How to discover ways to sustainable anti-money laundering operations*
|
|
- Agatha Lamb
- 6 years ago
- Views:
Transcription
1 Banking and Capital Markets How to discover ways to sustainable anti-money laundering operations* *connectedthinking
2
3 Table of contents Situation 5 Perspective 6 Common components of a successful integrated AML operating model 9 Implications 11 PricewaterhouseCoopers 3
4
5 Situation In response to rapid advances in technology and more robust regulatory oversight, banks have evolved to match the risks and needs of the institution with the laws that govern them and the customers that they serve. However, in today s world, keeping up has become increasingly difficult. Banks face a dilemma with their customers whose growing appetites for privacy and protection are equaled by their pressing need for a global, efficient means of moving money. This poses a distinct challenge because customers needs are somewhat contradictory: Privacy and protection often require more controls while efficient global access requires less. In addition, government policies present a challenge to banks. To facilitate global trade and build national wealth, governments encourage the development of means and mechanisms for rapid funds movement. Citizens also encourage their governments to safeguard their privacy. At the same time, citizens mandate that their financial supervisory agents reduce the likelihood that terrorists, drug cartels and organized criminals will find anonymity in privacy and ease in their global funds transfers. To meet the challenges posed by the customer s contradictory objectives and the new regulations posed by governments, banks have had to modify many of their internal operating procedures. However, banks often struggle to adapt their technology systems and internal processes some of which evolved over decades to these new procedures. In the case of recent anti-money laundering (AML) compliance, this has forced many institutions to implement quick fixes. Some of these short-term, quick-fix solutions include: Decentralized and un-integrated customer due diligence and AML surveillance functions Use of manual muscle approaches Use of inadequately configured technology systems Hiring third parties to own core processes These quick fixes were not intended to be long-term solutions, yet we still see them in existence at many banks years after their implementation. They may continue to function, but their sustainability develops into an issue when operating costs become disproportionately high compared to the risk they were intended to mitigate. The good news is that long-term, cost-effective, sustainable solutions are within reach. PricewaterhouseCoopers 5
6 Perspective Based on our collective experience, in order to maintain acceptable levels of risk, provide long-term, sustainable solutions and reduce costs, an institution must take a multifaceted approach to AML operations by leveraging enterprise efficiencies. To achieve these efficiencies, a financial institution needs to identify areas for integration within and across countries, units, and functions while also preserving those differences that are warranted. This requires the focus on what has to be done rather than who reports on it or where it occurs. The first step in the assessment and redesign effort is to establish a set of core principles that is common across the organizational structure. The principles that organizations use successfully that can serve as examples for other financial institutions include: Reporting Issues management Testing Monitoring Risk/control identification and assessment Communication, training, and development of compliance personnel Policies and procedures Structure, roles and responsibility Risk appetite and tolerance Objective setting Once the core set of principles has been established, a financial institution can assess the methods used to execute those principles and find the points for regional and global integration. To systematically tackle this major undertaking, a financial institution needs to evaluate the way people, processes, technology and information the four operating levers are applied to each principle. In the case of AML, these levers may include: People (compliance officers, risk managers, IT system analysts, account officers, relationship managers, investigators, data analysts, operation managers) 6 PricewaterhouseCoopers
7 Processes (new client take on, periodic review, event-driven review, client exit, existing client remediation, transaction monitoring, case management, regulatory reporting, client screening, transaction screening, document lifecycle management, data and process governance, quality assurance, management information, client ownership) Technology (rules, scoring, workflow, matching, MIS reporting, regulatory reporting, expert/knowledge-based system, list management, anomaly detection, peer grouping and profiling) Information (customer, product, account, transactions, electronic funds transfers/wires, hidden relationships, customer risk ratings, case information, CIP and approvals documentation) By evaluating and applying the principles to levers, a bank can identify gaps, target opportunities for integration and redesign its AML operating model. The redesigned model should integrate using options that range from combination and shared services platforms to co-sourced and outsourced activities. The table on page 8 represents a sample financial institution and a current state of some of its AML processes. These processes, such as client due diligence, client screening, or transaction monitoring, tend to be business unit centric and often times decentralized. This often leads to inconsistencies in processes and information gathering as well as inefficiencies in use of technologies and human capital. Depending on an organization, any lever described above provides an opportunity for integration. A thoughtful planning process is a prerequisite to designing a future state that will meet compliance objectives but will also be cost effective and well integrated with the other processes within the financial institution. What s left after the quick fixes? Highly manual and unrepeatable AML customer risk assessment processes Compliance departments struggle to meet non-aml compliance demands Different processes and technologies