SaaS
AI/ML
Platform Design

CISO AI-Powered Address Risk Profile

Empowering investigators and compliance teams with faster and accurate decisions through AI risk scoring.

Year

2019-2020

Role

0→1 Product Strategy, End-to-End UX, UI Craft

At a Glance

CISO’s AI-Powered Address Risk Profile helps investigators and compliance teams spot risky addresses quickly. It combines AI risk scoring, clear explanations, and suspicious activity evidence in one place, turning hours of manual checks into minutes.

I led the effort to build CISO from the ground up, a cloud-based risk, compliance, and investigation platform powered by an AI wallet risk scoring engine. This case study focuses on the earliest stage, when we built the Address Risk Profile alongside an API for large-scale address screening. Together, these became the foundation of the platform before it expanded into investigation tools.

Impact

10x

customer growth after launch

95%

faster reviews and reporting

Problem

Crypto compliance teams had no reliable way to assess wallet risk—manual checks were slow, inconsistent, and blocked early adoption by Crypto trading firms and exchanges.

Solution

An AI-powered Address Risk Profile and API delivered fast, explainable wallet screening at scale, with suspicious activity evidence included to support compliance reporting and streamline workflows.

Context

In 2019, crypto firms were under pressure to meet compliance requirements, but wallet addresses were anonymous and difficult to evaluate. Exchanges often had no way to know who was on the other side of a transfer.

At the time, all we had was an internal dashboard monitoring blockchain transaction data. It wasn’t built for compliance, and clients said it took hours to review a single address. This gap made it clear we needed to design the full compliance workflow, from the first alert to reporting.

The product at the time is more of a data viewer than a compliance solution

Discovery

How Compliance Really Worked

Our early clients were crypto trading firms moving funds across exchanges and multiple sources. Large transfers often froze operations while teams manually checked wallet risk through dashboards and intel sources, sometimes taking days and creating real friction for customers.

With larger exchanges, I saw the same challenge from another angle: without fast wallet screening up front, compliance teams couldn’t move quickly. A clear risk score was the missing first step toward a proper compliance workflow.

Core Problems

Address
Address

No Context on Wallets

Most blockchain addresses were unlabeled. Outside of sanctioned lists, teams had no way to know if a wallet was safe or risky.

Transactions
Transactions

Confusing Transaction Logs

Bitcoin transfers often had many inputs and outputs. Raw logs make it hard to trace flows or explain why they were suspicious.

Workflow
Workflow

Gaps in the Workflow

Our dashboard showed data, but not the way compliance teams worked. Analysts had to juggle spreadsheets and explorers just to finish one case.

The Solution

CISO Address Risk Profile

The CISO Address Risk Profile was built as the foundation of the compliance platform. This was the first release that turned a raw data viewer into a compliance solution and opened the door to adoption by trading firms, exchanges, and financial institutions. It gave analysts a single page to see wallet risk scores tied to real-world entities, review suspicious activity evidence, trace flows in the transaction graph, and download risk reports for compliance.

+ API Integration for Scale

Alongside the platform, we paired the product with an API that allows batch screening of addresses. This made it easy for clients to integrate risk checks directly into their own monitoring tools. For teams that preferred a visual interface, we also designed a dashboard to track and manage queries in real time.

Approach

1. Reframe the Platform Around Compliance Workflows

I reframed the product from a data dashboard into a compliance platform, starting with the risk score as the foundation. Since we couldn’t build everything at once, I prioritized wallet screening and suspicious activity evidence as the first scalable features. These replaced the old dashboard and set the structure

2. Map Compliance Review Steps

I observed analysts during SAR (Suspicious Activity Report) reviews to understand how they judged risk, then worked with data scientists to translate those manual checks into measurable signals: behavioral activity, attributes/intel, and hacking/news exposure. Together with engineers, we combined them into a calibrated risk matrix that became the foundation of the AI-powered risk score.

Early diagram turning review steps into a three-signal risk score model

✅ Outcome

Manual checks collapsed into a single explainable score with evidence, cutting review time from hours to minutes.

3. Make Scores Explainable

The first score was just a flag with no context. Through client testing and iteration, I evolved it into a clear summary: a radar chart of the three signals paired with plain text explanations (e.g. “30% tied to bad actors”). This struck the balance between transparency for users and feasibility for engineering.

Iterations on the risk score to add evidence and make risky addresses clearer.

✅ Outcome

Analysts could see why a score was high, improving trust and adoption.

4. Provide Suspicious Activity Evidence for Reporting

Early versions of suspicious activity grouped suspicious activity on a timeline, but teams lacked an overview of total funds involved. Through iteration, I redesigned it into an aggregated evidence chart with drill-downs. The trade-off was backend limits, we couldn’t update continuously, so the engineering team optimized by batching updates daily. This kept the system efficient while still giving analysts faster pattern recognition and easier reporting.

❌ Option A: Expandable Timeline

Pros

  • Lightweight on engineering, easier to support

  • Shows frequency of suspicious activity over time

  • Allows analysts to expand specific batches for details

Cons

  • Only gives a basic overview upfront

  • Must click into each batch to see transaction breakdowns

  • Slower for spotting overall patterns

✅ Option B: Aggregated Analytics Chart

Pros

  • Comprehensive overview at a glance

  • Faster pattern recognition and easier reporting

  • Reduces manual clicking to piece together details

Cons

  • Heavier engineering effort to implement

  • Required backend optimization (solved with daily batch updates)

✅ Outcome

Compliance teams got faster pattern recognition and clearer evidence for SAR reporting without overwhelming the backend.

5. Build the Investigation Graph

With the risk score established, the next objective was to help analysts understand how funds moved. I collaborated with engineers to design a transaction graph that replaced endless scrolling through raw logs, allowing analysts to expand nodes, trace flows, and connect to labeled entities. Through workshops and iterations, we added filters and incremental loading to handle large datasets within backend limits.

From raw BTC logs to graph concept.

Final transaction graph after multiple iterations.

✅ Outcome

Investigations that once took hours in spreadsheets and explorers could now be completed in minutes, with patterns and suspicious flows visible at a glance.

The Impact

10x Buyer Growth After The Launch

This was the first product our company brought to market, and it opened the door with exchanges, financial institutions, and even government investigators. The BEI API and platform together became the entry point that closed deals and built trust with clients. Over time, as larger exchanges built their own screening tools, our product shifted toward investigation.

Reflections

If I had more time at the start, I would have invested in deeper research into the full compliance workflow. Later we learned that larger exchanges already had strong internal monitoring systems, and what they really needed from us was our API and the investigation platform. That insight shaped how CISO grew, the address risk profile became the foundation, and over time the transaction graph and investigation tools turned into the core of the product.

© 2025 Olivia Xu