SlideShare a Scribd company logo
NAVIGATING THE FINANCIAL CRIMES
LANDSCAPE WITH AN EFFECTIVE VENDOR
MANAGEMENT PROGRAM
JANUARY 15, 2015
2
ABOUT PERFICIENT
Perficient is a leading information technology consulting firm serving clients throughout
North America.
We help clients implement business-driven technology solutions that integrate business
processes, improve worker productivity, increase customer loyalty and create a more agile
enterprise to better respond to new business opportunities.
3
GlobalDeliveryCenters/OffshoreDelivery
Deep Financial Services Domain Expertise
Enterprise
Information Solutions
Finance
Enterprise Insights
Portal
Web Content
Social Solutions
SOA
Cloud
API Solutions
Company Wide Practices
Deep Financial Services Domain Expertise
BANKING
Wholesale
Consumer
Credit Unions
Payment Processing
Trust & Custody
Trade Services
Treasury Services
ASSET & WEALTH
MANAGEMENT
Equities & Fixed Income
SMA & Wrap
Hedge Funds
OMS & EMS
Portfolio Modeling
Portfolio Accounting
CAPITAL
MARKETS
Equities & Fixed Income
FX & Commodities
Future & Options
Electronic Trading
INSURANCE
Investments
Customer Acquisition
Property & Casualty
Life Annuities Services
Claims Evaluation
Underwriting
Consumer Direct
Business/
Technology Solution
Rationalization
and Delivery
Business Process
Improvement
Program Value,
Quality and
Cost Management
Client
Centricity
Risk and Regulatory
Compliance
Finance
Transformation
Solutions & Services
INDUSTRY DRIVEN SOLUTIONS
4
ABOUT THE SPEAKER
Richard Brownstein, Director of Risk and Compliance, Perficient
Rich leads Risk and Compliance in Perficient’s Financial Services national
practice. He has more than 20 years of experience working for and with large
financial institutions in the areas of operational risk management, legal and
compliance, IT governance, and project portfolio management. He has a deep
understanding of industry challenges and best practices. Rich has a proven
track record leading strategic business, product and technology initiatives to
minimize risk and maximize effectiveness and efficiency for organizations.
5
WHAT WE WANT TO TALK ABOUT TODAY
• Introduction
• Financial Crimes on the Rise / Increased
Regulatory Pressure
• Taking an Enterprise View of Risk
• Know Your Vendor – KYV
• Vendor Assessment
6
AML COMPLIANCE PENALTIES
Source: “AML & Sanctions Enforcement and the
Price of Dirty Money” Infographic 2014
7
HIDDEN COSTS OF NONCOMPLIANCE*
*In 2014 alone…
$12.4 B
in monetary fines as disclosed
in trade publications.
Unknown Costs
Lost Business
Reputational
Damage
Third-Party &
Vendor RisksSource: “AML & Sanctions Enforcement and the
Price of Dirty Money” Infographic 2014
8
2015 RISK & COMPLIANCE CHALLENGES
Agencies and the self-regulatory organizations are continually revising
and adopting new rules and regulations
9
GOALS OF FINANCIAL CRIME PREVENTION
Current Compliance Goals
• Meet regulatory requirements
• Prevent fraud losses
• Reduce false positives
• Manage reputational risk
• Streamline operations and reduce costs
New Compliance Goals
• Governance and enterprise view
• Integrated risk controls and framework
• Data quality and standards
• Risk intelligence
• Vendor risk management
10
AREAS CONTROLS SHOULD BE PUT IN PLACE
Electronic Communication
Surveillance
Information Security
SEC Trade Surveillance
Rules Compliance
AML, KYC
Transaction Monitoring
PATRIOT ACT / CFT
Client Suitability / Broker Fraud
Sales Practice Abuse
Fraud Detection & Surveillance
Corruption / Collusion / Bribery
FACTA Identity Theft Prevention
Regulatory Red Flags
Regulatory Assessment
and Review
Regulatory
Impact Analysis
11
THE VAST
LANDSCAPE OF
FINANCIAL CRIMES
Financial crimes have been increasing at a disturbing
rate causing increased scrutiny by regulatory bodies and
greater due diligence applied by business risk officers.
Fraudsters are finding more ways to fund activities or profit
by multifarious means both internally and externally.
12
ALTERNATE
CHANNELS
New ways of gaining access to customer
information have increased the ways of
committing financial crimes
• Cross-channel and cross-product fraud
• Online banking and bill pay services
• Mobile banking
• Mobile payments
• Virtual currency
• Gift card theft and scams
• Email scams
13
INTERNAL
THREATS
Internal Threats are on the rise
• Identity theft
• Embezzlement
• Fraud
• Bribery
• Gifts and entertainment
• Vendor relations
• Information security breaches
14
EXTERNAL
THREATS
External threats continue to be on the rise as well,
even with existing regulatory demands increasing
• Fraud
• Trading Violations
• Brokerage Fraud
• Client Suitability / Sales Practice Abuse
• AML / CFT – AML & Countering Funding for
Terrorism
• OFAC / FinCen Sanctions & BSA Requirements
violations
• Mutual Fund Abuses
• Vendor Services SLA breaches / Vendor KYC / Data
breaches
• FATCA – Foreign Account Tax Compliance Act
• FACTA – Fair and Accurate Credit Transaction Act
• Identity Theft
15
CURRENT AML/FRAUD DETECTION FUNCTIONS
Alert / Case
Management
Regulatory
Compliance
Risk Rating / Enhanced
Due Diligence / CIP
Surveillance and
Supervision
KYC / New Account Opening
(NAO) / Client On-boarding
FRAUD SOUCE DETECTION FUNCTIONS
Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls
Data Security Breaches Information Security Identity Theft
Integrated
AML Compliance
Program
• Identify verification
• Validate source of funds and
product suitability
• Confirm no negative news ,
watch list and PEP
• Central and standardized
Customer, LEI & Account data
• Cross enterprise activity view
• Review changes
• Vet activity against scenarios
• Extended customer behavior
patterns detection
• Alert tuning to increase
accurate/efficient detection
• Alert manager driven by alert
type & research
• SLA and escalation
• Role based workflow
• Procedures and Training
• Reporting, logging, audit
• SAR investigation contents
• Regulatory review and audit
coordination / Exception investigation
• CCO Governance & Control Standards
• AML & Sanction Policy & Procedure
Manager
… evolving process and solutions to
meet evolving Fraud, AML & Sanctions
management objectives …
16
AREAS OF SYNERGY WITH EXISTING FRAMEWORK
Financial Crime and Compliance Technology Environment
17
ENTERPRISE VIEW OF RISK
The current regulatory climate is giving new meaning to the
term‘Governance’.
By focusing on compliance with individual regulations, banks and
insurance companies risk developing a requirements-based, siloed,
myopic approach and creating overlapping, uncoordinated
bureaucracies (and cost centers) that deal
with disparate regulations inconsistently.
“Governance takes a holistic, flexible, and forward-thinking approach
that addresses all areas of the business to create value beyond mere
compliance and minimize risk on an enterprise level.”
– CEB Towergroup
18
ENTERPRISE INTEGRATED RISK & COMPLIANCE
Definition: The ability to integrate All Risk
Management and Compliance activities
Enterprise-Wide.
• Driven from Policies
• 3 Lines of Defense / Front to Back
• Bottom-Up & Top-Down Risk Identification
• GRC Model
Business Process and Assurance
Operational Risk
Operations Risk Control
Validate &
Remediate
Enterprise
Integrated
Compliance &
Risk Mgmt.
19
POLL: How are you currently
managing and identifying vendor
risks?
20
VENDOR PRODUCT / SERVICES POTENTIAL RISK AREAS
Risk Control Self Assessments drive increased management awareness
into strong controls, potential blind spots and key control issues
21
KYV TYPICALLY NOT INCLUDED IN SRM
DUE DILIGENCE ACTIVITY
SUPPLIER RISK
MANAGEMENT
KYV
Assist or lead RFP/Proof of concept/ Selection Process 
Confirm financials and references 
Negotiate MSA / Contract / Pricing 
Ensure performance measures / SLAs are set Ideally
Ensure SLAs are achieved Rarely
Assure appropriate control entitlements and IT access  
Validate Vendor Party ID 
Perform upfront on ongoing Sanctions and Watch List
monitoring

