P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the...
Transcript of P a g efiles.acams.org/pdfs/2018-2/Program_2019_Hollywood... · 2018-12-10 · Examining the...
1 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
SUNDAY, APRIL 14, 2019
Pre-Conference Training
PRE-CONFERENCE TRAINING
8:00 AM – 9:00 AM
CAMS Examination Preparation Seminar Check-in (Separate registration required.)
9:00 AM – 4:30 PM
CAMS Examination Preparation Seminar
Led by CAMS-certified instructors, the CAMS Examination Preparation Seminar
reviews critical information in an easy-to-follow format that prepares you to sit for the CAMS Examination. Benefit from this interactive study session as AML
experts walk you through core content areas and practice questions. To register, please contact us on +1 305.373.0020 or via email at [email protected].
8:00 AM – 9:00 AM Pre-Conference Workshop A Check-in (Separate registration required)
9:00 AM – 12:00 PM WORKSHOP A: Inside the Criminal Mind: To Catch a Fraudster, Think Like One
Trust is the foundation of individual and business relationships — and
fraudsters are experts at building it, and betraying it, in order to perpetrate
their crimes. In this compelling and insightful workshop, attendees will examine the psychological profiles of these unscrupulous financial criminals, whose
victims may be an elderly relative, a trusting employer — or even a financial institution. This highly analytical workshop will examine the common
motivations of fraudsters for committing such acts. In addition, the methods by which fraudsters identify opportunities will be detailed. Finally, the rationales by
which fraudsters justify their actions will be scrutinized. In short, for financial
crime professionals, catching fraudsters requires thinking like one. For AML and financial crime professionals, this workshop provides eminently useful insights
on fraud detection, protection and prevention.
Key Areas Covered
Analyzing fraud perpetrators’ motivation to better differentiate legitimate relationships and those based on criminal intent and take appropriate
protective actions
Detailing rationalization processes of fraudsters to strengthen situational
awareness skills related and improve detection of potential fraudulent acts or schemes
Scrutinizing how fraudsters identify opportunities, to assess vulnerability of
institution or clients to fraud and implement controls to mitigate risks of being victimized
Who Should Attend
2 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Prevention, detection, investigation: Fighting fraud requires a multi-faceted approach, and this compelling workshop provides a holistic examination that’s
of benefit to all the relevant anti-financial crime constituencies. Whether you
are a fraud examiner, a member of a financial intelligence unit or a law enforcement officer who works in collaboration with financial institutions, this
workshop will raise awareness of how fraudsters think and act — providing new tools for spotting and circumventing them. Meanwhile, the materials presented
will also be of inherent benefit to relationship managers as well as AML officers and consultants who conduct training on the nefarious methods by which these
criminals operate.
9:00 AM – 12:00 PM
WORKSHOP B: The New Era of Risk Models: Mastering the Challenges
Risk modeling is in the midst of revolutionary changes, driven by a compliance landscape that is increasingly tech-dependent and data-driven, financial crimes
that are executed via sophisticated transnational networks and the rise of innovative products and services such as Fintech and virtual currencies. In this
authoritative yet eminently practical workshop, expert presenters will guide
attendees through a comprehensive examination of the multiple forces that are impacting the roles and responsibilities of risk models, then conduct interactive
exercises to develop constructive and applicable solutions for updating them in ways that strengthen AML and provide robust oversight going forward.
Key Areas Covered
Outlining tech tools enhancing oversight such as AI and machine learning and detailing emerging AML risks such as cybercrime to
analyze potential deficiencies of legacy risk models
Crafting risk models that reflect systemic requirements such as data
integrity and relevant regulatory guidance to hone assessment accuracy
and meet institutional obligations
Validating model efficacy in areas such as quality of data extractions
and false positive generation to determine efficacy of new models and address issues such as algorithmic bias
Who Should Attend
Risk management is at the core of a culture of compliance, and therefore this workshop on the new era for risk models is of near universal interest in the
ACAMS community. Among the attendees whose duties are most closely tied to
the content are risk management officers, relationship managers, onboarding personnel and specialists in technologies such as data analytics and artificial
intelligence. Finally, consultants and those who conduct in-house training will find the insights shared by the expert panelists will provide them valued
expertise in the next generation of risk models.