used for collecting, reporting storing due diligence information within and across lines of business Inconsistencies in customer risk scoring and due diligence procedures for the same customer or similar customer types across lines of business and globally Lack of meaningful money-laundering risk reports Large number of false positives in transaction surveillance systems Case management processes that are supported by inaccurate financial intelligence Inability to see into static and transaction activities of customers their related accounts within and across lines of business and globally Case consolidation by customer or other common case characteristics performed through ad-hoc workarounds Lack of consistency and reconciliation between the risk model used account monitoring and the model used for customer risk assessments Inability to report on key performance indicators Lack of coordination among other key areas such as credit risk management, suitability for broker-dealer accounts and fraud detection units Little integration of AML compliance with other bank initiatives PricewaterhouseCoopers 7
8 Table 1: Simple example of the application of AML levers to customer risk/control identification and assessment principle Levers Sample current status Integration opportunities Sample future state Retail Wealth management Wholesale Retail Wealth management Wholesale Process Account opening Customer due diligence Customer due diligence Related to account opening, but risk aligned with customer due diligence Customer due diligence People Bank officer Relationship banker Relationship manager No change: Ownership should remain with front-office Bank officer Relationship banker Relationship manager Technology Online application Paper based Smart Word document Standardize on new technology platform Integrated web-based KYC technology Information CIP form Wealth management version of KYC Risk Form Wholesale version of KYC risk form Standardize risk assessment form with extensions for customer and product differentiators KYC form based on common client risk rating methodology Process Client screening No change needed Client screening People Operations account manager Relationship banker Compliance officer Skill-set and technology are better aligned with operations Centralized middle-office operations Technology Automated using OFAC agent Manual using FINRA OFAC tool Manual using World Check Manual approaches can be replaced with automation Automated using OFAC agent Information Customer Relationship Legal entity No change: Customer types warrant differences Customer Relationship Legal entity Process Transaction monitoring No change needed Transaction monitoring People Investigator Relationship manager Investigator Leverage investigation skill-set Centralized financial intelligence unit Technology ERASE Manual report review ERASE Automate manual review with pre-existing technology Automated using ERASE Information Account, transaction, wire Relationship, account transaction, wire Account, transaction, wire Link accounts to create single customer view Relationship, customer, accounts, transactions, wires 8 PricewaterhouseCoopers
9 Common components of a successful integrated AML operating model A redesigned AML operating model will differ from organization to organization based on the specific risks, needs and geographic makeup of the organization. However, we have seen some components that are consistently adopted within the industry, and those components have been highly effective. The first component calls for the COO and the CIO to increase their roles in the AML compliance function because many of the areas of improvement are within their domains. The second calls for the need to tailor AML policies and procedures to be globally consistent yet able to be effectively implemented locally. The third component calls for integration across operational areas, specifically to the middle and back offices in a shared-services structure, to create centralized hubs that manage many surveillance and due diligence activities. The final component assigns specific, discrete AML responsibilities to core functions within the enterprise that allow per-unit costs to be measured and monitored. These responsibilities include: Front office: The front office retains ownership of the customer and continues to on-board customers, as well as conduct initial risk assessments, eventdriven reviews and periodic customer reviews, and collect relevant customer due diligence and enhanced due diligence information. These functions are well aligned with front-office expertise, which is focused on customers and products. Integration challenges Multiple entry points for customer information (e.g. multiple business lines, internet vs. branch network, third party agents/brokers, etc.) Customer relationship ownership when the customer has accounts that exist across lines of business, etc. Organizational and global complexity Certain AML compliance practices vary by line of business, regions, and geographies Cross-border data sharing due to local data security laws Operating and integrating with local privacy laws, including bank secrecy jurisdictions Resource and skill set availability at the corporate, region, and local levels Middle office: A gatekeeping function sits centralized in the middle office to help drive efficiency and consistency of policy application. The middle office enforces the institution s Know Your Customer (KYC) strategy, which includes customer acceptance policies; quality assurance of static customer information; integration of comprehensive customer risk assessments across lines of business, products and services; and monitoring of front-office customer review compliance. Back office: The back office houses both the AML transaction surveillance and case management functions, which together make up the financial intelligence unit (FIU). The FIU provides one dynamic picture of customer PricewaterhouseCoopers 9
