Revenue Assurance Best Practices & Fraud Management

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
CIOassist Technologies Your CIO on Demand… Business Continuity Planning Our Offering CIOassist Technologies (
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
ITIL: Why Your IT Organization Should Care Service Support
Client Case Studies Revenue Assurance & Revenue Intelligence.
1 European Conference on Training Strategies Kieran Cox -NSAI Education & Promotion-
Information Security Issues at Casinos and eGaming
Requirements to benefit from CB in Value Added Services Mark Cabiling, Swapcom Marketing Manager
Information Management in British Telecom Jon Hill.
Network Forensics. What is it? ► Remote data acquisition (disk capture) ► Remote collection of live systems (memory) ► Traffic acquisition (cables and.
Information Systems Security Computer System Life Cycle Security.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Mr. Ran Mitra Vice President Intelligent Networks Division New Ways to Generate Profit in a Real-Time Billing Environment.
Information Systems Security Operational Control for Information Security.
TELECOMUNICAÇÕES DE MOÇAMBIQUE, SA Joint ITU-T & 8th African SNO Workshop Theme: METRICS - Update on the last International SNO (Swaziland) Malaquias E.
TELECOMUNICAÇÕES DE MOÇAMBIQUE, SA Quality of Service Development Group (QSDG) ITU-T SG12 The challenges for provisioning Telecom services in a developing.
Paul Hardiman and Rob Brown SMMT IF Planning and organising an audit.
© British Telecommunications plc Senior Engineer Review Field, Plan and Build.
Cleve L. Freeman – Los Angeles, CA USA Energy Loss Reduction Programs & Profits, Rio de Janeiro, Brazil 11 – 13 August 2004.
Charging for services over IP/ATM ACTS Project AC320 SUSIE Donal Morris Sherkin Technologies Ltd Tel:
Cctv Management Solution - CMS From – Intelitech Solutions Pvt. Limited. [ ITSPL Group ]
Chapter 2 Securing Network Server and User Workstations.
Security fundamentals Topic 6 Securing the network infrastructure.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Software Quality Assurance SOFTWARE DEFECT. Defect Repair Defect Repair is a process of repairing the defective part or replacing it, as needed. For example,
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
1 Southern Africa Telecoms Fraud Management, Revenue Assurance and Network Security Meeting.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
S V.MOUNICA 09551A0294.  To increase the distribution rate of present electric supply which is 70% to 100%.  Improving the supply to house holds without.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Barracuda Subscription and Support Upsell Opportunities
Mastercard® Automatic Billing Updater
UNIFED COMMUNICATIONS MANAGEMENT
Firewall Technology Planning and Implementation
A Quick Overview of ITIL
Regular Payments First and Subsequent Payments
Fraud Management Now let us continue and understand fraud management in detail. Let us consider Saurabh’s example to understand the steps followed in fraud.
GS-R-3 vs. ISO 9001:2008 Requirements - 4
AAC Monthly Report RA-UG Mine November 2016
Team 1 – Incident Response
Critical Security Controls
Network management system
TechStambha PMP Certification Training
Reporting and Interpreting Sales Revenue, Receivables, and Cash
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
EXAM CODE N CompTIA Network+ certification
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Prepare Question Answers Exam Dumps - Dumps4Download.us
REVENUE ASSURANCE CHALLENGES
CORPORATE PROFILE JUNE 2016
Free 2018 Cisco Questions-Cisco Dumps PDF Cisco Dumps
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
RAG London Meeting – 23rd Nov 2017
Organisational NRW Management
AT&T/Cisco Partnership…Enabling Customer Success
ITIL: Why Your IT Organization Should Care Service Support
Introduction to Milestone Services
Reliable communications at all times.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
FIRST How can MANRS actions prevent incidents .
6. Application Software Security
Mastercard® Automatic Billing Updater
Traffic Analysis Points (TAP) For Real-time Network Monitoring TAP stands for Traffic Analysis Point, which is designed to provide real-time monitoring.
Towards a frictionless social security
Presentation transcript:

Revenue Assurance Best Practices & Fraud Management Baltazar Ngomane 9th Telecommunications Fraud Management Revenue Assurance and Network Security 21 – 23, October 2015, Harare , October 2015, Harare Telecomunicações de Moçambique Revenue Assurance Best Practices & Fraud Management

