{"id":11382,"date":"2018-10-31T09:53:45","date_gmt":"2018-10-31T08:53:45","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11382\/"},"modified":"2019-12-31T09:33:47","modified_gmt":"2019-12-31T08:33:47","slug":"quelle-perspective-pour-la-lutte-contre-la-fraude-12","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/","title":{"rendered":"Revolution technologique : quelle perspective pour la lutte contre la fraude ? (1\/2)"},"content":{"rendered":"<p>La protection des actifs, notamment contre leur vol ou leur d\u00e9tournement, est depuis longtemps un enjeu majeur des entreprises. Les dispositifs de lutte contre la fraude s\u2019organisent autour de trois grands piliers\u00a0: la pr\u00e9vention, la d\u00e9tection et la r\u00e9action. Ces dispositifs historiques font aujourd\u2019hui face \u00e0 de multiples \u00e9volutions qui offrent \u00e9galement des opportunit\u00e9s sans pr\u00e9c\u00e9dent que les entreprises se doivent de saisir.<\/p>\n<p>Les exp\u00e9riences et exp\u00e9rimentations du secteur bancaire, en avance sur ces probl\u00e9matiques, permettent d\u2019envisager les perspectives \u00e0 venir et fournit donc un prisme d\u2019analyse utile aussi pour les autres secteurs.<\/p>\n<h2>Menaces, usages, r\u00e9glementations : trois \u00e9volutions majeures qui impliquent des adaptations des dispositifs antifraude<\/h2>\n<p>Les transformations business et technologiques dans l\u2019ensemble des secteurs d\u2019activit\u00e9 font apparaitre des \u00e9volutions impactant directement les dispositifs antifraude historiques.<\/p>\n<p>Les menaces \u00e9voluent, les <strong>pratiques de fraude se sont professionnalis\u00e9es<\/strong> avec de nouveaux outils et de nouvelles pratiques. Prenons l&#8217;exemple du phishing : m\u00eame sans connaissances informatiques, une cellule de fraudeurs entrain\u00e9e peut d\u00e9sormais acheter un kit de phishing pr\u00eat \u00e0 l&#8217;emploi et met en moyenne seulement trois minutes entre une connexion frauduleuse et une sortie d&#8217;argent. Les<strong> tentatives de fraude se sont donc d\u00e9multipli\u00e9es<\/strong> ces derni\u00e8res ann\u00e9es.<\/p>\n<p>En parall\u00e8le, les usages \u00e9voluent vers une <strong>plus forte digitalisation<\/strong>, parfois dict\u00e9s directement par <strong>des \u00e9volutions r\u00e9glementaires<\/strong>, \u00e0 la fois \u00e0 destination des clients ou \u00e0 destination des collaborateurs. Par exemple la mise en place de l\u2019Instant Payment en France ou de la directive europ\u00e9enne sur les services de paiement 2\u00e8me version (DSP2) pr\u00e9voient des virements instantan\u00e9s. Ces nouveaux usages acc\u00e9l\u00e8rent les transactions financi\u00e8res entre les acteurs entrainant par la m\u00eame occasion des <strong>besoins d\u2019\u00e9valuation instantan\u00e9e<\/strong> des risques de fraude. De plus, cette multiplication des canaux de paiement entra\u00eene une<strong> augmentation de la surface d&#8217;attaque<\/strong> avec notamment une diversification des malwares bancaires aux applications mobiles ainsi que l&#8217;apparition de pratiques d&#8217;ing\u00e9nierie sociale complexes <strong>multicanales<\/strong> et appuy\u00e9es sur une compr\u00e9hension des processus m\u00e9tier.<\/p>\n<p>La diversification des fraudes, la volum\u00e9trie associ\u00e9e et l&#8217;augmentation des besoins de traitement instantan\u00e9 rend le traitement manuel presque impossible. La cr\u00e9ation de r\u00e8gles d&#8217;alertes plus restrictives pour minimiser les volumes ferait cependant courir le risque de manquer un grand nombre de fraudes.<\/p>\n<p>Dans ce nouveau paysage, o\u00f9 la fraude devient de plus en plus technologique et peut avoir de multiples origines (clients, donneurs d\u2019ordres, sous-traitants, fournisseurs, administrateurs\u2026), les strat\u00e9gies de d\u00e9tection doivent \u00e9voluer et passer d\u2019une d\u00e9tection r\u00e9active des fraudes connues \u00e0 une d\u00e9tection proactive des menaces encore inconnues.<\/p>\n<h2>Les nouvelles technologies, l&#8217;avenir de l&#8217;antifraude pour faire face \u00e0 ce nouveau paradigme<\/h2>\n<p><em>L\u2019approche historique de la d\u00e9tection de fraude est fond\u00e9e principalement sur la d\u00e9finition de r\u00e8gles unitaires g\u00e9n\u00e9rant une alerte en cas de non-respect d\u2019un des crit\u00e8res et sur la corr\u00e9lation d\u2019\u00e9v\u00e9nements, consistant \u00e0 mettre en \u0153uvre des r\u00e8gles m\u00e9tiers plus avanc\u00e9es prenant en compte plusieurs types de donn\u00e9es, afin de g\u00e9n\u00e9rer une alerte lorsque apparaissent des indices du d\u00e9roulement d\u2019un sc\u00e9nario de fraude connu.