12:30 PM – 1:30 PM Pre-Conference Workshop B Check-in (Separate registration required)
3 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
1:00 PM – 6:30 PM Registration Desk Open
Bags and Lanyards courtesy of Globalvision Systems
1:30 PM – 4:30 PM
WORKSHOP C: Crypto Quandaries: An Interactive Workshop on
Managing Risks—and Optimizing Opportunities—of Virtual Currencies
Virtual currencies can sometimes strike fear in compliance officers, but the
reality is cryptocurrencies are an innovation that AML specialists are going to see more of. Which is why this insight-filled workshop is tailored to provide a
roadmap for AML officers who must guide their institutions as they navigate
this disruptive technology. Led by longtime experts, this workshop will address issues such as the unique AML risks posed by cryptocurrencies, along with
practical guidance on how to manage them. Questions as to how cryptocurrencies are increasingly being used—and how that impacts AML
responsibilities such as transaction monitoring— will be explored in-depth, giving compliance professionals vital insights on adjusting legacy systems to
accommodate these new and transformative financial products. The truth is,
these new technologies demand new AML skills. Learn them at this workshop.
Key Areas Covered
Deconstructing unique compliance challenges of virtual currencies, to
develop risk-based oversight models that mitigate potential AML and financial crime issues
Analyzing cryptocurrency case studies to gain comprehension of issues such as KYC and transparency to incorporate lessons learned into
enterprise-wide training programs
Surveying evolving regulatory efforts and growth of cryptocurrencies
and related businesses such as Bitcoin exchanges to facilitate adequate
planning as virtual currencies gain greater acceptance worldwide
Who Should Attend
This workshop is tailored for compliance professionals no matter their level of exposure to cryptocurrencies. With their growing clout, virtual currencies are
almost certain to affect financial institutions regardless of size or market niche. Attendees can expect a solid grounding in the rise and current status of the
cryptocurrency market, as well as a forward-looking exploration of emerging
trends that will enable them to be thought leaders on risk management of cryptocurrencies at the institutional level.
5:00 PM - 5:30 PM
ACAMS First-Time Attendee Orientation
4 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
MONDAY, APRIL 15, 2019
Main Conference Day One
7:30 AM – 5:50 PM
Registration Desk Open
Bags and Lanyards courtesy of Globalvision Systems
7:30 AM – 6:50 PM
Exhibit Hall Open
7:30 AM – 8:30 AM
Networking Breakfast in Exhibit Hall
GENERAL SESSIONS
8:30 AM – 8:40 AM
Welcome Remarks
8:40 AM – 9:10 AM
Keynote Address and Q&A
9:10 AM – 10:35 AM
Panel Discussion
Regulatory Roundtable: Insights on Oversight Directly From Top
Regulators
Discussing recent global and domestic regulatory developments and offer insight into current AML compliance oversight trends
Assessing recent US regulatory changes in 2018-19 and their practical
impacts on systems, resources and controls
Reviewing both good and challenging examination trends to improve
institution responses and ensure clarity of expectations
10:35 AM – 11:05 AM
Networking and Refreshment Break in Exhibit Hall
11:05 AM – 12:15 PM
Panel Discussion
Hot Topics: The Issues (and Answers) You Care Most About
Join our expert panel as they address questions and comments submitted
directly by you, the attendees, and provide industry responses to discussion
topics from the Regulatory Roundtable. This session provides an open forum and interactive discussion as panelists tackle topics submitted by the audience
two weeks before the conference starts. Whether the issue is regtech or regulatory expectations, SARs or cybersecurity, this is your chance to be heard.
