SlideShare a Scribd company logo
https://www.alessa.caseware.com/
Strategies to Enhance your Screening
and Transaction Monitoring
Processes
Sponsored by
https://www.alessa.caseware.com/
About Presenters
Joel Freckleton, CAMS
Regional Sales Manager,
CaseWare RCM
Eric Hansen,
Senior Risk Specialist,
CaseWare RCM
Daniel Buckingham,
Director of Compliance Strategy,
Governance and Technology,
Transfast
Mandar Vaidya,
Assistant Vice President, Compliance,
ICICI Bank Canada
https://www.alessa.caseware.com/
Housekeeping
Enter your questions here
Webinar Tips
• If you are experiencing issues with audio quality, switch to Chrome as
your web browser
• If you are still experiencing issues, send us a message and we will
provide a link to the GoToWebinar support line. There is a also a link at
the bottom of the chat box.
• Let us know if you are experiencing any other issues.
https://www.alessa.caseware.com/
Agenda
4
1. Understanding risk
2. Translating risks into transaction monitoring
realities
3. Tuning capabilities
https://www.alessa.caseware.com/ 5
Risk-Based Approach
Challenge:
Theoretically sound premise, but practical realities make this difficult to achieve and
reliably demonstrate
Intent:
More efficient use of resources to mitigate the ML/TF risks identified. It enables a firm to
focus their resources and take enhanced measures in situations where the risks are
higher, apply simplified measures where the risks are lower and exempt low risk activities.
https://www.alessa.caseware.com/ 6
FATF: Risk-Based Approach
“Competent authorities and financial institutions, are expected to
identify, assess and understand the ML/TF risks to which they are
exposed and take AML/CFT measures commensurate to those
risks in order to mitigate them effectively.”
The Financial Action Task Force (FATF) Guidance for a Risk-based approach - 2014
https://www.alessa.caseware.com/ 7
Understanding Risk: Monitoring & Detection Perspectives
Challenge:
Identifying the balance:
• Coverage vs. targeted approaches to risk identification and mitigation.
• Manual vs. automated mechanisms
• Interim vs. Strategic solutions
Intent:
• More comprehensive view of risks, to most importantly understand the realities of risk
(likelihood, impact and repercussions) to make an informed decision around your risk
focus lenses.
• Enables early insight into challenges and/or realities that may impact and even limit the
ability to efficiently and effectively monitor and detect risk.
https://www.alessa.caseware.com/ 8
Understanding Risk: Monitoring & Detection Perspectives
• Enterprise & Localized assessments are critical
• Inherent Risk
• Customers, Product/Services, Transactions Type, Geography, etc.
• Risk mapping e.g. to specific regulations/country typologies (manage risk nuances)
• Perceived vs. Real
• Likelihood, impact and repercussions
• Upstream and Downstream realities
• Transaction flows and data capture rules
• Product and service parameters (limits, restrictions etc.)
• KYC processes
• Knowledgeable & skilled staff
• Manual vs. automated
https://www.alessa.caseware.com/
POLL 1:
How does your Organization conduct risk
assessments?
1. Enterprise (holistically)
2. By department
3. Regulator driven
4. Other
https://www.alessa.caseware.com/ 10
From Targeted Risks to Monitoring/Detection Realities
Challenge:
• Data quality and availability to support true targeting of risk.
Intent:
• To understand the type and combination of monitoring controls needed and how
effective these controls will be, based upon the data availability, completeness and
accuracy.
https://www.alessa.caseware.com/ 11
From Targeted Risks to Monitoring/Detection Realities
• Risk Factors Elements
• What are the specific attributes that when present (combined) would identify the risk?
• When (risk tolerance) does the risk become real?
• What areas within the organization (customers, products, services etc.) are affected by this
risk, and are they all equal (risk tolerance)?
• Map data element to the constituent parts
• Where is the data? Is it electronic or physical? Can the acquisition be automated?
• Data completeness and accuracy
• Define monitoring & detection capabilities
• Is there sufficient electronic, systematic data to support automation?
• Does the data require manual acquisition and transformation before it can be used?
https://www.alessa.caseware.com/ 12
Tuning Monitoring & Detection Capabilities
Challenge:
• To not build in such a bias that risks (even if lower) are not being monitored and
detected.
• Finding the balance between targeted and coverage risk mitigation and human
resources to manage.
Intent:
• To build a more effective approach to monitoring and detection of risk that is
proportional to the risks of the firm. The efforts are proportionally higher where the
risks are higher.
https://www.alessa.caseware.com/ 13
Tuning Monitoring & Detection Capabilities
• Tuning
• Using a combination of system parameters and data for optimization
o Targeting of specific risks
o Reduction of unproductive detection
o Timeliness of detection
o Coverage of detection (spectrum of risk monitoring)
• Risk Based Bias
• Monitoring and detection skewed towards risk
o More specific detection approaches
o Higher propensity to alert
• More efforts are made using the compliments of parts to monitor and detect.
https://www.alessa.caseware.com/
POLL 2:
What type of tuning function do you currently have