<\/em><\/p>\n<p>Cette approche tout en demeurant efficace pour la d\u00e9tection de fraudes connues, par exemple dans la lutte contre le <em>phishing<\/em>, n\u2019est plus suffisante pour faire face aux \u00e9volutions en cours. Une approche hybride doit \u00eatre enrichie sur la base des nouvelles technologies pr\u00e9sentes sur le march\u00e9 (intelligence artificielle \/ Machine Learning, biom\u00e9trie comportementale&#8230;) qui offrent deux grandes perspectives d\u2019enrichissement des dispositifs actuels.<\/p>\n<ol>\n<li><strong>\u00a0<\/strong>Passer d\u2019une d\u00e9tection de masse \u00e0 une d\u00e9tection individualis\u00e9e beaucoup plus fine qui va se concentrer sur les changements de comportement.<\/li>\n<\/ol>\n<p>Le Machine Learning a la possibilit\u00e9 de cr\u00e9er des profils individuels \u00e0 chaque client. Ces profils, compos\u00e9s de variables construites \u00e0 l\u2019aide des donn\u00e9es collect\u00e9es, vont permettre de mod\u00e9liser le comportement. Ainsi, les algorithmes utilis\u00e9s vont comparer le profil du client (et donc son habitude) avec un \u00e9v\u00e9nement donn\u00e9 et, de fait, remonter une anomalie lorsqu\u2019une divergence apparait. A noter que le nombre de variables manipul\u00e9es peut facilement d\u00e9passer plusieurs dizaines, l\u00e0 o\u00f9 des r\u00e8gles statiques n\u2019int\u00e8greront que quelques param\u00e8tres, permettant ainsi de d\u00e9multiplier le potentiel de d\u00e9tection ou de r\u00e9duire le nombre de faux positif.<\/p>\n<ol start=\"2\">\n<li>Diversifier les p\u00e9rim\u00e8tres \u00e0 couvrir en b\u00e9n\u00e9ficiant des \u00e9conomies d\u2019\u00e9chelle apport\u00e9es par ces technologies (mutualisation des infrastructures big data, massification des donn\u00e9es, automatisation permettant un gain de temps pour les analystes\u2026)<\/li>\n<\/ol>\n<p>Ces technologies ont la capacit\u00e9 d\u2019int\u00e9grer et corr\u00e9ler, gr\u00e2ce \u00e0 des <em>Data Lake<\/em> sur lesquels elles s\u2019appuient, des volum\u00e9tries importantes de donn\u00e9es brutes, techniques ou m\u00e9tiers (logs applicatifs, connaissances clients, op\u00e9rations financi\u00e8res\u2026) et d\u2019apporter un potentiel d\u2019enrichissement par des donn\u00e9es ext\u00e9rieures (liste de surveillance, transformation d\u2019adresses IP en localisations physiques\u2026). Pour tirer le maximum de b\u00e9n\u00e9fices des syst\u00e8mes antifraudes, le <em>Data Lake<\/em> doit disposer d\u2019un historique de donn\u00e9es pertinentes et conformes, \u00e0 savoir 13 mois pour des personnes physiques et 6 mois pour des personnes morales.<\/p>\n<p>Pour autant ces technologies ne sont pas \u00ab\u00a0magiques\u00a0\u00bb, elles n\u00e9cessitent d\u2019avoir \u00e0 disposition des donn\u00e9es en qualit\u00e9 et en quantit\u00e9 afin de r\u00e9aliser un important travail pr\u00e9paratoire sur la construction des variables qui portent les capacit\u00e9s de d\u00e9tection des algorithmes. Cette phase de construction n\u00e9cessite un apport d\u2019expertise \u00e0 la fois m\u00e9tier mais aussi technologique (<em>datascience<\/em>, d\u00e9veloppeurs, etc.).<\/p>\n<figure id=\"post-11384 media-11384\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11384\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/11\/schema-1.png\" alt=\"\" width=\"459\" height=\"647\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/11\/schema-1.png 519w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/11\/schema-1-135x191.png 135w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/11\/schema-1-28x39.png 28w\" sizes=\"auto, (max-width: 459px) 100vw, 459px\" \/><\/figure>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; les principales m\u00e9thodes de d\u00e9tection<\/em><\/p>\n<p>Le choix des algorithmes n\u2019est \u00e9galement pas \u00e0 n\u00e9gliger, notamment d\u2019un point de vue de la transparence. En effet, certains outils sont bas\u00e9s sur des algorithmes o\u00f9 les r\u00e9sultats sont difficilement justifiables. Le manque de visibilit\u00e9 sur les crit\u00e8res d\u2019\u00e9tablissement des r\u00e9sultats entraine une remont\u00e9e d\u2019alertes en \u00ab\u00a0bo\u00eete noire\u00a0\u00bb et ne permet pas toujours de justifier les blocages aux clients. Une trop grande opacit\u00e9 peut \u00e9galement avoir des cons\u00e9quences juridiques, voir \u00eatre ill\u00e9gale, lorsque ces alertes ont des cons\u00e9quences directes sur des clients.