C-Suite

Counter Fraud Webinar – Today 2pm ET – live on CFO.com

Protection concept: Shield on puzzle background

Today, I have the distinct pleasure to be a featured speaker on a CFO.com webinar on the topic of ‘Using Advanced Analytics to Counter Fraud in a Big Data World.’

As you are no doubt aware, combating fraudulent activity is a hot topic across the C-Suite today, and most particularly in the CFO and finance space. The set of challenges this poses is not going away anytime soon. Recent estimates indicate that today $3.5 trillion (yes, with a T) is lost annually to fraud and financial crimes.

Senior finance executives have new tools and technologies to discover fraud, waste, abuse and errors across their firms and functions. Moreover, advanced analytics are now being used to analyze an organization’s internal data to measure behavior, and then compare the results within specific peer groups to identify anomalies that indicate suspicious activity.

We will take a look at how CFOs and enterprises across a wide array of industries are addressing these challenges, including:

  • Identifying potential fraud before payment, reducing expensive recovery actions;
  • Detecting multiple behaviors and schemes simultaneously;
  • Analyzing transaction/claim- and provider/supplier-level information to detect suspicious patterns; and
  • Providing evidence-based identification of target cases for investigation.

We will also discuss the latest developments from IBM Research on countering, highlight several client case-study examples featuring actionable guidance, and of course, take your questions. I hope you will take an hour out of your busy schedule (2pm ET US) to join me and our friends at CFO.com for this informative live webinar. Pre-registration is required at ibm.biz/BdXPAN.

More stories

The benefits of automation you didn’t see coming

Automation pays out, and relatively quickly too. But some of the benefits come from less obvious places. The recent Forrester Total Economic Impact study looked at the impact — costs and benefits — of automation in the world of application management, based on in-depth interviews with IBM clients. For many organizations, the catalyst for considering […]

Continue reading

GDPR and protecting data privacy with cryptographic pseudonyms

Within two years, most of today’s cybersecurity technologies will be obsolete. Since the beginning of 2016, hackers have stolen more than 8 billion records — more than double the two previous years combined — and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for […]

Continue reading

The progress of automation in the financial services industry

Working across a range of industries as I do, I’m always interested to get the perspective of a peer group on the way automation is impacting their own particular industry. So when I gave the keynote speech at the recent Millennium Alliance FSI event in Palm Beach, FL, I relished the opportunity to meet with […]

Continue reading