in place?
1. Maintained through the compliance department
2. Outsourced
3. Managed by IT
4. Other
https://www.alessa.caseware.com/
Strategies to optimize Transaction Monitoring processes
• Use a risk-based approach to enable a comprehensive view of risks, to better understand the
realities of risk (likelihood, impact and repercussions)
• Understand the type, frequency and combination of monitoring controls needed and how
effective these controls will be, based upon the data availability, completeness and accuracy.
• Ensure approach balances between targeted and coverage risk mitigation
• Utilize periodic tuning for sustainability
15
Summary
https://www.alessa.caseware.com/
Agenda
16
1. Effective watch lists screening
2. Enabling risk scoring
3. Effective communication
https://www.alessa.caseware.com/ 17
Sanctions Fines
https://www.alessa.caseware.com/
Customer Risk - Onboarding
• Customer characteristics (name, address, date of birth, profession etc.)
• Corporate entities characteristics (industry, revenue, no of employees, geographies, etc.)
• Anticipated utilization and activity of account
• Presence on any sanctions or watch lists including politically-exposed persons (PEP) lists
18
Customer Risk – Onboarding
https://www.alessa.caseware.com/
Triggers for Screening
• Daily Screening against list deltas
• Screening at time of transaction
(against A and B parties)
• Ongoing monitoring of high-risk
clients.
19
Customer Risk – Ongoing Risk Score
https://www.alessa.caseware.com/
• Is part of effective financial crime compliance program
• Includes
• Watchlist screening
• Sanctions screening, and
• Screening for identifying PEPs, HIOs, and family members
• Screening is typically done at time of
• Establishing business relationship
• Processing of transactions
• Screening systems should find right balance between meeting regulatory expectation and
customer experience.
• In summary, should be effective and efficient
20
Screening
https://www.alessa.caseware.com/
POLL 3:
How would you describe the state of your current
screening program?
1. Very good - other FIs could learn from us!
2. Adequate - at least it keeps the regulators happy
3. Needs improvement - could probably use some fine-tuning
4. Under construction - we are working on it!
https://www.alessa.caseware.com/
• It is important to design and develop a robust screening environment
• Each FI should assess its own risks
• Taking a Risk-Based Approach by considering parameters such as
• Product offering
• Customer base
• Geographic risk
• For example a retail credit product where real time approvals are required – the inherent
sanctions risk is low where customers are local customers with credit history, value of
transaction is low then using an automated system may be considered
• For Trade Finance customers, the inherent sanctions risk is high so enhanced due
diligence is required, for such products a mix of automated – manual processes may be
required
22
How to Meet the Challenge
https://www.alessa.caseware.com/
• Screening environment is most often a complex set of processes
• Customer data maybe from multiple systems
• Screening lists from a reliable service provider
• Requires a good matching algorithm, and
• Flexibility to make quick changes
• FIs should have a strong governance over the screening process
23
Good Screening Environment
https://www.alessa.caseware.com/
• Use the updated version of lists
• Use reliable sources
• Assess the accuracy of the list
• Look at geographic scope of list
application
• Be aware of common prefixes,
secondary names, suffixes
• Names in non-Latin characters
• Duplicate values
• 50 percent rule for entity ownership
24
Best Practices for a Good Screening Environment
https://www.alessa.caseware.com/
• Not for Profit Organizations (NPO)
• Designated Non-Financial Businesses and Professions
• Shell Corporations
• Cash Intensive Businesses
• Pre-paid Card Issuers
• Marijuana Related Businesses
25
Screening High-Risk Professions and Businesses
https://www.alessa.caseware.com/
• Periodic Quality Assurance checks are required
• Independent team within Compliance to do the checks
• Check for alert generation process – completeness and accuracy
• Flow of data into the screening system – data integrity
• Check the number of false positives generated – metrics and reporting
• Are all types of transactions integrated with the screening system
• Is there a need for recalibration?
• Are there misconfigured watch lists?
26
Recalibration of Screening Environment
https://www.alessa.caseware.com/ 27
Use Case – ICICI Bank of Canada
• Name Screening Process
• Risk-Based Approach
• In-house name screening matching algorithm using fuzzy logic, phonetic algorithm,
deletes “noise”
• Common global lists and geography specific lists ( where clients do most of the
transactions)
• Emphasis on regular trainings to AMLO within business functions
• Use of robotics /automation for clearing certain types of alerts
• Quarterly QA testing
https://www.alessa.caseware.com/
Strategies to enhance screening processes
• Use a Risk-Based Approach
• Design an effective screening environment
• Use new technologies, and
• Periodically re-calibrate the eco-system
28
Summary
https://www.alessa.caseware.com/
Questions?
https://www.alessa.caseware.com/
Strategies to Enhance your Screening
and Transaction Monitoring
Processes
Sponsored by

