Outlining Historic and Evolving Methods of Terrorist Financing to Strengthen CTF Oversight

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU06

• Differentiating sources of terrorist funding such as transnational criminal networks, sympathizer contributions and fake charities to ensure comprehensive CTF oversight
• Identifying historic and evolving methods of terrorist financing including hawala and cryptocurrencies to promote awareness of new and growing risks
• Reviewing best practices for disrupting terrorist financing systems such as creating CTF-centric risk assessments and formalizing systems for filing SARS and collaborating with law enforcement

Fintech Safety Check: Effective AML for the New Era of Financial Services

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU07

• Defining institutional risk appetite and tolerance and to build awareness by front line staff and potential fintech customers of bank standards and allocate oversight resources as needed
• Conducting risk-based assessment of discrete fintech products including those developed internally to ensure proper AML rigor in areas such as CIP, KYC/CDD and product lines
• Auditing fintech clients to determine adequacy of AML controls, document metrics such as SAR filing trends and sufficiency of organization’s culture of compliance

Crafting Detection and Investigation Systems to Fight Human Trafficking

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU10

• Detailing forms of human trafficking such as migrant smuggling, forced labor and sex slavery to build oversight models based on discrete typologies and institutional risks
• Training staff on red flags such as frequent wire transfers below required reporting thresholds and deposits/withdrawals indicating funnel account activity
• Filing SARs as warranted, facilitating information sharing under 314(b) and collaborating with law enforcement and NGOs to investigate and resolve alerts

Positive Actions: How to Reduce False Positives and Enhance AML Efficiency

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU11

• Reviewing current false positives to identify systemic causes such as reliance on legacy systems, static risk assessment models and regulatory expectation concerns

• Supplementing staff expertise with advanced analytics and predictive models to hone risk detection and foster robust alert signaling processes

• Working with oversight bodies to ensure revamped systems meet regulatory requirements and mitigate potential risks such as false negatives

Audit-Proof Your AML/FCC Training Programs

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU12

• Collaborating with lines of business to analyze individualized job duties and functions and craft risk-based employee training policies and procedures accordingly

• Crafting targeted training materials and delivery systems to produce demonstrable subject matter competence that strengthens compliance oversight

• Obtaining management buy-in on training’s value in achieving risk management goals and establish timely completion of required instruction as an institutional priority

MSB AML Best Practices: From Fintech Startups to Multinational Organizations

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU13

• Identifying unique MSB and Fintech challenges with AML issues such as KYC/CDD to develop effective oversight responses including enhanced monitoring models and risk management protocols
• Utilizing technology and training to meet regulatory expectations regarding agent oversight and strengthen risk management in areas such as onboarding and alert resolution
• Documenting ongoing AML/BSA compliance policies and best practices to foster and maintain productive relationships with banking partners

Understanding the Impact of the CDD Rule on Customer Risk Rating

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU14

Presented by LexisNexis
Identifying a customer or beneficial owner’s risk related to money laundering or terrorist financing is the cornerstone of a comprehensive CDD program. In light of the new CDD Rule, now is the perfect time to take a fresh look at your customer risk rating policies and procedures and revise how you determine customer and beneficial owner risk. In this session we will discuss how to:

• Develop a comprehensive Customer Risk Rating Program using quantitative and qualitative approaches
• Find unknown and hidden customer and beneficial owner risks
• Leverage technology and the customer risk rating to automate processes and reduce manual reviews

Driving the Shift to Next Generation AML: Emerging Technologies and Managed Services

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU15

Presented by Promontory
• Engaging industry experts and managed services to increase compliance program efficiency and effectiveness
• Exploring use case examples utilizing cognitive, RPA and other technology to identify financial criminals
• Improving the customer experience through optimized processes, machine learning, and enhanced privacy and security protocols

A Bright and Shining SAR: Practical Tips to Polish SAR Narratives

Oct 4, 2018 1:00pm ‐ Oct 4, 2018 2:15pm

Identification: THU20

• Reviewing assembled evidence to determine themes to be explored and documented in SAR narrative
• Creating a narrative outline to guide a linear chronicling of suspicious activities being reported
• Editing narrative to ensure information is complete and accurate, eliminate unnecessary or redundant details, and determine filing conforms to FinCEN guidance and expectations

Analyzing Regtech’s Risks and Rewards

Oct 4, 2018 1:00pm ‐ Oct 4, 2018 2:15pm

Identification: THU21

• Contrasting supervised learning and rules-based monitoring to optimize regtech’s potential to mitigate regulatory risks in areas such as sanctions and KYC
• Detailing best practices for risk-based systemic inputs to regtech systems to achieve optimal accuracy and functionality of data outcomes
• Resolving challenges to regtech implementation including costs, recruitment of talent and lack of data harmonization across business lines