ACAMS Mystery Theatre: A Thriller of a Subject

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON11

As the saying goes, what happens in Vegas stays in Vegas. Which is why you need to be in Vegas when the secret subject of this session is revealed. Curious about the topic? Here’s a clue: You can bet it’s riddled with intriguing insights to help solve puzzling AML challenges. Please join us.

The Latest Developments: Updating Client Profiles to Ensure Risk Ratings Reflect Current Realities

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON12

• Determining potential sanction, PEP, business line and geographic risks to ensure comprehensive collection of all relevant client data

• Creating new profile to incorporate changes in business models, transaction patterns or entity ownership impact into risk assessment

• Adjusting risk rating and monitoring protocols based on updated information to ensure proper allocation of oversight resources


Cyber SAR: Meeting FinCEN’s Expectations on Data Collection, Information Sharing and SAR Filing

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON13

• Analyzing FinCEN guidance to determine institutional responsibilities when reporting cyber events and cyber-related crime

• Assembling pertinent data such as relevant IP addresses, involved virtual currency accounts and digital footprints of perpetrators

• Reviewing 314b safe harbor provisions to promote inter-institutional information sharing to aid in identifying and stopping cyber-events


Knowing Your Customer in the Era of Heightened Regulations and Cost Pressures

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON14

Presented by PWC

  • Reviewing the regulatory landscape and the new enhanced Customer Due Diligence (CDD) Rule
  • Analyzing the new beneficial ownership requirement and its impact to your AML program
  • Meeting regulatory commitments while managing compliance costs


Information Sharing: A Force Multiplier to Effectively Combat Financial Crime

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON15

Presented by Verafin

  • Creating “intelligence” through information sharing between law enforcement and financial institutions compounded by information sharing among FIs
  • Collaborating to transform suspicious activity reports (SARs) into actionable insight for law enforcement
  • Gaining efficiency by embracing an innovative approach versus the old-school focus of traditional AML/CFT compliance


Securities Spotlight: Reviewing Recent Enforcement Actions to Manage AML & ABAC Risks

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON16

• Reviewing enforcement actions tied to weak AML & ABAC programs to detect common deficiencies

• Scrutinizing penalties to discern expectations for risk-tailored programs and needs for adequate staffing and resources

• Analyzing recent actions to highlight best practice recommendations


Fighting Human Trafficking: Utilizing AML Models, SARS and Law Enforcement

Sep 25, 2017 1:00pm ‐ Sep 25, 2017 2:15pm

Identification: MON17

• Analyzing trafficking typologies such as forced prostitution, migrant smuggling and illegal labor to ensure monitoring addresses most relevant institutional risks

• Training staff to spot and investigate trafficking red flags such as funnel accounts and voluminous low-amount wire transfers to at risk-regions

• Leveraging investigative resources by partnering with NGOs, filing SARs and collaborating with law enforcement


Advise and Consent: Managing Internal Processes to Ensure Timely and Appropriate Responses to Enforcement

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON18

• Developing strategic plans to target and rectify deficiencies that led to enforcement action
• Analyzing best practices for managing relationship with a monitor
• Conducting post-remediation review to identify positive outcomes and strengthen compliance going forward

Acceptable Risk: Formalizing Risk Tolerance Policies to Ensure Uniform Decisions Across Enterprise

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON19

• Articulating institutional risk appetite and risk tolerance policies to standardize customer assessment ratings

• Developing quantitative criteria to uniformly measure risks linked to geography, product lines and customer profile

• Analyzing residual risks to ensure accordance with institutional risk tolerance policies


Recovery Mode: Practical Tools for Developing a Cyber Incident Response

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON20

• Identifying cybercrime typologies such as ransomware and Distributed Denial of Service attacks to promptly contain and isolate breaches

• Developing emergency response plans to conduct cyber forensic investigations, audit damage and restore IT infrastructure integrity

• Reporting incident and response plans to stakeholders including senior management, account holders, law enforcement and regulators