SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
https://www.alessa.caseware.com/
Strategies to Enhance your Screening
and Transaction Monitoring
Processes
Sponsored by
https://www.alessa.caseware.com/
About Presenters
Joel Freckleton, CAMS
Regional Sales Manager,
CaseWare RCM
Eric Hansen,
Senior Risk Specialist,
CaseWare RCM
Daniel Buckingham,
Director of Compliance Strategy,
Governance and Technology,
Transfast
Mandar Vaidya,
Assistant Vice President, Compliance,
ICICI Bank Canada
https://www.alessa.caseware.com/
Housekeeping
Enter your questions here
Webinar Tips
• If you are experiencing issues with audio quality, switch to Chrome as
your web browser
• If you are still experiencing issues, send us a message and we will
provide a link to the GoToWebinar support line. There is a also a link at
the bottom of the chat box.
• Let us know if you are experiencing any other issues.
https://www.alessa.caseware.com/
Agenda
4
1. Understanding risk
2. Translating risks into transaction monitoring
realities
3. Tuning capabilities
https://www.alessa.caseware.com/ 5
Risk-Based Approach
Challenge:
Theoretically sound premise, but practical realities make this difficult to achieve and
reliably demonstrate
Intent:
More efficient use of resources to mitigate the ML/TF risks identified. It enables a firm to
focus their resources and take enhanced measures in situations where the risks are
higher, apply simplified measures where the risks are lower and exempt low risk activities.
https://www.alessa.caseware.com/ 6
FATF: Risk-Based Approach
“Competent authorities and financial institutions, are expected to
identify, assess and understand the ML/TF risks to which they are
exposed and take AML/CFT measures commensurate to those
risks in order to mitigate them effectively.”
The Financial Action Task Force (FATF) Guidance for a Risk-based approach - 2014
https://www.alessa.caseware.com/ 7
Understanding Risk: Monitoring & Detection Perspectives
Challenge:
Identifying the balance:
• Coverage vs. targeted approaches to risk identification and mitigation.
• Manual vs. automated mechanisms
• Interim vs. Strategic solutions
Intent:
• More comprehensive view of risks, to most importantly understand the realities of risk
(likelihood, impact and repercussions) to make an informed decision around your risk
focus lenses.
• Enables early insight into challenges and/or realities that may impact and even limit the
ability to efficiently and effectively monitor and detect risk.
https://www.alessa.caseware.com/ 8
Understanding Risk: Monitoring & Detection Perspectives
• Enterprise & Localized assessments are critical
• Inherent Risk
• Customers, Product/Services, Transactions Type, Geography, etc.
• Risk mapping e.g. to specific regulations/country typologies (manage risk nuances)
• Perceived vs. Real
• Likelihood, impact and repercussions
• Upstream and Downstream realities
• Transaction flows and data capture rules
• Product and service parameters (limits, restrictions etc.)
• KYC processes
• Knowledgeable & skilled staff
• Manual vs. automated
https://www.alessa.caseware.com/
POLL 1:
How does your Organization conduct risk
assessments?
1. Enterprise (holistically)
2. By department
3. Regulator driven
4. Other
https://www.alessa.caseware.com/ 10
From Targeted Risks to Monitoring/Detection Realities
Challenge:
• Data quality and availability to support true targeting of risk.
Intent:
• To understand the type and combination of monitoring controls needed and how
effective these controls will be, based upon the data availability, completeness and
accuracy.
https://www.alessa.caseware.com/ 11
From Targeted Risks to Monitoring/Detection Realities
• Risk Factors Elements
• What are the specific attributes that when present (combined) would identify the risk?
• When (risk tolerance) does the risk become real?
• What areas within the organization (customers, products, services etc.) are affected by this
risk, and are they all equal (risk tolerance)?
• Map data element to the constituent parts
• Where is the data? Is it electronic or physical? Can the acquisition be automated?
• Data completeness and accuracy
• Define monitoring & detection capabilities
• Is there sufficient electronic, systematic data to support automation?
• Does the data require manual acquisition and transformation before it can be used?
https://www.alessa.caseware.com/ 12
Tuning Monitoring & Detection Capabilities
Challenge:
• To not build in such a bias that risks (even if lower) are not being monitored and
detected.
• Finding the balance between targeted and coverage risk mitigation and human
resources to manage.
Intent:
• To build a more effective approach to monitoring and detection of risk that is
proportional to the risks of the firm. The efforts are proportionally higher where the
risks are higher.
https://www.alessa.caseware.com/ 13
Tuning Monitoring & Detection Capabilities
• Tuning
• Using a combination of system parameters and data for optimization
o Targeting of specific risks
o Reduction of unproductive detection
o Timeliness of detection
o Coverage of detection (spectrum of risk monitoring)
• Risk Based Bias
• Monitoring and detection skewed towards risk
o More specific detection approaches
o Higher propensity to alert
• More efforts are made using the compliments of parts to monitor and detect.
https://www.alessa.caseware.com/
POLL 2:
What type of tuning function do you currently have
in place?
1. Maintained through the compliance department
2. Outsourced
3. Managed by IT
4. Other
https://www.alessa.caseware.com/
Strategies to optimize Transaction Monitoring processes
• Use a risk-based approach to enable a comprehensive view of risks, to better understand the
realities of risk (likelihood, impact and repercussions)
• Understand the type, frequency and combination of monitoring controls needed and how
effective these controls will be, based upon the data availability, completeness and accuracy.
• Ensure approach balances between targeted and coverage risk mitigation
• Utilize periodic tuning for sustainability
15
Summary
https://www.alessa.caseware.com/
Agenda
16
1. Effective watch lists screening
2. Enabling risk scoring
3. Effective communication
https://www.alessa.caseware.com/ 17
Sanctions Fines
https://www.alessa.caseware.com/
Customer Risk - Onboarding
• Customer characteristics (name, address, date of birth, profession etc.)
• Corporate entities characteristics (industry, revenue, no of employees, geographies, etc.)
• Anticipated utilization and activity of account
• Presence on any sanctions or watch lists including politically-exposed persons (PEP) lists
18
Customer Risk – Onboarding
https://www.alessa.caseware.com/
Triggers for Screening
• Daily Screening against list deltas
• Screening at time of transaction
(against A and B parties)
• Ongoing monitoring of high-risk
clients.
19
Customer Risk – Ongoing Risk Score
https://www.alessa.caseware.com/
• Is part of effective financial crime compliance program
• Includes
• Watchlist screening
• Sanctions screening, and
• Screening for identifying PEPs, HIOs, and family members
• Screening is typically done at time of
• Establishing business relationship
• Processing of transactions
• Screening systems should find right balance between meeting regulatory expectation and
customer experience.
• In summary, should be effective and efficient
20
Screening
https://www.alessa.caseware.com/
POLL 3:
How would you describe the state of your current
screening program?
1. Very good - other FIs could learn from us!
2. Adequate - at least it keeps the regulators happy
3. Needs improvement - could probably use some fine-tuning
4. Under construction - we are working on it!
https://www.alessa.caseware.com/
• It is important to design and develop a robust screening environment
• Each FI should assess its own risks
• Taking a Risk-Based Approach by considering parameters such as
• Product offering
• Customer base
• Geographic risk
• For example a retail credit product where real time approvals are required – the inherent
sanctions risk is low where customers are local customers with credit history, value of
transaction is low then using an automated system may be considered
• For Trade Finance customers, the inherent sanctions risk is high so enhanced due
diligence is required, for such products a mix of automated – manual processes may be
required
22
How to Meet the Challenge
https://www.alessa.caseware.com/
• Screening environment is most often a complex set of processes
• Customer data maybe from multiple systems
• Screening lists from a reliable service provider
• Requires a good matching algorithm, and
• Flexibility to make quick changes
• FIs should have a strong governance over the screening process
23
Good Screening Environment
https://www.alessa.caseware.com/
• Use the updated version of lists
• Use reliable sources
• Assess the accuracy of the list
• Look at geographic scope of list
application
• Be aware of common prefixes,
secondary names, suffixes
• Names in non-Latin characters
• Duplicate values
• 50 percent rule for entity ownership
24
Best Practices for a Good Screening Environment
https://www.alessa.caseware.com/
• Not for Profit Organizations (NPO)
• Designated Non-Financial Businesses and Professions
• Shell Corporations
• Cash Intensive Businesses
• Pre-paid Card Issuers
• Marijuana Related Businesses
25
Screening High-Risk Professions and Businesses
https://www.alessa.caseware.com/
• Periodic Quality Assurance checks are required
• Independent team within Compliance to do the checks
• Check for alert generation process – completeness and accuracy
• Flow of data into the screening system – data integrity
• Check the number of false positives generated – metrics and reporting
• Are all types of transactions integrated with the screening system
• Is there a need for recalibration?
• Are there misconfigured watch lists?
26
Recalibration of Screening Environment
https://www.alessa.caseware.com/ 27
Use Case – ICICI Bank of Canada
• Name Screening Process
• Risk-Based Approach
• In-house name screening matching algorithm using fuzzy logic, phonetic algorithm,
deletes “noise”
• Common global lists and geography specific lists ( where clients do most of the
transactions)
• Emphasis on regular trainings to AMLO within business functions
• Use of robotics /automation for clearing certain types of alerts
• Quarterly QA testing
https://www.alessa.caseware.com/
Strategies to enhance screening processes
• Use a Risk-Based Approach
• Design an effective screening environment
• Use new technologies, and
• Periodically re-calibrate the eco-system
28
Summary
https://www.alessa.caseware.com/
Questions?
https://www.alessa.caseware.com/
Strategies to Enhance your Screening
and Transaction Monitoring
Processes
Sponsored by

