Fighting Fraud and Financial Exploitation Involving Elders and Vulnerable Adults

Apr 15, 2019 3:50pm ‐ Apr 15, 2019 4:50pm

Identification: C18

• Evaluating the new Senior Safe Act to identify collaborative opportunities between financial institutions, regulators and law enforcement involving senior financial abuse

• Reviewing FINRA rule changes involving obtaining trusted contact person information for vulnerable adults and placement of temporary holds in cases of suspected exploitation

• Training relationship managers on red flags of elder abuse including atypical disbursements or asset transfers to ensure investigation and resolution of potential exploitation


Adverse Media - Leveraging AI, Unstructured News and Global Beneficial Ownership

Apr 15, 2019 3:50pm ‐ Apr 15, 2019 4:50pm

Identification: C19

  • Learn why AI systems improve speed and accuracies in analyzing both traditional and unstructured news sources
  • Discover how to enhance risk management programs and increase efficiencies with machine learning and AI-driven analytics  
  • Understand the role of beneficial ownership in assessing adverse media and risk in a global world

Welcome Remarks

Apr 16, 2019 7:30am ‐ Apr 16, 2019 7:45am

Identification: G05


New Tools for Combatting Human Trafficking: What Financial Institutions Can Do to Help Stop Labor and Sex Trafficking of Vulnerable Individuals

Apr 16, 2019 7:45am ‐ Apr 16, 2019 8:55am

Identification: G06

• Understand anti-human trafficking initiatives built on a foundation of shared data and resources, where organizations benefit from the experience and intelligence of their peers, as well as shared learnings from government, law enforcement, and NGO actors.

• Learn about some of the cooperative efforts to fight human trafficking locally, nationally and globally

• Master some of the latest typologies that present red flags for human trafficking


Special Presentation and Q&A (Tuesday)

Apr 16, 2019 8:55am ‐ Apr 16, 2019 9:45am

Identification: G07


A Year in the Life of the CDD Final Rule: A First Anniversary Assessment

Apr 16, 2019 10:15am ‐ Apr 16, 2019 11:15am

Identification: G08

• Evaluating impact and resolution of implementation hurdles to outline strategies for managing issues such as training, IT investment, hiring and responding to triggering events

• Detailing preferable methodologies for determining beneficial ownership to demonstrate disciplined institutional compliance with CDD Final Rule in anticipation of examination-related inquiries

• Reviewing beneficial ownership verification tools, policies and practices to evaluate efficiencies and effectiveness to strengthen entity identification accuracy and mitigate non-compliance risks


US vs. Them? How Growing Divergences in EU and US Iran Sanctions Affect Compliance

Apr 16, 2019 12:30pm ‐ Apr 16, 2019 1:45pm

Identification: C20

• Enumerating differences between US and EU sanctions on Iran to highlight potential non-compliance risks

• Assessing the practical effects of EU efforts to immunize European companies from non-compliance with US sanctions on Iran

• Adapting oversight models to mitigate sanctions exposure risks related to Special Purpose Vehicles, third-country oil trading or other efforts to skirt US sanctions


Enhancing Enhanced Due Diligence: A Tool for Managing Higher-Risk Customers

Apr 16, 2019 12:30pm ‐ Apr 16, 2019 1:45pm

Identification: C21

• Utilizing CDD review to determine when EDD is required based on factors such as jurisdictional risks, entity client base, ownership structure and transaction activity patterns

• Developing checklist of EDD goals such as beneficial ownership determination and processes such as negative news searches to secure data relevant to risk-based assessment

• Informing senior management regularly to review risk profile changes, responsive EDD and monitoring measures, and gain consensus on account exiting or continuation decisions


How to Be a Cyber Fighter: Defending Against Cybercrime Threats

Apr 16, 2019 12:30pm ‐ Apr 16, 2019 1:45pm

Identification: C22

• Conducting risk-based review of data collection and management systems, including vendors, to identify potential vulnerabilities and mitigate risks such as malware infestation

• Creating a formal risk-based Know Your Employee program to combat insider threats such as rogue employees and inadequate staff training on cyber-related threats

• Developing cyber-incident response plans to contain damage of systemic attacks such as ransomware and data breaches, rectify security gaps, and notify and collaborate with authorities


Left of Boom, Right of Boom: Pre- and Post-Attack CTF Strategies

Apr 16, 2019 12:30pm ‐ Apr 16, 2019 1:45pm

Identification: C23

• Applying the military “left of boom” concept — referring to pre-explosion timelines — to strengthen CTF through partnering with law enforcement, proactive monitoring and situational awareness of terrorism threats

• Preparing for a “right of boom,” or post-attack, AML/compliance response to address issues such as institutional exposure to terrorist financing flows, securing data that may be of use to investigators and refreshing relevant risk assessments

• Incorporating lessons learned such as motivation for attack, methods of circumventing security controls and terrorist funding streams to fortify left of boom protocols going forward