Pre-Conference Trainingfiles.acams.org/pdfs/2019/ACAMS-Hollywood-Conference-2020-Prog… ·...
Transcript of Pre-Conference Trainingfiles.acams.org/pdfs/2019/ACAMS-Hollywood-Conference-2020-Prog… ·...
CAMS Examination Preparation Seminar Check-in (Separate registration required.)
CAMS Examination Preparation Seminar
CGSS Examination Preparation Seminar Check-in (Separate registration required.)
CGSS Examination Preparation Seminar
Pre-Conference Workshop A and B Check-in (Separate registration required.)
WORKSHOP A: The Perfect Storm: Cryptocurrencies, the Dark Web and Fentanyl
WORKSHOP B: Pathway of the SARs: Tracking Trajectories of Suspicious Activity Reports from Alerts to
Prosecution
Registration Desk Open
ACAMS First Time Attendee Orientation
8:00 AM – 9:00 AM
9:00 AM – 4:30 PM
8:00 AM – 9:00 AM
9:00 AM – 5:00 PM
8:00 AM – 9:00 AM
9:00 AM – 12:00 PM
1:00 PM – 4:00 PM
1:00 PM – 6:30 PM
5:00 PM - 5:30 PM
Pre-Conference TrainingSUNDAY, APR IL 19 , 2020
1 *Program subject to change.
April 20-22, 2020Hollywood, Florida
CONFERENCE PROGRAM
25th Annual International AML& Financial Crime Conference
Registration Desk Open
Exhibit Hall Open
Networking Continental Breakfast in Exhibit Hall
Welcome Remarks
Keynote Presentation and Q&A
PANEL DISCUSSION
Regulatory Roundtable: Overview on Oversight from Top Regulatory Voices
• Scrutinizing recent developments in US and global compliance including new rules and advisories
affecting AFC operating models and regulatory expectations
• Identifying evolving regulatory exam trends to understand implications for allocating compliance
resources and additions to IT systems and/or human capital
• Defining and refining best practices for addressing areas such as risk-based management for new
products or resolution of cross-sovereign regulatory conflicts
Networking and Refreshment Break in Exhibit Hall
PANEL DISCUSSION
Hot Topics: You Ask, We Answer
Perennially one of most popular sessions, we can assure you Hot Topics answers the questions you
care about most — because those questions come from you. Approximately two weeks before heading
to Hollywood, ACAMS will solicit questions from attendees. The day of the session, our panel of experts
take the stage to provide the answers to your inquiries — as well as take follow-up questions from the
audience, making this a lively, thought-provoking and interactive format. Whether your interests are
cybercrime or SARs, data systems or digital currencies, Hot Topics is where your AFC questions get
answered — literally.
Networking Luncheon
AML Knowledge Luncheon courtesy of 4iQ
AML Knowledge Luncheon courtesy of K2 Intelligence
Networking Groups
7:30 AM – 5:45 PM
7:30 AM – 6:45 PM
7:30 AM – 8:30 AM
8:30 AM – 8:40 AM
8:40 AM – 9:10 AM
9:10 AM – 10:35 AM
10:35 AM – 11:05 AM
11:05 AM – 12:15 PM
12:15 PM – 1:30 PM
12:15 PM – 1:30 PM
12:15 PM – 1:30 PM
1:30 PM – 2:00 PM
Main Conference Day OneMONDAY, APR IL 20 , 2020
2
CONFERENCE PROGRAM
*Program subject to change.
