SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
SAS FRAUD FRAMEWORK FOR INSURANCE
                                                                                                MORE INFORMATION




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
GLOBAL INSURANCE CLAIMS FRAUD


                                      •                     US Insurance Information Institute estimate $30 billion losses annually; about 10% incurred losses and loss
                                                            adjustment expenses


                                      •                     FBI estimate costs $40+ billion per annum; costing between $400 and $700 in extra premiums


                                      •                     Insurance Council of Australia estimates that between 10 and 15% of insurance claims across of lines exhibit
                                                            elements of fraud


                                      •                     Swedish Association estimate that 5 to 10% of claims include fraud


                                       •                     ALFA estimate that fraud 15% of claims paid, or 4-8% of premiums collected equating to €2.5bn per annum


                                       •                     ABI estimates that undetected fraud = £2.1bn adding about £50 to average premium


                                       •                     South Africa Insurance Crime Bureau estimate that 30% of short term insurance claims include fraud


                                       •                     Swiss Insurance Association estimate that 10% of claims paid are fraudulent


                                       •                     German Insurance Association estimates that fraud costs circa €4bn per annum



C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
THE SHIFTING LANDSCAPE OF INSURANCE FRAUD



                              Insurance fraud is on the rise & today’s schemes are:
                                  • Increasingly sophisticated
                                  • More agile
                                  • Higher velocity
                                  • Cross industry
                                  • Influenced by regulatory & political climate




                                                                                                Yesterday’s methods are insufficient
                                                                                                to address today’s fraud risk!


C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
BUSINESS ANALYTICS AND FRAUD DETECTION


                                                           Allows insurers to identify ‘suspicious cases’


                                                           Works underneath the insurers existing processes


                                                           Does not replace expertise of claims team members but ensures cases
                                                            are not missed


                                                           Allows insurers to detect fraud by multi-dimensions
                                                                   Case-by-case
                                                                   Repeat
                                                                   Organised rings




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
FRAMEWORK-BASED
                       END-TO-END SOLUTION
             APPROACH




                 Data                                                                           Detection             Reporting                Administration
                 • Structured &                                                                 • Business Rules      • Advanced Ranking       • Self administered
                   Unstructured Data                                                            • Anomaly Detection     Technology             • Custom alert queues
                   Sources                                                                                            • Easy to use web
                                                                                                • Advanced                                     • Alert suppression &
                 • Batch or real time                                                             Predictive Models     based interface          routing rules
                   processing                                                                                         • Advanced Query
                                                                                                • Watch Lists                                  • Workflow analysis
                 • Data Cleansing                                                                                       of integrated data
                                                                                                • Social Network                               • Direct integration
                 • Data Integration                                                               Analysis            • Full business            with Case
                 • Variable Extraction                                                                                  intelligence             Management
                                                                                                • Network-level         reporting capability
                   & Sentiment                                                                    analytics
                   Analysis with Text                                                                                 • Claim system
                   Mining                                                                       • Hybrid Technology     integration




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
FRAUD ANALYTICS USING A HYBRID APPROACH FOR FRAUD DETECTION




                                                                                                                                       Text
                                                                                                                                       Mining
                                                                                                                                                  Database
                                                                                                        Predictive                                Searches
                                                                                                        Modeling



                                          Anomaly
                                          Detection


                                                                                                Automated             Analytic
                                                                                                Business Rules       Decisioning
                                                                                                                       Engine
                                                                                                                                                        Social
                                                                                                                                                        Network
                                                                                                                                                        Analysis



                                                                                                LEVERAGING SAS HYBRID APPROACH TO SCORE TRANSACTIONS,
                                                                                                 ENTITIES, AND NETWORKS ACROSS MULTIPLE ORGANIZATIONS




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
AUTOMATED
                                          KNOWN PATTERNS
                           BUSINESS RULES


                                    •         Automates manual processes

                                    •         Operationalize traditional “red flags” or
                                              suspicious loss indicators

                                    •         Effective regardless of adjuster
                                              training or experience level

                                    •         Administered by business

                                    •         Catch suspicious claims that would
                                              “fall through the cracks”




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
DATABASE
                                                                          KNOWN FRAUD
                                                                SEARCHING


                                    •         Match against data already held on file
                                              •          Known customer
                                              •          Watch or Hot-list


                                    •         Match at household level

                                    •         ‘Supplier’ watch list
                                              •          Doctors, treatment centres, garages,
                                                         agents, lawyers etc.