It’s a frank dialogue of value to anyone involved in AML, compliance or the fight against financial crime.
12:15 PM – 1:30 PM
Networking Luncheon
12:15 PM – 1:30 PM
AML Knowledge Luncheon
CONCURRENT SESSIONS
1:30 PM – 2:00 PM Networking Groups
2:15 PM – 2:45 PM Networking Groups
Networking para Profesionales ALD de América Latina
5 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
A menudo se llama a Miami la capital de América Latina, por lo que es justo que la conferencia de ACAMS en el sur de la Florida brinde una oportunidad de
networking específicamente para aquellos que prefieren hablar sobre ALD en
español. Ya sea que usted sea de México o Manhattan, Texas o Tegucigalpa, esta sesión brinda una ocasión amistosa e informal para unirse a la
conversación ALD - en español.
1:30 PM – 2:45 PM Concurrent Sessions
Global Issues
Lessons Learned from the ABLV, Societe Generale and Danske Cases
Detailing SocGen’s deficiencies in AML infrastructure to analyze how lax oversight led to willful violations and concealment of sanctions laws and
the Foreign Corrupt Practices Act
Reviewing the use of shell companies and disguised identities to chart the flow of billions of dollars in suspicious payments through Danske
Bank’s Estonian branch office
Examining the consequences for implicated institutions, such as multi-
billion dollar fines and liquidation of ABLV following FinCEN prohibition of correspondent accounts by US banks
Financial Crime Trends
Wildlife Trafficking: AML Models to Deter Environmental-Linked
Financial Crime
Charting common typologies of environmental-related crimes such as
endangered species smuggling or trafficking in wildlife subject to harvest quotas including lumber and aquatic species
Reviewing specific cases involving wildlife-related schemes such as
rhino horn smuggling to establish ties between environmental-related trafficking and transnational financial crime organizations
Familiarizing staff with laws such as END Wildlife Trafficking Act,
utilizing resources such as State Department’s “focus countries” at
higher risk of wildlife trafficking and establishing protocols for contacting and aiding authorities
SARs SARs From A Law Enforcement Perspective
Outlining SAR management practices by investigative agencies to gain insights into law enforcement review processes and priorities
Examining examples of SAR-initiated investigations to gain insights into
making SARs of optimal use to law enforcement
Reviewing best practices for creating and maintaining outreach programs with law enforcement to foster collaborative AML and
financial crime prevention efforts
Technology Trends
Choosing an AML Technology Solution—A “How To” for Evaluating and
Selecting the Best Fit For Your Institution
Assessing your institution’s need for new or enhanced AML technology
solutions
Key areas of focus to evaluate in narrowing the field of suitable vendors
and solutions for your institution
6 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Vetting potential vendors for expertise in targeted functions and
capacity to integrate automated processes with existing legacy systems
Performing a post-integration audit to assess success of outcomes, identify operational deficiencies and adjust systems or vendor
relationship as warranted
AML Knowledge
AML Knowledge
2:45 PM – 3:05 PM
Networking and Refreshment Break in Exhibit Hall
3:05 PM – 3:35 PM Networking Groups
3:05 PM – 4:20 PM Concurrent Sessions
Global Issues
Rethinking Correspondent Banking: De-Risking Through Education
Analyzing unique market and respondent bank risks to create appropriate and individualized control environments that conform to
institutional risk appetite and tolerance standards
Simulating case studies to detail practical management and staff training scenarios for scrutinizing and resolving relationship issues with
respondent banks
Understanding motivations and interests of both business side and
financial criminal compliance units to facilitate mutually beneficial resolution of conflicting incentives
Financial Crime
Trends
Dark Web Spotlight: Countering Its Financial Crime and Money
Laundering Risks
Analyzing encryption technologies such as The Onion Router (Tor) and Bitcoin to attain insights into how they can be exploited to mask
