Welcome Remarks

Sep 29, 2014 8:00am ‐ Sep 29, 2014 8:15am

Identification: GS01

Speaker(s):


Examining Key Initiatives from Law Enforcement Agencies

Sep 29, 2014 8:45am ‐ Sep 29, 2014 10:00am

Identification: GS03

  • Bridging the gap between law enforcement and financial institutions
  • Analyzing trends and criminal patterns from recent case investigations
  • Supporting the latest law enforcement initiatives to combat financial crime
  • Responding to recent financial system abuse by virtual currencies and marijuana related businesses

 

Speaker(s):


Special Presentation

Sep 29, 2014 10:30am ‐ Sep 29, 2014 11:00am

Identification: GS04

Speaker(s):


[Case Study] TBML Update: Examining Emerging Threats and Recent Cases

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: ID1

  • Incorporating export controls violations intelligence into AML risk assessments
  • Pinpointing lessons learned from recent real-life cases involving commodities and car selling schemes
  • Promoting information sharing and collaboration with law enforcement to identify suspicious activities
  • Reviewing FATF's typologies and guidance on TBML

Speaker(s):


Advancements in the Adoption of Model Risk Practices in BSA/AML Compliance - Presented by SAS

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: SP1

Since the FFIEC agencies began applying the OCC's Supervisory Guidance on Model Risk Management (OCC 2011-12) to Bank Secrecy Act / Anti-Money Laundering compliance practices during 2012, U.S. financial institutions have adopted more rigorous use of analytics, testing, and governance. This session will highlight best practices in Model Tuning & Optimization.

Topics covered will include:

  • Relationship between Risk Appetite and MRM practices
  • Discussion of how AML models have been integrated in broader enterprise MRM processes
  • Skills and processes required to support practices in-house
  • Lessons learned from regulatory reviews
  • Challenges and changes in the AML model tuning & management
  • Big data and visualization technologies to speed the process of tuning & optimization
  • Emerging practices for automating prioritization and triage of work items

Speaker(s):


Leveraging Quality Control Processes to Satisfy Audit Requirements

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: AUD1

  • Elevating quality control procedures to meet supervisory guidance and internal audit standards
  • Improving your quality control review process to address key BSA risk
  • Ensuring audit and quality control coverage is sufficient to meet regulatory expectations
  • Recognizing cost savings and efficiency by eliminating dual reviews
  • Involving the compliance function during reviews to provide guidance and collaboration

Speaker(s):


Optimizing Your Sanctions Risk Management Program - 1

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: RM1

  • Evaluating your sanctions risk exposure
  • Leveraging AML resources to strengthen sanctions controls
  • Applying intelligence from recent case settlements to strengthen your monitoring practices
  • Understanding regulatory priorities around cash letters, exchange and trade houses, and custody accounts
  • Maintaining a dynamic sanctions program that adapts to an evolving financial and political environment

Speaker(s):


MSB Focus: Uncovering Emerging Financial Crime Schemes

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: MI1

  • Spotting abuse of MSB financial channels for narco-funding and illegal use of virtual currencies
  • Identifying high-risk clients and jurisdictions to update monitoring practices
  • Mitigating the risks of conducting business in the US Southwest border
  • Fortifying AML programs and complying with regulatory expectations

Speaker(s):


Trouble on the I-95 Corridor - The Illicit Movement of People, Drugs, Goods and Cash

Sep 29, 2014 12:15pm ‐ Sep 29, 2014 1:30pm

Identification: CH1

The I-95 Corridor connects the largest cities in the Northeast. It also provides an efficient and direct route for criminal groups to transport the proceeds of crime through several states in a matter of hours. This presents a unique problem for both law enforcement and financial institutions as they strive to identify, investigate, and curtail these illegal activities. This session will describe four major types of smuggling along this corridor and provide insight for financial institutions tracking transactions flowing down the highway.

In particular, the session will focus on:
The movement of people – human and labor trafficking
The movement of drugs – medical marijuana to heroin
The movement of goods – tobacco, fuel, and counterfeit items
The movement of cash – online gambling, drugs, and check cashing

Speaker(s):


Tackling Financial Crime Vulnerabilities in the Payments Processing Industry

Sep 29, 2014 2:00pm ‐ Sep 29, 2014 3:15pm

Identification: MI2

  • Understanding sanctions screening requirements for third party payment (TPP) processors and proper disclosure to the sponsoring bank
  • Forging open lines of communication between the sponsor bank and TPP to identify suspicious transaction patterns
  • Determining guidance and training for TPPs on SAR filing processes, obligations and expectations
  • Utilizing technology to fulfill CIP and CDD requirements based on clientele risk levels

Speaker(s):