P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the...

14
1 | Page Property of ACAMS 2018-2019. Not for distribution. This program is subject to change. SUNDAY, APRIL 14, 2019 Pre-Conference Training PRE-CONFERENCE TRAINING 8:00 AM – 9:00 AM CAMS Examination Preparation Seminar Check-in (Separate registration required.) 9:00 AM 4:30 PM CAMS Examination Preparation Seminar Led by CAMS-certified instructors, the CAMS Examination Preparation Seminar reviews critical information in an easy-to-follow format that prepares you to sit for the CAMS Examination. Benefit from this interactive study session as AML experts walk you through core content areas and practice questions. To register, please contact us on +1 305.373.0020 or via email at [email protected]. 8:00 AM – 9:00 AM Pre-Conference Workshop A Check-in (Separate registration required) 9:00 AM – 12:00 PM WORKSHOP A: Inside the Criminal Mind: To Catch a Fraudster, Think Like One Trust is the foundation of individual and business relationships — and fraudsters are experts at building it, and betraying it, in order to perpetrate their crimes. In this compelling and insightful workshop, attendees will examine the psychological profiles of these unscrupulous financial criminals, whose victims may be an elderly relative, a trusting employer — or even a financial institution. This highly analytical workshop will examine the common motivations of fraudsters for committing such acts. In addition, the methods by which fraudsters identify opportunities will be detailed. Finally, the rationales by which fraudsters justify their actions will be scrutinized. In short, for financial crime professionals, catching fraudsters requires thinking like one. For AML and financial crime professionals, this workshop provides eminently useful insights on fraud detection, protection and prevention. Key Areas Covered Analyzing fraud perpetrators’ motivation to better differentiate legitimate relationships and those based on criminal intent and take appropriate protective actions Detailing rationalization processes of fraudsters to strengthen situational awareness skills related and improve detection of potential fraudulent acts or schemes Scrutinizing how fraudsters identify opportunities, to assess vulnerability of institution or clients to fraud and implement controls to mitigate risks of being victimized Who Should Attend

Transcript of P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the...

Page 1: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

1 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

SUNDAY, APRIL 14, 2019

Pre-Conference Training

PRE-CONFERENCE TRAINING

8:00 AM – 9:00 AM

CAMS Examination Preparation Seminar Check-in (Separate registration required.)

9:00 AM – 4:30 PM

CAMS Examination Preparation Seminar

Led by CAMS-certified instructors, the CAMS Examination Preparation Seminar

reviews critical information in an easy-to-follow format that prepares you to sit for the CAMS Examination. Benefit from this interactive study session as AML

experts walk you through core content areas and practice questions. To register, please contact us on +1 305.373.0020 or via email at [email protected].

8:00 AM – 9:00 AM Pre-Conference Workshop A Check-in (Separate registration required)

9:00 AM – 12:00 PM WORKSHOP A: Inside the Criminal Mind: To Catch a Fraudster, Think Like One

Trust is the foundation of individual and business relationships — and

fraudsters are experts at building it, and betraying it, in order to perpetrate

their crimes. In this compelling and insightful workshop, attendees will examine the psychological profiles of these unscrupulous financial criminals, whose

victims may be an elderly relative, a trusting employer — or even a financial institution. This highly analytical workshop will examine the common

motivations of fraudsters for committing such acts. In addition, the methods by which fraudsters identify opportunities will be detailed. Finally, the rationales by

which fraudsters justify their actions will be scrutinized. In short, for financial

crime professionals, catching fraudsters requires thinking like one. For AML and financial crime professionals, this workshop provides eminently useful insights

on fraud detection, protection and prevention.

Key Areas Covered

Analyzing fraud perpetrators’ motivation to better differentiate legitimate relationships and those based on criminal intent and take appropriate

protective actions

Detailing rationalization processes of fraudsters to strengthen situational

awareness skills related and improve detection of potential fraudulent acts or schemes

Scrutinizing how fraudsters identify opportunities, to assess vulnerability of

institution or clients to fraud and implement controls to mitigate risks of being victimized

Who Should Attend

Page 2: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

2 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Prevention, detection, investigation: Fighting fraud requires a multi-faceted approach, and this compelling workshop provides a holistic examination that’s

of benefit to all the relevant anti-financial crime constituencies. Whether you

are a fraud examiner, a member of a financial intelligence unit or a law enforcement officer who works in collaboration with financial institutions, this

workshop will raise awareness of how fraudsters think and act — providing new tools for spotting and circumventing them. Meanwhile, the materials presented

will also be of inherent benefit to relationship managers as well as AML officers and consultants who conduct training on the nefarious methods by which these

criminals operate.