criminal enterprises and transactions
Reviewing Operation Dark Gold and other successful investigations by law enforcement agencies to detail inner workings of illicit Dark Web
activities
Incorporating monitoring for Dark Web criminal typologies into AML
models and utilizing oversight tools such as KYC and EDD to flag and resolve suspicious activities
SARs Write On: A Guide to Composing and Editing SAR Narratives
Reviewing investigative findings that support SAR filing decision to
outline narrative’s key points, identify vital supporting evidence and
jettison irrelevant or inconsequential data
Expanding outline into a rough draft that highlights relevant facts — such as who, what, when, where, why and how — to optimize SAR’s
usefulness to law enforcement
Editing narrative to delete unnecessary details, check factual accuracy and ensure final SAR is clear, concise, chronological and comprehensive
and meets regulatory expectations
7 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Technology Trends
How May AI Help You? Applying Artificial Intelligence, Robotics and
Machine Learning to AML
Distinguishing AI, machine learning and robotic process automation to
identify discrete risk management uses such as predictive capacity, client segmentation and monitoring
Augmenting manual reviews and legacy systems with data analytics to
boost oversight efficiencies and elevate accuracy in alert generation, investigation and resolution
Auditing AI and machine learning systems to analyze systemic issues
such as data quality, currency of risk models or algorithmic bias and
take corrective actions as warranted
AML Knowledge
AML Knowledge
4:20 PM – 4:50 PM Networking and Refreshment Break in Exhibit Hall
4:50 PM – 5:20 PM Networking Groups
Networking for AML Caribbean Professionals
Beautiful beaches and warm waters are pretty much the norm for Caribbean attendees, so this networking session provides a friendly alternative to fun in the sun: Getting to know your neighbors (figuratively speaking.) From the Bahamas to Barbados, Grand Cayman to Grenada, the Caribbean compliance community is strong and growing. Meet up with old acquaintances—and make some new ones—at this assemblage of fellow financial crime professionals from across the Caribbean region.
4:50 PM – 5:50 PM Concurrent Sessions
Sanctions Management
Keeping Current: Staying Ahead on Sanctions
Formalizing sanctions communications systems to achieve ongoing awareness of changes concerning Iran, Cuba, Venezuela and Russia
and additions or deletions from SDN list
Conducting staff training on obscured sanctions risks such as dual-use goods or black market commodities trading to mitigate trade-related
and prohibited transaction risks
Examining requirements of the OFAC 50% rule to enhance identification and whose ownership structures create sanctions risks
involving blocked persons
Multi-Industry
Training Game On: AML in the Era of Legal Sports Gambling
Updating state actions to legalize sports gambling following Supreme Court’s overturning of Professional and Amateur Sports Protection Act
8 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
TUESDAY, APRIL 16, 2019
Main Conference Day Two
7:30 AM – 5:50 PM Registration Desk Open
Creating oversight protocols to reconcile differences among states on
sports gambling and adjusting models in accord with legislative changes such as those involving online betting
Examining Nevada’s legal sports betting industry to assess historic roles
of state regulations and institutional standards in oversight of sports books
Risk Management PEPs Spotlight: Operation Money Flight and the Case Against
Venezuelan PEPs
Examining the alleged currency-exchange conspiracy to launder $1.2
billion embezzled from state-owned PDVSA to illustrate vulnerability of
state-owned enterprises to PEP schemes
Probing the alleged acts involving international bankers, Miami securities advisors and instruments such as fake mutual-fund
investments to illuminate laundering typologies
Surveying named defendants to gain insights on best practices for conducting effective risk assessments of PEPs
Technology Trends
The Data Whisperer: How Well Do You Know Your Data?
