Real-time Intelligence that Matters 1. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 53% of consumers who experienced.

Slides:



Advertisements
Similar presentations
Managing Knowledge in the Digital Firm (II) Soetam Rizky.
Advertisements

© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
This refresher course will:
Purchasing Card Best Practices: Program Expansion & Controls Julie Krause, Vice President Commercial Cards Sales Manager M&T Bank May 12, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Welcome to Dublin! Airline Distribution  Great Keynote Speakers  Impressive Executive Panel  New Airline Distribution Strategies  Data Privacy.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
4 Intelligent Systems.
IBM SPSS Solutions A SELECT INTERNATIONAL COMPANY.
Bank Card Protector Policy Frates Insurance & Risk Management By Thomas P Mulligan
CHAPTER 4 ANALYTICS, DECISION SUPPORT, AND ARTIFICIAL INTELLIGENCE
Artificial Intelligence By: Groups 19 & 20. What is A.I. A.I. is a broad discipline that promises to simulate numerous human skills such as automatic.
1 Information Requirements by Management Level Strategic Management Tactical Management Operational Management Decisions Information.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Interchange fees and the quality of service obtained by consumers and merchants Marianne Verdier, EconomiX University Paris Ouest Nanterre 1.
Supporting Decision Making Chapter 10 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Copyright 2009 C Welcome Real-time 1 Innovation of loyalty and rewards for retail banks Welcome Real-time Mavis Liew, Vice President, Marketing Hong Kong,
Academy of Risk Management | Innovate. Collaborate. Educate. Fraud Management Solutions Innovative Products & Thought Leadership.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Analytics, Decision Support, and Artificial Intelligence:
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE M. Gams.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
R U Ready? V M E EUROPAY MASTERCARD VISA EMVco was formed in 1999.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
The Next Generation Identity Verification and Assured Rights Management Preventing Cybercrime and Protecting Privacy.
Company factsheet May 2010 Experian is the leading global information services company, providing data and analytical tools. The company helps businesses.
PLUG IT IN 5 Intelligent Systems. 1.Introduction to intelligent systems 2.Expert Systems 3.Neural Networks 4.Fuzzy Logic 5.Genetic Algorithms 6.Intelligent.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
91 st Annual Meeting & Exposition April 1 – 4, 2012 Anaheim, California Commercial Payments Overview Visa, Inc. NAEP April 2012.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Decision Support Systems Chapter 10.
IAS 23 – Borrowing Costs. Academic Resource Center Long-term liabilities Page 2 Borrowing costs Borrowing costs primarily include interest on borrowings.
Security and Fraud Solutions Initiatives: Turning the Threat into an Opportunity.
Financial Literacy: Knowing What You Need To Know To Achieve Your Financial Goals.
April CHAPTER 16 APPLICATIONS OF SOFT COMPUTING.
2014 Asia-Pacific Financial Forum Seattle, Washington July 7, 2014 Electronic Payments: Expanding Financial Access for Consumers and Businesses of Every.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
Confidential © 2014, Brighterion Inc. (all rights reserved) Keeping an eye on your business Brighterion Solutions SMART AGENTS SMART AGENTS UNSUPERVISED.
TransArmorSM A Secure Transaction ManagementSM Solution
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
Soft Computing methods for High frequency tradin.
Langara College PCI Awareness Training
Midsouth User Group Annual Conference
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved CHAPTER 9 Enabling the Organization—Decision Making.
Customer Relationship Management (CRM) Chapter 4 Customer Portfolio Analysis Learning Objectives Why customer portfolio analysis is necessary for CRM implementation.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
Summary of Changes. General These are changes that have come up in many EMV migrations that I have assessed and been involved in. The changes are broken.
MAC Internal Audit Dept.
PayPal and Other Third Party Payment Options Presented by Meg Monsen, Eric Zeng, and Michael Leonard.
TECHNOLOGY GUIDE FOUR Intelligent Systems. TECHNOLOGY GUIDE OUTLINE TG4.1 Introduction to Intelligent Systems TG4.2 Expert Systems TG4.3 Neural Networks.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Data Breach What kind of target are you?. Agenda The Problem Legal Landscape Risk Mitigation.
April 20023CSG11 Electronic Commerce Payment systems John Wordsworth Department of Computer Science The University of Reading
THE LARGEST BANKS OF THE US. Plan 1. United States' Largest Banks 2. Bank of America 3. JPMorgan Chase 4. Citigroup Inc.
PRIMARY DATA vs SECONDARY DATA RESEARCH Lesson 23 June 2016
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE
ZIKMUNDBABIN CARR GRIFFIN BUSINESS MARKET RESEARCH EIGHTH EDITION.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
RESEARCH APPROACH.
Adherence and Innovation: Payment under New Retails
Exam 1 Terminology Review
Cyber Trends and Market Update
Mastercard® Threat scan
A Secret Service Perspective on Credit Card Fraud
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Your source for payments education
It Runs In The Family Fraud
Presentation transcript:

Real-time Intelligence that Matters 1

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 53% of consumers who experienced an account or identity compromise changed their banking relationship Source: Aite Group survey of Identity Theft Resource Center clients, March 2013 to January 2014

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Beware back of wallet Source: Aite Group, ACI Worldwide survey of consumers in 20 countries, Q1 2014

557 Data breaches reported to the California Attorney General since January new data breaches reported to the California Attorney General in April % of data breaches effect small merchants $7.99 is the average cost to issuers for each compromised card Data Breaches: Facts and Lessons

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Case Study – 2014 Large Retailer 6 April 1 Commenced Sept 2 Announced Sept 12 Closed

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Case Study – 2014 Retailer Data Breach 7 April 1Sept 2Sept 12 Commenced Announced Closed 154 Days Open 56 Million Cards Compromised $447 Million Estimated Issuer Losses $33 Million Q4 Retailer Losses

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Stages of a Merchant Data Breach 8

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 9 iDetect Components Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Real-Time Card Risk Scoring Engine: Model Building and Training Unsupervised Learning Real-time Profiling Long-term Profiling Peer Profiling Geo Profiling Cross-card Profiling Issuer/Processor Data Merchant information Global transaction history Global fraud database Card transaction history Computer Agent Time Profile Computer Agent Card Profile Computer Agent Merchant Profile Computer Agent Geographic Profile

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Real-Time Card Risk Scoring Engine: Model Building and Training Issuer/Processor Data Merchant information Global transaction history Global fraud database Card transaction history Computer Agent Time Profile Computer Agent Card Profile Computer Agent Merchant Profile Computer Agent Geographic Profile Neural Networks Data Mining Case based Reasoning Genetic Algorithms Fuzzy Logic

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business Real-Time Card Risk Scoring Engine: Model Building and Training Computer Agent Time Profile Computer Agent Card Profile Computer Agent Merchant Profile Computer Agent Geographic Profile Neural Networks Data Mining Case based Reasoning Genetic Algorithms Fuzzy Logic Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 13 Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 14 Computer Agent Time Profile Computer Agent Card Profile Computer Agent Merchant Profile Computer Agent Geographic Profile Neural Networks Data Mining Case based Reasoning Genetic Algorithms Fuzzy Logic Computer Agent Time Profile Computer Agent Card Profile Computer Agent Merchant Profile Computer Agent Geographic Profile Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 15 Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 16 Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 17 Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business How iDetect Works 18 Real-Time Merchant Profiling Engine Real-Time Card Risk Scoring Engine

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business iDetect Simulation Study 19 Commenced Avg. 150 Days Open Closed

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business iDetect Simulation Study 20 Commenced Closed Avg. 5 Days Open

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business iDetect Simulation Study 21 Commenced Closed Avg. 5 Days Open

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business iDetect Simulation Study 22 97% Reduction in Cards Compromised 53.2 Million cards SAVED 97% Reduction in Estimated Issuer Losses $438 Million issuer dollars SAVED 97% Reduction in Mechant Losses $29.4 Million Q4 Home Depot dollars SAVED Commenced Closed Avg. 5 Days Open

© 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business iDetect Simulation Study 23 97% Reduction in Cards Compromised 54 Million cards SAVED 97% Reduction in Estimated Issuer Losses $434 Million issuer dollars SAVED Commenced Closed Avg. 5 Days Open

Provides real-time results based on proven AI models Uses Brighterion’s patented Smart Agent technology to identify anomalous card-holder behavior and traces those results back to a Common Point of Purchase Detects data breaches within 5 days of the first transactions being executed by the criminals Discovers data breaches over 6 times faster than the closest competitive solution Saves Issuers, Merchants and Insurers over 90% of their total losses from data breaches Prevents brand damage that results from data breach media attention Generates increased revenues for Acquirers who resell iDetect to their Merchants Benefits