Networking Groups
CONCURRENT SESSIONS
REGULATORY UPDATES
Getting Granular on Regulatory Sandboxes
• Reviewing public/private sandbox initiatives to identify benefits such as controlled testing of FinTech
innovations in an environment of limited regulatory risks
• Analyzing sandbox process to detail required strictures such as developing test parameters,
consumer safeguards and metrics-based measuring of success or failure
• Assessing limitations of sandboxes such as unknown impacts of beta-testing vs. large-scale
adoption and co-opting of innovation for financial crime uses
FINANCIAL CRIME TRENDS
The Scammer Without a Face: Combating Synthetic Identity Fraud
• Examining how stolen personal identifying information such as children’s Social Security numbers
support digital creation of non-existent “real” persons
• Reviewing cases to review how synthetic identities generate credit histories and defraud financial
institutions through bogus loans and credit “bust out” schemes
• Employing innovations such as AI/machine learning to detect and investigate synthetic identity red
flags such as aberrant credit history gaps and charge-off patterns
RISK MANAGEMENT
Super Models: Building Better Risk Models for the New Era of AFC
• Auditing legacy risk models and inputs to identify methods to elevate accuracy and efficiency such
as complementing rules-based oversight with AI and data analytics
• Updating oversight models to address unique challenges of evolving AFC risks such as FinTech
innovations or typologies such as transnational cybercrime rings
• Utilizing non-traditional tools such as behavioral modeling and social media monitoring to augment
“assumed risk” models and strengthen assessment quality
DATA MANAGEMENT
A Quality Product: Enhancing Data Quality to Strengthen AFC
• Creating quality control models to ensure data is properly sourced, contains required elements for
assigned function and is monitored for consistency of results
• Strengthening data quality with centralized data stewardship to standardize governance, curtail
duplicative data harnessing and coordinate training policies
• Conducting quality assurance testing to analyze data integrity and take corrective actions such as
increased automation of data processing as needed while safeguarding data
AML KNOWLEDGE
AML KNOWLEDGE
2:15 PM – 2:45 PM
1:30 PM – 2:30 PM
3 *Program subject to change.
April 20-22, 2020Hollywood, Florida
25th Annual International AML& Financial Crime Conference
Networking and Refreshment Break in Exhibit Hall
Networking Groups
Networking Groups
CONCURRENT SESSIONS
REGULATORY UPDATES
Which Bud’s For You? A Deep-Dive Into Evolving Marijuana Laws
• Charting current legal landscape of marijuana and related enterprises to ensure AFC models reflect
and resolve conflicting domestic and cross-sovereign regulations
• Optimizing AI-assisted monitoring, data-driven KYC/CDD reviews and updated staff training to keep
marijuana-related risk management robust and efficient
• Assessing institutional risk appetite and tolerance standards to formalize and standardize policies
for retaining or exiting MRB accounts
FINANCIAL CRIME TRENDS
Fighting Financial Exploitation of Seniors and Other Vulnerable Populations
• Building client awareness of ploys such as fake IRS calls and caregiver fraud to reduce risks of
clients falling victim to exploitation schemes targeting the elderly
• Reviewing law enforcement raids under 2017’s Elder Abuse Prevention and Prosecution Act to detail
how transnational crime rings perpetrate senior exploitation
• Following FinCEN and CFPB guidance on spotting and investigating elder fraud red flags such as
early CD withdrawals and unusual additions of authorized signers
RISK MANAGEMENT
Don’t Miss the Chance to Enhance Your Enhanced Due Diligence
• Assessing if EDD is warranted based on factors such as PEP connections, cash-intensive business
operations or inability to verify beneficial ownership information
• Determining appropriate EDD tools such as site visits, auditing client AML controls or commissioning
private intelligence to develop holistic entity risk profile
• Comparing EDD results and institutional risk tolerance to drive onboarding/retention decisions and
apply apt controls such as increased account review frequency
DATA MANAGEMENT
What the Hack: Lessons from the Equifax, Capital One and Facebook Data Breaches
• Reviewing government report on how lax server protection allowed hackers 76 days of undetected
access to Equifax networks and theft of data on 148 million clients
• Analyzing Capital One breach to outline threats posed by inadequate firewalls and risks of rogue
employees of data services providers such as cloud storage firms
• Examining Facebook case to outline how software flaws permitted hackers to break into social
media accounts and access personal data on up to 50 million users
2:30 PM – 3:00 PM
3:00 PM – 3:30 PM
3:35 PM – 4:05 PM
3:00 PM – 4:00 PM
4
CONFERENCE PROGRAM
*Program subject to change.