                                    •         Country insurance industry co-
                                              operatives

                                    •         Other external databases

                                    •         Data protection issues?




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
ANOMALY
                                                                           UNKNOWN PATTERNS
                                                                 DETECTION


                                    •         Use when no known target exists

                                    •         Examine current behavior to identify
                                              outliers and abnormal transactions that
                                              are somewhat different from ordinary
                                              transactions

                                    •         Include univariate and multivariate
                                              outlier detection techniques, such as
                                              peer group comparison, clustering,
                                              trend analysis, and so on




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
PREDICTIVE
                                                                         COMPLEX PATTERNS
                                                               MODELING


                                    •         Base: uses confirmed fraud cases
                                                                                                Fraud Scores


                                    •         Use historical behavioral information of
                                              known fraud to identify suspicious                                            Predicted
                                              behaviors similar to previous fraud                                           Fraud Scores
                                                                                                      Claims   # of previous
                                                                                                               investigations
                                              patterns

                                    •         Result – fraud risk score

                                    •         Include multiple modeling techniques,
                                              such as regression analysis,
                                              generalized linear models, decision
                                              tree, neural networks etc.




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
SOCIAL NETWORK
                                      ASSOCIATIVE LINK PATTERNS
                             ANALYSIS


                                    •         Detect unexplained relationships

                                    •         Data Linking Analysis
                                              •          Nodes = individuals, policies, claims,
                                                         addresses, telephone numbers, repairers
                                                         (garages), medical providers, lawyers,
                                                         employees, bank accounts etc.
                                              •          Links


                                    •         Scoring: Rule and analytic-based

                                    •         Modeling techniques
                                              •          Sequence analysis
                                              •          Path analysis
                                              •          Fuzzy matching




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
TEXT MINING UNSTRUCTURED PATTERNS


                                    •         Up to 80% of insurer data is
                                              unstructured text
                                              •          Adjuster notes
                                              •          Call centre logs etc.


                                    •         Configurable parsing, tagging, and
                                              extracting of free text for use in fraud
                                              analytics

                                    •         Combine quantitative and qualitative
                                              data with text analysis to improve
                                              predictions




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CASE MANAGEMENT


                                    •         Single portal for holistic view of fraud –
                                              can see both current and historical
                                              cases

                                    •         Enables Investigation Unit to:
                                              •          Manage investigation workflows
                                              •          Attach documents and digital files
                                              •          Record exposures and losses
                                              •          Utilize dashboards and management
                                                         reporting
                                              •          Track operational performance




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
FINANCIAL CRIMES
                       MONITOR


                                    •         Logically manage your rules, models
                                              and alerts for investigators

                                    •         Maintain simple or complex routing
                                              and suppression rules

                                    •         Manage analytical table, project,
                                              scenario and scenario group
                                              relationships




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
MAKING LIFE
                                                           EASIER




       Establish                                                                       Query     Rank &       Combine &    Analysis   Decision            Final
        Search                                                                        Various   Prioritize    Synthesize      of         to             Analysis &
      Parameters                                                                      Systems    Results     Information   Findings   Proceed?          Summary




                                     Framework-Based Predictive Analytics                                                        Analytical Value-Add




                          “What used to take me most of a day, now takes 10 minutes.”
                          “It completely streamlines where we need to go.”
                                                                                                                                                   -SIU Analyst




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
CUSTOMER STORY                                                                       CNA (US)



                                                                                                    Business Problem
                                                                                                    • Detect and prevent fraud in four separate commercial
                                                                                                       lines of business
        Customer Quote                                                                              • Optimally direct its investigation resources on cases with
                                                                                                       higher likelihood of fraud
        We have an excellent
        partnership with SAS.
        They took the time to                                                                       Solution
        meet with us and truly
        understand the nuances                                                                      • SAS Fraud Framework for Insurance
        of CNA so that we could
        build effective predictive
        models for each line of
        our business                                                                                Results
                                                                                                    • $2.1m in fraud recovery / prevention within the first 9
        Tim Wolfe, SIU Director                                                                        months of implementation

                                                                                                    • Detection and investigation of 15 potentially fraudulent
                                                                                                       provider networks – four times what CNA anticipated