Perform Activity Monitoring 
Screen Vendor Payments (A/P) 
22
INHERENT RISK VS.
RESIDUAL RISK
There are two ways to look at vendor risk:
Inherent Risk – The risk that activity would pose if
no controls were in place
• What is the vendor doing for your company?
• How critical are they to your business?
• Where are they located?
• What data are they handling?
• What naturally occurring threats do they face?
Residual risk – The risk that remains after controls
are taken into account
• Cybersecurity/data breaches/InfoSec
• IT Services/IT vendors
• Labor issues
• Bribery and corruption
• Fiduciary responsibility
• Vendor transaction monitoring
23
US Foreign Corrupt Practices Act:
• Offense to bribe public officials.
• Does not cover bribery on a private level.
• Only covers active bribery (the giving of a bribe).
• Companies subject to US jurisdiction can be held
vicariously liable for acts of its employees and
agents.
• Must be proved that the person offering the bribe did
so with a “corrupt” intent.
• FCPA creates an exemption for facilitation payments.
REGULATORY IMPLICATIONS FOR 3rd PARTY
SERVICES
UK Bribery Act
• Offense to bribe public officials.
• Covers bribery on a private level.
• Covers the giving (active) and taking (passive) of a
bribe.
• Creates a strict liability corporate offence for failure to
prevent bribery (no vicarious liability).
• No requirement for a “corrupt” or “improper” intent.
• The Bribery Act makes no such exception.
24
A COMBINED VIEW
OF RISK
The convergence of Supplier Risk
Management and Compliance in Vendor
acceptance is key:
• Vendor Procurement/Supplier Risk
Management to interface with Compliance
and the business to conduct KYV and more in
depth due diligence
• Risk-rate new and existing vendors
periodically to perform risk-based approach to
support departmental functions…
• Support the departmental functions as well as
protect the enterprise
Supplier Risk
Mgmt. Office
Department
KYV
25
THIRD PARTY VENDOR RISKS CONSIDERATIONS
Several typical Financial Crimes could be sourced at the Third Party Vendor level.
Avoid potential risks and threats from vendor products and service providers by:
• Increasing Third Party Vendor Due Diligence during selection process
• Reviewing and updating Third Party Vendor Contracts
• Inspecting all Third Party Vendor Service Level Agreements (SLAs)
– Make sure all regulatory considerations have been covered
– Make sure Vendor financial viability is strong
– Evaluate Third Party Vendor business and data processes and controls
– Consider data location and access follows strict controls
– Require that vendors endure the same due diligence as customers and employee
• Financial, Reputational, and Legal Risks
– Information security for companies handling sensitive information
– Social responsibility and labor standards, especially in third‐world countries
– Bribery and corruption
– Financial stability of critical suppliers
– Geopolitical risks that threaten to disrupt business
Your comfort with the level of residual risk determines what you do next: continue the business
relationship by working with the vendor to further reduce that risk, or sever the relationship and
find an alternate supplier
26
• Internal controls
– Adopt rigorous accounting policies, procedures and controls, including dual signoff
– Conduct due diligence on suppliers and vendors (special attention and possibly EDD on off-shore providers).
– Establish a system for monitoring transactions and developing review processes to ensure that transactions “fit the business” of
the vendor.
• Regulatory guidance
– Adopt risk management processes commensurate with the level of risk and complexity of its third-party relationships.
• Ensure comprehensive risk management and oversight of third-party relationships involving critical activities.
• An effective risk management process throughout the life cycle of the relationship includes, but is not limited to:
– Planning
– Due diligence and third-party selection
– Contract negotiation
– Ongoing monitoring
– Termination
– Oversight and accountability
– Documentation and reporting
– Independent reviews
OCC SR 2013-29 RISK MANAGEMENT GUIDANCE
27
28
KYV DUE DILIGENCE: HOW WE CAN HELP
• Regulatory Compliance Program
Management
• Vendor Assessments, Solution
Rationalization & Project Roadmaps
• Risk & Controls Assessments
• Business Requirements
• Data Governance & Data Quality
• Testing & Validation
Our risk and compliance expertise,
management consulting experience, reusable
assets, and client track record in the industry,
enable us to delivery business value for firms
leveraging existing sanctions platforms and
evolve their culture of compliance through KYV
processes and controls.
29
VENDOR SELECTION APPROACH
Obtain
Management
Approval to
Proceed
Conduct
Management
Interviews
Identify Unique
Requirements
Review Existing
Requirements
Document
Develop
Solution
Architecture
Develop
Product
Information
Request
Manage Project--Quality Assurance
Select Software
Package
Finalize
Hardware
Requirements &
Costs
Develop
Implementation
Plan
Organize
Project/
Research
Software
Options
GATHER REQUIREMENTS ANALYZE OFFERINGSDEVELOP EVALUTATION
CRITERIA
SELECT SOFTWARE
Refine Scoring
Methodology
Develop Demo
Scripts
Check
References
Facilitate
Interactive
Demos
Score PRI
A rigorous approach to the Third Party Vendor Product or Service is focused around the concept of high-impact and fast-response,
understanding broad requirements, identifying vendor landscape, due diligence and selection process. Perficient uses a packaged
selection methodology and assets where applicable to accelerate the selection. The approach is flexible based on individual client
requirements for vendor selection and is customized to establish a strong and low risk exposure selection.
The approach is modular and can be easily adapted to client-specific circumstances
Proof of
Concept Test
KNOW-YOUR-VENDOR
Party
Identification
Risk Rating
Enhanced Due
Diligence
30
VENDOR SELECTION BASED ON KEY CRITERIA
Short List of VendorsLong List of Vendors
1. Vendor X
2. Vendor Y
3. Vendor Z
Prioritized Client Criteria
Institutions are challenged in identifying their most suitable partners. The risk and compliance space
requires a diligent yet efficient vendor assessment.
Vendor 1
Vendor 2
Vendor 3
Vendor 4
Functional
Capabilities
Cost
Company/Client base
Technology
NumberofVendors
VendorsVendors Vendors Vendors
Complete
Enhanced SRM
& KYV
To RFP or
Quick
Selection
31
INTEGRATED RISK MANAGEMENT FRAMEWORK
FRAUD SOUCE DETECTION FUNCTIONS
Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls
Data Security Breaches Information Security Identity Theft
Alert / Case
Management
Surveillance and
Supervision
Integrated
AML Compliance
Program
Regulatory
Compliance
Risk Rating / Enhanced
Due Diligence / CIP
KYC / New Account
Opening (NAO) / Client
On-boarding
32
2015 RISK & COMPLIANCE SERIES
How to Drive Value from
Operational Risk Data
Thurs., January, 29 12:00 – 1:00 ET
Registration details will follow in post-
webinar email communications or
visit www.perficient.com.

