imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction...

24
1

Transcript of imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction...

Page 1: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

1

Page 2: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

2

Page 3: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

3

Page 4: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

4

Page 5: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

5

Page 6: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

6

Page 7: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

7

Page 8: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

8

Page 9: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

9

Page 10: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

10

Page 11: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

11

Page 12: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

12

Page 13: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

13

Page 14: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

14

Page 15: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

15

Page 16: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

16

Page 17: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

17

Page 18: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

18

AGENDA CONFERENCE DAY 2

Page 19: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

19

Page 20: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

20

Page 21: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

21

Page 22: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

22

VIRGINIAMARTÍNEZ

Virginia is a professional in the computer field, with extensive experience in the analysis, development and implementation of programs.Virginia recently joined IMTC and takes care of all Web De-veloment and Design.

She has worked as a profes-sional developer for more than 20 years.

Her participation has been in international projects for com-panies such as TransTOOLs and Industrias la Constancia (ILC). In this last one she worked as a mobile solutions leader.

Page 23: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

23

Page 24: imtconferences.com · Session 5: Best Practices in Transaction Monitoring Essentials of transaction monitoring, suspicious activity, detection and reporting Session 6: The Challenges

24