Conducting data needs assessments for business lines and products to collaboratively construct data collection and extraction systems to meet
unique AML needs across enterprise
Harmonizing data systems of discrete units to minimize duplication, enhance data quality and protection and foster efficiency in areas such
as beneficial ownership determination
Performing quality assurance review of data systems to identify and
resolve functional defects and confirm integration of changes in business models, risk profiles or regulations
Financial Crime Trends
Fighting Fraud and Financial Exploitation Involving Elders and
Vulnerable Adults
Evaluating the new Senior Safe Act to identify collaborative
opportunities between financial institutions, regulators and law enforcement involving senior financial abuse
Reviewing FINRA rule changes involving obtaining trusted contact
person information for vulnerable adults and placement of temporary holds in cases of suspected exploitation
Training relationship managers on red flags of elder abuse including
atypical disbursements or asset transfers to ensure investigation and
resolution of potential exploitation
AML Knowledge
5:50 PM – 6:50 PM Networking Reception in Exhibit Hall
9 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Bags and Lanyards courtesy of Globalvision Systems
7:30 AM – 5:50 PM Exhibit Hall Open
7:30 AM – 8:30 AM
Networking Breakfast in Exhibit Hall
GENERAL SESSIONS
8:30 AM – 8:45 AM
ACAMS Advanced Certification Recognition
8:45 AM – 9:55 AM
Panel Discussion
New Tools for Combating Human Trafficking:
What Financial Institutions Can Do to Help Stop Labor and Sex Trafficking of Vulnerable Individuals
Understand anti-human trafficking initiatives built on a foundation of
shared data and resources, where organizations benefit from the
experience and intelligence of their peers, as well as shared learnings
from government, law enforcement, and NGO actors.
Learn about some of the cooperative efforts to fight human trafficking
locally, nationally and globally
Master some of the latest typologies that present red flags for human
trafficking
9:55 AM – 10:45 AM
Special Presentation and Q&A
10:45 AM – 11:15 AM
Networking and Refreshment Break in Exhibit Hall
11:15 AM – 12:15 PM
Panel Discussion
A Year in the Life of the CDD Final Rule: A First Anniversary
Assessment
Evaluating impact and resolution of implementation hurdles to outline
strategies for managing issues such as training, IT investment, hiring and responding to triggering events
Detailing preferable methodologies for determining beneficial
ownership to demonstrate disciplined institutional compliance with CDD Final Rule in anticipation of examination-related inquiries
Reviewing beneficial ownership verification tools, policies and practices
to evaluate efficiencies and effectiveness to strengthen entity
identification accuracy and mitigate non-compliance risks
12:15 PM – 1:30 PM
Networking Luncheon
CONCURRENT SESSIONS
1:30 PM – 2:00 PM AML Innovations
2:15 PM – 2:45 PM AML Innovations
1:30 PM – 2:45 PM Concurrent Sessions
10 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Sanctions Management
US vs. Them? How Growing Divergences in EU and US Iran Sanctions
Affect Compliance
Enumerating differences between US and EU sanctions on Iran to
highlight potential non-compliance risks
Assessing the practical effects of EU efforts to immunize European companies from non-compliance with US sanctions on Iran
Adapting oversight models to mitigate sanctions exposure risks related
to Special Purpose Vehicles, third-country oil trading or other efforts to
skirt US sanctions
Risk Management Enhancing Enhanced Due Diligence: A Tool for Managing Higher-Risk
Customers
Utilizing CDD review to determine when EDD is required based on factors such as jurisdictional risks, entity client base, ownership
structure and transaction activity patterns
Developing checklist of EDD goals such as beneficial ownership determination and processes such as negative news searches to secure
data relevant to risk-based assessment
Informing senior management regularly to review risk profile changes, responsive EDD and monitoring measures, and gain consensus on
account exiting or continuation decisions
Financial Crime
Trends
How to Be a Cyber Fighter: Defending Against Cybercrime Threats
Conducting risk-based review of data collection and management
systems, including vendors, to identify potential vulnerabilities and
