Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity News

Beyond Business Intelligence – Using AI to Gain Sharper Insights From Your Loss Prevention Data

By Jason Wolfgang
AI-cyber
November 12, 2019

We’ve got lots of data in Loss Prevention (LP): months of video stored somewhere in our infrastructure and multiple systems that house financial data. For years, we’ve described the need for a data pipeline to consolidate all that data into one place to better understand our business. The data pipeline implementation takes the raw data in an operation and stores it in a data lake. From the data lake, one can join all this disparate data and video together in multiple ways to derive more insight from these assets.

Let’s say an LP staff member finds a new exception scenario that is causing your organization to lose money. Cashiers are creating point of sale transactions when the video surveillance shows no customer is present. You can take this new exception scenario and aggregate the data into a polished data mart—a place storing only the subset of data necessary for LP end users to effectively understand the exception. This process makes the charts appear faster on the screen when this new insight is shared with colleagues.

“We found a great new LP exception scenario in our data! So, now what?”

Depending on the Business Intelligence (BI) platform bought or built, you can either create a clean looking dashboard with the same tool with which the data is modeled; or you can buy/build an additional tool to present the data to stakeholders:

  • They need to access it:  VPN? Web application? What credentials do they use?
  • You must ensure they only see data they are entitled to see: Are they allowed to see data from that division or that one or…?
  • They must understand what they’re looking at: What type of chart? What’s the drill through sequence? What action should they take after assimilating the data?

What’s the point of providing this new insight to everyone?

That question just above is the kicker, and it is easy to forget. How to make this new LP Exception Insight worth all this work? How many BI tools include case management? If your team needs to act on this data, they should be able to do it without going to a separate application. So, you can buy/build an end user application with the following workflow:

  1. Exception takes place
  2. Data is aggregated and rolled-up through LP data pipeline
  3. The appropriate end user gets an alert to review the exception
  4. The LP end user reviews the exception and takes the appropriate action within the application
  5. They’re catching insider thieves in droves and increasing the bottom line by reducing shrinkage

Good news, right? But looking closer, you realize only 20 percent of potential end users have adopted the application. With greater adoption, you could increase your savings by a factor of five! 

You promised me AI in this article—where is it?

Alright, here we go: You’ve identified the A players in your LP operation who are viewing their videos, classifying them as fraud and getting their tasks done to fix the problems. You wish you could clone them and put them in your under-performing locations. Now for the possibly far-fetched AI claim:

Not only can applying AI to this workflow clone your A players, it can also make your A players better! 

If you’ll indulge me, I’ll explain. First, if your question is: Should the video classification data from A players be sent back through the LP data pipeline into the data lake? The answer is: Absolutely! 

Now that the video classifications of fraudulent actions are back in your data lake, you can train a machine learning model based on the data your A players have classified as fraud. The goal of the AI model is to find trends in the exception transactions where your A players found fraud, then proactively identify transactions with similar trends as potential fraud. Once the model is trained, you can test the machine learning model against exception transactions that have not yet been classified. You know, the ones from the underperforming store locations where nobody looks at their tasks and problems are going unsolved.

From there, you can create a feedback loop with your A players to see if they agree with the output of the fraud detection machine learning model. This is an iterative process, and there are a bunch of knobs you can turn to fine tune a machine learning model. I won’t sugar coat it: this can be hard work. There isn’t an “Easy Button,” however; the benefits can be well worth the investment.

Only exceptions that are thoroughly understood work for manual classification—you have to know what to look for. Remember all the work you did in your data lake to flag this exception in the first place? Fraudulent behaviors may be complex and change over time. The efforts of your best classification talent can be invested into a machine learning model without overworking them. The machine learning model can find additional trends in, for example, fraudulent receipt data that even the best humans couldn’t find. This is how AI can take the efforts of your best talent and make them better. You’re not replacing them, because without their hard work there would be nothing with which to train the machine learning model. Our humans and machines are working in harmony.

Beyond BI – AI and action

There you have it. It is more than just good data and beautiful charts, but the results aren’t mythically far-fetched either. The data analysis best practices from years past are not irrelevant; as an industry, we’re simply able to build on them to keep getting better at reducing fraud and shrinkage within operations. How many vendors does it take to pull this off? What skillsets do those vendors need? To be continued…

KEYWORDS: artificial intelligence (AI) data analytics loss prevention machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jason wolfgang
Jason Wolfgang is a Product Manager for STANLEY Products & Solutions, where he collaborates with customers to build loss prevention exception-based reporting solutions. He has scoped, managed, built, tested and deployed various business intelligence modules throughout his career. Jason has worked in the healthcare, access control, sales engagement and parking management industries.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Services

    Combines Video and RFID Data for Business Insights and Loss Prevention

    See More
  • half open laptop

    What data loss prevention can do to protect your most valuable asset

    See More
  • cashier

    Using video analytics to boost retail loss prevention

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing