AML is an ever-changing profession with rapidly evolving regulations, technology and financial crime methods such as cyberattacks. Nobody can say for certain what will happen in the years to come, but we can be sure that there will be changes. This fall, join over 2,000 influential anti-financial crime professionals, regulators, law enforcement investigators and government officials for expert analysis of the changing compliance landscape—and practical strategies for mastering the complexities of this demanding new era. Will you ace the new AML? Learn how in Las Vegas at ACAMS’ 17th Annual AML & Financial Crime Conference.
Preview Available
Identification: THU06
• Differentiating sources of terrorist funding such as transnational criminal networks, sympathizer contributions and fake charities to ensure comprehensive CTF oversight
• Identifying historic and evolving methods of terrorist financing including hawala and cryptocurrencies to promote awareness of new and growing risks
• Reviewing best practices for disrupting terrorist financing systems such as creating CTF-centric risk assessments and formalizing systems for filing SARS and collaborating with law enforcement
Identification: THU07
• Defining institutional risk appetite and tolerance and to build awareness by front line staff and potential fintech customers of bank standards and allocate oversight resources as needed
• Conducting risk-based assessment of discrete fintech products including those developed internally to ensure proper AML rigor in areas such as CIP, KYC/CDD and product lines
• Auditing fintech clients to determine adequacy of AML controls, document metrics such as SAR filing trends and sufficiency of organization’s culture of compliance
Preview Available
Identification: THU10
• Detailing forms of human trafficking such as migrant smuggling, forced labor and sex slavery to build oversight models based on discrete typologies and institutional risks
• Training staff on red flags such as frequent wire transfers below required reporting thresholds and deposits/withdrawals indicating funnel account activity
• Filing SARs as warranted, facilitating information sharing under 314(b) and collaborating with law enforcement and NGOs to investigate and resolve alerts
Identification: THU11
• Reviewing current false positives to identify systemic causes such as reliance on legacy systems, static risk assessment models and regulatory expectation concerns
• Supplementing staff expertise with advanced analytics and predictive models to hone risk detection and foster robust alert signaling processes
• Working with oversight bodies to ensure revamped systems meet regulatory requirements and mitigate potential risks such as false negatives
Preview Available
Identification: THU12
• Collaborating with lines of business to analyze individualized job duties and functions and craft risk-based employee training policies and procedures accordingly
• Crafting targeted training materials and delivery systems to produce demonstrable subject matter competence that strengthens compliance oversight
• Obtaining management buy-in on training’s value in achieving risk management goals and establish timely completion of required instruction as an institutional priority
Identification: THU13
• Identifying unique MSB and Fintech challenges with AML issues such as KYC/CDD to develop effective oversight responses including enhanced monitoring models and risk management protocols
• Utilizing technology and training to meet regulatory expectations regarding agent oversight and strengthen risk management in areas such as onboarding and alert resolution
• Documenting ongoing AML/BSA compliance policies and best practices to foster and maintain productive relationships with banking partners
Preview Available
Identification: THU14
Presented by LexisNexis
Identifying a customer or beneficial owner’s risk related to money laundering or terrorist financing is the cornerstone of a comprehensive CDD program. In light of the new CDD Rule, now is the perfect time to take a fresh look at your customer risk rating policies and procedures and revise how you determine customer and beneficial owner risk. In this session we will discuss how to:
• Develop a comprehensive Customer Risk Rating Program using quantitative and qualitative approaches
• Find unknown and hidden customer and beneficial owner risks
• Leverage technology and the customer risk rating to automate processes and reduce manual reviews
Preview Available
Identification: THU15
Presented by Promontory
• Engaging industry experts and managed services to increase compliance program efficiency and effectiveness
• Exploring use case examples utilizing cognitive, RPA and other technology to identify financial criminals
• Improving the customer experience through optimized processes, machine learning, and enhanced privacy and security protocols
Preview Available
Identification: THU20
• Reviewing assembled evidence to determine themes to be explored and documented in SAR narrative
• Creating a narrative outline to guide a linear chronicling of suspicious activities being reported
• Editing narrative to ensure information is complete and accurate, eliminate unnecessary or redundant details, and determine filing conforms to FinCEN guidance and expectations
Preview Available
Identification: THU21
• Contrasting supervised learning and rules-based monitoring to optimize regtech’s potential to mitigate regulatory risks in areas such as sanctions and KYC
• Detailing best practices for risk-based systemic inputs to regtech systems to achieve optimal accuracy and functionality of data outcomes
• Resolving challenges to regtech implementation including costs, recruitment of talent and lack of data harmonization across business lines