Identification: THU06
• Differentiating sources of terrorist funding such as transnational criminal networks, sympathizer contributions and fake charities to ensure comprehensive CTF oversight
• Identifying historic and evolving methods of terrorist financing including hawala and cryptocurrencies to promote awareness of new and growing risks
• Reviewing best practices for disrupting terrorist financing systems such as creating CTF-centric risk assessments and formalizing systems for filing SARS and collaborating with law enforcement
Identification: THU07
• Defining institutional risk appetite and tolerance and to build awareness by front line staff and potential fintech customers of bank standards and allocate oversight resources as needed
• Conducting risk-based assessment of discrete fintech products including those developed internally to ensure proper AML rigor in areas such as CIP, KYC/CDD and product lines
• Auditing fintech clients to determine adequacy of AML controls, document metrics such as SAR filing trends and sufficiency of organization’s culture of compliance
Identification: THU10
• Detailing forms of human trafficking such as migrant smuggling, forced labor and sex slavery to build oversight models based on discrete typologies and institutional risks
• Training staff on red flags such as frequent wire transfers below required reporting thresholds and deposits/withdrawals indicating funnel account activity
• Filing SARs as warranted, facilitating information sharing under 314(b) and collaborating with law enforcement and NGOs to investigate and resolve alerts
Identification: THU11
• Reviewing current false positives to identify systemic causes such as reliance on legacy systems, static risk assessment models and regulatory expectation concerns
• Supplementing staff expertise with advanced analytics and predictive models to hone risk detection and foster robust alert signaling processes
• Working with oversight bodies to ensure revamped systems meet regulatory requirements and mitigate potential risks such as false negatives
Identification: THU12
• Collaborating with lines of business to analyze individualized job duties and functions and craft risk-based employee training policies and procedures accordingly
• Crafting targeted training materials and delivery systems to produce demonstrable subject matter competence that strengthens compliance oversight
• Obtaining management buy-in on training’s value in achieving risk management goals and establish timely completion of required instruction as an institutional priority
Identification: THU13
• Identifying unique MSB and Fintech challenges with AML issues such as KYC/CDD to develop effective oversight responses including enhanced monitoring models and risk management protocols
• Utilizing technology and training to meet regulatory expectations regarding agent oversight and strengthen risk management in areas such as onboarding and alert resolution
• Documenting ongoing AML/BSA compliance policies and best practices to foster and maintain productive relationships with banking partners
Identification: THU14
Presented by LexisNexis
Identifying a customer or beneficial owner’s risk related to money laundering or terrorist financing is the cornerstone of a comprehensive CDD program. In light of the new CDD Rule, now is the perfect time to take a fresh look at your customer risk rating policies and procedures and revise how you determine customer and beneficial owner risk. In this session we will discuss how to:
• Develop a comprehensive Customer Risk Rating Program using quantitative and qualitative approaches
• Find unknown and hidden customer and beneficial owner risks
• Leverage technology and the customer risk rating to automate processes and reduce manual reviews
Identification: THU15
Presented by Promontory
• Engaging industry experts and managed services to increase compliance program efficiency and effectiveness
• Exploring use case examples utilizing cognitive, RPA and other technology to identify financial criminals
• Improving the customer experience through optimized processes, machine learning, and enhanced privacy and security protocols
Identification: THU20
• Reviewing assembled evidence to determine themes to be explored and documented in SAR narrative
• Creating a narrative outline to guide a linear chronicling of suspicious activities being reported
• Editing narrative to ensure information is complete and accurate, eliminate unnecessary or redundant details, and determine filing conforms to FinCEN guidance and expectations
Identification: THU21
• Contrasting supervised learning and rules-based monitoring to optimize regtech’s potential to mitigate regulatory risks in areas such as sanctions and KYC
• Detailing best practices for risk-based systemic inputs to regtech systems to achieve optimal accuracy and functionality of data outcomes
• Resolving challenges to regtech implementation including costs, recruitment of talent and lack of data harmonization across business lines