More Related Content

What's hot

Transforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle SolutionsTransforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle Solutions
Perficient, Inc.
 
Gain Faster Closure, Lower Risk and Better Results with IBM Emptoris
Gain Faster Closure, Lower Risk and Better Results with IBM EmptorisGain Faster Closure, Lower Risk and Better Results with IBM Emptoris
Gain Faster Closure, Lower Risk and Better Results with IBM Emptoris
Perficient, Inc.
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
Mantala
 
A Real Retail Strategy for Healthcare
A Real Retail Strategy for HealthcareA Real Retail Strategy for Healthcare
A Real Retail Strategy for Healthcare
Perficient, Inc.
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
Advanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBMAdvanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBM
Perficient, Inc.
 
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Perficient, Inc.
 
Console Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy CustomersConsole Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy Customers
Perficient, Inc.
 
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystem
Designing Enhanced Supervision for the Evolving Wealth Management EcosystemDesigning Enhanced Supervision for the Evolving Wealth Management Ecosystem
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystem
accenture
 
Digitally Transforming Patient and Caregiver Experiences
Digitally Transforming Patient and Caregiver ExperiencesDigitally Transforming Patient and Caregiver Experiences
Digitally Transforming Patient and Caregiver Experiences
Damo Consulting Inc.
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
Capgemini
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)gcharlesj
 
How Finance is driving growth in the Digital Age via OpenText
How Finance is driving growth in the Digital Age via OpenTextHow Finance is driving growth in the Digital Age via OpenText
How Finance is driving growth in the Digital Age via OpenText
OpenText
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
Goutama Bachtiar
 
Information Strategy: Updating the IT Strategy for Information, Insights and ...
Information Strategy: Updating the IT Strategy for Information, Insights and ...Information Strategy: Updating the IT Strategy for Information, Insights and ...
Information Strategy: Updating the IT Strategy for Information, Insights and ...
Jamal_Shah
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeTrillium Software
 
Expanding Trust in Data
Expanding Trust in DataExpanding Trust in Data
Expanding Trust in Data
Precisely
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
IBM Analytics
 
Insurance rating software market
Insurance rating software marketInsurance rating software market
Insurance rating software market
HarshalBamble
 
Wsta event 3 19-2015.v6
Wsta event 3 19-2015.v6Wsta event 3 19-2015.v6
Wsta event 3 19-2015.v6
Kevin Petrie
 

What's hot (20)

Transforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle SolutionsTransforming Healthcare through Patient Engagement with Oracle Solutions
Transforming Healthcare through Patient Engagement with Oracle Solutions
 
Gain Faster Closure, Lower Risk and Better Results with IBM Emptoris
Gain Faster Closure, Lower Risk and Better Results with IBM EmptorisGain Faster Closure, Lower Risk and Better Results with IBM Emptoris
Gain Faster Closure, Lower Risk and Better Results with IBM Emptoris
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
A Real Retail Strategy for Healthcare
A Real Retail Strategy for HealthcareA Real Retail Strategy for Healthcare
A Real Retail Strategy for Healthcare
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Advanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBMAdvanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBM
 
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...
 
Console Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy CustomersConsole Power Productive Agents and Happy Customers
Console Power Productive Agents and Happy Customers
 
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystem
Designing Enhanced Supervision for the Evolving Wealth Management EcosystemDesigning Enhanced Supervision for the Evolving Wealth Management Ecosystem
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystem
 
Digitally Transforming Patient and Caregiver Experiences
Digitally Transforming Patient and Caregiver ExperiencesDigitally Transforming Patient and Caregiver Experiences
Digitally Transforming Patient and Caregiver Experiences
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
 