9:00 AM – 12:00 PM

WORKSHOP B: The New Era of Risk Models: Mastering the Challenges

Risk modeling is in the midst of revolutionary changes, driven by a compliance landscape that is increasingly tech-dependent and data-driven, financial crimes

that are executed via sophisticated transnational networks and the rise of innovative products and services such as Fintech and virtual currencies. In this

authoritative yet eminently practical workshop, expert presenters will guide

attendees through a comprehensive examination of the multiple forces that are impacting the roles and responsibilities of risk models, then conduct interactive

exercises to develop constructive and applicable solutions for updating them in ways that strengthen AML and provide robust oversight going forward.

Key Areas Covered

Outlining tech tools enhancing oversight such as AI and machine learning and detailing emerging AML risks such as cybercrime to

analyze potential deficiencies of legacy risk models

Crafting risk models that reflect systemic requirements such as data

integrity and relevant regulatory guidance to hone assessment accuracy

and meet institutional obligations

Validating model efficacy in areas such as quality of data extractions

and false positive generation to determine efficacy of new models and address issues such as algorithmic bias

Who Should Attend

Risk management is at the core of a culture of compliance, and therefore this workshop on the new era for risk models is of near universal interest in the

ACAMS community. Among the attendees whose duties are most closely tied to

the content are risk management officers, relationship managers, onboarding personnel and specialists in technologies such as data analytics and artificial

intelligence. Finally, consultants and those who conduct in-house training will find the insights shared by the expert panelists will provide them valued

expertise in the next generation of risk models.

12:30 PM – 1:30 PM Pre-Conference Workshop B Check-in (Separate registration required)

Page 3: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

3 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

1:00 PM – 6:30 PM Registration Desk Open

Bags and Lanyards courtesy of Globalvision Systems

1:30 PM – 4:30 PM

WORKSHOP C: Crypto Quandaries: An Interactive Workshop on

Managing Risks—and Optimizing Opportunities—of Virtual Currencies

Virtual currencies can sometimes strike fear in compliance officers, but the

reality is cryptocurrencies are an innovation that AML specialists are going to see more of. Which is why this insight-filled workshop is tailored to provide a

roadmap for AML officers who must guide their institutions as they navigate

this disruptive technology. Led by longtime experts, this workshop will address issues such as the unique AML risks posed by cryptocurrencies, along with

practical guidance on how to manage them. Questions as to how cryptocurrencies are increasingly being used—and how that impacts AML

responsibilities such as transaction monitoring— will be explored in-depth, giving compliance professionals vital insights on adjusting legacy systems to

accommodate these new and transformative financial products. The truth is,

these new technologies demand new AML skills. Learn them at this workshop.

Key Areas Covered

Deconstructing unique compliance challenges of virtual currencies, to

develop risk-based oversight models that mitigate potential AML and financial crime issues

Analyzing cryptocurrency case studies to gain comprehension of issues such as KYC and transparency to incorporate lessons learned into

enterprise-wide training programs

Surveying evolving regulatory efforts and growth of cryptocurrencies

and related businesses such as Bitcoin exchanges to facilitate adequate

planning as virtual currencies gain greater acceptance worldwide

Who Should Attend

This workshop is tailored for compliance professionals no matter their level of exposure to cryptocurrencies. With their growing clout, virtual currencies are

almost certain to affect financial institutions regardless of size or market niche. Attendees can expect a solid grounding in the rise and current status of the

cryptocurrency market, as well as a forward-looking exploration of emerging

trends that will enable them to be thought leaders on risk management of cryptocurrencies at the institutional level.

