Vous êtes sur la page 1sur 8

IBM Global Business Services Strategy & Transformation

White Paper

Unlocking the value of


an integrated fraud strategy
IBM Global Business Services 3

By our estimates, top tier banks in the US on average spend 1. Building support across stakeholder groups
$30-50 million more per year than necessary combating fraud
across all channels. Compounding the issue, banks continue to 2. Developing a holistic data strategy
lag behind the technical and organizational advancements of
the criminal elements driving the growing number and 3. Understanding requirements
sophistication of fraud attacks. Some industry estimates are as
high as $700 million in average losses per year for a single top 4. Value centric implementation
tier diversified financial institution. These two factors define
an interesting dilemma. On the one hand, banks must add new Building support across stakeholder
systems and processes to combat the growing number and groups
sophistication of fraud threats. On the other hand banks need The primary function of loss prevention is to stop money from
to address existing overlaps and unnecessary complexities in walking out the door. The other side of that coin is the
the existing function to rein in costs. operational costs associated with the systems and processes
necessary to achieve this goal. So the first logical question, and
If your institution is like most, you are currently closely one that institutions have for the most part understood and
examining fraud operational budgets in relation to overall answered is, “How will an integrated fraud strategy help us
program effectiveness; and a significant element of your future reduce our losses and save on operation and technology
plan is integrating operations across various channels like budgets?” While these basic elements are critical in forming a
Online, Deposit, ATM, Check, Card and ACH/Wire. We first self-funded business case for the required transformation, the
observed the integrated fraud trend four years ago with several problem with this simple approach to building support is that
of the large regional banks, where the barriers to such integra- it lives purely on the cost side of the ledger, and therefore will
tion are more easily overcome. We are now seeing a move not garner enthusiasm from stakeholders responsible for
towards integrated operations consistently with the largest and driving revenue.
most complex bank and non-bank financial institutions. Some
have started to execute on their integrated strategy, many are To be properly supported by the full stakeholder community as a
still in the planning and design stages. strategic initiative, the question that must be answered is, “How
does an integrated fraud approach support the institutions
Various fraud threats have each seen their day as an industry fundamental business strategy and increase shareholder value?”
hot button resulting in solutions that were implemented in a
stand-alone fashion, as a time critical response to an emerging Providing real value to the business is a stated goal of most risk
threat or regulatory imperative. Economic conditions have management functions, but as we’ve worked with our clients to
shifted focus to the balance between cost and effectiveness of begin to identify how this can be accomplished the conversa-
these functions. As a result, integrating these very similar tion invariably defaults to “soft” benefits such as protecting
systems and processes has leapt to the top of the agenda to reputation, customer perception, and ensuring a clear bill of
address increasing operation costs, as well as the emergence of health with regulating authorities. These benefits are clearly
more sophisticated cross channel and mass compromise fraud important and valuable, but are also intangible and difficult to
threats that often include insider collusion. quantify, so basing a business case on them is impossible. An
integrated approach to fraud operations however, can provide
Working with both the early adopter regional institutions and three very tangible benefits that can drive and support strategic
now the large diversified financial institutions to plan and business results.
execute these integration programs, we’ve identified four
critical challenges which must be solved to achieve success:
4 Unlocking the value of an integrated fraud strategy