<\/p>\n<p>Si ce premier article pr\u00e9sente quelles sont les technologies d&#8217;avenir dans la lutte contre la fraude, un deuxi\u00e8me article viendra d\u00e9tailler comment les int\u00e9grer au mieux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La protection des actifs, notamment contre leur vol ou leur d\u00e9tournement, est depuis longtemps un enjeu majeur des entreprises. Les dispositifs de lutte contre la fraude s\u2019organisent autour de trois grands piliers\u00a0: la pr\u00e9vention, la d\u00e9tection et la r\u00e9action. Ces&#8230;<\/p>\n","protected":false},"author":1132,"featured_media":11390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3229,36],"tags":[3062,533,165,2885,3307,550,2733],"coauthors":[2570,3064],"class_list":["post-11382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-for-financial-services","category-cybersecurity-digital-trust","tag-anti-fraude","tag-banque","tag-confiance","tag-detection","tag-financial-services-cyber","tag-fraude","tag-machine-learning"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight<\/title>\n<meta name=\"description\" content=\"Les dispositifs antifraude font face aujourd&#039;hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"Les dispositifs antifraude font face aujourd&#039;hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-31T08:53:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T08:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Martin Descazeaux\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin Descazeaux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\"},\"author\":{\"name\":\"m@THIEU\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d32e77bd2cd2bb2261b4f64f06113d8c\"},\"headline\":\"Revolution technologique : quelle perspective pour la lutte contre la fraude ? (1\/2)\",\"datePublished\":\"2018-10-31T08:53:45+00:00\",\"dateModified\":\"2019-12-31T08:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\"},\"wordCount\":1113,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"anti fraude\",\"Banque\",\"confiance\",\"d\u00e9tection\",\"financial services cyber\",\"fraude\",\"Machine learning\"],\"articleSection\":[\"Cyber for Financial Services\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\",\"name\":\"Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2018-10-31T08:53:45+00:00\",\"dateModified\":\"2019-12-31T08:33:47+00:00\",\"description\":\"Les dispositifs antifraude font face aujourd'hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Revolution technologique : quelle perspective pour la lutte contre la fraude ? (1\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d32e77bd2cd2bb2261b4f64f06113d8c\",\"name\":\"m@THIEU\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mthieu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight","description":"Les dispositifs antifraude font face aujourd'hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/","og_locale":"en_US","og_type":"article","og_title":"Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight","og_description":"Les dispositifs antifraude font face aujourd'hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/","og_site_name":"RiskInsight","article_published_time":"2018-10-31T08:53:45+00:00","article_modified_time":"2019-12-31T08:33:47+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Martin Descazeaux","twitter_misc":{"Written by":"Martin Descazeaux","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/"},"author":{"name":"m@THIEU","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d32e77bd2cd2bb2261b4f64f06113d8c"},"headline":"Revolution technologique : quelle perspective pour la lutte contre la fraude ? (1\/2)","datePublished":"2018-10-31T08:53:45+00:00","dateModified":"2019-12-31T08:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/"},"wordCount":1113,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["anti fraude","Banque","confiance","d\u00e9tection","financial services cyber","fraude","Machine learning"],"articleSection":["Cyber for Financial Services","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/","url":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/","name":"Quelle perspective pour la lutte contre la fraude ? (1\/2) - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2018-10-31T08:53:45+00:00","dateModified":"2019-12-31T08:33:47+00:00","description":"Les dispositifs antifraude font face aujourd'hui \u00e0 de multiples \u00e9volutions. Quelles sont donc les perspectives pour la lutte contre la fraude ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/10\/quelle-perspective-pour-la-lutte-contre-la-fraude-12\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Revolution technologique : quelle perspective pour la lutte contre la fraude ? (1\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d32e77bd2cd2bb2261b4f64f06113d8c","name":"m@THIEU","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mthieu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11382"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11382\/revisions"}],"predecessor-version":[{"id":11388,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11382\/revisions\/11388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11390"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11382"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}