10 activities, enabling the institution to monitor and investigate unusual activity at the customer level and gain insight into the overall activity and behavior of the customer across all business lines and products. The FIU and the KYC strategies operate in tandem to provide a holistic view of the customer s AML risk. AML compliance: AML compliance sets and modifies compliance guidelines and polices based on international, domestic, industry, third-party and internal requirements. The AML compliance team is responsible for resolving AML issues escalated from the middle office customer due diligence function and/ or the FIU as well as making regulatory reporting filing decisions. IT: IT owns and operates relevant compliance technologies and helps drive efficiency by identifying, categorizing, evaluating and consolidating redundant systems. IT staff members participate in the process of deciding when new systems should be implemented or when existing systems should be leveraged. 10 PricewaterhouseCoopers
11 Implications To achieve sustainable AML operations, we recommend the following fivestep approach: 1. Shift AML oversight responsibility to a senior risk management task force that includes both local and global compliance, risk management, operations and IT representatives. Include feedback channel for line of business inputs. 2. Perform an initial health check, or diagnostic review of AML operations, to provide a snapshot view of current operations and to identify key risks, costs and improvement opportunities. Based on the results of the health check, develop a cost-and-efficiency business case. 3. Using the health check as a guide and leveraging existing analysis and documentation, assess the current state of the AML compliance function across principles and levers. Perform the following actions: Identify applicable AML global policies, key regulatory requirements, commitments made to regulatory examiners and internal auditors related to customer due diligence and customer risk assessment for widely varying customer types from individuals to multinationals. Analyze the quality and quantity of people and processes in corporate and in each line of business, including current account opening processes and activities, transaction surveillance and case management activities (acceptance and information collection methodologies, tools and techniques, roles and responsibilities, risk tolerance, issues tracking, reporting, etc.). Take inventory of current AML compliance technology. Organize requirements by type of customer, product, industry of business or wealth of customer, rather than by business unit. Review, assess and prioritize key commonality and differentiator requirements between the various AML functions. Evaluate and define integration opportunities. PricewaterhouseCoopers 11
12 4. Develop an AML compliance global strategy, future-state vision and implementation plan to meet the institution s global standards and risk tolerance, local regulatory requirements and industry standards. This strategy must take into consideration all lines of business, products and services, as well as the institution s customer base, and include the following activities: Define the desired operating model using key differentiators and integration mechanisms (e.g., creating hubs uniting critical enterprise capabilities across multiple geographies, taking into account local data privacy laws and cost structures) and other common AML integration components as a foundation. Evaluate technology options focusing on systems that can adapt to the unique needs of each line of business as well as to new and changing local regulatory requirements. Define pre- and post-implementation quality assurance standards. Design new or leverage existing governance processes for the acquisition of new AML compliance technologies. Develop a communication and training plan within consolidated functions and across business units. Identify key activities/controls and establish metrics for continuous monitoring and improvement (e.g., account rejection that is proportional to the risk tolerance of the institution). Determine change management requirements such as staffing and training needs to support the new organization. 5. Integrate redesigned operating functions incrementally through a fourphased approach, beginning with the phase appropriate to the current state of the bank s systems and processes. Phase One: Enhance Roll out centralized KYC people and process functions to the middle office using manual processes to address immediate issues without major technology enhancements. Conduct an AML risk reassessment on existing customers. 12 PricewaterhouseCoopers
13 Phase Two: Expand Pilot the future-state model. Roll out centralized KYC technology and information to a select number of lines of business. This technology should be an improvement to manual compliance processes that already exist in the front office. Phase Three: Standardize Roll out centralized KYC technology and information across all lines of business and geographies using a risk-based approach to focus efforts on key areas first. Deploy consolidated FIU capability leveraging the single view of the customer created by the middleoffice gatekeeping function. Integrate within and across lines of business. Phase Four: Maximize Integrate centralized people, process, information and technology functions with other institution-wide initiatives, e.g., KYC with the customer relationship management initiative or the FIU with the anti-fraud and financial crime function. Integrated global Global AML Program program (Policies & Procedures) & procedures) Lines of business Insurance Wholesale Retail Banking banking Online Banking banking Event-Driven Review (EDR) New Client Take On On Client Exit exit (NCTO) Periodic Review (PR) Existing Client client remediation Remediation Transaction Monitoring monitoring Client Screening screening Document Life life Cycle cycle Management management Data and Process process Governance governance Quality Assurance assurance Management Information information Client Ownership ownership Centralized Supporting supporting Organization organization AML KYC CLIENT LIFECYCLE Integrated Global KYC Technology Europe North America South America Asia/Pacific Business regions PricewaterhouseCoopers 13
14 Every organization is at a different level of operational sustainability. PwC can help determine your organization s current state by performing our AML health check. We can quickly and cost-effectively provide basic quantitative reports that provide a high-level traffic-light representation of AML operations against industry practices, your organization s risk tolerance and optimal state.