How Finance is driving growth in the Digital Age via OpenText
How Finance is driving growth in the Digital Age via OpenTextHow Finance is driving growth in the Digital Age via OpenText
How Finance is driving growth in the Digital Age via OpenText
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 
Information Strategy: Updating the IT Strategy for Information, Insights and ...
Information Strategy: Updating the IT Strategy for Information, Insights and ...Information Strategy: Updating the IT Strategy for Information, Insights and ...
Information Strategy: Updating the IT Strategy for Information, Insights and ...
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance Landscape
 
Expanding Trust in Data
Expanding Trust in DataExpanding Trust in Data
Expanding Trust in Data
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Insurance rating software market
Insurance rating software marketInsurance rating software market
Insurance rating software market
 
Wsta event 3 19-2015.v6
Wsta event 3 19-2015.v6Wsta event 3 19-2015.v6
Wsta event 3 19-2015.v6
 

Similar to Navigate the Financial Crime Landscape with a Vendor Management Program

D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
Wilson Kao
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
Rebecca1243
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Placesaafdn
 
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
LexisNexis Benelux
 
Money Services Businesses: Past, Present & Future
Money Services Businesses: Past, Present & FutureMoney Services Businesses: Past, Present & Future
Money Services Businesses: Past, Present & Future
Jay Postma
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
WeaverCPAs
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
Abhishek Bali
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
EDR
 
Travel fraud kyc as fraud tool masha cilliers 210217
Travel fraud kyc as fraud tool masha cilliers 210217Travel fraud kyc as fraud tool masha cilliers 210217
Travel fraud kyc as fraud tool masha cilliers 210217
Masha Cilliers
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in Banking
TriVersa
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
Nidhi Gupta
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
Nidhi Gupta
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
Scott Swanson , CFE, CFCI
 
The Role of Regulations in the Development of Digital Finance
The Role of Regulations in the Development of Digital FinanceThe Role of Regulations in the Development of Digital Finance
The Role of Regulations in the Development of Digital Finance
John Owens
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Securefact
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.
Abdur Rahman (Sagor)
 

Similar to Navigate the Financial Crime Landscape with a Vendor Management Program (20)

D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
 
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
 
Money Services Businesses: Past, Present & Future
Money Services Businesses: Past, Present & FutureMoney Services Businesses: Past, Present & Future
Money Services Businesses: Past, Present & Future
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Travel fraud kyc as fraud tool masha cilliers 210217
Travel fraud kyc as fraud tool masha cilliers 210217Travel fraud kyc as fraud tool masha cilliers 210217
Travel fraud kyc as fraud tool masha cilliers 210217
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in Banking
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 
The Role of Regulations in the Development of Digital Finance
The Role of Regulations in the Development of Digital FinanceThe Role of Regulations in the Development of Digital Finance
The Role of Regulations in the Development of Digital Finance
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Our way of fighting fraud
 
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.
 

More from Perficient, Inc.

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
Perficient, Inc.
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
Perficient, Inc.
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
Perficient, Inc.
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Perficient, Inc.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
Perficient, Inc.
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
Perficient, Inc.
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
Perficient, Inc.
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Perficient, Inc.
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Perficient, Inc.
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
Perficient, Inc.
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
Perficient, Inc.
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
Perficient, Inc.
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
Perficient, Inc.
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
Perficient, Inc.
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
Perficient, Inc.
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
Perficient, Inc.
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
Perficient, Inc.
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
Perficient, Inc.
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
Perficient, Inc.
 

More from Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Navigate the Financial Crime Landscape with a Vendor Management Program