C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
WHY SAS?
                                              More suspicious cases identified
                                               •          Including both previously undetected fraudulent networks and extensions to already identified
                                                          fraud

                                                                          “We discovered that 5% of its claims pay-outs were fraudulent, and these can now be
                                                                          corrected and prevented in the future."
                                                                          Assistant General Manager, Market Leader, Southern Europe



                                              Reduction in false positive rates
                                               •          Significant improvement in ‘quality’ of suspicious cases past for investigation
                                                                           “84% of the claims flagged as possibly fraudulent, turned out to be fraud. A 69 % uplift in
                                                                           suspicious claim detection compared with the old system.."
                                                                           SIU Manager, Major Tier 1 USA Insurer



                                              Improved investigation efficiency
                                               •          Each referral taking 1/2 – 1/3 the time to investigate using SAS’ link analysis visualization

                                                                           “What used to take me most of a day, now takes 10 minutes.’’
                                                                           SIU Manager, Major Tier 1 USA Insurer




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
MORE
                                                INFORMATION



                                       •          Contact information:
                                                   Stuart Rose, SAS Global Insurance Marketing Director
                                                   e-mail: Stuart.rose@sas.com
                                                   Blog: Analytic Insurer
                                                   Twitter: @stuartdrose

                                              • White Papers:
                                                 Combatting Insurance Claims Fraud
                                                 Insurance Fraud Race
                                              • Research:
                                                 State of Insurance Fraud Technology

C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
THANK YOU




C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .               www.SAS.com

Contenu connexe

Tendances

Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
Databricks
 
Exadata and the Oracle Optimizer: The Untold Story
Exadata and the Oracle Optimizer: The Untold StoryExadata and the Oracle Optimizer: The Untold Story
Exadata and the Oracle Optimizer: The Untold Story
Enkitec
 
RedisConf18 - Migrating from Coherence to Redis
RedisConf18 - Migrating from Coherence to RedisRedisConf18 - Migrating from Coherence to Redis
RedisConf18 - Migrating from Coherence to Redis
Redis Labs
 
Oracle SQL Performance Tuning and Optimization v26 chapter 1
Oracle SQL Performance Tuning and Optimization v26 chapter 1Oracle SQL Performance Tuning and Optimization v26 chapter 1
Oracle SQL Performance Tuning and Optimization v26 chapter 1
Kevin Meade
 
Scalable crawling with Kafka, scrapy and spark - November 2021
Scalable crawling with Kafka, scrapy and spark - November 2021Scalable crawling with Kafka, scrapy and spark - November 2021
Scalable crawling with Kafka, scrapy and spark - November 2021
Max Lapan
 

Tendances (20)

OSA Con 2022 - Switching Jaeger Distributed Tracing to ClickHouse to Enable A...
OSA Con 2022 - Switching Jaeger Distributed Tracing to ClickHouse to Enable A...OSA Con 2022 - Switching Jaeger Distributed Tracing to ClickHouse to Enable A...
OSA Con 2022 - Switching Jaeger Distributed Tracing to ClickHouse to Enable A...
 
Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
Using AI to Build a Self-Driving Query Optimizer with Shivnath Babu and Adria...
 
Exadata and the Oracle Optimizer: The Untold Story
Exadata and the Oracle Optimizer: The Untold StoryExadata and the Oracle Optimizer: The Untold Story
Exadata and the Oracle Optimizer: The Untold Story
 
NoSql
NoSqlNoSql
NoSql
 
Amazon Aurora Storage Demystified: How It All Works (DAT363) - AWS re:Invent ...
Amazon Aurora Storage Demystified: How It All Works (DAT363) - AWS re:Invent ...Amazon Aurora Storage Demystified: How It All Works (DAT363) - AWS re:Invent ...
Amazon Aurora Storage Demystified: How It All Works (DAT363) - AWS re:Invent ...
 