More Related Content

What's hot

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)AML Source
 
goAML
goAMLgoAML
goAML
jwsong127
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
Louise Malady
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and amlcrmbasel
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Resurgent India
 
AML by the Numbers
AML by the NumbersAML by the Numbers
AML by the Numbers
Alessa
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
Amazon Web Services
 
Capanalec profile June-2019
Capanalec profile June-2019Capanalec profile June-2019
Capanalec profile June-2019
CapAnalec
 
Sales Tax Exemption Certificates
Sales Tax Exemption CertificatesSales Tax Exemption Certificates
Sales Tax Exemption Certificates
Credit Management Association
 
Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)
HEXANIKA
 
AnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentationAnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentation
Credit Management Association
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2Eric Young
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and amlcrmbasel
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
Thomas Lee
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_Shapiro
Mediabistro
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Cognizant
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
StubbsGazette
 
Vendor Monitoring Lifecycle
Vendor Monitoring LifecycleVendor Monitoring Lifecycle
Vendor Monitoring Lifecycle
Trust Exchange
 

What's hot (19)

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
 
goAML
goAMLgoAML
goAML
 
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
FATF's June 2013 Guidance Note on a Risk Based Approach to Implementing AML/C...
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and aml
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
AML by the Numbers
AML by the NumbersAML by the Numbers
AML by the Numbers
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
Capanalec profile June-2019
Capanalec profile June-2019Capanalec profile June-2019
Capanalec profile June-2019
 
Sales Tax Exemption Certificates
Sales Tax Exemption CertificatesSales Tax Exemption Certificates
Sales Tax Exemption Certificates
 
Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)Understanding SAR (Suspicious Activity Reporting)
Understanding SAR (Suspicious Activity Reporting)
 
AnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentationAnscersX Multibureau Business Trade Credit Report presentation
AnscersX Multibureau Business Trade Credit Report presentation
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and aml
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_Shapiro
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
 
Vendor Monitoring Lifecycle
Vendor Monitoring LifecycleVendor Monitoring Lifecycle
Vendor Monitoring Lifecycle
 

Similar to Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes

CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
Alessa
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
Hortonworks
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
Tuan Phan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
Tri Phan
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard Jim Robins
 
The role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeThe role of Technology: Battling Financial Crime
The role of Technology: Battling Financial Crime
Symptai Consulting Limited
 
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...Prolifics
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.
Nicholai Portelli
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
SAS Institute India Pvt. Ltd
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
Tri Phan
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance services
drishtipuro1234
 
Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Mo Johnson
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Genpact Ltd
 
Adopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bankAdopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bank
Krishna Bollojula
 
Adopting Analytics in BFSI
Adopting Analytics in BFSIAdopting Analytics in BFSI
Adopting Analytics in BFSI
Krishna Bollojula
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
Perficient, Inc.
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
Emma Kelly
 
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
accenture
 
Fraud analysis
Fraud analysisFraud analysis
Fraud analysis
Smriti Tikoo
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banks
Pankaj Baid
 

Similar to Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes (20)

CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
 
The role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeThe role of Technology: Battling Financial Crime
The role of Technology: Battling Financial Crime
 