  • 1. NAVIGATING THE FINANCIAL CRIMES LANDSCAPE WITH AN EFFECTIVE VENDOR MANAGEMENT PROGRAM JANUARY 15, 2015
  • 2. 2 ABOUT PERFICIENT Perficient is a leading information technology consulting firm serving clients throughout North America. We help clients implement business-driven technology solutions that integrate business processes, improve worker productivity, increase customer loyalty and create a more agile enterprise to better respond to new business opportunities.
  • 3. 3 GlobalDeliveryCenters/OffshoreDelivery Deep Financial Services Domain Expertise Enterprise Information Solutions Finance Enterprise Insights Portal Web Content Social Solutions SOA Cloud API Solutions Company Wide Practices Deep Financial Services Domain Expertise BANKING Wholesale Consumer Credit Unions Payment Processing Trust & Custody Trade Services Treasury Services ASSET & WEALTH MANAGEMENT Equities & Fixed Income SMA & Wrap Hedge Funds OMS & EMS Portfolio Modeling Portfolio Accounting CAPITAL MARKETS Equities & Fixed Income FX & Commodities Future & Options Electronic Trading INSURANCE Investments Customer Acquisition Property & Casualty Life Annuities Services Claims Evaluation Underwriting Consumer Direct Business/ Technology Solution Rationalization and Delivery Business Process Improvement Program Value, Quality and Cost Management Client Centricity Risk and Regulatory Compliance Finance Transformation Solutions & Services INDUSTRY DRIVEN SOLUTIONS
  • 4. 4 ABOUT THE SPEAKER Richard Brownstein, Director of Risk and Compliance, Perficient Rich leads Risk and Compliance in Perficient’s Financial Services national practice. He has more than 20 years of experience working for and with large financial institutions in the areas of operational risk management, legal and compliance, IT governance, and project portfolio management. He has a deep understanding of industry challenges and best practices. Rich has a proven track record leading strategic business, product and technology initiatives to minimize risk and maximize effectiveness and efficiency for organizations.
  • 5. 5 WHAT WE WANT TO TALK ABOUT TODAY • Introduction • Financial Crimes on the Rise / Increased Regulatory Pressure • Taking an Enterprise View of Risk • Know Your Vendor – KYV • Vendor Assessment
  • 6. 6 AML COMPLIANCE PENALTIES Source: “AML & Sanctions Enforcement and the Price of Dirty Money” Infographic 2014
  • 7. 7 HIDDEN COSTS OF NONCOMPLIANCE* *In 2014 alone… $12.4 B in monetary fines as disclosed in trade publications. Unknown Costs Lost Business Reputational Damage Third-Party & Vendor RisksSource: “AML & Sanctions Enforcement and the Price of Dirty Money” Infographic 2014
  • 8. 8 2015 RISK & COMPLIANCE CHALLENGES Agencies and the self-regulatory organizations are continually revising and adopting new rules and regulations
  • 9. 9 GOALS OF FINANCIAL CRIME PREVENTION Current Compliance Goals • Meet regulatory requirements • Prevent fraud losses • Reduce false positives • Manage reputational risk • Streamline operations and reduce costs New Compliance Goals • Governance and enterprise view • Integrated risk controls and framework • Data quality and standards • Risk intelligence • Vendor risk management
  • 10. 10 AREAS CONTROLS SHOULD BE PUT IN PLACE Electronic Communication Surveillance Information Security SEC Trade Surveillance Rules Compliance AML, KYC Transaction Monitoring PATRIOT ACT / CFT Client Suitability / Broker Fraud Sales Practice Abuse Fraud Detection & Surveillance Corruption / Collusion / Bribery FACTA Identity Theft Prevention Regulatory Red Flags Regulatory Assessment and Review Regulatory Impact Analysis
  • 11. 11 THE VAST LANDSCAPE OF FINANCIAL CRIMES Financial crimes have been increasing at a disturbing rate causing increased scrutiny by regulatory bodies and greater due diligence applied by business risk officers. Fraudsters are finding more ways to fund activities or profit by multifarious means both internally and externally.
  • 12. 12 ALTERNATE CHANNELS New ways of gaining access to customer information have increased the ways of committing financial crimes • Cross-channel and cross-product fraud • Online banking and bill pay services • Mobile banking • Mobile payments • Virtual currency • Gift card theft and scams • Email scams
  • 13. 13 INTERNAL THREATS Internal Threats are on the rise • Identity theft • Embezzlement • Fraud • Bribery • Gifts and entertainment • Vendor relations • Information security breaches
  • 14. 14 EXTERNAL THREATS External threats continue to be on the rise as well, even with existing regulatory demands increasing • Fraud • Trading Violations • Brokerage Fraud • Client Suitability / Sales Practice Abuse • AML / CFT – AML & Countering Funding for Terrorism • OFAC / FinCen Sanctions & BSA Requirements violations • Mutual Fund Abuses • Vendor Services SLA breaches / Vendor KYC / Data breaches • FATCA – Foreign Account Tax Compliance Act • FACTA – Fair and Accurate Credit Transaction Act • Identity Theft
