brand photo banki3forum.org/wp-content/uploads/sites/2/user_uploads/caroline/amdo… · revenue...
TRANSCRIPT
Revenue GuardYour Operational Risk Management (ORM) Partner
Harnessing innovation to protect your revenues
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs2
Revenue Guard ORM Services
Fraud
Management
Revenue
Assurance
Smart Bill
QA
Payment
Assurance
Digital Partner
Assurance
Financial
Assurance
Service Providers
Risk Management
Map
B2B Managing Enterprise Risk
PBX Protection
Call Center Protection
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs3
The Future is Now
The best way to predict the future is to invent it.Alan Kay
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs4 Cities of the future
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs5
Is this the city of the Future?
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs6
Or this?
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs7
More likely this
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs8
99%
1T
Of things are not yet connected
Cost of Sensors
Cost of Bandwidth
Cost of Processing Power
things connected in 2020
The future ain't what it
used to be.Yogi Berra
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs9
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs10
Service Provider world is changingthe CSP to DSP Journey
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs11
It’s a brave new world
Connected Car
Digital RTSS
E-Health
Smart CitySmart Grid
E-Payments
Smart Home
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs12
New RA and Fraud Challenges
Revenue Assurance
Multiple digital partners
Multiple services
Multiple business models
Multiple platforms (Omni Channel)
Multiple devices
Fraud Management
Multiple partners
Multiple services
Cyber Fraud
Multiple devices (Omni Channel)
Customer Authentication per transaction
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs13
The Cyber Threat
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs14
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs15
No Need to Hide
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs16
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs17
Using Government Weapons
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs18
Advanced Persistent Threat (APT)
Distributed Denial of Service (DDoS)
Cross-Platform Malware (CPM)
Phishing
Common Attack Methods
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs19
The Cyber Arena
<20 %
Will click
Move from
machine to human
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs20
Authentication
Who is the
next Gen
fraudster ?
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs21
< 75% Financial Verizon 2016
Cyber crime to reach
$2 T by 2019 Forbes
$More than 500K
attacks a day
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs22
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs23
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs24
The Cyber Threat
Phishing
Link/
Attachment
Malware
Person/System
Steal Credentials
/Data
Use of Stolen
Credentials
Purchase
Payment
Control
Cyber Security
The ‘Enabler’
Cyber Fraud
The ‘Result’
Data Breach “There are only two types of companies:Those that have been hacked and those that would be” Robert Mueller
FBI Director 2012
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs25
Market Needs - A Cyber-
Fraud Based Solution
Integrate with existing cyber-security solutions Anti-phishing, Anti-malware, Insider fraud detection solution
Use both security and fraud related indications
Agile/Flexible
Machine learning as core detection component
Advanced correlation capabilities
Provide an holistic view across all network elements
Advanced authentication features and algorithms
Use crowd sourcing approach (‘contribute and be contributed’)
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs26
Machine Learning/ Artificial Intelligence
The Value
Ruled based systemsRely on prior knowledge
Need constant adaptation
Have high % of false positives
Limited results analytics
High reliance on manual human intervention
The Need
Ability to utilize processing powerMultiple models
Multiple technologies (deep learning, neural networks,
Bayes network and more)
Ability to detect unknown unknowns
Self tuning and low false positives
Preventive models
Ability to create and use NLP, sentiment analysis,
biometric and behavior analysis
Automation
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs27
Machine Learning in
Revenue Guard– How ?
Utilization of RapidMiner , A powerful &
collaborative analytics platform for
machine learning capabilities and data
science
01Combining embedded ML algorithms in RA
and FMS
‘built-in’ set of APIs that provides accessibility
and transparency to data providing intuitive
semantics, results can be stored and used by
Revenue Guard Platform
Consultancy service performing
ML audits detecting unknown
threats
02
03
04
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs28
The Machine learning process
Training
Raw Data
Feature Extraction
Feature Selection
Model Training
Data Cleansing
ModelModel
Evaluation
Labels
New Data
Feature Extraction
Apply model
Predict / Score / Cluster
Labels
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs29
Machine Learning main categories
Supervised
learningUnsupervised
learningReinforcement
learning
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs30
CEV Service – High Level Concept
SALES CHANNELS
OMS
ORDERING SHIPPING ENDCUSTOMER
REVENUE GUARD
IVR
SERVICECENTER
• Appling multiple machine learning models and known rules to detect fraudulent transactions
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs31
Authentication Methods:
Device Unlock
Social Media
Movement Analysis
Behavior
Analysis
Device Finger prints
Cyber
Journey
Device
identity /proximity
Two/multi factor authentication
Biometrics
Unlock
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs32
Platform services
Monitoring
Auditing
Detection Techniques
Machinelearning
Rulebased
Data APIs
En
tity
ma
na
ge
me
nt
Existingcustomers
Occasional customers
External DB
Business services
Security
BI la
ye
r
POS/CNP fraud
Digital Partner Management
CustomerWeb portal
Reports
Geo-location
Dispatching
Social media
Biometrics
Dashboards
Statisticalanalysis
Time &Space
Device FP
Social media
MFS fraud Partners fraud
RA/Fraud
Employees
Partners
Wallets
Web
Channels - Inbound layer
IVR Smartphone Apps SMSService desk Internal activities
Revenue Guard Future Platform
Billing/Payment Assurance
Data fraud
Existing Systems
Analytics
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs33
Our world is changing rapidly
New services, technologies and
business models
New fraud enablers and methods
We need New approaches, new
technologies and new skill-sets to
meet these challenges
An ongoing process
We need to be prepared for the future
and secure the present
Summary
Thank you