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
The Mindset of Decision-Making: Best Practices to Increase Agility and Visibi...
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance services
 
Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14Case overview Jackson MS 4-17-14
Case overview Jackson MS 4-17-14
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
Adopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bankAdopting Analytics for decision making in a bank
Adopting Analytics for decision making in a bank
 
Adopting Analytics in BFSI
Adopting Analytics in BFSIAdopting Analytics in BFSI
Adopting Analytics in BFSI
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
 
Fraud analysis
Fraud analysisFraud analysis
Fraud analysis
 
AI powered decision making in banks
AI powered decision making in banksAI powered decision making in banks
AI powered decision making in banks
 

More from Alessa

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More Effective
Alessa
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Alessa
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
Alessa
 
Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)
Alessa
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
Alessa
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada Perspective
Alessa
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening Programs
Alessa
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Alessa
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
Alessa
 
Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in Canada
Alessa
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
Alessa
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
Alessa
 
Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining
Alessa
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
Alessa
 
Analytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAnalytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing Cards
Alessa
 
Reduce Your AML Compliance Workload
Reduce Your AML Compliance WorkloadReduce Your AML Compliance Workload
Reduce Your AML Compliance Workload
Alessa
 
CaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your BusinessCaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your Business
Alessa
 
Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime
Alessa
 

More from Alessa (18)

How to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More EffectiveHow to make KYC for AML Compliance More Effective
How to make KYC for AML Compliance More Effective
 
Trade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to KnowTrade-Based Money Laundering: What Compliance Professionals Need to Know
Trade-Based Money Laundering: What Compliance Professionals Need to Know
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
 
Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)Novedades en alessa (antes conocido como case ware monitor)
Novedades en alessa (antes conocido como case ware monitor)
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
 
Beneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada PerspectiveBeneficial Ownership Rules: Global and Canada Perspective
Beneficial Ownership Rules: Global and Canada Perspective
 
Tackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening ProgramsTackling Hidden Risks in AML Sanctions Screening Programs
Tackling Hidden Risks in AML Sanctions Screening Programs
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
 
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
A Regulatory Understanding of Virtual Assets (Cryptocurrency) Types and their...
 
Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in Canada
 
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about CryptocurrenciesWEBINAR: What Financial Institutions need to know about Cryptocurrencies
WEBINAR: What Financial Institutions need to know about Cryptocurrencies
 
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML ComplianceAn Executive Guide on How to Use Machine Learning and AI for AML Compliance
An Executive Guide on How to Use Machine Learning and AI for AML Compliance
 
Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining Strengthen Your AML Compliance Program with Data Mining
Strengthen Your AML Compliance Program with Data Mining
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
Analytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing CardsAnalytics and Continuous Monitoring to Manage Purchasing Cards
Analytics and Continuous Monitoring to Manage Purchasing Cards
 
Reduce Your AML Compliance Workload
Reduce Your AML Compliance WorkloadReduce Your AML Compliance Workload
Reduce Your AML Compliance Workload
 
CaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your BusinessCaseWare Monitor 5 - Take Control of Your Business
CaseWare Monitor 5 - Take Control of Your Business
 
Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime Using Advanced Data Analytics and Technology to Combat Financial Crime
Using Advanced Data Analytics and Technology to Combat Financial Crime
 

Recently uploaded

FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 

Recently uploaded (20)

FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 

Webinar: Strategies to Enhance your Screening and Transaction Monitoring Processes

