Model Validation in a World with Rule 504

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON21

Presented by KPMG

  • Performing model validation to meet 504 standards and/or similar regulatory expectations
  • Establishing a governance framework, including all relevant stakeholders (AML and non-AML) while remaining effective
  • Focusing on the sustainability of the model validation program and establishing a well-defined certification process, as applicable

Due Diligence on Your B2B Relationships: Challenges and Best Practices on Your Customers, Suppliers and Third Parties

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON22

Presented by LexisNexis Risk Solutions

  • Understanding the challenges and best practices for vetting small and mid-sized business customers, suppliers and third party relationships
  • Finding information on business entities and practices to decide whether to on-board, maintain or exit a commercial relationship
  • Verifying UBOs and defining the intended role of the KYC repositories

Gaming: Las Vegas Case Study: Skimmers, Scammers and Casino Cages

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON23

• Detailing how skimmers work to protect against data theft via ATMs and point of sale

• Tracing common typologies for laundering proceeds derived from skimming activities

• Collaborating with law enforcement to promptly report and investigate skimming activity

A Clear and Present Danger: Developing Models to Combat Proliferation Financing

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON24

• Differentiating proliferation financing from terrorist funding to identify unique monitoring challenges and ensure adequate resourcing

• Analyzing typologies such as dual-use goods shipments to highlight role of SARs and sanctions screening in detecting proliferation networks

• Identifying available proprietary and open source data sources to strengthen investigations into potential proliferation financing cases

Seeing SARS: Law Enforcement Weighs in on Recent SAR Aided Investigations

Sep 25, 2017 2:45pm ‐ Sep 25, 2017 4:00pm

Identification: MON25

• Identifying, documenting and assembling SAR information most helpful to law enforcement in investigations

• Collaborating with law enforcement via post-SAR information sharing including 314(a)

• Analyzing real-life cases to demonstrate SAR best practices and avoid errors such as inadequate data, incomplete narratives and delayed filings

Special Presentation and Q&A (Monday)

Sep 25, 2017 4:10pm ‐ Sep 25, 2017 4:40pm

Identification: MON26

Survey presented by Thomson Reuters

Opening Remarks and Special Award

Sep 26, 2017 8:00am ‐ Sep 26, 2017 8:15am

Identification: TUE01

Special Presentation and Q&A

Sep 26, 2017 8:15am ‐ Sep 26, 2017 8:45am

Identification: TUE02

Racing to the Finish: Homestretch Strategies for Implementing the CDD Final Rule

Sep 26, 2017 8:45am ‐ Sep 26, 2017 10:05am

Identification: TUE03

• Developing and testing policies for determining beneficial owners and controlling persons to meet regulatory expectations

• Formulating systems to collect and manage required client data and conduct event-triggered risk reviews as warranted

• Training onboarding personnel and relationship managers on CDD Final Rule to attain enterprise-wide awareness of new standards, practices and policies

The New CTF: Reviewing Practical Tools to Counter Terrorism’s Evolving Financing Methods

Sep 26, 2017 10:35am ‐ Sep 26, 2017 11:50am

Identification: TUE04

• Detailing growing convergence between terrorist groups and transnational crime networks to adjust alert systems accordingly

• Identifying at-risk entities based on commercial partnerships, transaction patterns and business profile to calibrate KYC/CDD accordingly

• Understanding terrorist funding typologies such as benefactor sympathizers, micro-financing and social media crowdfunding to detect red flags promptly