5:00 PM - 5:30 PM

ACAMS First-Time Attendee Orientation

Page 4: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

4 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

MONDAY, APRIL 15, 2019

Main Conference Day One

7:30 AM – 5:50 PM

Registration Desk Open

Bags and Lanyards courtesy of Globalvision Systems

7:30 AM – 6:50 PM

Exhibit Hall Open

7:30 AM – 8:30 AM

Networking Breakfast in Exhibit Hall

GENERAL SESSIONS

8:30 AM – 8:40 AM

Welcome Remarks

8:40 AM – 9:10 AM

Keynote Address and Q&A

9:10 AM – 10:35 AM

Panel Discussion

Regulatory Roundtable: Insights on Oversight Directly From Top

Regulators

Discussing recent global and domestic regulatory developments and offer insight into current AML compliance oversight trends

Assessing recent US regulatory changes in 2018-19 and their practical

impacts on systems, resources and controls

Reviewing both good and challenging examination trends to improve

institution responses and ensure clarity of expectations

10:35 AM – 11:05 AM

Networking and Refreshment Break in Exhibit Hall

11:05 AM – 12:15 PM

Panel Discussion

Hot Topics: The Issues (and Answers) You Care Most About

Join our expert panel as they address questions and comments submitted

directly by you, the attendees, and provide industry responses to discussion

topics from the Regulatory Roundtable. This session provides an open forum and interactive discussion as panelists tackle topics submitted by the audience

two weeks before the conference starts. Whether the issue is regtech or regulatory expectations, SARs or cybersecurity, this is your chance to be heard.

It’s a frank dialogue of value to anyone involved in AML, compliance or the fight against financial crime.

12:15 PM – 1:30 PM

Networking Luncheon

12:15 PM – 1:30 PM

AML Knowledge Luncheon

CONCURRENT SESSIONS

1:30 PM – 2:00 PM Networking Groups

2:15 PM – 2:45 PM Networking Groups

Networking para Profesionales ALD de América Latina

Page 5: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

5 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

A menudo se llama a Miami la capital de América Latina, por lo que es justo que la conferencia de ACAMS en el sur de la Florida brinde una oportunidad de

networking específicamente para aquellos que prefieren hablar sobre ALD en

español. Ya sea que usted sea de México o Manhattan, Texas o Tegucigalpa, esta sesión brinda una ocasión amistosa e informal para unirse a la

conversación ALD - en español.

1:30 PM – 2:45 PM Concurrent Sessions

Global Issues

Lessons Learned from the ABLV, Societe Generale and Danske Cases

Detailing SocGen’s deficiencies in AML infrastructure to analyze how lax oversight led to willful violations and concealment of sanctions laws and

the Foreign Corrupt Practices Act

Reviewing the use of shell companies and disguised identities to chart the flow of billions of dollars in suspicious payments through Danske

Bank’s Estonian branch office

Examining the consequences for implicated institutions, such as multi-

billion dollar fines and liquidation of ABLV following FinCEN prohibition of correspondent accounts by US banks

Financial Crime Trends

Wildlife Trafficking: AML Models to Deter Environmental-Linked

Financial Crime

Charting common typologies of environmental-related crimes such as

endangered species smuggling or trafficking in wildlife subject to harvest quotas including lumber and aquatic species

Reviewing specific cases involving wildlife-related schemes such as

rhino horn smuggling to establish ties between environmental-related trafficking and transnational financial crime organizations

Familiarizing staff with laws such as END Wildlife Trafficking Act,

utilizing resources such as State Department’s “focus countries” at

higher risk of wildlife trafficking and establishing protocols for contacting and aiding authorities

SARs SARs From A Law Enforcement Perspective

Outlining SAR management practices by investigative agencies to gain insights into law enforcement review processes and priorities

Examining examples of SAR-initiated investigations to gain insights into

making SARs of optimal use to law enforcement

Reviewing best practices for creating and maintaining outreach programs with law enforcement to foster collaborative AML and

financial crime prevention efforts

Technology Trends

Choosing an AML Technology Solution—A “How To” for Evaluating and

Selecting the Best Fit For Your Institution

Assessing your institution’s need for new or enhanced AML technology

solutions

Key areas of focus to evaluate in narrowing the field of suitable vendors

and solutions for your institution

Page 6: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

6 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Vetting potential vendors for expertise in targeted functions and

capacity to integrate automated processes with existing legacy systems

Performing a post-integration audit to assess success of outcomes, identify operational deficiencies and adjust systems or vendor