Minimize impact on good revenue: There is an opportunity Developing a holistic data strategy
cost associated with fraud controls, and banks must balance the At IBM, we’ve seen a strong trend across the banking industry
tradeoff between addressing risks with the lost revenue caused towards strategic data management. The business case is clear
by over reaching controls. An integrated approach increases for reducing duplicate and redundant data across the complex,
transparency into these opportunity costs at the customer, integrated financial institutions that most large banks have
entity, or event level, and enables better planning and execu- become over the past generation as a result of continuous
tion to limit these negative impacts. expansion and merger activity. Businesses are putting an eye
towards improved analytics that can be leveraged for business
Improve customer retention: Recent industry studies report expansion and improved risk management. The goal of
that 20-25% of customers touched by a fraud event end their improved analytics necessitates better data management, and in
relationship with the bank. An integrated approach and the process can drive substantial infrastructure and operational
resulting improved prevention abilities will reduce the number cost savings.
of customers that leave the institution. Additionally, with the
growing risk of identity theft, fraud events increasingly involve In the fraud domain, these same challenges are exasperated by
multiple channels (checking account and credit card for the silo mentality and highly evolutionary nature of existing
example), but loss prevention organizations are not equipped systems and processes. The same economic opportunities
to interact with the customer holistically. The result is that exist, maybe to a greater extent because of the fraud functions
what could be a positive experience for the customer, “my bank heavy dependency on effective analytics. Silo-based loss
is looking out for my safety,” can turn into a frustrating and prevention functions have duplicated and sometimes inconsis-
negative experience. An integrated approach reduces fraud tent views of the same data sets. Because the fraud prevention
related customer touch points. When customer contact is problem evolves quickly as banks layer on additional protec-
necessary it is coordinated and intelligent. tions in response to emerging threats, the data architecture
supplying the fraud prevention function continues to grow
Enhance credit quality: All managers responsible for credit more repetitive, redundant, and inefficient.
losses recognize that there is some degree of fraud hidden
within the bad debt. This problem erroneously increases credit A holistic data strategy, specific to the fraud domain, will drive
charge-offs. Collection associates waste time attempting to three notable benefits:
collect. An integrated approach can uncover bad debt that is in
truth fraud. This not only takes it out of the credit loss 1. Improved analytics effectiveness
numbers but allows a more appropriate treatment for investi-
gation and possible recovery. 2. More timely and complete view of data to the fraud
operator/decision maker
A business case that addresses these three areas, in addition to
the more obvious loss prevention and cost take out dimensions 3. Operation and technology cost savings
can successfully build the consensus and stakeholder support
necessary for a successful initiative.
IBM Global Business Services 5

Not all data environments are created equal. In fact, based on Understanding Requirements
experience working with many of the large integrated financial Integrated fraud platforms have become a solution class in
institutions in the US and globally, the specific architectures and their own right. Several of the prominent industry analyst
day to day challenges are not always similar, but the macro level groups have recently published papers describing the typical
impediments to fraud program effectiveness are quite consistent. functionality set these software vendors provide including top
quadrant analysis identifying the early leaders in the space. We
Data timing should be constrained by the operations of the invariably see a consistent short list of the same 2-3 vendors
business, but in many cases today there are additional con- truly being considered, so circumstantial evidence suggests the
straints introduced by latency of systems downstream from the practical solution class is a bit narrower than what these
back-office transaction processing. Not all transactions are industry analyst reports suggest.
real time or even near real time. Many financial transactions
still occur in an overnight batch mode, some are real time or Institutions place a great deal of focus and energy on vendor
near real time. As the data architecture is simplified and evaluation and the selection process. While it is clearly a good
streamlined, fraud analytics should function at the speed of practice to perform extensive due diligence and make an eyes
business. wide open decision when selecting this strategic component of
the go forward fraud architecture, one mistake we often see
All fraud systems should share common business definitions. made is carrying over requirements and expectations from the
Primary entities central to successful analytics can be standard- selection process into the implementation project.
ized, thereby improving the ability to understand linkages and
common threats across silos. As many institutions move to It is absolutely critical that once the platform is selected,
improve broad scale analytics at the enterprise level, these business requirements and implementation plans be reset.
improvements can lend dramatic value to the integrated fraud Requirements that are documented for the purpose of con-
agenda. In some cases, fraud will need to set individual ducting a request for proposal tend to be firmly grounded on a
standards and definitions of data, for instance the fraud cloud in the blue sky. It is important when implementing a
prevention function is far more dependent on a detailed view packaged solution to define requirements with the end in
of transaction streams than many other functions in the bank. mind. Requirements should be explored during an open
dialogue with experts in implementing the chosen software,
In the end, it is important for the fraud agenda to be well sometimes the professional services division of the software
represented as a stakeholder in setting enterprise data and vendor can provide this perspective, and oftentimes it is wise to
analytic transformation priorities. It is also important for fraud engage an experienced system integrator to provide an
stakeholders to take ownership of their own data agenda independent view. The dialogue should explore what the
outside larger enterprise initiatives and drive the improvements solution can provide with existing functionality and what will
that are necessary to take analytics to the next level of effec- require customization so that intelligent trade-off decisions can
tiveness and cross channel visibility. Really, can you think of a be made based on a clear understanding of effort and risks.
recent fraud project that wasn’t ultimately constrained by the
availability or quality of data?
6 Unlocking the value of an integrated fraud strategy

