14
Too much white noise

Insurance stream - Marc DonFrancesco slides

Embed Size (px)

DESCRIPTION

Insurance steam - Marc DonFrancesco slides

Citation preview

Page 1: Insurance stream - Marc DonFrancesco slides

Too much white noise

Page 2: Insurance stream - Marc DonFrancesco slides

You need more than just a bigger „to do‟ list!

SMART Data, not „Big Data‟

Page 3: Insurance stream - Marc DonFrancesco slides

Beware of “I am Spartacus”!

Page 4: Insurance stream - Marc DonFrancesco slides

Common „noise‟

Process & the “Retreat of Reason”

„Fraud savings‟ & targets

“Police aren’t interested in fraud”

Page 5: Insurance stream - Marc DonFrancesco slides

If a claim was a relay baton?...

Page 6: Insurance stream - Marc DonFrancesco slides

Continual innovation required to address „hot spots‟

Page 7: Insurance stream - Marc DonFrancesco slides

Continual innovation required to address „hot spots‟

thirdeye® Casualty

Screening = swift decisions

Fast. Effective. Evolving…

Are they who they say?

Were they where they said?

Did they do what they said?

How do they live?

Stay in or out of Portal?

Page 8: Insurance stream - Marc DonFrancesco slides

Add genuine value

or get out of the way!

Get excited about what you do

or get out of the way!

Keep challenging oneself

– it‟s how we improve

Increasingly important to...

Page 9: Insurance stream - Marc DonFrancesco slides

Reduce the noise!

Page 10: Insurance stream - Marc DonFrancesco slides

DATE

FRONT LINE

• As an online company we require the maximum amount of information on our clients, besides the usual

personal data. The information that we obtain via our front line IP provider helps us build a better

understanding of the potential client, in addition to the personal information submitted by the client.

Another benefit is the unique device number provided; this device is recorded within their vast database

allowing subscribers to view this database to observe the device history.

• The unique information presented to us from our provider is: Device type, Real IP address, Country,

Region, City and Service Provider. Other information is evidence placed on the device by other

Subscribers as well as ourselves; this can include True ID Theft and Credit Card Fraud among many

other types.

10

Page 11: Insurance stream - Marc DonFrancesco slides

DATE

THE BREAKDOWN

• We are also able to set our own rules, with varying output responses e.g. Allow, Review and Deny

depending on a company’s appetite for risk. The below table show some of rules present, evidence

placed by us or other subscribers is shown below including the ratio seen within the applications sent for

Review:

11

Rules Aug-14

Country List 21%

Device ID is Unique 5%

Risky Device 4%

High Risk ISP 3%

High Risk IP 5%

MYJAR Evidence Exists 4%

Mobile Emulator Detected 1%

Potential Financial Difficulties 2%

Proxy in Use 1%

Subscriber Evidence 19%

Timezone vs Geolocation Mismatch 32%

Risky Transactions A 3%

Risky Transactions B 2%

Page 12: Insurance stream - Marc DonFrancesco slides

DATE

THE FURTHER BREAKDOWN • In addition to the above IP database we also use rules within our own database, this mainly looks at

velocity, related clients history and defined known risks. All accounts that fail any of our rule sets are

sent for review by our validation team and our fraud manager.

• There are varying types of fraud seen by us; however, the majority of the fraud seen can be broken

down into different standards of fraud and analysed. A breakdown of this for 2013 and YTD can be seen

below:

12

Fraud Definitions 2013 YTD

Application Fraud 11.50% 2.50%

Account Take-Over/Hijacking 0.50% 0.20%

Fraud Other 1.10% 0.70%

Identity Fraud 50.00% 34.30%

Misuse of Facility Fraud 11.60% 15.00%

Subscriber Evidence Fraud 20.30% 37.70%

Returned as Fraud from DC 5.10% 9.60%

Page 13: Insurance stream - Marc DonFrancesco slides

DATE

FRAUD GANGS MO

• Crime gangs like to operate using stolen identities which can be obtained from the ‘dark web’, in tandem

with cloned/stolen cards. Their favoured MO as observed by us is using a dynamic IP or open public

network fraudulently applying for loans using a windows pc. As their patterns are usually consistent we

are usually able to have some impact on their operation however some naturally slip through.

13

Page 14: Insurance stream - Marc DonFrancesco slides

Group Head of Collections, Recoveries and Fraud

STUART SYKES

14