relationship as warranted

AML Knowledge

AML Knowledge

2:45 PM – 3:05 PM

Networking and Refreshment Break in Exhibit Hall

3:05 PM – 3:35 PM Networking Groups

3:05 PM – 4:20 PM Concurrent Sessions

Global Issues

Rethinking Correspondent Banking: De-Risking Through Education

Analyzing unique market and respondent bank risks to create appropriate and individualized control environments that conform to

institutional risk appetite and tolerance standards

Simulating case studies to detail practical management and staff training scenarios for scrutinizing and resolving relationship issues with

respondent banks

Understanding motivations and interests of both business side and

financial criminal compliance units to facilitate mutually beneficial resolution of conflicting incentives

Financial Crime

Trends

Dark Web Spotlight: Countering Its Financial Crime and Money

Laundering Risks

Analyzing encryption technologies such as The Onion Router (Tor) and Bitcoin to attain insights into how they can be exploited to mask

criminal enterprises and transactions

Reviewing Operation Dark Gold and other successful investigations by law enforcement agencies to detail inner workings of illicit Dark Web

activities

Incorporating monitoring for Dark Web criminal typologies into AML

models and utilizing oversight tools such as KYC and EDD to flag and resolve suspicious activities

SARs Write On: A Guide to Composing and Editing SAR Narratives

Reviewing investigative findings that support SAR filing decision to

outline narrative’s key points, identify vital supporting evidence and

jettison irrelevant or inconsequential data

Expanding outline into a rough draft that highlights relevant facts — such as who, what, when, where, why and how — to optimize SAR’s

usefulness to law enforcement

Editing narrative to delete unnecessary details, check factual accuracy and ensure final SAR is clear, concise, chronological and comprehensive

and meets regulatory expectations

Page 7: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

7 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Technology Trends

How May AI Help You? Applying Artificial Intelligence, Robotics and

Machine Learning to AML

Distinguishing AI, machine learning and robotic process automation to

identify discrete risk management uses such as predictive capacity, client segmentation and monitoring

Augmenting manual reviews and legacy systems with data analytics to

boost oversight efficiencies and elevate accuracy in alert generation, investigation and resolution

Auditing AI and machine learning systems to analyze systemic issues

such as data quality, currency of risk models or algorithmic bias and

take corrective actions as warranted

AML Knowledge

AML Knowledge

4:20 PM – 4:50 PM Networking and Refreshment Break in Exhibit Hall

4:50 PM – 5:20 PM Networking Groups

Networking for AML Caribbean Professionals

Beautiful beaches and warm waters are pretty much the norm for Caribbean attendees, so this networking session provides a friendly alternative to fun in the sun: Getting to know your neighbors (figuratively speaking.) From the Bahamas to Barbados, Grand Cayman to Grenada, the Caribbean compliance community is strong and growing. Meet up with old acquaintances—and make some new ones—at this assemblage of fellow financial crime professionals from across the Caribbean region.

4:50 PM – 5:50 PM Concurrent Sessions

Sanctions Management

Keeping Current: Staying Ahead on Sanctions

Formalizing sanctions communications systems to achieve ongoing awareness of changes concerning Iran, Cuba, Venezuela and Russia

and additions or deletions from SDN list

Conducting staff training on obscured sanctions risks such as dual-use goods or black market commodities trading to mitigate trade-related

and prohibited transaction risks

Examining requirements of the OFAC 50% rule to enhance identification and whose ownership structures create sanctions risks

involving blocked persons

Multi-Industry

Training Game On: AML in the Era of Legal Sports Gambling

Updating state actions to legalize sports gambling following Supreme Court’s overturning of Professional and Amateur Sports Protection Act

Page 8: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

8 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

TUESDAY, APRIL 16, 2019

Main Conference Day Two

7:30 AM – 5:50 PM Registration Desk Open

Creating oversight protocols to reconcile differences among states on

sports gambling and adjusting models in accord with legislative changes such as those involving online betting

Examining Nevada’s legal sports betting industry to assess historic roles

of state regulations and institutional standards in oversight of sports books

Risk Management PEPs Spotlight: Operation Money Flight and the Case Against

Venezuelan PEPs

Examining the alleged currency-exchange conspiracy to launder $1.2

billion embezzled from state-owned PDVSA to illustrate vulnerability of

state-owned enterprises to PEP schemes

Probing the alleged acts involving international bankers, Miami securities advisors and instruments such as fake mutual-fund

investments to illuminate laundering typologies

Surveying named defendants to gain insights on best practices for conducting effective risk assessments of PEPs

Technology Trends

The Data Whisperer: How Well Do You Know Your Data?