AML KNOWLEDGE
AML KNOWLEDGE
Networking and Refreshment Break in Exhibit Hall
NETWORKING GROUPS
Networking for AML Caribbean Professionals
CONCURRENT SESSIONS
REGULATORY UPDATES
Tales from the Cryptos: How Virtual Currencies and Exchanges Impact AFC
• Detailing regulatory fragmentation surrounding digital currencies to ensure AFC oversight meets all
applicable regulatory expectations and requirements
• Crafting policies such as auditing AFC controls of VC exchanges to mitigate risks such as illicit
proceeds conversion, ICO fraud and sanctions evasion schemes
• Reviewing recent developments such as JPM Coin and Libra to assess risk management needs as
cryptocurrencies gain wider acceptance and use
FINANCIAL CRIME TRENDS
Public-Private Collaboration: Doubling Down on Fighting Financial Crime
• Exploring available tools for fostering collaborative initiatives such as SARs, 314(a) and (b) to
leverage investigative resources and facilitate information sharing
• Establishing parameters for governing collaborations to ensure data sharing and investigations are
compliant with privacy protection laws such as GDPR and CCPA
• Reviewing public-private AFC initiatives such as Singapore’s ACIP and UK’s JMLIT to gain insights on
structuring collaborative efforts for optimal outcomes
RISK MANAGEMENT
Bad Company? Balancing Reputational Risks and Business Side Priorities
• Assessing reputational risk profile based on factors such as geographic footprint, product lines and
client profiles to integrate reputational risk management and broader institutional risk governance
• Utilizing internal controls such as EDD, triggering events and beneficial ownership verification to
mitigate potential impacts of residual reputational risks
• Incorporating reputational risk protection into crisis response plans to contain harms caused by
negative publicity and/or unforeseen events such as data breaches and enforcement actions
3:00 PM – 4:00 PM
4:00 PM – 4:30 PM
4:30 PM – 5:00 PM
4:30 PM – 5:30 PM
5 *Program subject to change.
April 20-22, 2020Hollywood, Florida
25th Annual International AML& Financial Crime Conference
DATA MANAGEMENT
Compliance Culture Conflicts? Data Privacy Laws and Risk Management
• Contrasting data collection and retention restrictions of privacy laws such as GDPR with regulatory
requirements in areas such as KYC/CDD to reconcile differences
• Analyzing GDPR’s transparency and “lawful basis” data processing demands to harmonize privacy
protection and AFC issues such as managing high-risk clients
• Monitoring vendors and third-party service providers for adherence to applicable privacy protection
principles to ensure compliance with legal standards
TECH TRENDS
Strategies for Optimal Vendor Selection and Management
• Analyzing institutional risk management priorities and current AFC controls to determine areas most
conducive to vendor partnering in terms of costs/benefits
• Assembling internal stakeholders to vet potential vendors based on expertise in compliance
services, business side needs and ability to integrate with legacy systems
• Conducting post-integration review based on metrics such as efficiency gains and performance
quality to detect and correct systemic problems as warranted
AML KNOWLEDGE
Networking Reception in Exhibit Hall5:45 PM – 6:45 PM
6
CONFERENCE PROGRAM
*Program subject to change.
Registration Desk Open
Exhibit Hall Open
Networking Continental Breakfast in Exhibit Hall
ACAMS Enterprise Breakfast (By invitation only)
Opening Remarks
PANEL DISCUSSION
The BSA at 50 and Beyond: What It Changed, and What It Will
Special Presentation and Q&A
Networking and Refreshment Break in Exhibit Hall
PANEL DISCUSSION
Domestic Terrorism: Adjusting AFC to Combat Homegrown Threats
• Reviewing research of FBI and other groups to identify indicators of terroristic risks such as stalking,
domestic violence and terminations due to workplace conflicts
• Utilizing mass shooter case studies to detail financial indicators of potential planned attacks such as
credit card usage spikes and aberrant munitions purchases
• Conducting exercises on strategies such as social media monitoring and EDD to detect extremism
indicators such as hate group affiliations and file SARs as warranted
Networking Luncheon
AML Innovations
AML Innovations
7:30 AM – 5:30 PM
7:30 AM – 5:30 PM
7:30 AM – 8:30 AM
7:30 AM – 8:30 AM
8:30 AM – 8:45 AM
8:45 AM – 9:55 AM
9:55 AM – 10:45 AM
10:45 AM – 11:15 AM
11:15 AM – 12:15 PM
12:15 PM – 1:30 PM
1:30 PM – 2:00 PM
2:10 PM – 2:40 PM
Main Conference Day TwoTUESDAY, APR IL 21 , 2020
7 *Program subject to change.