Contenu connexe

Tendances

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)AML Source
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...Louise Malady
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and amlcrmbasel
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
 
AML by the Numbers
AML by the NumbersAML by the Numbers
AML by the NumbersAlessa
 
Capanalec profile June-2019
Capanalec profile June-2019Capanalec profile June-2019
Capanalec profile June-2019CapAnalec
 
Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)HEXANIKA
 
AnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentationAnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentationCredit Management Association
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2Eric Young
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and amlcrmbasel
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_ShapiroMediabistro
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...StubbsGazette
 
Vendor Monitoring Lifecycle
Vendor Monitoring LifecycleVendor Monitoring Lifecycle
Vendor Monitoring LifecycleTrust Exchange
 

Tendances (19)

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
 
goAML
goAMLgoAML
goAML
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and aml
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
AML by the Numbers
AML by the NumbersAML by the Numbers
AML by the Numbers
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
Capanalec profile June-2019
Capanalec profile June-2019Capanalec profile June-2019
Capanalec profile June-2019
 
Sales Tax Exemption Certificates
Sales Tax Exemption CertificatesSales Tax Exemption Certificates
Sales Tax Exemption Certificates
 
Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)
 
AnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentationAnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentation
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and aml
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_Shapiro
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
 
Vendor Monitoring Lifecycle
Vendor Monitoring LifecycleVendor Monitoring Lifecycle
Vendor Monitoring Lifecycle
 

Similaire à Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes

CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseAlessa
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesHortonworks
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTri Phan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTuan Phan
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard Jim Robins
 
The role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeThe role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeSymptai Consulting Limited
 
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...Prolifics
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.Nicholai Portelli
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTri Phan
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance servicesdrishtipuro1234
 
Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Mo Johnson
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Genpact Ltd
 
Adopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bankAdopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bankKrishna Bollojula
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2Perficient, Inc.
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!Emma Kelly
 
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...accenture
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banksPankaj Baid
 

Similaire à Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes (20)

CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
 
The role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeThe role of Technology: Battling Financial Crime
The role of Technology: Battling Financial Crime
 
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance services
 
Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
Adopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bankAdopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bank
 
Adopting Analytics in BFSI
Adopting Analytics in BFSIAdopting Analytics in BFSI
Adopting Analytics in BFSI
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
 
Fraud analysis
Fraud analysisFraud analysis
Fraud analysis
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banks
 

Plus de Alessa

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveAlessa
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowAlessa
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersAlessa
 
Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Alessa
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsAlessa
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveAlessa
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsAlessa
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYAlessa
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...Alessa
 
Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaAlessa
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesAlessa
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAlessa
 
Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Alessa
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Alessa
 
Analytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAnalytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAlessa
 
Reduce Your AML Compliance Workload
Reduce Your AML Compliance WorkloadReduce Your AML Compliance Workload
Reduce Your AML Compliance WorkloadAlessa
 
CaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your BusinessCaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your BusinessAlessa
 
Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime Alessa
 

Plus de Alessa (18)

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More Effective
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to Know
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
 
Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada Perspective
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening Programs
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
 
Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in Canada
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
 
Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
Analytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAnalytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing Cards
 
Reduce Your AML Compliance Workload
Reduce Your AML Compliance WorkloadReduce Your AML Compliance Workload
Reduce Your AML Compliance Workload
 
CaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your BusinessCaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your Business
 
Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime
 

Dernier

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 

Dernier (20)