Conducting data needs assessments for business lines and products to collaboratively construct data collection and extraction systems to meet

unique AML needs across enterprise

Harmonizing data systems of discrete units to minimize duplication, enhance data quality and protection and foster efficiency in areas such

as beneficial ownership determination

Performing quality assurance review of data systems to identify and

resolve functional defects and confirm integration of changes in business models, risk profiles or regulations

Financial Crime Trends

Fighting Fraud and Financial Exploitation Involving Elders and

Vulnerable Adults

Evaluating the new Senior Safe Act to identify collaborative

opportunities between financial institutions, regulators and law enforcement involving senior financial abuse

Reviewing FINRA rule changes involving obtaining trusted contact

person information for vulnerable adults and placement of temporary holds in cases of suspected exploitation

Training relationship managers on red flags of elder abuse including

atypical disbursements or asset transfers to ensure investigation and

resolution of potential exploitation

AML Knowledge

5:50 PM – 6:50 PM Networking Reception in Exhibit Hall

Page 9: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

9 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Bags and Lanyards courtesy of Globalvision Systems

7:30 AM – 5:50 PM Exhibit Hall Open

7:30 AM – 8:30 AM

Networking Breakfast in Exhibit Hall

GENERAL SESSIONS

8:30 AM – 8:45 AM

ACAMS Advanced Certification Recognition

8:45 AM – 9:55 AM

Panel Discussion

New Tools for Combating Human Trafficking:

What Financial Institutions Can Do to Help Stop Labor and Sex Trafficking of Vulnerable Individuals

Understand anti-human trafficking initiatives built on a foundation of

shared data and resources, where organizations benefit from the

experience and intelligence of their peers, as well as shared learnings

from government, law enforcement, and NGO actors.

Learn about some of the cooperative efforts to fight human trafficking

locally, nationally and globally

Master some of the latest typologies that present red flags for human

trafficking

9:55 AM – 10:45 AM

Special Presentation and Q&A

10:45 AM – 11:15 AM

Networking and Refreshment Break in Exhibit Hall

11:15 AM – 12:15 PM

Panel Discussion

A Year in the Life of the CDD Final Rule: A First Anniversary

Assessment

Evaluating impact and resolution of implementation hurdles to outline

strategies for managing issues such as training, IT investment, hiring and responding to triggering events

Detailing preferable methodologies for determining beneficial

ownership to demonstrate disciplined institutional compliance with CDD Final Rule in anticipation of examination-related inquiries

Reviewing beneficial ownership verification tools, policies and practices

to evaluate efficiencies and effectiveness to strengthen entity

identification accuracy and mitigate non-compliance risks

12:15 PM – 1:30 PM

Networking Luncheon

CONCURRENT SESSIONS

1:30 PM – 2:00 PM AML Innovations

2:15 PM – 2:45 PM AML Innovations

1:30 PM – 2:45 PM Concurrent Sessions

Page 10: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

10 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Sanctions Management

US vs. Them? How Growing Divergences in EU and US Iran Sanctions

Affect Compliance

Enumerating differences between US and EU sanctions on Iran to

highlight potential non-compliance risks

Assessing the practical effects of EU efforts to immunize European companies from non-compliance with US sanctions on Iran

Adapting oversight models to mitigate sanctions exposure risks related

to Special Purpose Vehicles, third-country oil trading or other efforts to

skirt US sanctions

Risk Management Enhancing Enhanced Due Diligence: A Tool for Managing Higher-Risk