  • 15. 15 CURRENT AML/FRAUD DETECTION FUNCTIONS Alert / Case Management Regulatory Compliance Risk Rating / Enhanced Due Diligence / CIP Surveillance and Supervision KYC / New Account Opening (NAO) / Client On-boarding FRAUD SOUCE DETECTION FUNCTIONS Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls Data Security Breaches Information Security Identity Theft Integrated AML Compliance Program • Identify verification • Validate source of funds and product suitability • Confirm no negative news , watch list and PEP • Central and standardized Customer, LEI & Account data • Cross enterprise activity view • Review changes • Vet activity against scenarios • Extended customer behavior patterns detection • Alert tuning to increase accurate/efficient detection • Alert manager driven by alert type & research • SLA and escalation • Role based workflow • Procedures and Training • Reporting, logging, audit • SAR investigation contents • Regulatory review and audit coordination / Exception investigation • CCO Governance & Control Standards • AML & Sanction Policy & Procedure Manager … evolving process and solutions to meet evolving Fraud, AML & Sanctions management objectives …
  • 16. 16 AREAS OF SYNERGY WITH EXISTING FRAMEWORK Financial Crime and Compliance Technology Environment
  • 17. 17 ENTERPRISE VIEW OF RISK The current regulatory climate is giving new meaning to the term‘Governance’. By focusing on compliance with individual regulations, banks and insurance companies risk developing a requirements-based, siloed, myopic approach and creating overlapping, uncoordinated bureaucracies (and cost centers) that deal with disparate regulations inconsistently. “Governance takes a holistic, flexible, and forward-thinking approach that addresses all areas of the business to create value beyond mere compliance and minimize risk on an enterprise level.” – CEB Towergroup
  • 18. 18 ENTERPRISE INTEGRATED RISK & COMPLIANCE Definition: The ability to integrate All Risk Management and Compliance activities Enterprise-Wide. • Driven from Policies • 3 Lines of Defense / Front to Back • Bottom-Up & Top-Down Risk Identification • GRC Model Business Process and Assurance Operational Risk Operations Risk Control Validate & Remediate Enterprise Integrated Compliance & Risk Mgmt.
  • 19. 19 POLL: How are you currently managing and identifying vendor risks?
  • 20. 20 VENDOR PRODUCT / SERVICES POTENTIAL RISK AREAS Risk Control Self Assessments drive increased management awareness into strong controls, potential blind spots and key control issues
  • 21. 21 KYV TYPICALLY NOT INCLUDED IN SRM DUE DILIGENCE ACTIVITY SUPPLIER RISK MANAGEMENT KYV Assist or lead RFP/Proof of concept/ Selection Process  Confirm financials and references  Negotiate MSA / Contract / Pricing  Ensure performance measures / SLAs are set Ideally Ensure SLAs are achieved Rarely Assure appropriate control entitlements and IT access   Validate Vendor Party ID  Perform upfront on ongoing Sanctions and Watch List monitoring  Perform Activity Monitoring  Screen Vendor Payments (A/P) 
  • 22. 22 INHERENT RISK VS. RESIDUAL RISK There are two ways to look at vendor risk: Inherent Risk – The risk that activity would pose if no controls were in place • What is the vendor doing for your company? • How critical are they to your business? • Where are they located? • What data are they handling? • What naturally occurring threats do they face? Residual risk – The risk that remains after controls are taken into account • Cybersecurity/data breaches/InfoSec • IT Services/IT vendors • Labor issues • Bribery and corruption • Fiduciary responsibility • Vendor transaction monitoring
  • 23. 23 US Foreign Corrupt Practices Act: • Offense to bribe public officials. • Does not cover bribery on a private level. • Only covers active bribery (the giving of a bribe). • Companies subject to US jurisdiction can be held vicariously liable for acts of its employees and agents. • Must be proved that the person offering the bribe did so with a “corrupt” intent. • FCPA creates an exemption for facilitation payments. REGULATORY IMPLICATIONS FOR 3rd PARTY SERVICES UK Bribery Act • Offense to bribe public officials. • Covers bribery on a private level. • Covers the giving (active) and taking (passive) of a bribe. • Creates a strict liability corporate offence for failure to prevent bribery (no vicarious liability). • No requirement for a “corrupt” or “improper” intent. • The Bribery Act makes no such exception.
  • 24. 24 A COMBINED VIEW OF RISK The convergence of Supplier Risk Management and Compliance in Vendor acceptance is key: • Vendor Procurement/Supplier Risk Management to interface with Compliance and the business to conduct KYV and more in depth due diligence • Risk-rate new and existing vendors periodically to perform risk-based approach to support departmental functions… • Support the departmental functions as well as protect the enterprise Supplier Risk Mgmt. Office Department KYV