Redo log improvements MYSQL 8.0
Redo log improvements MYSQL 8.0Redo log improvements MYSQL 8.0
Redo log improvements MYSQL 8.0
 
Troubleshooting Complex Oracle Performance Problems with Tanel Poder
Troubleshooting Complex Oracle Performance Problems with Tanel PoderTroubleshooting Complex Oracle Performance Problems with Tanel Poder
Troubleshooting Complex Oracle Performance Problems with Tanel Poder
 
Capacity Planning For Your Growing MongoDB Cluster
Capacity Planning For Your Growing MongoDB ClusterCapacity Planning For Your Growing MongoDB Cluster
Capacity Planning For Your Growing MongoDB Cluster
 
Building a Scalable Record Linkage System with Apache Spark, Python 3, and Ma...
Building a Scalable Record Linkage System with Apache Spark, Python 3, and Ma...Building a Scalable Record Linkage System with Apache Spark, Python 3, and Ma...
Building a Scalable Record Linkage System with Apache Spark, Python 3, and Ma...
 
Part1 of SQL Tuning Workshop - Understanding the Optimizer
Part1 of SQL Tuning Workshop - Understanding the OptimizerPart1 of SQL Tuning Workshop - Understanding the Optimizer
Part1 of SQL Tuning Workshop - Understanding the Optimizer
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
 
MyRocks Deep Dive
MyRocks Deep DiveMyRocks Deep Dive
MyRocks Deep Dive
 
RedisConf18 - Migrating from Coherence to Redis
RedisConf18 - Migrating from Coherence to RedisRedisConf18 - Migrating from Coherence to Redis
RedisConf18 - Migrating from Coherence to Redis
 
Oracle SQL Performance Tuning and Optimization v26 chapter 1
Oracle SQL Performance Tuning and Optimization v26 chapter 1Oracle SQL Performance Tuning and Optimization v26 chapter 1
Oracle SQL Performance Tuning and Optimization v26 chapter 1
 
Real-Time Streaming Data Solution on AWS with Beeswax
Real-Time Streaming Data Solution on AWS with BeeswaxReal-Time Streaming Data Solution on AWS with Beeswax
Real-Time Streaming Data Solution on AWS with Beeswax
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
 
추천시스템 구축을 위한 빅데이터 분석기법과 사례
추천시스템 구축을 위한 빅데이터 분석기법과 사례추천시스템 구축을 위한 빅데이터 분석기법과 사례
추천시스템 구축을 위한 빅데이터 분석기법과 사례
 
Performance Tuning And Optimization Microsoft SQL Database
Performance Tuning And Optimization Microsoft SQL DatabasePerformance Tuning And Optimization Microsoft SQL Database
Performance Tuning And Optimization Microsoft SQL Database
 
Containerizing a Data Warehouse for Kubernetes
Containerizing a Data Warehouse for KubernetesContainerizing a Data Warehouse for Kubernetes
Containerizing a Data Warehouse for Kubernetes
 
Scalable crawling with Kafka, scrapy and spark - November 2021
Scalable crawling with Kafka, scrapy and spark - November 2021Scalable crawling with Kafka, scrapy and spark - November 2021
Scalable crawling with Kafka, scrapy and spark - November 2021
 

En vedette

Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key lines
Cambridge Intelligence
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
Joseph Callahan
 

En vedette (20)

Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraud
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Big Data Needs Big Analytics
Big Data Needs Big AnalyticsBig Data Needs Big Analytics
Big Data Needs Big Analytics
 
Lecture 17 sas framework internal control - james a. hall book chapter 3
Lecture 17  sas framework internal control - james a. hall book chapter 3Lecture 17  sas framework internal control - james a. hall book chapter 3
Lecture 17 sas framework internal control - james a. hall book chapter 3
 
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
Decision CAMP 2013 - sako hidetoshi - blaze consulting japan - Using Business...
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniques
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key lines
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial Intelligence
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Active Learning for Fraud Prevention
Active Learning for Fraud PreventionActive Learning for Fraud Prevention
Active Learning for Fraud Prevention
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
 
SAS Customer Analytics for Insurance
SAS Customer Analytics for InsuranceSAS Customer Analytics for Insurance
SAS Customer Analytics for Insurance
 
Maximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceMaximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax Compliance
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 

Similaire à SAS Fraud Framework for Insurance

CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008IISYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
finance40
 
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008IISYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
finance40
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
Seema Sheth-Voss
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our World
BigDataViz
 
Predictive Analytics Innovation Summit
Predictive Analytics Innovation SummitPredictive Analytics Innovation Summit
Predictive Analytics Innovation Summit
Fractal Analytics
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
OracleIDM
 

Similaire à SAS Fraud Framework for Insurance (20)

