Banks must grasp how criminals interact with their processes and systems. This allows upgraded security to defend customers.
Here’s how using the CEMMethodยฎ to help
User Research and Real Events.
- Study actual fraud cases.
- See how criminals use bank offerings.
- Document fraudsteยญr actions, steps taken, what they eยญngaged with, and victim emotions.
- Consider both faileยญd and successful crimes for a completeยญ view.
Chart Fraudster Customer Journeยญys.
- Use the Outside-In Strategic Matrix (OISM), but initially focus just on fraudsters.
- Understand the different types of fraudsters (do a Customer Categorization (CCAT) exercise)
- Develop a Successful Customer Outcome Canvas (SCOC)
- Map the steps from initial bank contact, like account creation through final crime, like unauthorized transactions.
- Calculate the Disruption Factor (DF)
- Use the Innovation approach to identify Moments of Truth (MOTs), weak points, and areยญas for improvement within this path.
- Based on the Innovation approach recalculate the DF to show the improvement
Note Every Interaction and Channel.
- Account for all criminal bank MOTs/touchpoints, including:
- Account creationLogin/authentication
- Transaction history
- Phone, email, and chat communications
- Customer support exchangeยญs
See how criminals exploit weยญaknesses at each steยญp.
- Complete a Risk-Impact matrix (RIM)
Data is Key Oveยญr Visuals.
- Mapping the experience visually matters, yet the focus should lie on the underlying information.
- Comprehend patterns, triggeยญrs, and behavioural signals.
- Look beyond the aesthetic appeal of the CX map to extract invaluable insights.
Customer Vieยญwpoint and Emotions.
- Step into a fraudster’s shoes. Use the โempty chair approachโ.
- What driveยญs them? What emotions arise?
- Also, eยญmpathize with legitimate customeยญrs who fall prey to fraud.
- Understand their feelings of anxiety, frustration, and vulnerability.
Cross-Teยญam Collaboration.
- Involve teams spanning fraud preveยญntion, UX design, security expeยญrts, and customer support.
- Share insights, collaborating to address vulneยญrabilities identified in theยญ fraudster’s journey.
Prioritizing Account Takeover (ATO).
- Recognize fraudsters directly target user accounts.
- Bolster security measures around account creation, login, and password management.
- Educate users on seยญcure practices to preveยญnt ATO.
Adapting to Evolving Trends.
- Stay informed about shifting fraud tactics.
- As fraudsters adapt, so must your defences.
- Monitor phishing, social engineยญering, and other fraudster meยญthods.
Balancing Security and User Experience.
- You should enhanceยญ security without hindering genuineยญ users.
- Make sure theยญ security upgrades don’t negativeยญly affect user expeยญrience.
- Put security measures smoothly, no hassle for real customers.
Keep Improving.
- Revieยญw the fraudster’s plan often, updateยญ CX map regularly.
- Revisit the OISM and CCAT and update them on a regular basis
- Try new cheยญcks, and analyze if they work well against threยญats.
- Learn from actual incidents and modify practices accordingly.

Frequently Asked Questions Related Bank Fraud and the CEMMethodยฎ
Frequently Asked Questions Related to Bank Fraud and the CEMMethodยฎ
- What is CEMMethodยฎ? How does the CEMMethodยฎ help? The CEMMethodยฎ is a comprehensive approach that aims to improve customer experiences by aligning all aspects of an organization with customer needs and experiences.
It helps by:
> Lowering costs, increasing revenues, and improving service through the Triple Crown approach.
> Utilizing tools like the Successful Customer Outcome Canvas (SCOC) and the Outside-In Strategic Matrix (OISM) to identify and prioritize key customer outcomes. - Implementation Challenges: Common challenges banks face when implementing the CEMMethodยฎ for fraud prevention include:
> Integrating the method with existing processes and systems in a way that is both effective and efficient.
> Ensuring that the focus remains on customer needs and experiences while also addressing internal processes. - Measuring Success: Banks measure the success and effectiveness of the CEMMethodยฎ in fraud prevention by:
> Assessing the impact on key outcomes such as lower costs, higher revenues, and improved service.
> Evaluating the effectiveness of techniques and approaches in real-world applications and their alignment with customer needs. - Integration with Existing Systems: The CEMMethodยฎ can be integrated with existing bank systems and processes for seamless fraud prevention by:
> Aligning with technologies such as AI, digitization, and machine learning for significant cost reductions and revenue uplift.
> Adapting the portfolio of techniques and approaches to suit all circumstances, ensuring rigorous dashboards focused Outside-In.
For more detailed information and practical applications, you can explore the resources and guides available on the CEMMethodยฎ

Steve Towers, BPG’s Chief Experience Officer, is an expert in customer experience and process transformation who enjoys spreading his enthusiasm for this field through coaching, consultancy, keynote talks and books (twelve published).
Through the CEMMethodยฎ, now in version 15, he and the BPG affiliates help companies win the triple crown ๐ โthe simultaneous ability to Grow Revenue, Reduce Costs, and Improve service.
With over four decades of experience working with large enterprises worldwide, Steve has distilled the successful strategies of top-performing organizations into a proprietary methodology that can be easily imparted to CX and Process teams and executives.
His forte lies in envisioning the future of customer-centricity, customer experience, process management and realizing long-term benefits from business transformation. Steve’s approach combines customer-focused thinking, cutting-edge technologies, and a human touch.
Steve is also an entrepreneur and an early-stage investor in innovative software companies.
Subscribe to this channel and reach out and connect with Steve via https://linktr.ee/stevetowers
