence Sharing • We know that sharing intelligence reduces collective risk • Law Enforcement Agencies will share intelligence to reduce harm • Preventing fraud, money laundering & terrorist financing counts • Data Protection Act is not a barrier if data used & handled correctly • DPA is wrongly used as an excuse not to share intelligence • Using a trusted partner can help • To analyse & transform data into actionable intelligence • To ensure information security to a certifiable level • Encryption & other security measures are important • Reciprocal intelligence sharing benefits all participants • It’s not a zero-sum game So don’t hoard intelligence: Share it for the collective good!
  • 11. Thank you – any questions? adrian@contego.com Adrian Black

Notes de l'éditeur

  1. Reputation damage is often a bigger blow that the fraud loss SME and high growth business run higher risks as their systems lag