Smarter Computing Big Data
Smarter Computing Big DataSmarter Computing Big Data
Smarter Computing Big Data
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
IBM Netezza - The data warehouse in a big data strategy
IBM Netezza - The data warehouse in a big data strategyIBM Netezza - The data warehouse in a big data strategy
IBM Netezza - The data warehouse in a big data strategy
 
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008IISYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
 
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008IISYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our World
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Lumension Security - State of Endpoint and Security DSS @Vilnius 2010
Lumension Security - State of Endpoint and Security DSS @Vilnius 2010Lumension Security - State of Endpoint and Security DSS @Vilnius 2010
Lumension Security - State of Endpoint and Security DSS @Vilnius 2010
 
TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012
 
Today's BI and Data Mining ecosystem
Today's BI and Data Mining ecosystemToday's BI and Data Mining ecosystem
Today's BI and Data Mining ecosystem
 
IBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv AnalysIBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Predictive Analytics Innovation Summit
Predictive Analytics Innovation SummitPredictive Analytics Innovation Summit
Predictive Analytics Innovation Summit
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
Strategic decision making using Big Data
Strategic decision making using Big DataStrategic decision making using Big Data
Strategic decision making using Big Data
 

SAS Fraud Framework for Insurance

  • 1. SAS FRAUD FRAMEWORK FOR INSURANCE MORE INFORMATION C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 2. GLOBAL INSURANCE CLAIMS FRAUD • US Insurance Information Institute estimate $30 billion losses annually; about 10% incurred losses and loss adjustment expenses • FBI estimate costs $40+ billion per annum; costing between $400 and $700 in extra premiums • Insurance Council of Australia estimates that between 10 and 15% of insurance claims across of lines exhibit elements of fraud • Swedish Association estimate that 5 to 10% of claims include fraud • ALFA estimate that fraud 15% of claims paid, or 4-8% of premiums collected equating to €2.5bn per annum • ABI estimates that undetected fraud = £2.1bn adding about £50 to average premium • South Africa Insurance Crime Bureau estimate that 30% of short term insurance claims include fraud • Swiss Insurance Association estimate that 10% of claims paid are fraudulent • German Insurance Association estimates that fraud costs circa €4bn per annum C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 3. THE SHIFTING LANDSCAPE OF INSURANCE FRAUD Insurance fraud is on the rise & today’s schemes are: • Increasingly sophisticated • More agile • Higher velocity • Cross industry • Influenced by regulatory & political climate Yesterday’s methods are insufficient to address today’s fraud risk! C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 4. BUSINESS ANALYTICS AND FRAUD DETECTION  Allows insurers to identify ‘suspicious cases’  Works underneath the insurers existing processes  Does not replace expertise of claims team members but ensures cases are not missed  Allows insurers to detect fraud by multi-dimensions  Case-by-case  Repeat  Organised rings C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 5. FRAMEWORK-BASED END-TO-END SOLUTION APPROACH Data Detection Reporting Administration • Structured & • Business Rules • Advanced Ranking • Self administered Unstructured Data • Anomaly Detection Technology • Custom alert queues Sources • Easy to use web • Advanced • Alert suppression & • Batch or real time Predictive Models based interface routing rules processing • Advanced Query • Watch Lists • Workflow analysis • Data Cleansing of integrated data • Social Network • Direct integration • Data Integration Analysis • Full business with Case • Variable Extraction intelligence Management • Network-level reporting capability & Sentiment analytics Analysis with Text • Claim system Mining • Hybrid Technology integration C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 6. FRAUD ANALYTICS USING A HYBRID APPROACH FOR FRAUD DETECTION Text Mining Database Predictive Searches Modeling Anomaly Detection Automated Analytic Business Rules Decisioning Engine Social Network Analysis LEVERAGING SAS HYBRID APPROACH TO SCORE TRANSACTIONS, ENTITIES, AND NETWORKS ACROSS MULTIPLE ORGANIZATIONS C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 7. AUTOMATED KNOWN PATTERNS BUSINESS RULES • Automates manual processes • Operationalize traditional “red flags” or suspicious loss indicators • Effective regardless of adjuster training or experience level • Administered by business • Catch suspicious claims that would “fall through the cracks” C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 8. DATABASE KNOWN FRAUD SEARCHING • Match against data already held on file • Known customer • Watch or Hot-list • Match at household level • ‘Supplier’ watch list • Doctors, treatment centres, garages, agents, lawyers etc. • Country insurance industry co- operatives • Other external databases • Data protection issues? C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 9. ANOMALY UNKNOWN PATTERNS DETECTION • Use when no known target exists • Examine current behavior to identify outliers and abnormal transactions that are somewhat different from ordinary transactions • Include univariate and multivariate outlier detection techniques, such as peer group comparison, clustering, trend analysis, and so on C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 10. PREDICTIVE COMPLEX PATTERNS MODELING • Base: uses confirmed fraud cases Fraud Scores • Use historical behavioral information of known fraud to identify suspicious Predicted behaviors similar to previous fraud Fraud Scores Claims # of previous investigations patterns • Result – fraud risk score • Include multiple modeling techniques, such as regression analysis, generalized linear models, decision tree, neural networks etc. C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 11. SOCIAL NETWORK ASSOCIATIVE LINK PATTERNS ANALYSIS • Detect unexplained relationships • Data Linking Analysis • Nodes = individuals, policies, claims, addresses, telephone numbers, repairers (garages), medical providers, lawyers, employees, bank accounts etc. • Links • Scoring: Rule and analytic-based • Modeling techniques • Sequence analysis • Path analysis • Fuzzy matching C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 12. TEXT MINING UNSTRUCTURED PATTERNS • Up to 80% of insurer data is unstructured text • Adjuster notes • Call centre logs etc. • Configurable parsing, tagging, and extracting of free text for use in fraud analytics • Combine quantitative and qualitative data with text analysis to improve predictions C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 13. CASE MANAGEMENT • Single portal for holistic view of fraud – can see both current and historical cases • Enables Investigation Unit to: • Manage investigation workflows • Attach documents and digital files • Record exposures and losses • Utilize dashboards and management reporting • Track operational performance C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 14. FINANCIAL CRIMES MONITOR • Logically manage your rules, models and alerts for investigators • Maintain simple or complex routing and suppression rules • Manage analytical table, project, scenario and scenario group relationships C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 15. MAKING LIFE EASIER Establish Query Rank & Combine & Analysis Decision Final Search Various Prioritize Synthesize of to Analysis & Parameters Systems Results Information Findings Proceed? Summary Framework-Based Predictive Analytics Analytical Value-Add “What used to take me most of a day, now takes 10 minutes.” “It completely streamlines where we need to go.” -SIU Analyst C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 16. CUSTOMER STORY CNA (US) Business Problem • Detect and prevent fraud in four separate commercial lines of business Customer Quote • Optimally direct its investigation resources on cases with higher likelihood of fraud We have an excellent partnership with SAS. They took the time to Solution meet with us and truly understand the nuances • SAS Fraud Framework for Insurance of CNA so that we could build effective predictive models for each line of our business Results • $2.1m in fraud recovery / prevention within the first 9 Tim Wolfe, SIU Director months of implementation • Detection and investigation of 15 potentially fraudulent provider networks – four times what CNA anticipated C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 17. WHY SAS?  More suspicious cases identified • Including both previously undetected fraudulent networks and extensions to already identified fraud “We discovered that 5% of its claims pay-outs were fraudulent, and these can now be corrected and prevented in the future." Assistant General Manager, Market Leader, Southern Europe  Reduction in false positive rates • Significant improvement in ‘quality’ of suspicious cases past for investigation “84% of the claims flagged as possibly fraudulent, turned out to be fraud. A 69 % uplift in suspicious claim detection compared with the old system.." SIU Manager, Major Tier 1 USA Insurer  Improved investigation efficiency • Each referral taking 1/2 – 1/3 the time to investigate using SAS’ link analysis visualization “What used to take me most of a day, now takes 10 minutes.’’ SIU Manager, Major Tier 1 USA Insurer C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 18. MORE INFORMATION • Contact information: Stuart Rose, SAS Global Insurance Marketing Director e-mail: Stuart.rose@sas.com Blog: Analytic Insurer Twitter: @stuartdrose • White Papers: Combatting Insurance Claims Fraud Insurance Fraud Race • Research: State of Insurance Fraud Technology C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d .
  • 19. THANK YOU C op yr i g h t © 2 0 1 2 , S A S I n s t i t u t e I n c . A l l r i g h t s r es er v e d . www.SAS.com