mitigate risks such as malware infestation
Creating a formal risk-based Know Your Employee program to combat
insider threats such as rogue employees and inadequate staff training
on cyber-related threats
Developing cyber-incident response plans to contain damage of
systemic attacks such as ransomware and data breaches, rectify
security gaps, and notify and collaborate with authorities
Global Issues Left of Boom, Right of Boom: Pre- and Post-Attack CTF Strategies
Applying the military “left of boom” concept — referring to pre-explosion timelines — to strengthen CTF through partnering with law
enforcement, proactive monitoring and situational awareness of
terrorism threats
Preparing for a “right of boom,” or post-attack, AML/compliance response to address issues such as institutional exposure to terrorist
financing flows, securing data that may be of use to investigators and refreshing relevant risk assessments
Incorporating lessons learned such as motivation for attack, methods of
circumventing security controls and terrorist funding streams to fortify left of boom protocols going forward
AML Knowledge
11 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
AML Knowledge
2:45 PM – 3:05 PM
Networking and Refreshment Break in Exhibit Hall
3:05 PM – 3:35 PM AML Innovations
3:50 PM – 4:20 PM AML Innovations
3:05 PM – 4:20 PM Concurrent Sessions
Regulatory
Developments
Joint Solutions: A Multi-Pronged Approach to Banking Marijuana-
Related Businesses
Analyzing relevant FinCEN guidance on banking MRBs to ensure risk
models meet regulatory expectations and identify potential conflicts with applicable state laws
Training front-line staff on typologies such as commingling of bankable
and non-bankable proceeds in order to strengthen risk-based monitoring related to marijuana
Formalizing periodic reviews of MRB policies and procedures to keep
risk models current and reflect institutional risk appetite and recent
regulatory or legal developments
AML Careers What the Future Holds: Skills and Knowledge to Keep AML Careers
Advancing
Developing and maintaining technological literacy to achieve proficiency
in growing role of oversight and compliance tools such as analytics and
data management
Assessing emerging AML trends and needs to identify and acquire
talent acquisition in areas such as coding, algorithmic screening and
innovative products such as blockchain
Leveraging AML resources with approaches such as strategic
outsourcing and collaborating with law enforcement on investigations
to meet growing oversight obligations
Multi-Industry Training
Securities Focus: Analyzing SEC Actions on Oversight Adequacy and
SAR Filing
Probing SEC actions regarding deficient suspicious activity reporting to
discern regulatory expectations for SAR filing on activities of independent advisers
Standardizing definition of “reasonable suspicion” across enterprise to
ensure SAR filing decisions conform to regulatory and institutional standards
Applying lessons of enforcement actions to confirm oversight models
are comply with requirements such as those governing reporting,
recordkeeping and record retention
12 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Financial Crime Trends
Operation Darkness Falls: Taking Down the Largest Fentanyl Vendor
in the U.S.
Analyzing the MH4Life organization’s use of the dark net and
cryptocurrencies to detail changing mechanics of drug dealing
enterprises Scrutinizing the organization’s money laundering process to detail role
of digital currency exchangers in converting proceeds into fiat
currencies and prepaid cards
Examining the collaborative investigation by federal agencies to gain insights into law enforcement methods for fighting cyber-based
financial crimes
AML Knowledge
AML Knowledge
4:20 PM – 4:50 PM Networking and Refreshment Break in Exhibit Hall
4:50 PM – 5:20 PM AML Innovations
4:50 PM – 5:50 PM Concurrent Sessions
Technology Trends
The Reach of a Breach: Following the Path from Stolen Data to
Identity Theft to Fraud
Analyzing how breached data is transformed into identity theft to
understand common typologies involving stolen information
Detailing the use of online accounts as “virtual money mules” used to launder money through financial institutions
Reviewing emerging trends in identity theft methods to adjust oversight
regimens as needed and improve detection and resolution of identity theft red flags
SARs Before You File: Creating a Support System to Aid Suspicious Activity
