SlideShare a Scribd company logo
1 of 1
Download to read offline
Monitoring High Risk Transactions
This BSA/AML (Bank Secrecy Act/ Anti Money Laundering) compliance training will help
attendees understand, identify and mitigate the risks associated with high risk transactions.
Why Should You Attend:
An effective BSA/AML compliance program controls risks associated with the institution’s
products, services, customers, entities, and geographic locations; therefore, en effective risk
assessment should be an ongoing process, not a one-time exercise. Monitoring your risks
includes monitoring your transactions, especially your high risk transactions.
Per the FFIEC Manual: The development of the BSA/AML risk assessment generally involves
two steps: first, identify the specific risk categories (i.e., products, services, customers, entities,
transactions, and geographic locations) unique to the institution: and second, conduct a more
detailed analysis of the data identified to better assess the risk within these categories.
Several examples of a system of internal controls will help you document your monitoring
program.
Areas Covered in the Webinar:
Resources.
Accessing the data: What are the obstacles? Core system, teller system, BSA monitoring
program, etc.
How did the activity occur? In person, telephone, internet, wire, ATM, or ACH.
Sample risk assessment for products and services.
Systems of internal controls.
Managing Non Resident Aliens.
Documenting and Monitoring a Cash In and Cash Out Report.
Who will Benefit:
Financial Officers
Bank Secrecy Act Officers
Front Line Staff
Risk Officers
Operational Managers
For more details visit us at:
http://www.complianceonline.com/ecommerce/control/trainingFocus/~produc
t_id=703001?channel=Doc_organic

More Related Content

Similar to Monitoring high risk transactions

Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentMayank Johri
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentErik De Monte
 
5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programmeSILO Compliance Systems
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSarah George
 
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud ControlsCommercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud ControlsSuvendu Ganguli
 
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml divisioncomplianceonline123
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsSecurefact
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI ChecklistIdeba
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
The Significance of Background Verification Software in the Banking Industry....
The Significance of Background Verification Software in the Banking Industry....The Significance of Background Verification Software in the Banking Industry....
The Significance of Background Verification Software in the Banking Industry....TraQSuite
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTPaul Authachinda
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
Grant Application Management For Charities Flow Chart En
Grant Application Management For Charities Flow Chart EnGrant Application Management For Charities Flow Chart En
Grant Application Management For Charities Flow Chart Enjanslides
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
CrowsNest_WhitePaper
CrowsNest_WhitePaperCrowsNest_WhitePaper
CrowsNest_WhitePaperMichael Matza
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analyticsIBM Analytics
 

Similar to Monitoring high risk transactions (20)

Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
 
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud ControlsCommercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
 
SMART-AML_A4.EN.ciq
SMART-AML_A4.EN.ciqSMART-AML_A4.EN.ciq
SMART-AML_A4.EN.ciq
 
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml division
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI Checklist
 
J. Sarnowski Resume v2
J. Sarnowski Resume v2J. Sarnowski Resume v2
J. Sarnowski Resume v2
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
The Significance of Background Verification Software in the Banking Industry....
The Significance of Background Verification Software in the Banking Industry....The Significance of Background Verification Software in the Banking Industry....
The Significance of Background Verification Software in the Banking Industry....
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENT
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Grant Application Management For Charities Flow Chart En
Grant Application Management For Charities Flow Chart EnGrant Application Management For Charities Flow Chart En
Grant Application Management For Charities Flow Chart En
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
CrowsNest_WhitePaper
CrowsNest_WhitePaperCrowsNest_WhitePaper
CrowsNest_WhitePaper
 
main project doument
main project doumentmain project doument
main project doument
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analytics
 

More from complianceonline123

Fda adverse event reporting requirements for otc drugs
Fda adverse event reporting requirements  for otc drugsFda adverse event reporting requirements  for otc drugs
Fda adverse event reporting requirements for otc drugscomplianceonline123
 
