Credits: None available.
• Utilizing risk-based assessments to flag potential TBML activity such as invoice manipulation, phantom shipping and unclear nature of transactions or end user identity
• Crafting unique trade CDD models to detail risks such as entity business model, principal counter-parties and establish triggering events for EDD or updated reviews
• Leveraging rules-based monitoring with tools such as Natural Language Processing to reconcile TBML issues such as discordant trade data reporting platforms
You must be logged in and own this session in order to