Professional Documents
Culture Documents
à Introduc=on
à What is Financial Crime, AML and what we are seeing in the AML Space
à Brief Discussion of Customer Ac=vity in AML
à Illustra=ve Use Cases
à Where Current Implementa=ons fall short?
à Reference Architecture for AML and Predic=ve Analy=cs
à Q&A
FSI Industry"
Predictive Analytics
Analy=cs enabling both defensive and offensive use cases
And ML/DL
à Firms, large and small, need to navigate a set of increasingly complex compliance rules
and regula=ons as regulatory bodies clampdown on loopholes in the financial regulatory
framework. With =ghter regula=on comes the need to seek out more advanced and
cost effec=ve compliance solu=ons
à It is es=mated by the Financial Ac=on Task Force that over one trillion dollars is
laundered annually.
à Regulators increasingly require greater oversight from ins=tu=ons, including closer
monitoring for an=-money laundering (AML) and know your customer (KYC)
compliance.
à The methods and tac=cs used to launder money are constantly evolving, from loan-back
schemes and front companies, to trusts and black market currency exchanges, there is
no “typical” money laundering case.
à An=-money laundering (AML) is a term mainly used in the financial and legal industries
to describe the legal controls that require financial ins=tu=ons and other regulated
en==es to prevent or report money laundering ac=vi=es.
A poll of 500 execu.ves and owners of small and medium businesses showed:
58% of businesses were vic=ms of fraud
80% of banks failed to catch fraud before funds were transferred out
87% of fraud aiacks, the bank was unable to fully recover assets
40% of businesses said they have moved their banking ac=vi=es elsewhere
20% Only 20% of banks were able to iden=fy fraud before money was transferred.
à Need for highly interac=ve and visually appealing UI’s for inves=ga=on
à Need for advanced analy=cs for deeper insight into trends in customer
behavior.
à Higher degree of depth of analysis in AML program.
à Guard against Aging technology and Manual approaches
à Automated Risk Classifica=on Approaches
à Need to reduce the volume of False posi=ves
à The need for structured and unstructured data analysis
Key highlights
à The algorithm understands malicious
behavior through data LexisNexis
Source
Data Dynamic Customer
(examples) External/3rd party Data Sources
Real-Time Event Profile /Risk
Appe=te Model
Accounts
Streaming Engine Enrich Events with
Customer/Risk info and Visualiza.on / Analy.cal Views
Scoring Models
Transac=ons
Social
Real-.me Intelligent Ac.on ODBC/JDBC
• Risk Similarity/Risk Profiling
• Related En=ty Analysis (graph database)
lexisNexis • Fraud/Social Network Analysis
• Mul=-line “profitable” class code Rest API
• Geospa=al data
• Updated risk appe=te
26
© Hortonworks Inc. 2011 – 2016. All Rights Reserved
Key Deliverable to build Big Data Solu.on
Drivers of a
Connected Data
Architecture