All team members (bank, vendor, system integration consul- deficiencies attributed to poorly defined requirements. This
tants) must have a common understanding of the requirements, delay resulted in an erosion of more than $50 million to the
and of the business needs driving the requirements. It is project’s underlying business case when considering both cost
critical that the end user community is at the center of the and benefit sides. The primary lessons learned from that
requirements dialoged, as well as be involved in the build/ experience have already been articulated above, but needless to
configuration phase to mitigate the misunderstanding of say a more structured requirements management process and
requirements. Having the users involved in early solution methodology was instrumental in avoiding similar delays on
walkthroughs and allowing for adjustments to requirements future phases, as well as accelerating the pace of the overall
and solution design in later phases of the project plan will help program, and improving the quality of delivered functionality
ensure the solution matches the true business need. These against the true needs of the business.
choices and best practices are difficult to plan at the outset of a
project, when the timeline and budget are primarily setting the Implementing to deliver value
agenda, but you are likely to go through these steps one way or With IT projects, time is money. The business case for inte-
another. The question is, will they be planned, organized, and grated fraud is built on delivering in year benefits, prevented
accounted for in the timelines and other commitments driving fraud and operational cost savings. Benefit lost to project delays
senior management expectations, or will they be an unexpected can never be recovered. Based on our experience, the cost of
delay and budget over-run? delay when implementing an integrated fraud solution for a top
10 US bank is $12-15million per calendar quarter, which
The industry-leading solutions in this space offer immense translates to $4-5million per month, or more than $1 million of
flexibility. To deal with this flexibility, a highly structured added cost and eroded benefit per week of delay!
methodology must be adopted and adhered to for document-
ing and managing requirements through the full project life To ensure reliable delivery timelines, program management
cycle. Integrating fraud operations across a large complex plays a critical role in delivering promised value. Often times,
organization will likely be a multi-year, multi-phased program. projects get very focused on delivering a list of functional
The requirement set for phase one will be complex in its own requirements and lose sight of the primary objective which is
right. As future phases are layered on, along with enhance- delivering the economic benefits committed to at the project
ments and break fixes for functionality already in production, outset. Fully meeting the functional requirements of phase
understanding all requirements and their interdependencies is one becomes a hard dependency to starting phase two regard-
an enormous task that must be supported by proven methodol- less of what is really driving the promised business benefit.
ogy, reliable tools, and experienced resources. Managing scope and schedule by value is one way to ensure the
promised benefit is realized, but more importantly a coordi-
A recent integrated fraud project at a large global financial nated assembly line approach to the system development life
institution was delayed by more than a year as the project cycle ensuring resource continuity and continues forward
struggled to exit the requirements and design phase and then progress on the overall solution is critical to success.
was plagued by a high number of defects and functional
IBM Global Business Services 7

In our experience working on these types of projects, there are 4. Automation: for many simple alert types the action taken by
four primary functional value drivers to the business case: the operator is parameter driven and procedural in nature.
For example, a high dollar check deposit alert may call for the
1. Thin integration: Meaning not biting off too much. A smart operator to check available balance on the account first, then
approach is to leverage the value that existing systems are consider overall relationship balance, and if available funds are
providing and concentrating on first integrating at an opera- less than the value of the deposit a hold is placed. Processes
tional level. This means the first step is achieving a single like this can be automated by the integrated fraud platform,
consolidated case management environment that integrates and this automation can lead to significant increases in the
alerts coming from all the existing systems across channels. throughput of the investigative organization.