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 

Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes

  • 1. https://www.alessa.caseware.com/ Strategies to Enhance your Screening and Transaction Monitoring Processes Sponsored by
  • 2. https://www.alessa.caseware.com/ About Presenters Joel Freckleton, CAMS Regional Sales Manager, CaseWare RCM Eric Hansen, Senior Risk Specialist, CaseWare RCM Daniel Buckingham, Director of Compliance Strategy, Governance and Technology, Transfast Mandar Vaidya, Assistant Vice President, Compliance, ICICI Bank Canada
  • 3. https://www.alessa.caseware.com/ Housekeeping Enter your questions here Webinar Tips • If you are experiencing issues with audio quality, switch to Chrome as your web browser • If you are still experiencing issues, send us a message and we will provide a link to the GoToWebinar support line. There is a also a link at the bottom of the chat box. • Let us know if you are experiencing any other issues.
  • 4. https://www.alessa.caseware.com/ Agenda 4 1. Understanding risk 2. Translating risks into transaction monitoring realities 3. Tuning capabilities
  • 5. https://www.alessa.caseware.com/ 5 Risk-Based Approach Challenge: Theoretically sound premise, but practical realities make this difficult to achieve and reliably demonstrate Intent: More efficient use of resources to mitigate the ML/TF risks identified. It enables a firm to focus their resources and take enhanced measures in situations where the risks are higher, apply simplified measures where the risks are lower and exempt low risk activities.
  • 6. https://www.alessa.caseware.com/ 6 FATF: Risk-Based Approach “Competent authorities and financial institutions, are expected to identify, assess and understand the ML/TF risks to which they are exposed and take AML/CFT measures commensurate to those risks in order to mitigate them effectively.” The Financial Action Task Force (FATF) Guidance for a Risk-based approach - 2014
  • 7. https://www.alessa.caseware.com/ 7 Understanding Risk: Monitoring & Detection Perspectives Challenge: Identifying the balance: • Coverage vs. targeted approaches to risk identification and mitigation. • Manual vs. automated mechanisms • Interim vs. Strategic solutions Intent: • More comprehensive view of risks, to most importantly understand the realities of risk (likelihood, impact and repercussions) to make an informed decision around your risk focus lenses. • Enables early insight into challenges and/or realities that may impact and even limit the ability to efficiently and effectively monitor and detect risk.
  • 8. https://www.alessa.caseware.com/ 8 Understanding Risk: Monitoring & Detection Perspectives • Enterprise & Localized assessments are critical • Inherent Risk • Customers, Product/Services, Transactions Type, Geography, etc. • Risk mapping e.g. to specific regulations/country typologies (manage risk nuances) • Perceived vs. Real • Likelihood, impact and repercussions • Upstream and Downstream realities • Transaction flows and data capture rules • Product and service parameters (limits, restrictions etc.) • KYC processes • Knowledgeable & skilled staff • Manual vs. automated
  • 9. https://www.alessa.caseware.com/ POLL 1: How does your Organization conduct risk assessments? 1. Enterprise (holistically) 2. By department 3. Regulator driven 4. Other
  • 10. https://www.alessa.caseware.com/ 10 From Targeted Risks to Monitoring/Detection Realities Challenge: • Data quality and availability to support true targeting of risk. Intent: • To understand the type and combination of monitoring controls needed and how effective these controls will be, based upon the data availability, completeness and accuracy.
  • 11. https://www.alessa.caseware.com/ 11 From Targeted Risks to Monitoring/Detection Realities • Risk Factors Elements • What are the specific attributes that when present (combined) would identify the risk? • When (risk tolerance) does the risk become real? • What areas within the organization (customers, products, services etc.) are affected by this risk, and are they all equal (risk tolerance)? • Map data element to the constituent parts • Where is the data? Is it electronic or physical? Can the acquisition be automated? • Data completeness and accuracy • Define monitoring & detection capabilities • Is there sufficient electronic, systematic data to support automation? • Does the data require manual acquisition and transformation before it can be used?
  • 12. https://www.alessa.caseware.com/ 12 Tuning Monitoring & Detection Capabilities Challenge: • To not build in such a bias that risks (even if lower) are not being monitored and detected. • Finding the balance between targeted and coverage risk mitigation and human resources to manage. Intent: • To build a more effective approach to monitoring and detection of risk that is proportional to the risks of the firm. The efforts are proportionally higher where the risks are higher.
  • 13. https://www.alessa.caseware.com/ 13 Tuning Monitoring & Detection Capabilities • Tuning • Using a combination of system parameters and data for optimization o Targeting of specific risks o Reduction of unproductive detection o Timeliness of detection o Coverage of detection (spectrum of risk monitoring) • Risk Based Bias • Monitoring and detection skewed towards risk o More specific detection approaches o Higher propensity to alert • More efforts are made using the compliments of parts to monitor and detect.
