SlideShare une entreprise Scribd logo
1  sur  47
Fair Isaac, Falcon Fraud Manager  and Debit Card Fraud Ryan Ganji Falcon Product Management Global Fraud Solutions [email_address]
[object Object],[object Object],[object Object],[object Object],[object Object],© 2008 Fair Isaac Corporation. Confidential. Agenda
We make decisions smarter Fair Isaac is the leader in  Enterprise Decision Management  powered by advanced analytics #1 in Worldwide Analytic Applications Software Revenue
Among our clients 4000
[object Object],[object Object],[object Object],[object Object],[object Object],© 2008 Fair Isaac Corporation. Confidential. Agenda
Fair Isaac Fraud Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fair Isaac Card Fraud Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fair Isaac’s Falcon Software Has Contributed To The Industry’s Success Combating Fraud U.S. fraud losses, as a percentage of sales, have declined from a peak level of over 18 basis points in 1992,  to 6.25 basis point in 2005 Falcon Introduced Credit Card Fraud Source: Nilson data
[object Object],[object Object],[object Object],[object Object],[object Object],© 2008 Fair Isaac Corporation. Confidential. Agenda
Fraud’s Four Key Dimensions Deposit Account Securities Loans Criminal Employee Criminal Outsider ATM POS Teller Window Telebanking and Call Center PC Account File Changes Info Gathering Account Debit Account Credit Mail Account Opening Mobile Credit Card Criminals Products Access Methods Activity Customer
Growing Complexity, Changing Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fair Isaac Protects the Whole Lifecycle Account Opening Account Access Real-time Monitor and Response Suspect Case Management Investigations Recovery Fair Isaac Fraud Solutions Lost and Stolen First Party Identity Theft Flash Fraud Cross-Channel Cross-Line Phishing Employee Collusion Hacking Fraud in New Markets Counterfeit Mass Compromise Premeditated Credit Abuse
[object Object],[object Object],[object Object],[object Object],[object Object],© 2008 Fair Isaac Corporation. Confidential. Agenda
Fair Isaac Falcon Fraud Manager Solution
Protecting Against Payment Card Losses Sophisticated Analytics Case Management Patented Profiles Rules Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Falcon ®  Fraud Manager ,[object Object],[object Object],[object Object],[object Object],[object Object]
Account Holder Profile ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Makes a Good Fraud Management Solution? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Analytics Focus effort on transactions with highest likelihood of fraud Good transactions Fraud transactions No protection  – fraud/good transactions mixed and difficult to identify Rules-based solution - some fraud captured, but much  is missed and still lot of good transactions captured as well Analytics-based solution  – most of fraud captured, with minimal good transactions
Fraud Accounts Score Higher Score Range Illustrative Score Distribution and Detection Rates Fraud Accounts Non-Fraud Accounts
Falcon Fraud Manager 6.0  The Next Generation Enables Multiple Profiles Per Transaction ,[object Object],[object Object],[object Object]
Multiple Profiles and Fraud Detection – Cont’d ,[object Object],[object Object],[object Object]
Profiling Advancements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Patented Profiling System $ $ $ $ * $ $ # $ Falcon Profiling System Deposits Non-monetary Transactions ATM & POS Authorizations Customer Master Changes # Updated Profile To models
Analytic   Advancements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Fraud Open Platform Bank Data Warehouse Online Banking &  Telephony Access Branch ACH & Wire  Transfers Application Originations Credit Card Transactions Channel Models, Rules, Profiles Scoring Module Source Systems Bill Pay Checks On us & Deposits Customer Model, Merchant Model, Rules, Profiles Research  Module Modules Control APIs, rules, queues, hotlists Management  Module Mobile Payments Fraud  Risk Research Analysis & Investigations  Debit Card Transactions Third-Party Case Intervention Case Database Case Module Intervention Case Database 3 rd  Party Data Third-Party Detection Engine Consortium Outlier Bank Third-Party … Acquirer
[object Object],[object Object],[object Object],[object Object],[object Object],© 2008 Fair Isaac Corporation. Confidential. Agenda
Falcon Fraud Manager for Debit
Incidence of Debit Fraud Growing INCIDENCE RATES FOR EXISTING CARD FRAUD BY TYPE Source: Javelin Strategy & Research, 2008 Identity Fraud Report
Amount of Debit Fraud Increasing TOTAL ANNUAL FRAUD AMOUNTS FOR EXISTING CARD FRAUD BY TYPE $ Billion Source: Javelin Strategy & Research, 2008 Identity Fraud Report
Today’s Fraud –  A Convergence of Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],Signature- Based POS Fraud PIN-Based POS Fraud ATM Fraud Deposit Fraud VIA Debit Card
Debit PIN Fraud Trends ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Debit Fraud? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Debit PIN Fraud Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PIN Points of Compromise Source: Fair Isaac CardAlert Fraud Manager PIN Points of Compromise 2001-2007 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2001 2002 2003 2004 2005 2006 2007 ATM-Bank ATM -NonBank POS
POS Compromises ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2007 POS Points of Compromise
ATM Compromises ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATM Points of Compromise Source: Fair Isaac CardAlert Fraud Manager
2007 FI ATM Points of Compromise
ATM/POS Profiling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Predictive Lift from Device Profiling 80% relative performance lift   in real-time value detection at a 10-to-1 false positive rate for Debit Cash Transactions Cardholder + ATM Profiles Cardholder Profiles
Predictive Lift from Merchant Profiles 40% relative performance lift   in real-time value detection at a 10-to-1 false positive rate Cardholder + Merchant Profiles Cardholder Profiles
Conclusions
Falcon ®  Fraud Manager Reduces Fraud Losses ,[object Object],[object Object],[object Object]
Falcon ®  Fraud Manager Reduces Fraud Losses ,[object Object],[object Object]
Working Together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU

Contenu connexe

En vedette

Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
Fraud presentation
Fraud presentationFraud presentation
Fraud presentationborusie2
 
Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamPaul Denhup
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactionsvincentg64
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Shareapulvermache
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud programchris75308
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...NAFCU Services Corporation
 
Fraud Detection Class Slides
Fraud Detection Class SlidesFraud Detection Class Slides
Fraud Detection Class SlidesMax De Marzi
 
Alternative channels of banking
Alternative channels of bankingAlternative channels of banking
Alternative channels of bankingRavi Arora
 

En vedette (18)

Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
Fraud presentation
Fraud presentationFraud presentation
Fraud presentation
 
Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_Spam
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactions
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Share
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Debit Cards
Debit CardsDebit Cards
Debit Cards
 
debit cards
debit cardsdebit cards
debit cards
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Axis Bank
Axis BankAxis Bank
Axis Bank
 
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...
Enhancing Debit Card Security: The Life of a Counterfeit Card (Credit Union C...
 
Fraud Detection Class Slides
Fraud Detection Class SlidesFraud Detection Class Slides
Fraud Detection Class Slides
 
Alternative channels of banking
Alternative channels of bankingAlternative channels of banking
Alternative channels of banking
 

Similaire à Falcon 012009

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Office Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsOffice Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsMike Walker
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudKyriba Corporation
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataTyler Hannan
 
AI in Finance, background material of Aalto Fintech Seminar, fall 2019
AI in Finance, background material of Aalto Fintech Seminar, fall 2019AI in Finance, background material of Aalto Fintech Seminar, fall 2019
AI in Finance, background material of Aalto Fintech Seminar, fall 2019Ruth Kaila
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...DataWorks Summit
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseLaurent Pacalin
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...Opus
 
Online Trading
Online TradingOnline Trading
Online Tradingkoolzub
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detectionconfluent
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 

Similaire à Falcon 012009 (20)

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Office Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAsOffice Developers Conference - Financial Services OBAs
Office Developers Conference - Financial Services OBAs
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
Karza Technologies
Karza TechnologiesKarza Technologies
Karza Technologies
 
AI in Finance, background material of Aalto Fintech Seminar, fall 2019
AI in Finance, background material of Aalto Fintech Seminar, fall 2019AI in Finance, background material of Aalto Fintech Seminar, fall 2019
AI in Finance, background material of Aalto Fintech Seminar, fall 2019
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
Online Trading
Online TradingOnline Trading
Online Trading
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detection
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 

Dernier

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Dernier (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Falcon 012009