2. Tier two analytics: As alerts flow into a common case These primary drivers of value can be mapped directly to
management environment, much of the value comes from the efficiency gains, and depending on the metrics your institution
ability to consolidate those alerts by entity and perform a uses to track fraud losses, they should align well with the
second level of rule based, systematic evaluation before the business case behind integrated fraud. Managing the project to
alerts are given to an operator for investigation and action. metrics centered on delivering value, rather than merely
The ability to correlate alerts from various detection methods ticking off a list of functional components is an important
for one product and across products will uncover fraud that perspective to maintain as project challenges and potential
would otherwise remain hidden. Additional value is provided delays arise.
by reducing the total number of alerts that must be handled,
and second having higher quality alerts with a more complete Conclusion
perspective of all risk activity across channels and over time. In the face of growing sophistication and frequency of fraud
attacks backed by well organized and technologically advanced
3. Integrated data view for the operator: in today’s environ- criminal networks, banks must respond by integrating fraud
ment, there are often a large number of systems that an functions across business lines to achieve a holistic enterprise
operator must interact with in order to dispose of the alert in view of risks. An integrated fraud platform, usually in the form
question. It’s very normal for fraud operators to have multiple of a single case management system that collects, consolidates,
computer monitors, with multiple applications open on each processes, and automates alerts from existing silo based
screen. It’s normal to see an operator write down an account detection systems is the core system change required to
number on a piece of paper, then switch over to another support the holistic approach.
application to type it in to find the needed data. We estimate
that as much as 80% of the elapsed time working a typical alert Some institutions are already working towards implementing
is spent on administrative or data entry tasks. By providing a an integrated fraud case management system; many are still in
more accurate and complete view of all the necessary data the planning phases. IBM’s lessons learned are based on
needed for a given alert type, the percentage of time operators working with the early adopters in this area. Careful consider-
spend on true value add, knowledge worker tasks like making ation and implementation of these best practices will increase
decisions and taking action to mitigate risks can be increased the total value delivered from an integrated fraud solution by
dramatically. These gains should also translate into direct controlling implementation costs and ensuring a close fit to
operator efficiency gains, typically measured by the average core value add requirements so that long term benefits emerge
amount of time spent on each alert. as planned.
About the author
Jake Jacobson is an Associate Partner in IBM’s Strategy & © Copyright IBM Corporation 2009
Transformation practice focused on the Financial Services
IBM Global Services
Industry segment. He specializes in helping banks implement Route 100
effective systematic controls for Financial Crime related issues. Somers, NY 10589
He can be reached at jjacobson@us.ibm.com. U.S.A.

Produced in the United States of America


September2009
All Rights Reserved

IBM, the IBM logo and ibm.com are trademarks or registered trademarks
of International Business Machines Corporation in the United States, other
countries, or both. If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark symbol (® or ™),
these symbols indicate U.S. registered or common law trademarks owned by
IBM at the time this information was published. Such trademarks may also
be registered or common law trademarks in other countries. A current list of
IBM trademarks is available on the Web at “Copyright and trademark
information” at ibm.com/legal/copytrade.shtml Other company, product
and service names may be trademarks or service marks of others.

References in this publication to IBM products and services do not


imply that IBM intends to make them available in all countries in which
IBM operates.

Please Recycle

GBW03094-USEN-00

Vous aimerez peut-être aussi