  • 25. 25 THIRD PARTY VENDOR RISKS CONSIDERATIONS Several typical Financial Crimes could be sourced at the Third Party Vendor level. Avoid potential risks and threats from vendor products and service providers by: • Increasing Third Party Vendor Due Diligence during selection process • Reviewing and updating Third Party Vendor Contracts • Inspecting all Third Party Vendor Service Level Agreements (SLAs) – Make sure all regulatory considerations have been covered – Make sure Vendor financial viability is strong – Evaluate Third Party Vendor business and data processes and controls – Consider data location and access follows strict controls – Require that vendors endure the same due diligence as customers and employee • Financial, Reputational, and Legal Risks – Information security for companies handling sensitive information – Social responsibility and labor standards, especially in third‐world countries – Bribery and corruption – Financial stability of critical suppliers – Geopolitical risks that threaten to disrupt business Your comfort with the level of residual risk determines what you do next: continue the business relationship by working with the vendor to further reduce that risk, or sever the relationship and find an alternate supplier
  • 26. 26 • Internal controls – Adopt rigorous accounting policies, procedures and controls, including dual signoff – Conduct due diligence on suppliers and vendors (special attention and possibly EDD on off-shore providers). – Establish a system for monitoring transactions and developing review processes to ensure that transactions “fit the business” of the vendor. • Regulatory guidance – Adopt risk management processes commensurate with the level of risk and complexity of its third-party relationships. • Ensure comprehensive risk management and oversight of third-party relationships involving critical activities. • An effective risk management process throughout the life cycle of the relationship includes, but is not limited to: – Planning – Due diligence and third-party selection – Contract negotiation – Ongoing monitoring – Termination – Oversight and accountability – Documentation and reporting – Independent reviews OCC SR 2013-29 RISK MANAGEMENT GUIDANCE
  • 27. 27
  • 28. 28 KYV DUE DILIGENCE: HOW WE CAN HELP • Regulatory Compliance Program Management • Vendor Assessments, Solution Rationalization & Project Roadmaps • Risk & Controls Assessments • Business Requirements • Data Governance & Data Quality • Testing & Validation Our risk and compliance expertise, management consulting experience, reusable assets, and client track record in the industry, enable us to delivery business value for firms leveraging existing sanctions platforms and evolve their culture of compliance through KYV processes and controls.
  • 29. 29 VENDOR SELECTION APPROACH Obtain Management Approval to Proceed Conduct Management Interviews Identify Unique Requirements Review Existing Requirements Document Develop Solution Architecture Develop Product Information Request Manage Project--Quality Assurance Select Software Package Finalize Hardware Requirements & Costs Develop Implementation Plan Organize Project/ Research Software Options GATHER REQUIREMENTS ANALYZE OFFERINGSDEVELOP EVALUTATION CRITERIA SELECT SOFTWARE Refine Scoring Methodology Develop Demo Scripts Check References Facilitate Interactive Demos Score PRI A rigorous approach to the Third Party Vendor Product or Service is focused around the concept of high-impact and fast-response, understanding broad requirements, identifying vendor landscape, due diligence and selection process. Perficient uses a packaged selection methodology and assets where applicable to accelerate the selection. The approach is flexible based on individual client requirements for vendor selection and is customized to establish a strong and low risk exposure selection. The approach is modular and can be easily adapted to client-specific circumstances Proof of Concept Test KNOW-YOUR-VENDOR Party Identification Risk Rating Enhanced Due Diligence
  • 30. 30 VENDOR SELECTION BASED ON KEY CRITERIA Short List of VendorsLong List of Vendors 1. Vendor X 2. Vendor Y 3. Vendor Z Prioritized Client Criteria Institutions are challenged in identifying their most suitable partners. The risk and compliance space requires a diligent yet efficient vendor assessment. Vendor 1 Vendor 2 Vendor 3 Vendor 4 Functional Capabilities Cost Company/Client base Technology NumberofVendors VendorsVendors Vendors Vendors Complete Enhanced SRM & KYV To RFP or Quick Selection
  • 31. 31 INTEGRATED RISK MANAGEMENT FRAMEWORK FRAUD SOUCE DETECTION FUNCTIONS Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls Data Security Breaches Information Security Identity Theft Alert / Case Management Surveillance and Supervision Integrated AML Compliance Program Regulatory Compliance Risk Rating / Enhanced Due Diligence / CIP KYC / New Account Opening (NAO) / Client On-boarding
  • 32. 32 2015 RISK & COMPLIANCE SERIES How to Drive Value from Operational Risk Data Thurs., January, 29 12:00 – 1:00 ET Registration details will follow in post- webinar email communications or visit www.perficient.com.

