with a better browsing experience; allow us to assess, monitor, and improve the website’s
performance; and enable our partners to advertise to you. You may disable the cookies by changing
the settings in your browser, and you may tell us not to share your cookie data with third parties.
The insurance industry has long been a leader in the use of analytic models for pricing. Now, with new and more complex data available there are an increasing number of scenarios where analytics are making a big impact. FICO provides a platform for Insurance that uses advanced analytics to manage risk, prevent fraud, improve debt collections and increase your profitability while delivering a great customer experience. This includes areas such as:
For insurance companies who deal with cyber-insurance, FICO delivers a research-proven approach to independently score 3rd party organizations based on their risk of data breach – this involves scanning the entire internet on a weekly basis and process an enormous data set using machine learning to create advanced predictive models. This same enterprise security score can be used to ensure you have accurate insight into your own company’s ability to keep sensitive data secure.
This course provides essential knowledge about the technical environment and processes of Siron™ AML. It focuses on the aspects that are relevant for technical consultants and IT staff, in particular general understanding of technical prerequisites, product and interface handling, and tools.
This course provides essential knowledge about the technical environment and processes of Siron™ KYC. It focuses on the aspects that are relevant for technical consultants and IT staff, in particular installation, integration of watch lists, technical settings, processes, and error handling.
This two-part course provides a foundation for developing a Blaze Advisor system-enabled application. Part 1 is for both Business Analysts and Developers who maintain rules in the RMA. Part 2 is for Developers who need to understand the SRL generated by the RMA. Students are introduced to rule authoring, Structured Rule Language (SRL), testing, RMA generation, lifecycle management in the RMA, and rule project deployment.
As America's “Un-carrier,” T-Mobile has redefined the way consumers and businesses buy wireless services, resulting in 86 million customers and $44B in annual revenue. In order to achieve and build upon their success, T-Mobile must rely upon a network of thousands of vendors and suppliers, and many of these relationships require exchanging sensitive information. In a digitally connected age in which most breaches occur through third-party vendors, how does T-Mobile successfully assess and manage their cyber risk of their suppliers?
This course familiarizes attendees with optimization models and techniques, and the terminology used to describe them. Participants gain an understanding of the Xpress suite, the Mosel modeling and programming language, and Xpress Workbench. Through a series of projects illustrating applications of the LP and MIP methods, students learn to implement optimization models using Xpress Optimization Suite.
This course is aimed at developers and rule writers. The course covers rule authoring using both interactive builder and advanced builder where participants will learn how to write using Structured Rule Language (SRL); project testing and deployment.
This course provides knowledge how Siron™ KYC is used in KYC business processes, e.g. customer onboarding or ongoing customer screening. It explains the details of the check processes and the configuration options from the business point of view. It also shows how business rules can be built in general, and in particular be used for risk assignment.
This course provides information about the features and functionality of Siron™ ACM Alert and Case Management. It shows the user's point of view, and it explains administration and configuration options for power users.
This course provides essential knowledge about the technical environ-ment and processes of Siron™ Embargo. It focuses on the aspects that are relevant for technical consultants and IT staff, in particular general understanding of technical prerequisites, and product and interface han-dling.
This course provides information about the technical environment of Si-ron®ACM Alert and Case Management.
This course explains elements and functions of the Siron™ programming lan-guage. It focuses on those aspects needed for rule building in the Siron™ prod-uct suite and shows examples of how to use Siron™ syntax in Siron™ AML and Siron™ KYC.
GEHA catches fraud before payout while improving case targeting twelve-fold.
It’s a fact: Accounts receivables and bad debt are soaring among hospitals and health systems, and it’s not just because of uninsured patients. Unpaid medical bills are also surging at an alarming rate for many middle-class citizens, due t...
The FICO® Cyber Risk Score provides an empirical, long-term indicator of network security risk based on network assets and proprietary analytical methods helping understand your security posture and assess the risk of third-party organizat...
Insurance fraud losses are rising in the US, the UK and many other markets across the globe. Insurers are experiencing higher incidences of opportunistic fraud (exaggeration of legitimate claims), as well as premium leakage due to misrepre...
In the fight against claims fraud, criminal rings constitute an elusive and costly portion of an estimated $80 billion lost to fraud annually. FICO® Identity Resolution Engine, an integral component of the FICO® Claims Fraud Solution, prov...