Loading...

Vision 2022 – Day 2 Recap

Published: April 13, 2022 by Stefani Wendel

“I saw an opportunity to create change instead of asking for it.”

Day 2 was charged up with new technology; new ideas; and new, clearer visions of where we can drive change across our industries.

Jeff Softley, President, Direct to Consumer, Experian Consumer Services, illustrated how the consumer is at the center of Experian’s business with countless statistics and how our consumer advocacy drives our focus, growth and mission.

Wil Lewis, Global Chief of Diversity, Equity and Inclusion; Hiq Lee, President of Business Information Services; and Alex Lintner, Group President, Consumer Information Services, engaged in a panel discussion centered on reimagining inclusion.

Keynote: Allyson Felix

Allyson Felix, five-time Olympian and most decorated Track & Field athlete, kicked off the day with an inspiring keynote touching on her athletic career, taking challenges head-on and using our platforms to make an impact. Felix, who is racing in the first race of her final season this weekend, is a tireless advocate, life-long learner, who seeks to empower others.

“We can all start where we are,” she said. “Small things turn into big things.”

Day 2 session highlights

From the breakout sessions, the theme of disruption was evident. We dove into how prescreen and prequalification have evolved, a demand that many must adapt to deliver in the post-pandemic world. Financial inclusion was a topic covered across the board, as were the strategies to be enacted to bolster these financial inclusion drivers. One such area addressed was how the rapidly growing buy now, pay later industry advances financial access and inclusion efforts. And speaking of evolution, retention must evolve as well — we heard how retention, recapture and risk strategies are transforming, particularly in the mortgage servicing space.

  • Rapid Model Development and Deployment – Feedback from businesses reflects organizations’ desires for flexible deployment options, flexible integration with existing tech stacks, open source technology and the ability to incorporate multiple data providers. Today’s solutions address that feedback as well as solve for the most rampant market challenges in new, innovative ways.
  • Strategy optimization with Artificial Intelligence and Machine Learning – Over 50% of financial institutions surveyed are using AI/ML in at least one department. Challenges include data management, operation, evolving the analytics program. ML/AI starts with proper data management. For optimization, templatizing ML frameworks is a necessity.
  • ID Verification, Authentication and Fraud – There were $56B in identity fraud losses in 2020, $13B of which were traditional identity fraud losses and $43B related to identity fraud scams. Leveraging strategies is necessary to maintain the critical balance required for identity verification and fraud – mitigating losses and risk exposure, drive optimal customer experience, maintain regulatory compliance.
  • Maximizing Customer Value – The monthly data refresh is a thing of the past. When reimagining account review for risk and marketing purposes, remaining agile is key with increased data freshness for operational efficiency.

Keynote: Ashton Kutcher

The energy, insights and ideas have been reverberating throughout the venue for the past 48 hours, which set the stage for Ashton Kutcher’s closing keynote.

The Chicago Bears fan talked about his career, how hard work wasn’t an option when he was growing up and how part of his assessment process for potential investments – determining whether they create efficiencies in the market – he sometimes thinks of a long-standing, personal benchmark – the air nailer.

He talked about his philanthropy efforts, the mission behind his company Thorn, and the ability for people to impact change and achieve “a sense of agency” over the outcome of the future.

“That’s the human spirit. That’s the spark that exists – that people understand that you can sit in despair, or you can do something,” he said.

It has been an amazing two days – we can’t wait for Vision 2023!

Related Posts

Fraud rings cause an estimated $5 trillion in financial damages every year, making them one of the most dangerous threats facing today’s businesses. They’re organized, sophisticated and only growing more powerful with the advent of Generative AI (GenAI). Armed with advanced tools and an array of tried-and-true attack strategies, fraud rings have perfected the art of flying under the radar and circumventing traditional fraud detection tools. Their ability to adapt and innovate means they can identify and exploit vulnerabilities in businesses' fraud stacks; if you don’t know how fraud rings work and the right signs to look for, you may not be able to catch a fraud ring attack until it’s too late. What is a fraud ring? A fraud ring is an organized group of cybercriminals who collaborate to execute large-scale, coordinated attacks on one or more targets. These highly sophisticated groups leverage advanced techniques and technologies to breach fraud defenses and exploit vulnerabilities. In the past, they were primarily humans working scripts at scale; but with GenAI they’re increasingly mobilizing highly sophisticated bots as part of (or the entirety of) the attack. Fraud ring attacks are rarely isolated incidents. Typically, these groups will target the same victim multiple times, leveraging insights gained from previous attack attempts to refine and enhance their strategies. This iterative approach enables them to adapt to new controls and increase their impact with each subsequent attack. The impacts of fraud ring attacks far exceed those of an individual fraudster, incurring significant financial losses, interrupting operations and compromising sensitive data. Understanding the keys to spotting fraud rings is crucial for crafting effective defenses to stop them. Uncovering fraud rings There’s no single tell-tale sign of a fraud ring. These groups are too agile and adaptive to be defined by one trait. However, all fraud rings — whether it be an identity fraud ring, coordinated scam effort, or large-scale ATO fraud scheme — share common traits that produce warning signs of imminent attacks. First and foremost, fraud rings are focused on efficiency. They work quickly, aiming to cause as much damage as possible. If the fraud ring’s goal is to open fraudulent accounts, you won’t see a fraud ring member taking their time to input stolen data on an application; instead, they’ll likely copy and paste data from a spreadsheet or rely on fraud bots to execute the task. Typically, the larger the fraud ring attack, the more complex it is. The biggest fraud rings leverage a variety of tools and strategies to keep fraud teams on their heels and bypass traditional fraud defenses. Fraud rings often test strategies before launching a full-scale attack. This can look like a small “probe” preceding a larger attack, or a mass drop-off after fraudsters have gathered the information they needed from their testing phase. Fraud ring detection with behavioral analytics Behavioral analytics in fraud detection uncovers third-party fraud, from large-scale fraud ring operations and sophisticated bot attacks to individualized scams. By analyzing user behavior, organizations can effectively detect and mitigate these threats. With behavioral analytics, businesses have a new layer of fraud ring detection that doesn’t exist elsewhere in their fraud stack. At a crowd level, behavioral analytics reveals spikes in risky behavior, including fraud ring testing probes, that may indicate a forthcoming fraud ring attack, but would typically be hidden by sheer volume or disregarded as normal traffic. Behavioral analytics also identifies the high-efficiency techniques that fraud rings use, including copy/paste or “chunking” behaviors, or the use of advanced fraud bots designed to mimic human behavior. Learn more about our behavioral analytics solutions and their fraud ring detection capabilities. Learn more

Published: February 27, 2025 by Presten Swenson

Learn four capabilities to consider when building out an ID verification strategy and next steps to take. Read more!

Published: January 8, 2025 by Guest Contributor

Dormant fraud is an especially insidious form of account takeover fraud that often goes undetected until it’s too late. Learn how to protect your organization.

Published: December 5, 2024 by Devon Smith