  • 1. https://www.alessa.caseware.com/ Strategies to Enhance your Screening and Transaction Monitoring Processes Sponsored by
  • 2. https://www.alessa.caseware.com/ About Presenters Joel Freckleton, CAMS Regional Sales Manager, CaseWare RCM Eric Hansen, Senior Risk Specialist, CaseWare RCM Daniel Buckingham, Director of Compliance Strategy, Governance and Technology, Transfast Mandar Vaidya, Assistant Vice President, Compliance, ICICI Bank Canada
  • 3. https://www.alessa.caseware.com/ Housekeeping Enter your questions here Webinar Tips • If you are experiencing issues with audio quality, switch to Chrome as your web browser • If you are still experiencing issues, send us a message and we will provide a link to the GoToWebinar support line. There is a also a link at the bottom of the chat box. • Let us know if you are experiencing any other issues.
  • 4. https://www.alessa.caseware.com/ Agenda 4 1. Understanding risk 2. Translating risks into transaction monitoring realities 3. Tuning capabilities
  • 5. https://www.alessa.caseware.com/ 5 Risk-Based Approach Challenge: Theoretically sound premise, but practical realities make this difficult to achieve and reliably demonstrate Intent: More efficient use of resources to mitigate the ML/TF risks identified. It enables a firm to focus their resources and take enhanced measures in situations where the risks are higher, apply simplified measures where the risks are lower and exempt low risk activities.
  • 6. https://www.alessa.caseware.com/ 6 FATF: Risk-Based Approach “Competent authorities and financial institutions, are expected to identify, assess and understand the ML/TF risks to which they are exposed and take AML/CFT measures commensurate to those risks in order to mitigate them effectively.” The Financial Action Task Force (FATF) Guidance for a Risk-based approach - 2014
  • 7. https://www.alessa.caseware.com/ 7 Understanding Risk: Monitoring & Detection Perspectives Challenge: Identifying the balance: • Coverage vs. targeted approaches to risk identification and mitigation. • Manual vs. automated mechanisms • Interim vs. Strategic solutions Intent: • More comprehensive view of risks, to most importantly understand the realities of risk (likelihood, impact and repercussions) to make an informed decision around your risk focus lenses. • Enables early insight into challenges and/or realities that may impact and even limit the ability to efficiently and effectively monitor and detect risk.
  • 8. https://www.alessa.caseware.com/ 8 Understanding Risk: Monitoring & Detection Perspectives • Enterprise & Localized assessments are critical • Inherent Risk • Customers, Product/Services, Transactions Type, Geography, etc. • Risk mapping e.g. to specific regulations/country typologies (manage risk nuances) • Perceived vs. Real • Likelihood, impact and repercussions • Upstream and Downstream realities • Transaction flows and data capture rules • Product and service parameters (limits, restrictions etc.) • KYC processes • Knowledgeable & skilled staff • Manual vs. automated
  • 9. https://www.alessa.caseware.com/ POLL 1: How does your Organization conduct risk assessments? 1. Enterprise (holistically) 2. By department 3. Regulator driven 4. Other
  • 10. https://www.alessa.caseware.com/ 10 From Targeted Risks to Monitoring/Detection Realities Challenge: • Data quality and availability to support true targeting of risk. Intent: • To understand the type and combination of monitoring controls needed and how effective these controls will be, based upon the data availability, completeness and accuracy.
  • 11. https://www.alessa.caseware.com/ 11 From Targeted Risks to Monitoring/Detection Realities • Risk Factors Elements • What are the specific attributes that when present (combined) would identify the risk? • When (risk tolerance) does the risk become real? • What areas within the organization (customers, products, services etc.) are affected by this risk, and are they all equal (risk tolerance)? • Map data element to the constituent parts • Where is the data? Is it electronic or physical? Can the acquisition be automated? • Data completeness and accuracy • Define monitoring & detection capabilities • Is there sufficient electronic, systematic data to support automation? • Does the data require manual acquisition and transformation before it can be used?
  • 12. https://www.alessa.caseware.com/ 12 Tuning Monitoring & Detection Capabilities Challenge: • To not build in such a bias that risks (even if lower) are not being monitored and detected. • Finding the balance between targeted and coverage risk mitigation and human resources to manage. Intent: • To build a more effective approach to monitoring and detection of risk that is proportional to the risks of the firm. The efforts are proportionally higher where the risks are higher.
  • 13. https://www.alessa.caseware.com/ 13 Tuning Monitoring & Detection Capabilities • Tuning • Using a combination of system parameters and data for optimization o Targeting of specific risks o Reduction of unproductive detection o Timeliness of detection o Coverage of detection (spectrum of risk monitoring) • Risk Based Bias • Monitoring and detection skewed towards risk o More specific detection approaches o Higher propensity to alert • More efforts are made using the compliments of parts to monitor and detect.