April 20-22, 2020Hollywood, Florida
25th Annual International AML& Financial Crime Conference
CONCURRENT SESSIONS
GLOBAL TRENDS
Think Globally, Act Locally: Fighting Trade-Based Money Laundering
• Utilizing risk-based assessments to flag potential TBML activity such as invoice manipulation,
phantom shipping and unclear nature of transactions or end user identity
• Crafting unique trade CDD models to detail risks such as entity business model, principal
counter-parties and establish triggering events for EDD or updated reviews
• Leveraging rules-based monitoring with tools such as Natural Language Processing to reconcile
TBML issues such as discordant trade data reporting platforms
FINANCIAL CRIME TRENDS
Time to Reboot: New Approaches to Battling Ransomware Attacks
• Analyzing ransomware attacks such as Baltimore/Atlanta to identify contributors such as outdated
software, weak IT oversight and lax data backup/recovery systems
• Coordinating with cybersecurity teams to perform ransomware risk assessment, including internal
and external threats, and correct and test areas of vulnerability
• Creating post-attack plans to notify stakeholders and law enforcement, guide contact with hackers
and file cyber-SAR tailored to regulatory advisories/requirements
SANCTIONS
Sanctions Update: Lessons Learned from Recent Enforcement Actions
• Analyzing implications of the $75,000 OFAC fine against a US software firm, the first such
enforcement action relating to Russian sectoral sanctions
• Examining enforcement against trade insurer for apparent violations of Kingpin Act to highlight
sanctions risks such as assignment of debt by an SDN
• Detailing $2.3 billion in fines against Standard Chartered and UniCredit for sanctions violations such
as failure to block banned transactions with Iran
TECH TRENDS
Building Better Algorithms for Stronger AFC Controls
• Examining what algorithms are and how they function to detail potential uses for enhancing AFC
controls in areas such as sanctions screening or transaction monitoring
• Conducting institutional and business line threat assessments to craft algorithms tailored for
specific risks such as coordinated fraud rings or ties to PEPs
• Testing to assess quality of predictive models’ performance and identify and remediate issues such
as algorithmic bias or concept drift
AML KNOWLEDGE
AML KNOWLEDGE
1:30 PM – 2:30 PM
8
CONFERENCE PROGRAM
*Program subject to change.
Networking and Refreshment Break in Exhibit Hall
CONCURRENT SESSIONS
GLOBAL TRENDS
Making Correspondent Banking Work
• Conducting a respondent bank self-assessment of AFC efficacy to demonstrate adherence to risk
appetite standards of correspondent services providers
• Analyzing initiatives by correspondent banks to utilize staff training and strengthen CDD/KYC to
overcome relationship barriers and limit wholesale de-risking
• Formalizing respondent/correspondent communication protocols to pro-actively identify and resolve
issues such as shifts in business risk or changes in regulations
AML OPERATIONS
Mastering the Art of Ethical Office Politics for Stronger AFC
• Conducting “empathy exercises” to understand incentives of senior management and business line
leadership and identify opportunities to achieve consensus on role of AFC across enterprise
• Identifying and engaging informal power infrastructure such as thought leaders and influencers to
achieve buy-in on AFC priorities among rank-and-file employees
• Practicing conflict resolution skills such as dispassionate analysis of contrasting views to ensure
ethical decision-making, optimize cohesion and preserve vitality of personal networks going forward
SANCTIONS
Framing the Issue: Analyzing OFAC’s Framework for Compliance Commitments
• Analyzing OFAC’s 2019’s framework to identify regulatory expectations in developing, implementing
and regularly updating a sanctions compliance program
• Detailing specifics of framework to develop compliance strategies for areas such as
sanctions-centered risk assessments, internal controls, testing/auditing and training
• Reviewing OFAC’s list of common sanctions oversight issues such as deficient screening,
inconsistent adherence to standards and misinterpreting OFAC rules
TECH TRENDS
The Reality About the Hype on Artificial Intelligence in AFC
• Outlining how AI works to identify applications to efficiently perform AFC functions such as
transaction monitoring, sanctions screening and KYC/CDD
• Detailing the importance of data quality in areas such as client segmentation and updating systems
to reflect changes in regulations or criminal typologies
• Cultivating AFC staff expertise to interpret AI outputs and mitigate risks linked to its limitations in
areas such as analyzing human motivations and unfamiliar situations
AML KNOWLEDGE
AML KNOWLEDGE
2:30 PM – 3:00 PM
3:00 PM – 4:00 PM
9 *Program subject to change.