Editor's Notes

  1. Matching short-term and long-term AML/Fraud risk management goals with specific technology solutions is a priority in rationalizing Monitoring and Reporting tools
  2. Perficient takes a holistic view of Business Risk across an entire enterprise. This integrated view makes overall risk management more effective and comprehensive
  3. Inherent risk example For example, a company that processes your credit card payments has a higher inherent risk than a vendor who provides office supplies. A vendor’s low inherent risk rating can save you the time and expense of doing further assessment.
  4. OCC’s Guidance for 3rd Party Risk Management – Risk Lifecycle Planning - Plans that outline the institution’s strategy, identify the inherent risks of the activity, and detail how the bank selects, assesses, and oversees the third party. Due Diligence - Proper due diligence in selecting a third party. Contract Negotiation - Written contracts that outline the rights and responsibilities of all parties. Ongoing Monitoring - Ongoing monitoring of the third party’s activities and performance. Termination - Contingency plans for terminating the relationship in an effective manner. Oversight & Accountability - Clear roles and responsibilities for overseeing and managing the relationship and risk management process. Documentation & Reporting - Documentation and reporting that facilitates oversight, accountability, monitoring, and risk management. Independent Reviews - Independent reviews that allow bank management to determine that the institution’s process aligns with its strategy and effectively manages risks