Customers

Utilizing CDD review to determine when EDD is required based on factors such as jurisdictional risks, entity client base, ownership

structure and transaction activity patterns

Developing checklist of EDD goals such as beneficial ownership determination and processes such as negative news searches to secure

data relevant to risk-based assessment

Informing senior management regularly to review risk profile changes, responsive EDD and monitoring measures, and gain consensus on

account exiting or continuation decisions

Financial Crime

Trends

How to Be a Cyber Fighter: Defending Against Cybercrime Threats

Conducting risk-based review of data collection and management

systems, including vendors, to identify potential vulnerabilities and

mitigate risks such as malware infestation

Creating a formal risk-based Know Your Employee program to combat

insider threats such as rogue employees and inadequate staff training

on cyber-related threats

Developing cyber-incident response plans to contain damage of

systemic attacks such as ransomware and data breaches, rectify

security gaps, and notify and collaborate with authorities

Global Issues Left of Boom, Right of Boom: Pre- and Post-Attack CTF Strategies

Applying the military “left of boom” concept — referring to pre-explosion timelines — to strengthen CTF through partnering with law

enforcement, proactive monitoring and situational awareness of

terrorism threats

Preparing for a “right of boom,” or post-attack, AML/compliance response to address issues such as institutional exposure to terrorist

financing flows, securing data that may be of use to investigators and refreshing relevant risk assessments

Incorporating lessons learned such as motivation for attack, methods of

circumventing security controls and terrorist funding streams to fortify left of boom protocols going forward

AML Knowledge

Page 11: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

11 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

AML Knowledge

2:45 PM – 3:05 PM

Networking and Refreshment Break in Exhibit Hall

3:05 PM – 3:35 PM AML Innovations

3:50 PM – 4:20 PM AML Innovations

3:05 PM – 4:20 PM Concurrent Sessions

Regulatory

Developments

Joint Solutions: A Multi-Pronged Approach to Banking Marijuana-

Related Businesses

Analyzing relevant FinCEN guidance on banking MRBs to ensure risk

models meet regulatory expectations and identify potential conflicts with applicable state laws

Training front-line staff on typologies such as commingling of bankable

and non-bankable proceeds in order to strengthen risk-based monitoring related to marijuana

Formalizing periodic reviews of MRB policies and procedures to keep

risk models current and reflect institutional risk appetite and recent

regulatory or legal developments

AML Careers What the Future Holds: Skills and Knowledge to Keep AML Careers

Advancing

Developing and maintaining technological literacy to achieve proficiency

in growing role of oversight and compliance tools such as analytics and

data management

Assessing emerging AML trends and needs to identify and acquire

talent acquisition in areas such as coding, algorithmic screening and

innovative products such as blockchain

Leveraging AML resources with approaches such as strategic

outsourcing and collaborating with law enforcement on investigations

to meet growing oversight obligations

Multi-Industry Training

Securities Focus: Analyzing SEC Actions on Oversight Adequacy and

SAR Filing

Probing SEC actions regarding deficient suspicious activity reporting to

discern regulatory expectations for SAR filing on activities of independent advisers

Standardizing definition of “reasonable suspicion” across enterprise to

ensure SAR filing decisions conform to regulatory and institutional standards

Applying lessons of enforcement actions to confirm oversight models

are comply with requirements such as those governing reporting,

recordkeeping and record retention

Page 12: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

12 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Financial Crime Trends

Operation Darkness Falls: Taking Down the Largest Fentanyl Vendor

in the U.S.

Analyzing the MH4Life organization’s use of the dark net and

cryptocurrencies to detail changing mechanics of drug dealing

enterprises Scrutinizing the organization’s money laundering process to detail role

of digital currency exchangers in converting proceeds into fiat

currencies and prepaid cards

Examining the collaborative investigation by federal agencies to gain insights into law enforcement methods for fighting cyber-based

financial crimes

AML Knowledge

AML Knowledge

4:20 PM – 4:50 PM Networking and Refreshment Break in Exhibit Hall

4:50 PM – 5:20 PM AML Innovations

4:50 PM – 5:50 PM Concurrent Sessions

Technology Trends

The Reach of a Breach: Following the Path from Stolen Data to

Identity Theft to Fraud

Analyzing how breached data is transformed into identity theft to

understand common typologies involving stolen information

Detailing the use of online accounts as “virtual money mules” used to launder money through financial institutions

Reviewing emerging trends in identity theft methods to adjust oversight

regimens as needed and improve detection and resolution of identity theft red flags