Social media risks rules policies procedures
Social media risks rules policies  proceduresSocial media risks rules policies  procedures
Social media risks rules policies procedurescomplianceonline123
 
Excel spreadsheets how to ensure 21 cfr part 11 compliance
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliancecomplianceonline123
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital agecomplianceonline123
 
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s PotentialReaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potentialcomplianceonline123
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit complianceonline123
 
Aml non bank finanacial institutions
Aml non bank finanacial institutionsAml non bank finanacial institutions
Aml non bank finanacial institutionscomplianceonline123
 
Gdp how to manage documentation lifecycle
Gdp  how to manage documentation lifecycleGdp  how to manage documentation lifecycle
Gdp how to manage documentation lifecyclecomplianceonline123
 

More from complianceonline123 (20)

Fda adverse event reporting requirements for otc drugs
Fda adverse event reporting requirements  for otc drugsFda adverse event reporting requirements  for otc drugs
Fda adverse event reporting requirements for otc drugs
 
Social media risks rules policies procedures
Social media risks rules policies  proceduresSocial media risks rules policies  procedures
Social media risks rules policies procedures
 
Fmla ada overlap
Fmla  ada  overlapFmla  ada  overlap
Fmla ada overlap
 
Hipaa enforcement examples
Hipaa enforcement examplesHipaa enforcement examples
Hipaa enforcement examples
 
Excel spreadsheets how to ensure 21 cfr part 11 compliance
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliance
 
Retail loss
Retail lossRetail loss
Retail loss
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Fda warning letters
Fda  warning lettersFda  warning letters
Fda warning letters
 
Dietary supplement
Dietary supplementDietary supplement
Dietary supplement
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s PotentialReaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
 
Basics of internal audit
Basics of internal auditBasics of internal audit
Basics of internal audit
 
Free trade zones
Free trade zonesFree trade zones
Free trade zones
 
Sec what you need to know
Sec what you need to knowSec what you need to know
Sec what you need to know
 
Auditing your grc programs
Auditing your grc programsAuditing your grc programs
Auditing your grc programs
 
Aml non bank finanacial institutions
Aml non bank finanacial institutionsAml non bank finanacial institutions
Aml non bank finanacial institutions
 
Gdp how to manage documentation lifecycle
Gdp  how to manage documentation lifecycleGdp  how to manage documentation lifecycle
Gdp how to manage documentation lifecycle
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
 
Good documentation practices
Good documentation practicesGood documentation practices
Good documentation practices
 

Monitoring high risk transactions

  • 1. Monitoring High Risk Transactions This BSA/AML (Bank Secrecy Act/ Anti Money Laundering) compliance training will help attendees understand, identify and mitigate the risks associated with high risk transactions. Why Should You Attend: An effective BSA/AML compliance program controls risks associated with the institution’s products, services, customers, entities, and geographic locations; therefore, en effective risk assessment should be an ongoing process, not a one-time exercise. Monitoring your risks includes monitoring your transactions, especially your high risk transactions. Per the FFIEC Manual: The development of the BSA/AML risk assessment generally involves two steps: first, identify the specific risk categories (i.e., products, services, customers, entities, transactions, and geographic locations) unique to the institution: and second, conduct a more detailed analysis of the data identified to better assess the risk within these categories. Several examples of a system of internal controls will help you document your monitoring program. Areas Covered in the Webinar: Resources. Accessing the data: What are the obstacles? Core system, teller system, BSA monitoring program, etc. How did the activity occur? In person, telephone, internet, wire, ATM, or ACH. Sample risk assessment for products and services. Systems of internal controls. Managing Non Resident Aliens. Documenting and Monitoring a Cash In and Cash Out Report. Who will Benefit: Financial Officers Bank Secrecy Act Officers Front Line Staff Risk Officers Operational Managers For more details visit us at: http://www.complianceonline.com/ecommerce/control/trainingFocus/~produc t_id=703001?channel=Doc_organic