15 A look forward Cost and risk are obvious key measures in the determination of the effectiveness of the AML operating model. However, there are less obvious measures of success as well. Consider the benefits to the compliance function. As banks become more diverse and global, this model can adapt. It is not fixed. This gives compliance the ability to react quickly to changes in laws and regulations. And since compliance can more easily assess risk before products go live, Product Management benefits because those products can be brought to market more quickly and can give a distinct competitive advantage to the organization. Positive effects of truly knowing your customer Sales: Improved cross-selling Marketing: Improved product targeting Customer service: Improved retention rate Finance: Increased profit potential Operations: Better channel alignment The impact to the sales force is also significant. Rather than having to go to multiple sources, account officers and/or relationship managers can share one view of customers. This facilitates a cross-line of service and cross-border view of client relationships and improves the ability to service those customers. The customer experience improves as well. The KYC model creates consistency for customers regardless of where they are opening the account whether local or international. Instead, the distinguishing factors of the model are based on customer type, product, geography and anticipated activity. For example, a student domiciled in a high risk jurisdiction opening and depositing $500,000 in cash into a U.S. checking account is handled differently by the model compared with a long standing customer domiciled in a low risk jurisdiction opening a $10,000 time deposit in a Canadian account. All of these corollary benefits contribute to the overall business. Measuring, understanding and managing customer performance are key factors to business success. The integrated AML operating model sets the stage not only to reduce risk and costs, but also to attain business value from the AML function by recognizing and understanding the true costs and benefits of customer relationships. The result is to Truly Know Your Customer (TKYC). With an increasingly complex and fast-paced business environment, Institutions must act now to build a sustainable AML operation that enable them to properly balance cost with risk. This can be accomplished by leveraging enterprise efficiencies. The principles-based framework, the common AML integration components and the five implementation steps provide the means to achieve this goal incrementally and allows companies to move toward integration at a speed that matches their unique needs, risks and geographies. PricewaterhouseCoopers 15
16 Contacts We encourage you to contact any of our subject matter professionals for more information on sustainable anti-money laundering operations. John Campbell Principal, AML Practice Leader (646) Damian Kalinowski (314) Jeff Lavine (703) Monique Maranto (410) Bruce Roland (410) Cathy Stahlmann (305) Deven Swim (617) Sean Wilhelm (312) Thomas Messina (646) pwc.com 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers LLP (a Delaware limited liability partnership) or, as the context requires, the PricewaterhouseCoopers global network or other member firms of the network, each of which is a separate and independent legal entity. *connectedthinking is trademark of PricewaterhouseCoopers LLP (US). MC-NY A. TP.
Thomson Reuters SCREENING RESOLUTION SERVICE
Thomson Reuters SCREENING RESOLUTION SERVICE Benefits Reduce the compliance burden and maximize existing staff resources Demonstrate a complete audit trail to regulators Improve regulatory compliance Adopt
More informationIBM AML compliance solution
IBM AML compliance solution Staying ahead of financial crimes Highlights Continuously harnesses a powerful array of advanced analytics that are available to proactively fight the long-term war against
More informationCustomer Due Diligence A Risk Based Approach. Dr Tony Wicks Director of AML Solutions NICE Actimize
Customer Due Diligence A Risk Based Approach Dr Tony Wicks Director of AML Solutions NICE Actimize tony.wicks@actimize.com PLEASE NOTE that, to the extent that Actimize provides, in this presentation or
More informationCrowe Activity Review System
Crowe Activity Review System Quality at the Source Audit Tax Advisory Risk Performance With ever-increasing expectations of review processes from various stakeholders, organizations are under pressure
More informationMadison Consulting Group. An Introduction to Our Compliance and Regulatory Consulting Services
An Introduction to Our Compliance and Regulatory Consulting Services January 2017 Who We Are Experience Financial Services Specialists Services Compliance and Regulatory Consulting Business and Operations
More informationAML Transaction Monitoring
AML Transaction Monitoring A Survey of UK Financial Institutions September 2014 Contents Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Section 7 Section 8 Executive summary General findings
More informationCrowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance
Crowe Caliber Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four Crowe Caliber: Using
More informationAnti Money Laundering Compliance Solutions. Copyright 2016 Allsec Technologies. All rights reserved.