SARs Before You File: Creating a Support System to Aid Suspicious Activity

Oversight

Training staff on “appropriate and reasonable” testing to improve

detection of anomalous transactions, abrupt shifts in client profile and

other suspicious activities

Creating standardized procedures for investigating and escalating alerts to produce uniform and thorough reviews that support institutional risk

management goals

Formalizing SAR filing-decision protocols to ensure they are based on gathered evidence, conform to institutional standards and reflect the

views of affected parties

Sanctions

Know Your Country: Managing the Complications of Venezuelan

Sanctions

Crafting unique Venezuela oversight systems, using resources such as Treasury’s Venezuela sanctions updates and promptly incorporating

Page 13: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

13 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

OFAC changes involving SDN List, blacklisted entities and assets linked to PEPs

Conducting risk-based customer reviews to identify potential sanctions-

related risks such as purchases of banned debts or accounts receivable

owed to Venezuela or PDVSA or invoice manipulation of otherwise permissible trades

Reviewing FinCEN advisory on Venezuelan corruption to identify red

flags such as government contracts with entities having no clear business purpose, unusually complex wealth management patterns and

real estate purchases incommensurate with official salaries

Non-Bank

Institutions

MSB Spotlight: Regulatory Trends, Enforcement Actions and Emerging

Risks

Examining enforcement actions linked to innovative products such as

cryptocurrencies to identify unique MSB risks and strengthen oversight

protocols as warranted

Detailing and meeting regulatory requirements regarding adequacy of MSB AML programs and utilizing training and technology to address

obligations such as agent oversight

Conducting AML audits and documenting applicable corrective actions to foster productive collaboration with banking partners and mitigate

risks of relationship termination

Financial Crime

Trends

Antiquities, the Art Market and Financial Crime:

What AML Professionals Need to Know About the Looting and Trafficking of Cultural Artifacts and Fine Art

Analyzing guidance of FATF and law enforcement agencies on financial

crime risks of art and antiquities trading to strengthen due diligence of entities dealing in cultural artifacts

Reviewing federal and international investigations and prosecutions

with typologies that evidence the money laundering and terrorist financing opportunities via markets in cultural objects

Assessing regulatory and oversight trends including EU’s beneficial

ownership requirements for art dealers, the Geneva Responsible Art

Market Initiative and “Art Basel Guidelines” and public policy proposals in the US and globally

AML Knowledge

5:50 PM – 6:50 PM Networking Reception at Portico

WEDNESDAY, APRIL 17, 2019

Main Conference Day Three

7:30 AM – 11:50 AM Registration Desk Open

Page 14: P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the consequences for implicated institutions, ... Assessing your institution’s need for

14 | P a g e

Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.

Bags and Lanyards courtesy of Globalvision Systems

7:30 AM – 10:30 AM Exhibit Hall Open 7:30 AM – 8:30 AM

Networking Breakfast in Exhibit Hall

GENERAL SESSIONS

8:30 AM – 8:35 AM

Opening Remarks

8:35 AM – 9:20 AM

Keynote and Q&A

9:20 AM – 10:20 AM

Panel Discussion

What Do We Mean When We Say Regtech?

Defining Regtech and its components such as robotic process

automation to illuminate potential roles for satisfying regulatory

expectations and requirements

Harnessing Regtech processes such as machine learning to enhance

monitoring in areas such as regulatory changes and ensure robust adjustment of risk models and profiles

Reviewing trends in utilizing Regtech to strengthen oversight of

growing AML needs in areas such as Fintech, cryptocurrencies and beneficial ownership determination

10:20 AM – 10:50 AM

Networking and Refreshment Break in Exhibit Hall

10:50 AM – 12:00 PM

Panel Discussion

Corruption Case Study: The United States v. Paul J. Manafort Jr.

Tracing the movement of $60 million of secret Ukrainian payments to highlight the use of foreign corporations, partnerships and bank

accounts in money laundering conspiracies

Reviewing Manafort’s complex use of foreign nominee companies and offshore accounts to conceal millions of dollars from U.S. authorities

Analyzing luxury goods purchases and sham “loans” for U.S. real estate

by foreign accounts to reveal how cash was moved into the financial

system in a tax evasion scheme

12:00 PM – 12:05 PM

Closing Remarks