  • 14. https://www.alessa.caseware.com/ POLL 2: What type of tuning function do you currently have in place? 1. Maintained through the compliance department 2. Outsourced 3. Managed by IT 4. Other
  • 15. https://www.alessa.caseware.com/ Strategies to optimize Transaction Monitoring processes • Use a risk-based approach to enable a comprehensive view of risks, to better understand the realities of risk (likelihood, impact and repercussions) • Understand the type, frequency and combination of monitoring controls needed and how effective these controls will be, based upon the data availability, completeness and accuracy. • Ensure approach balances between targeted and coverage risk mitigation • Utilize periodic tuning for sustainability 15 Summary
  • 16. https://www.alessa.caseware.com/ Agenda 16 1. Effective watch lists screening 2. Enabling risk scoring 3. Effective communication
  • 18. https://www.alessa.caseware.com/ Customer Risk - Onboarding • Customer characteristics (name, address, date of birth, profession etc.) • Corporate entities characteristics (industry, revenue, no of employees, geographies, etc.) • Anticipated utilization and activity of account • Presence on any sanctions or watch lists including politically-exposed persons (PEP) lists 18 Customer Risk – Onboarding
  • 19. https://www.alessa.caseware.com/ Triggers for Screening • Daily Screening against list deltas • Screening at time of transaction (against A and B parties) • Ongoing monitoring of high-risk clients. 19 Customer Risk – Ongoing Risk Score
  • 20. https://www.alessa.caseware.com/ • Is part of effective financial crime compliance program • Includes • Watchlist screening • Sanctions screening, and • Screening for identifying PEPs, HIOs, and family members • Screening is typically done at time of • Establishing business relationship • Processing of transactions • Screening systems should find right balance between meeting regulatory expectation and customer experience. • In summary, should be effective and efficient 20 Screening
  • 21. https://www.alessa.caseware.com/ POLL 3: How would you describe the state of your current screening program? 1. Very good - other FIs could learn from us! 2. Adequate - at least it keeps the regulators happy 3. Needs improvement - could probably use some fine-tuning 4. Under construction - we are working on it!
  • 22. https://www.alessa.caseware.com/ • It is important to design and develop a robust screening environment • Each FI should assess its own risks • Taking a Risk-Based Approach by considering parameters such as • Product offering • Customer base • Geographic risk • For example a retail credit product where real time approvals are required – the inherent sanctions risk is low where customers are local customers with credit history, value of transaction is low then using an automated system may be considered • For Trade Finance customers, the inherent sanctions risk is high so enhanced due diligence is required, for such products a mix of automated – manual processes may be required 22 How to Meet the Challenge
  • 23. https://www.alessa.caseware.com/ • Screening environment is most often a complex set of processes • Customer data maybe from multiple systems • Screening lists from a reliable service provider • Requires a good matching algorithm, and • Flexibility to make quick changes • FIs should have a strong governance over the screening process 23 Good Screening Environment
  • 24. https://www.alessa.caseware.com/ • Use the updated version of lists • Use reliable sources • Assess the accuracy of the list • Look at geographic scope of list application • Be aware of common prefixes, secondary names, suffixes • Names in non-Latin characters • Duplicate values • 50 percent rule for entity ownership 24 Best Practices for a Good Screening Environment
  • 25. https://www.alessa.caseware.com/ • Not for Profit Organizations (NPO) • Designated Non-Financial Businesses and Professions • Shell Corporations • Cash Intensive Businesses • Pre-paid Card Issuers • Marijuana Related Businesses 25 Screening High-Risk Professions and Businesses
  • 26. https://www.alessa.caseware.com/ • Periodic Quality Assurance checks are required • Independent team within Compliance to do the checks • Check for alert generation process – completeness and accuracy • Flow of data into the screening system – data integrity • Check the number of false positives generated – metrics and reporting • Are all types of transactions integrated with the screening system • Is there a need for recalibration? • Are there misconfigured watch lists? 26 Recalibration of Screening Environment
  • 27. https://www.alessa.caseware.com/ 27 Use Case – ICICI Bank of Canada • Name Screening Process • Risk-Based Approach • In-house name screening matching algorithm using fuzzy logic, phonetic algorithm, deletes “noise” • Common global lists and geography specific lists ( where clients do most of the transactions) • Emphasis on regular trainings to AMLO within business functions • Use of robotics /automation for clearing certain types of alerts • Quarterly QA testing
  • 28. https://www.alessa.caseware.com/ Strategies to enhance screening processes • Use a Risk-Based Approach • Design an effective screening environment • Use new technologies, and • Periodically re-calibrate the eco-system 28 Summary
  • 30. https://www.alessa.caseware.com/ Strategies to Enhance your Screening and Transaction Monitoring Processes Sponsored by