Hello! Let Me Introduce Myself

data scientist
Share Button

As one of the newest employees at Easy Solutions, I'd like to take this opportunity to introduce myself. I am joining the Company as a Data Scientist. Before becoming part of Easy Solutions, I spent my time working at SIX Financial Services in Luxembourg and doing a PhD in Machine Learning at Luxembourg University. During that time, I focused my work on developing new Machine Learning models for fraud detection. In particular, I found that traditional Statistical Models are not well-aligned with business goals, in the sense that they don’t take the actual financial gains and losses present in fraud detection into account. Therefore, I worked on developing algorithms targeted to maximize the actual profit of the financial institution. Before my PhD, I worked at GEMoney and ScotiaBank in the statistical modeling departments, mostly creating credit risk scorecards and general models for risk analytics. Lastly, I did a B.S. and M.A. in Industrial Engineering at Universidad de los Andes in Bogota.

You may be wondering why I moved from Europe to Bogota, Colombia – trust me, you are not alone, as people on both sides of the Atlantic have asked me that same question. The truth is that I am honored to be working for a company with such huge potential that has already positioned itself as a leader in fraud prevention. But for me, more importantly, a company with a strong focus on innovation and who believes in the power of Data Science and Machine Learning to create better fraud prevention and detection solutions for its customers.

From now on, I will be sharing my thoughts about Machine Learning and its applications for information security and fraud prevention. If you want to get an early taste of what I have to say, take a look at the academic and industrial papers I have written (www.albahnsen.com/publications). There, you can also find several discussions about machine learning and fraud detection.

I will be in in touch soon!

Related Posts

Beta Now Available: Swordphish Predictive Phishing Risk Technology Earlier this year, our Detect Monitoring System team was faced with increased attacks across our customer base. This aligns with the Anti Phishing Working Group’s (APWG) findings
RSA Conference 2016 Recap -- Part II Though nothing will drive them away We can beat them, just for one day We can be Heroes, just for one day Heroes, 1977 Brian Eno, David Bowie Listening to the legendary David Bowie singing Heroes while everybody leaves the room will be the last, enduring impression of RSAC 2016. I’d like to think that, coming from a company that has a lot to do with...cryptography, where even chance has to be carefully factored in. It is not a random choice, but probably the slightly obfuscated summary of this conference. While the good guys cannot make the bad guys desist, we can beat them, forever and ever. To win the battle with the bad guys, a new job title is born - the hunter. A hunter is capable of reading the matrix, detecting in...the mass of data collected the telltale signs of an attack or an infection. Then she deploys digital traps and countermeasures to stop the adversary, analyzes the malicious code injected, studies the attack patterns and identifies the resources used for the attack and, eventually, tracks down the attacker. Finally, she launches a deadly counterstrike. Phishing and malware-laden websites are taken...down. Command and control machines are seized (?). Cybercriminals are arrested. Pretty epic, isn’t it? Even the hunter, however, could soon become obsolete. We are on the verge of the Rise of the Hacking Machines! No, it is not a cyberpunk novel. It is the title for Konstantinos Karagiannis’s (CTO Security Consulting, BT Americas) intervention. Today, AIs are successfully competing...with the best humans at most intellectual games. Techniques, like the ones developed by Google DeepMind for AlphaGo, may be applied to security, intelligently scanning network and software for vulnerabilities. And, why not, for performing intelligent attacks? Or responding to such attacks? What we see today in the cybersecurity landscape is, according to Johannes Ullrich, director of SANS’...Internet Storm Center, is a shift in cybercriminal targets. First, all personal and financial data apparently has already been stolen. Just sum up the numbers from the last, major breaches. Therefore the value of this data is very limited. As a reaction, cybercriminals are differentiating their business. Enter ransomware. And ransom-motivated DDOS. Second, the OS vendors are starting to do a...better job of avoiding unwanted software running on endpoint machines. Cybercriminals are therefore infecting the building blocks (libraries) and tools (IDEs and compilers) used by legitimate developers to reach the machines of their victims. Or they are hacking developer’s workstations to inject malicious content directly in the source code, as in the case of Juniper Networks. Finally, IoT...devices are starting to become commonplace, and with their limited embedded security, can be used as attack vectors. A myriad of uncontrolled and uncontrollable little computing devices that can be put to nefarious use. The situation is difficult, challenging, and exciting, more than ever

Leave a Reply

Your email address will not be published. Required fields are marked *