A Common-Sense Approach to AML/BSA Customer Risk Modeling (Presented by AML RightSource)

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: SE5

• Applying quantitative and qualitative approaches to customer risk rating
• Best practices and industry trends for developing and implementing a customer risk rating model
• Handling the outputs of a customer risk rating model and avoiding common mistakes in the risk rating process
 

Casinos: Charting New Standards for AML and Risk Reduction (Presented by Southern Nevada Chapter)

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: CI1

• Undertaking systematic analysis of high-risk transactions to identify areas demanding higher scrutiny
• Implementing the standards of the American Gaming Association’s guide to AML best practices
• Emulating successful collaborative strategies with regulators to reduce organizational risk

FINRA's Fines and Lessons for Securities Firms

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: MIT5

• Conducting model testing to reduce the likelihood of penalties linked to inadequate systems
• Properly documenting and registering foreign clients and affiliated parties to meet regulatory expectations
• Ensuring proper transaction monitoring for broker-dealers and correspondent services

Defining Reasonable Due Diligence in the Information Age (Presented by Exiger)

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: SE6

• Discussing what sources to search and how your program can best retain evidence of Internet research
• Determining what news is negative, the use of individual judgment in your due diligence program
• Leveraging technology to reduce false positive and duplicative results
 

Leveraging Big Data to Maximize Efforts against Financial Crime

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: ET2

• Researching, determining and installing appropriate technology to suit your institution’s size and business model
• Applying data analytics to enhance CDD and KYC practices
• Using big data to develop risk-based adjustments to monitoring operations and meet regulatory expectations

Opening Remarks and ACAMS Awards Ceremony

Sep 29, 2015 8:00am ‐ Sep 29, 2015 8:20am

Identification: PS5


Waging War on the Financing Methods of ISIS and Other Terrorist Groups

Sep 29, 2015 8:20am ‐ Sep 29, 2015 9:35am

Identification: PS6

• Charting how ISIS utilizes jurisdictions with weak financial oversight to move money into mainstream institutions
• Developing interception strategies for cross-border credit and value-added cards usage by Western ISIS fighters who may target your organization
• Learning patterns to help identify off-the-grid lone wolf terrorists, returning fighters and sympathetic relatives

Industry Debate: The Proper Role and Scale of De-Risking in AML/CTF and Compliance

Sep 29, 2015 10:00am ‐ Sep 29, 2015 11:15am

Identification: CS4

• Balancing regulatory requirements with your institution’s risk appetite and resources
• Tallying the social risks of underground banking alternatives for un-banked populations
• Developing risk-based onboarding processes to mitigate reputational and regulatory risks 

Pen & Tellers: Case Study of an Inside Fraud Job

Sep 29, 2015 10:00am ‐ Sep 29, 2015 11:15am

Identification: OC4

• Instituting effective KYE programs for effective employee due diligence
• Utilizing the latest metrics to identify potential employee-linked suspicious transactions
• Uncovering and investigating connections between employees and criminal organizations

Unleash the Power of Alternative Data, Big Data Technology and Information Sharing to Bring Compliance to the Next Level (Presented by LexisNexis Risk Solutions)

Sep 29, 2015 10:00am ‐ Sep 29, 2015 11:15am

Identification: SE7

• Learning how strengthening your compliance programs can deliver incremental revenue and cost savings
• Identifying and understanding the hidden risk in your customer portfolio
• Using these elements to maintain the integrity and accuracy of your customer records and risk assessments