  • 14. https://www.alessa.caseware.com/ POLL 2: What type of tuning function do you currently have in place? 1. Maintained through the compliance department 2. Outsourced 3. Managed by IT 4. Other
  • 15. https://www.alessa.caseware.com/ Strategies to optimize Transaction Monitoring processes • Use a risk-based approach to enable a comprehensive view of risks, to better understand the realities of risk (likelihood, impact and repercussions) • Understand the type, frequency and combination of monitoring controls needed and how effective these controls will be, based upon the data availability, completeness and accuracy. • Ensure approach balances between targeted and coverage risk mitigation • Utilize periodic tuning for sustainability 15 Summary
  • 16. https://www.alessa.caseware.com/ Agenda 16 1. Effective watch lists screening 2. Enabling risk scoring 3. Effective communication
  • 18. https://www.alessa.caseware.com/ Customer Risk - Onboarding • Customer characteristics (name, address, date of birth, profession etc.) • Corporate entities characteristics (industry, revenue, no of employees, geographies, etc.) • Anticipated utilization and activity of account • Presence on any sanctions or watch lists including politically-exposed persons (PEP) lists 18 Customer Risk – Onboarding
  • 19. https://www.alessa.caseware.com/ Triggers for Screening • Daily Screening against list deltas • Screening at time of transaction (against A and B parties) • Ongoing monitoring of high-risk clients. 19 Customer Risk – Ongoing Risk Score
  • 20. https://www.alessa.caseware.com/ • Is part of effective financial crime compliance program • Includes • Watchlist screening • Sanctions screening, and • Screening for identifying PEPs, HIOs, and family members • Screening is typically done at time of • Establishing business relationship • Processing of transactions • Screening systems should find right balance between meeting regulatory expectation and customer experience. • In summary, should be effective and efficient 20 Screening
  • 21. https://www.alessa.caseware.com/ POLL 3: How would you describe the state of your current screening program? 1. Very good - other FIs could learn from us! 2. Adequate - at least it keeps the regulators happy 3. Needs improvement - could probably use some fine-tuning 4. Under construction - we are working on it!
  • 22. https://www.alessa.caseware.com/ • It is important to design and develop a robust screening environment • Each FI should assess its own risks • Taking a Risk-Based Approach by considering parameters such as • Product offering • Customer base • Geographic risk • For example a retail credit product where real time approvals are required – the inherent sanctions risk is low where customers are local customers with credit history, value of transaction is low then using an automated system may be considered • For Trade Finance customers, the inherent sanctions risk is high so enhanced due diligence is required, for such products a mix of automated – manual processes may be required 22 How to Meet the Challenge
  • 23. https://www.alessa.caseware.com/ • Screening environment is most often a complex set of processes • Customer data maybe from multiple systems • Screening lists from a reliable service provider • Requires a good matching algorithm, and • Flexibility to make quick changes • FIs should have a strong governance over the screening process 23 Good Screening Environment
  • 24. https://www.alessa.caseware.com/ • Use the updated version of lists • Use reliable sources • Assess the accuracy of the list • Look at geographic scope of list application • Be aware of common prefixes, secondary names, suffixes • Names in non-Latin characters • Duplicate values • 50 percent rule for entity ownership 24 Best Practices for a Good Screening Environment
  • 25. https://www.alessa.caseware.com/ • Not for Profit Organizations (NPO) • Designated Non-Financial Businesses and Professions • Shell Corporations • Cash Intensive Businesses • Pre-paid Card Issuers • Marijuana Related Businesses 25 Screening High-Risk Professions and Businesses
  • 26. https://www.alessa.caseware.com/ • Periodic Quality Assurance checks are required • Independent team within Compliance to do the checks • Check for alert generation process – completeness and accuracy • Flow of data into the screening system – data integrity • Check the number of false positives generated – metrics and reporting • Are all types of transactions integrated with the screening system • Is there a need for recalibration? • Are there misconfigured watch lists? 26 Recalibration of Screening Environment
  • 27. https://www.alessa.caseware.com/ 27 Use Case – ICICI Bank of Canada • Name Screening Process • Risk-Based Approach • In-house name screening matching algorithm using fuzzy logic, phonetic algorithm, deletes “noise” • Common global lists and geography specific lists ( where clients do most of the transactions) • Emphasis on regular trainings to AMLO within business functions • Use of robotics /automation for clearing certain types of alerts • Quarterly QA testing
  • 28. https://www.alessa.caseware.com/ Strategies to enhance screening processes • Use a Risk-Based Approach • Design an effective screening environment • Use new technologies, and • Periodically re-calibrate the eco-system 28 Summary
  • 30. https://www.alessa.caseware.com/ Strategies to Enhance your Screening and Transaction Monitoring Processes Sponsored by