Oversight
Training staff on “appropriate and reasonable” testing to improve
detection of anomalous transactions, abrupt shifts in client profile and
other suspicious activities
Creating standardized procedures for investigating and escalating alerts to produce uniform and thorough reviews that support institutional risk
management goals
Formalizing SAR filing-decision protocols to ensure they are based on gathered evidence, conform to institutional standards and reflect the
views of affected parties
Sanctions
Know Your Country: Managing the Complications of Venezuelan
Sanctions
Crafting unique Venezuela oversight systems, using resources such as Treasury’s Venezuela sanctions updates and promptly incorporating
13 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
OFAC changes involving SDN List, blacklisted entities and assets linked to PEPs
Conducting risk-based customer reviews to identify potential sanctions-
related risks such as purchases of banned debts or accounts receivable
owed to Venezuela or PDVSA or invoice manipulation of otherwise permissible trades
Reviewing FinCEN advisory on Venezuelan corruption to identify red
flags such as government contracts with entities having no clear business purpose, unusually complex wealth management patterns and
real estate purchases incommensurate with official salaries
Non-Bank
Institutions
MSB Spotlight: Regulatory Trends, Enforcement Actions and Emerging
Risks
Examining enforcement actions linked to innovative products such as
cryptocurrencies to identify unique MSB risks and strengthen oversight
protocols as warranted
Detailing and meeting regulatory requirements regarding adequacy of MSB AML programs and utilizing training and technology to address
obligations such as agent oversight
Conducting AML audits and documenting applicable corrective actions to foster productive collaboration with banking partners and mitigate
risks of relationship termination
Financial Crime
Trends
Antiquities, the Art Market and Financial Crime:
What AML Professionals Need to Know About the Looting and Trafficking of Cultural Artifacts and Fine Art
Analyzing guidance of FATF and law enforcement agencies on financial
crime risks of art and antiquities trading to strengthen due diligence of entities dealing in cultural artifacts
Reviewing federal and international investigations and prosecutions
with typologies that evidence the money laundering and terrorist financing opportunities via markets in cultural objects
Assessing regulatory and oversight trends including EU’s beneficial
ownership requirements for art dealers, the Geneva Responsible Art
Market Initiative and “Art Basel Guidelines” and public policy proposals in the US and globally
AML Knowledge
5:50 PM – 6:50 PM Networking Reception at Portico
WEDNESDAY, APRIL 17, 2019
Main Conference Day Three
7:30 AM – 11:50 AM Registration Desk Open
14 | P a g e
Property of ACAMS 2018-2019. Not for distribution. This program is subject to change.
Bags and Lanyards courtesy of Globalvision Systems
7:30 AM – 10:30 AM Exhibit Hall Open 7:30 AM – 8:30 AM
Networking Breakfast in Exhibit Hall
GENERAL SESSIONS
8:30 AM – 8:35 AM
Opening Remarks
8:35 AM – 9:20 AM
Keynote and Q&A
9:20 AM – 10:20 AM
Panel Discussion
What Do We Mean When We Say Regtech?
Defining Regtech and its components such as robotic process
automation to illuminate potential roles for satisfying regulatory
expectations and requirements
Harnessing Regtech processes such as machine learning to enhance
monitoring in areas such as regulatory changes and ensure robust adjustment of risk models and profiles
Reviewing trends in utilizing Regtech to strengthen oversight of
growing AML needs in areas such as Fintech, cryptocurrencies and beneficial ownership determination
10:20 AM – 10:50 AM
Networking and Refreshment Break in Exhibit Hall
10:50 AM – 12:00 PM
Panel Discussion
Corruption Case Study: The United States v. Paul J. Manafort Jr.
Tracing the movement of $60 million of secret Ukrainian payments to highlight the use of foreign corporations, partnerships and bank
accounts in money laundering conspiracies
Reviewing Manafort’s complex use of foreign nominee companies and offshore accounts to conceal millions of dollars from U.S. authorities
Analyzing luxury goods purchases and sham “loans” for U.S. real estate
by foreign accounts to reveal how cash was moved into the financial
system in a tax evasion scheme
12:00 PM – 12:05 PM
Closing Remarks