Agenda Revenue Assurance Best Practices Why Best Practices RA Five Best Practices RA Control Points Network Audit Mediation (Gcollect) Audit Billing system Audit RA related KPIs Fraud Management 2010/2015 Fraud Incidents vs Losses Vandalism and its impact Challenges 1/17/2019

Follow Industry standards Maintain or improve data quality Why Best Practice Improve revenue Follow Industry standards Maintain or improve data quality Customer satisfaction 1/17/2019

Revenue Assurance: Five Best Practices for Success Make it a Business Priority Acquire the Proper Tools Ensure that Your Team has the Skills to Use the Tools Team with Deep Knowledge of the Data Team With a Good Imagination/attitude and creativity http://www.lavastorm.com/blog/post/revenue-assurance-five-best-practices-for-success/) 1/17/2019

RA Control Points Network Audit (ANS, UT100, AXE, SS, IN) Description: A_B NUMBER analysis by technology -Incomplete A, B Numbers (Ex:21) -Extra digits (Ex: 2131510321315103, 221750125) -Invalid lenght (fixed <> 8 dígits; mobile <> 9 dígitos; internacional < 10 dígitos) Checks on the input and expected Output parameters Analyse daily , weekly and Montly reports from RA System Impact: Losses due to missing/not registered cdr’s, clocks not syncronized Mediation (Gcollect) Audit Classification, filtering of billable records , duration, Unprocessed cdr’s(Rejects ) Checks/ on the input and expected Output parameters Impact: Losses due to Rejected cdr’s, classify local call as international and vice versa. Failure on CDR’s normalization 1/17/2019

Impact: Over /under Billing (Cont.) Billing system Description: Rating validation on all services, analyse recharges and consumption on IN platform. Compare RA rating engine results and the Billing system Checks on the input and expected Output parameters Impact: Over /under Billing 1/17/2019

Showcase trends based on KPI values over the period of time Related KPIs Network Files Produced per day, Files sent to mediation Mediation Files received per day, % corrupted cdr’s, sequence break, % rejects Billing Ratio of Billed account/Active account, Billed/collection, number of billing vs complains, Rating % Billable rejects/errors in rating %Rated input/Rated Output Collection % Valid Payment/Invalid payment. Reconciliation payment 1/17/2019

Fraud Management Fraud incidents in the last 5 years Derived Lines (Continuous monitoring of hot destinations/Last incident on 2014) IP PBX hacking/IRSF (Traffic to known Hot destination are detected within 1 day ) Cable theft and Vandalism Subscription Others/Internal Fraud 1/17/2019

Derived Lines The fraudsters intercept the line by parallel connection on the CCP and derive to a DP near by the rented house to make International calls for free Usually the victims are enterprises The enterprise is over charged due to the illegal use of his line by the fraudster 1/17/2019

Fraud Incidents vs Losses 1/17/2019

IP PBX Hacking Prevention To educate customers (Ip pbx owners) to be aware about pbx fraud Cut the possibility of making international calls for ISDN numbers when not necessary (if connected to VoIP) Implement Network security policies Disable all not used suplementary services on the IP PBX (DISA, Call Forwarding......) Dactivate Remote Maintenance port 1/17/2019

Unknown people dig on the cable route Vandalism Unknown people dig on the cable route 1/17/2019

The impact of vandalism Number of incidents Duration of srevice failure 1/17/2019

O Património é Nosso - TDM.mp4 Vandalism Prevention Promote campaigns to educate the Communities about the importance and the need of Optical Fiber Cable Systems passing through that areas. Radio/TV Broadcasting in local languages for OF protection. O Património é Nosso - TDM.mp4 1/17/2019

Challenges RA Fraud To recover identified revenue leakage Build internal competencies for managing RA Become proactive RA team Implementation of a Powerfull RA System (Under Survey ) Training on RA & Fraud Management Focused on new technologies Fraud The situation is more complex, due to new technologies and new service features under implementation in IN/NGN platform Much more and updated skills, Knowledge and expertise is needed to face the future Implementation of a Powerfull FMS (Under Survey ) 1/17/2019

©TDM,SA –Directrizes Estratégicas 2015 Thank You Obrigado ©TDM,SA –Directrizes Estratégicas 2015 1/17/2019