Outlining Historic and Evolving Methods of Terrorist Financing to Strengthen CTF Oversight

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU06

• Differentiating sources of terrorist funding such as transnational criminal networks, sympathizer contributions and fake charities to ensure comprehensive CTF oversight
• Identifying historic and evolving methods of terrorist financing including hawala and cryptocurrencies to promote awareness of new and growing risks
• Reviewing best practices for disrupting terrorist financing systems such as creating CTF-centric risk assessments and formalizing systems for filing SARS and collaborating with law enforcement

Moderator(s):

Speaker(s):


Fintech Safety Check: Effective AML for the New Era of Financial Services

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU07

• Defining institutional risk appetite and tolerance and to build awareness by front line staff and potential fintech customers of bank standards and allocate oversight resources as needed
• Conducting risk-based assessment of discrete fintech products including those developed internally to ensure proper AML rigor in areas such as CIP, KYC/CDD and product lines
• Auditing fintech clients to determine adequacy of AML controls, document metrics such as SAR filing trends and sufficiency of organization’s culture of compliance

Moderator(s):

Speaker(s):


Crafting Detection and Investigation Systems to Fight Human Trafficking

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU10

• Detailing forms of human trafficking such as migrant smuggling, forced labor and sex slavery to build oversight models based on discrete typologies and institutional risks
• Training staff on red flags such as frequent wire transfers below required reporting thresholds and deposits/withdrawals indicating funnel account activity
• Filing SARs as warranted, facilitating information sharing under 314(b) and collaborating with law enforcement and NGOs to investigate and resolve alerts

Moderator(s):

Speaker(s):


Positive Actions: How to Reduce False Positives and Enhance AML Efficiency

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU11

• Reviewing current false positives to identify systemic causes such as reliance on legacy systems, static risk assessment models and regulatory expectation concerns

• Supplementing staff expertise with advanced analytics and predictive models to hone risk detection and foster robust alert signaling processes

• Working with oversight bodies to ensure revamped systems meet regulatory requirements and mitigate potential risks such as false negatives

Moderator(s):

Speaker(s):


Audit-Proof Your AML/FCC Training Programs

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU12

• Collaborating with lines of business to analyze individualized job duties and functions and craft risk-based employee training policies and procedures accordingly

• Crafting targeted training materials and delivery systems to produce demonstrable subject matter competence that strengthens compliance oversight

• Obtaining management buy-in on training’s value in achieving risk management goals and establish timely completion of required instruction as an institutional priority

Moderator(s):

Speaker(s):


MSB AML Best Practices: From Fintech Startups to Multinational Organizations

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU13

• Identifying unique MSB and Fintech challenges with AML issues such as KYC/CDD to develop effective oversight responses including enhanced monitoring models and risk management protocols
• Utilizing technology and training to meet regulatory expectations regarding agent oversight and strengthen risk management in areas such as onboarding and alert resolution
• Documenting ongoing AML/BSA compliance policies and best practices to foster and maintain productive relationships with banking partners

Moderator(s):

Speaker(s):


Understanding the Impact of the CDD Rule on Customer Risk Rating

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU14

Presented by LexisNexis
Identifying a customer or beneficial owner’s risk related to money laundering or terrorist financing is the cornerstone of a comprehensive CDD program. In light of the new CDD Rule, now is the perfect time to take a fresh look at your customer risk rating policies and procedures and revise how you determine customer and beneficial owner risk. In this session we will discuss how to:

• Develop a comprehensive Customer Risk Rating Program using quantitative and qualitative approaches
• Find unknown and hidden customer and beneficial owner risks
• Leverage technology and the customer risk rating to automate processes and reduce manual reviews

Speaker(s):

Moderator(s):

Speaker(s):


Driving the Shift to Next Generation AML: Emerging Technologies and Managed Services

Oct 4, 2018 10:35am ‐ Oct 4, 2018 11:50am

Identification: THU15

Presented by Promontory
• Engaging industry experts and managed services to increase compliance program efficiency and effectiveness
• Exploring use case examples utilizing cognitive, RPA and other technology to identify financial criminals
• Improving the customer experience through optimized processes, machine learning, and enhanced privacy and security protocols

Moderator(s):

Speaker(s):


A Bright and Shining SAR: Practical Tips to Polish SAR Narratives

Oct 4, 2018 1:00pm ‐ Oct 4, 2018 2:15pm

Identification: THU20

• Reviewing assembled evidence to determine themes to be explored and documented in SAR narrative
• Creating a narrative outline to guide a linear chronicling of suspicious activities being reported
• Editing narrative to ensure information is complete and accurate, eliminate unnecessary or redundant details, and determine filing conforms to FinCEN guidance and expectations

Moderator(s):

Speaker(s):


Analyzing Regtech’s Risks and Rewards

Oct 4, 2018 1:00pm ‐ Oct 4, 2018 2:15pm

Identification: THU21

• Contrasting supervised learning and rules-based monitoring to optimize regtech’s potential to mitigate regulatory risks in areas such as sanctions and KYC
• Detailing best practices for risk-based systemic inputs to regtech systems to achieve optimal accuracy and functionality of data outcomes
• Resolving challenges to regtech implementation including costs, recruitment of talent and lack of data harmonization across business lines

Moderator(s):

Speaker(s):