Technology & Analytics

Slides:



Advertisements
Similar presentations
©2011, Cognizant Fraud Control - IT Interventions and Solutions.
Advertisements

Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
TM Breakout Sessions Interactive and discussion-oriented Six major topic areas Sign up sheets Moderator designated for each session Recorder needed Discussion.
Workflow & Event Derivation Workshop
Technological Challenges in Banking Operation. 2 © 2005 i-flex solutions ltd. All rights reserved.
Continuous Audit at Insurance Companies
Employee Central Presentation
Workflow & Event Derivation Workshop
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
RMsis – v Simplify Requirement Management for JIRA
What is Business Analysis Planning & Monitoring?
Guillaume Rivalle APRIL 2014 MEASURE YOUR RESEARCH PERFORMANCE WITH INCITES.
McGraw-Hill/Irwin McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.
Case Study : Morcom Trading – P BSC 21
1 Quality Center 10.0 NOTE: Uninstall the current version of QC before downloading QC All QC 10.0 documents can be located on the BI Shared Services.
Event Management & ITIL V3
Enterprise Reporting Solution
Managing Regulatory Changes June 24, Regulatory Change Management Critical Component of successful overall regulatory compliance risk management.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
ERP For Payments Presented by: Greg Midtbo Oracle Corporation Industry Vice President Financial Services.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Kaskad Technology Korrelera for Market Surveillance Candyce Edelen November 8, 2006.
1 Yield Analysis and Increasing Engineering Efficiency Spotfire Users Conference 10/15/2003 William Pressnall, Scott Lacey.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Copyright © 2015, SAS Institute Inc. All rights reserved. Business & Analytics unite VS.
Pamela J. Johnson Managing Director, Global Head, AML & Sanctions Compliance Citigroup Inc.
Solving document management issues for over 30 years Bob Hawley (800) x140 Welcome to Metafile Information.
Teacher and Admin Portal What’s New. New Features Enhanced Student Tracking and grouping – More data sets added to support enhanced grouping of students:
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
221 Presenter: Daniel Mangei & Babak Keyvani  May 20, 2014 SNEAK A Blackboard’s New Features.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
1 C.I.A.T. Technical Conference Theme 2 KEY ASPECTS FOR IMPROVING CONTROL CAPACITY OF TAX ADMINISTRATION Mr Luigi Magistro Director of the Central Directorate.
SOFTWARE TESTING TRAINING TOOLS SUPPORT FOR SOFTWARE TESTING Chapter 6 immaculateres 1.
TOP Practices in Post Award Administration
Brillio Data & Analytics
CIS 375 Bruce R. Maxim UM-Dearborn
A Generic Approach to Big Data Alarms Prioritization
Session 37 Business Intelligence Reporting
The Premier Test Lab Management Software
Monitoring Windows Server 2012
The Importance of an AML Programme
Test Lab Management and
The Foundation for your Future
Data Cleansing - Duplicate Identification and Resolution
Automate Does Not Always Mean Optimize
Cash and Liquidity Management Scenario Overview
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
Transform Billing Data Into Business Intelligence
Network management system
Fraud Risk Management at Digital Insurance Market
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Through the Eyes of Data
Speaker’s Name, SAP Month 00, 2017
Supply Chain Planning Demand Planning Excellence – Automotive Industry
What is InPlace? InPlace is a web-based software system that provides RMIT staff and students a single interface for managing work integrated learning.
Personal Finance Portfolio Management App for Better ROI and Control As portfolios become more diverse, they naturally become more complex. This increased.
Clear Demand Price & Promotion Optimization
DMAIC Analyze, Improve, Control
DAT381 Team Development with SQL Server 2005
United Nations Statistics Division
FIU - STR Red Flags.
Megaputer Intelligence
Software Development Process Using UML Recap
Mark Quirk Head of Technology Developer & Platform Group
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Outsourced CFO, Accounting and Bookkeeping
Presentation transcript:

Technology & Analytics in implementing a risk based approach Banking Compliance Symposium (Sri Lanka) Aug 2016

Necessary Features Analytical Tools Profiling & Peer Analytics Rule Builder Rule Library Profiling & Peer Analytics Analytical Tools Comprehensive Case Management Workflow Management Link Analysis Rule Simulations

Customer Demographics Risk Profiling Customer Risk Categorisation (CRC) is the process of assigning a value to the attributes of a customer of a financial institution, grouping them by and identifying the higher, the neutral (medium) and the lower risk customers. Risk Variables Customer Demographics Product Transaction Risk Categories Geography Customer Type; Length of Relationship; Occupation; Industry Sector; and KYC Compliance Risk Categories Insurance Risk Variables Less than 1 year One to three years Greater than three years Risk Factors Risk Factors1 1 –for illustrative purposes only.

Transaction Monitoring Patterns help in identifying complex activities involving multiple rule breaches over a period of time Aggregating Transactions into Events, Patterns, Alerts and Cases for effective, centralized and customer level monitoring Rules are the basic monitoring algorithms which run as per benchmarks defined All the Events and Alerts triggered for a customer are presented as a single case of consolidated investigation Pattern 1 Alert 1 Alert 2 Alert 3 Pattern 2 Event 1 Event 2 Event 3 Event 4 Event 6 Event 7 Rule 1 Rule 2 Rule 3 Event 5 Case 1 Non-patterned events are also displayed in the case Customers who trip rules will trigger events which are then used for tracing patterns Events of a customer are analyzed to find patterns which are in turn marked as alerts

Workflow Analyst Reviewer Approver Rules Library Assignment Rules - Customer Type - Product Type - Risk - Branch / Zone - Segment - User Defined - In-built - Manual Source Data Alerts & Cases Rules Engine Assignment Engine Forward Forward Analyst Reviewer Approver Re-Assign Re-Assign Comments Documents, Links & Tags Notifications Reminders & Escalations

Rule Builder GUI based Rule builder to assist business, risk and compliance analytical teams to build scenarios for detecting patterns

Peer Groups Dynamic self and peer profiling to establish base-line profiles for customer segments using customer demographic and transaction data.

Analytics Dashboards to manage and prioritize customer alerts.

Customer Level View Data visualizations of customer transactions overlaid with summaries, alerts indicators and key information changes quickly allow analytical teams to hone in on areas of relevant interest

Peer Analytics Comparison of transaction Peer Profiles can indicate customers who can potentially be offered more products/incentives due to use of a particular channel or are high risk and are conducting potentially suspicious activity

Customer Networks

Network Analysis Quick configuration of network depth is an essential feature for analysis Filters on Transaction Types, Channels, Counter Countries, Aggregates and Volumes are key for quickly dispensing on false positives and homing in on the most relevant & crucial items

Simulation Rapid Simulation to better deploy resources and understand business, compliance & risk patterns on historical data is a key component of automated analytics

Simulation Statistical distribution patterns are essential to save time, money and consequently effort on a large scale enterprise analytics & risk management. Such analysis helps teams prioritize and focus efforts on higher risk cases/alerts or patterns

Thank You Questions rahul.jandhyala@jocata.com