  • 1. Fair Isaac, Falcon Fraud Manager and Debit Card Fraud Ryan Ganji Falcon Product Management Global Fraud Solutions [email_address]
  • 2.
  • 3. We make decisions smarter Fair Isaac is the leader in Enterprise Decision Management powered by advanced analytics #1 in Worldwide Analytic Applications Software Revenue
  • 5.
  • 6.
  • 7.
  • 8. Fair Isaac’s Falcon Software Has Contributed To The Industry’s Success Combating Fraud U.S. fraud losses, as a percentage of sales, have declined from a peak level of over 18 basis points in 1992, to 6.25 basis point in 2005 Falcon Introduced Credit Card Fraud Source: Nilson data
  • 9.
  • 10. Fraud’s Four Key Dimensions Deposit Account Securities Loans Criminal Employee Criminal Outsider ATM POS Teller Window Telebanking and Call Center PC Account File Changes Info Gathering Account Debit Account Credit Mail Account Opening Mobile Credit Card Criminals Products Access Methods Activity Customer
  • 11.
  • 12. Fair Isaac Protects the Whole Lifecycle Account Opening Account Access Real-time Monitor and Response Suspect Case Management Investigations Recovery Fair Isaac Fraud Solutions Lost and Stolen First Party Identity Theft Flash Fraud Cross-Channel Cross-Line Phishing Employee Collusion Hacking Fraud in New Markets Counterfeit Mass Compromise Premeditated Credit Abuse
  • 13.
  • 14. Fair Isaac Falcon Fraud Manager Solution
  • 15.
  • 16.
  • 17.
  • 18. Benefits of Analytics Focus effort on transactions with highest likelihood of fraud Good transactions Fraud transactions No protection – fraud/good transactions mixed and difficult to identify Rules-based solution - some fraud captured, but much is missed and still lot of good transactions captured as well Analytics-based solution – most of fraud captured, with minimal good transactions
  • 19. Fraud Accounts Score Higher Score Range Illustrative Score Distribution and Detection Rates Fraud Accounts Non-Fraud Accounts
  • 20.
  • 21.
  • 22.
  • 23. Patented Profiling System $ $ $ $ * $ $ # $ Falcon Profiling System Deposits Non-monetary Transactions ATM & POS Authorizations Customer Master Changes # Updated Profile To models
  • 24.
  • 25. Enterprise Fraud Open Platform Bank Data Warehouse Online Banking & Telephony Access Branch ACH & Wire Transfers Application Originations Credit Card Transactions Channel Models, Rules, Profiles Scoring Module Source Systems Bill Pay Checks On us & Deposits Customer Model, Merchant Model, Rules, Profiles Research Module Modules Control APIs, rules, queues, hotlists Management Module Mobile Payments Fraud Risk Research Analysis & Investigations Debit Card Transactions Third-Party Case Intervention Case Database Case Module Intervention Case Database 3 rd Party Data Third-Party Detection Engine Consortium Outlier Bank Third-Party … Acquirer
  • 26.
  • 27. Falcon Fraud Manager for Debit
  • 28. Incidence of Debit Fraud Growing INCIDENCE RATES FOR EXISTING CARD FRAUD BY TYPE Source: Javelin Strategy & Research, 2008 Identity Fraud Report
  • 29. Amount of Debit Fraud Increasing TOTAL ANNUAL FRAUD AMOUNTS FOR EXISTING CARD FRAUD BY TYPE $ Billion Source: Javelin Strategy & Research, 2008 Identity Fraud Report
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. PIN Points of Compromise Source: Fair Isaac CardAlert Fraud Manager PIN Points of Compromise 2001-2007 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2001 2002 2003 2004 2005 2006 2007 ATM-Bank ATM -NonBank POS
  • 35.
  • 36. 2007 POS Points of Compromise
  • 37.
  • 38. ATM Points of Compromise Source: Fair Isaac CardAlert Fraud Manager
  • 39. 2007 FI ATM Points of Compromise
  • 40.
  • 41. Predictive Lift from Device Profiling 80% relative performance lift in real-time value detection at a 10-to-1 false positive rate for Debit Cash Transactions Cardholder + ATM Profiles Cardholder Profiles
  • 42. Predictive Lift from Merchant Profiles 40% relative performance lift in real-time value detection at a 10-to-1 false positive rate Cardholder + Merchant Profiles Cardholder Profiles
  • 44.
  • 45.
  • 46.

Notes de l'éditeur

  1. Page