April 20-22, 2020Hollywood, Florida
25th Annual International AML& Financial Crime Conference
Networking and Refreshment Break in Exhibit Hall
AML Innovations
CONCURRENT SESSIONS
GLOBAL TRENDS
A Farewell to Arms? Taking Up the Fight Against Proliferation Financing
• Utilizing risk-based models to manage proliferation financing issues such as legal/illegal sales of
dual-use goods that can be used in weapons of mass destruction
• Strengthening KYC to identify potential proliferation patterns such as involvement with rogue
procurement agents and vessel-to-vessel goods transfers
• Reviewing typologies of proliferation financing such as trade in jurisdictions of proliferation concern
and shipments involving atypical geographic trade patterns
SARS
The Light of SARs: Managing Supporting Document Requests from Law Enforcement
• Retaining and securing supporting documentation at time of SAR filing to mitigate delays in
responding to law enforcement requests
• Scrutinizing request to determine specifics of requested information comprehensive and complete in
accordance with FinCEN guidance
• Communicating with investigators post-request to identify avoidable oversights with future SAR
filings and foster best practices for handling document requests in future
SANCTIONS
Venezuela Spotlight: Sanctions Chaos Amid a Raucous Caracas
• Reviewing current Venezuelan sanctions to update oversight of banned entities, stolen proceeds of
state enterprises and money laundering via intermediary countries
• Highlighting Venezuela-specific red flags such as federal contracts directed to personal accounts or
transactions involving apparent distortions of exchange rates
• Analyzing case of the global shell firm network used by Maduro stepsons and others to launder
proceeds looted from government programs such as food subsidies
TECH TRENDS
Systems Check: Planning and Executing an Independent IT Audit
• Creating a risk-based audit approach to review efficacy of IT systems, associated non-automated
processes and the interfaces connecting them
• Ensuring auditors have full knowledge of risks relating to AFC functions such as oversight across
business lines, regulatory compliance and cybersecurity/hacking
• Reviewing audit findings to assess factors such as data quality and conformance to internal controls
to take corrective actions as indicated by review
4:00 PM – 4:30 PM
4:30 PM – 5:00 PM
4:30 PM – 5:30 PM
10
CONFERENCE PROGRAM
*Program subject to change.
BREAKING NEWS
In The Headlines
AML KNOWLEDGE
Networking Reception at Portico at Diplomat Landing5:45 PM – 6:45 PM
11 *Program subject to change.
April 20-22, 2020Hollywood, Florida
25th Annual International AML& Financial Crime Conference
Registration Desk Open
Exhibit Hall Open
Networking Continental Breakfast in Exhibit Hall
ACAMS Risk Assessment Breakfast (By invitation only)
Opening Remarks
Special Presentation and Q&A
PANEL DISCUSSION
Case Study: Jeffrey Epstein and the Scourge of Sex Trafficking of Minors
• Detailing how Epstein evaded tough accountability through high-profile charitable giving, influential
friends and services of powerful and experienced attorneys
• Outlining how sex traffickers exploit minors such as providing housing to runaways, offering feigned
affection and demanding repayment of purported debts
• Studying specifics of case against Epstein by New York prosecutors after previous non-prosecution
agreement was voided following Miami Herald investigation
Networking and Refreshment Break in Exhibit Hall
PANEL DISCUSSION
FinTech 2020: How Financial Innovation Trends Will Impact AFC
• Charting growth of “innovation” sector to build systems for managing unique FinTech risks such as
adequacy of AFC controls by third-party payment processors
• Exploring cybercrime risks of products such as digital wallets and mobile payments to ensure
transactions are secured and mitigate risks such as fraud
• Keeping current on FinTech trends such as blockchain-based fraud deterrence to assess human
capital needs and create strategic talent acquisition and initiatives
Closing Remarks
7:30 AM – 11:50 AM
7:30 AM – 10:50 AM
7:30 AM – 8:30 AM
7:30 AM – 8:30 AM
8:30 AM – 8:35 AM
8:35 AM – 9:20 AM
9:20 AM – 10:20 AM
10:20 AM – 10:50 AM
10:50 AM – 12:00 PM
12:00 PM – 12:05 PM
Main Conference Day ThreeWEDNESDAY, APR IL 22 , 2020
12
CONFERENCE PROGRAM
*Program subject to change.