Anti Money Laundering Compliance Solutions Copyright 2016 Allsec Technologies. All rights reserved. Contents Allsec Overview Information Security Credentials AML-as-a-Service Case Study 2016 Allsec Technologies.
More informationEffective Risk Management With AML Risk Assessment. January 25, 2017
Effective Risk Management With AML Risk Assessment January 25, 2017 2017 2017 Crowe Crowe Horwath Horwath LLP LLP Agenda Regulatory Trends in Risk Assessment Crowe Approach to Anti-Money Laundering (AML)
More informationKYC compliance strategies that your customers will love
KYC compliance strategies that your customers will love Introducing: Anthony Bracco PNC Bank Greg Carmean Experian Victorious warriors win first and then go to war, while defeated warriors go to war first
More informationFINRA 2090/2111 Solutions & Expertise
FINRA 2090/2111 Solutions & Expertise TABLE OF CONTENTS Overview... 3 Requirements for Institutions... 3 Recommended Approach... 4 Actimize Solutions for FINRA Know Your Customer & Suitability Requirements...
More informationAML for MSBs & FinTech: The Compliance Conundrum. Insight Article. Copyright 2016 NICE Actimize. All rights reserved.
AML for MSBs & FinTech: The Compliance Conundrum Insight Article Copyright 2016 NICE Actimize. All rights reserved. TABLE OF CONTENTS FinTech Innovation Collides with Reality... 3 Compliance Challenges
More informationActimize Essentials. Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance
Actimize Essentials Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance FIs of All Sizes Face Increasing Pressures From Financial Crime and Tightening Regulations As regulations
More informationMadison Consulting Group. An Introduction to AML Compliance Consulting Services
An Introduction to AML Compliance Consulting Services May 2009 Table of Contents Firm Overview AML Compliance Practice Contact Information 3 4 5 14 15 2 Who We Are Experience Financial Services Specialists
More informationAdvisory Services Governance, Risk & Compliance
Advisory Services Governance, Risk & Compliance Caribbean Association of Audit Committee Members Inc. 2010 Conference Caretakers of Integrity and Accountability: The Role of Internal Audit in Corporate
More informationRDC Risk Management in 2015
RDC Risk Management in 2015 John Leekley, Founder & CEO RemoteDepositCapture.com Be sure to tweet about the #RDCSummit and mention @RDCTweet Setting the Stage Discussion Objectives Definition of RDC Risk
More informationSOLUTION BRIEF RSA ARCHER AUDIT MANAGEMENT
RSA ARCHER AUDIT MANAGEMENT INTRODUCTION Internal audit departments are struggling to deliver strategic leadership, coordinated assurance and other services their stakeholders need, but this task isn t
More informationAuditing for Effective Training
Maleka Ali M. Ali 2013 Director of Consulting & Education Page 0 Banker s Toolbox Auditing for Effective Training I. INTRODUCTION Banking organizations must develop, implement, and maintain effective AML
More informationAgile Master Data Management
A better approach than trial and error by First San Francisco Partners 2 Common MDM initiative and benefit Customer Optimization Improve up-sell, cross-sell and customer retention Access full-customer
More informationActimize Essentials AML. Cloud Based Anti-Money Laundering Solutions
Actimize Essentials AML Cloud Based Anti-Money Laundering Solutions Essential Anti-Money Laundering Compliance Capabilities Growing Compliance Burdens for Financial Institutions of All Sizes As recent
More informationFinancial Services Compliance
Financial Services Compliance Amidst frequently changing regulations, heightened risk, and a growing volume of disparate data, compliance has become complex, inefficient, and costly. Mitigating new risk
More informationThird Party Risk Management ( TPRM ) Transformation
Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement
More informationCEB Financial Services Technology Summit 14
CEB TowerGroup TM Commercial Banking CEB Financial Services Technology Summit 14 The Realization of Service 22 24 April 2014 The Keys to Optimizing Customer Relationships Steven Murphy, Research Director,
More informationCommodity & Energy Risk Management. kpmg.com.sg
kpmg.com.sg Introduction Organisations exposed to energy, metal, and agricultural commodity raw materials are increasingly challenged by competitive economies, volatile markets, and onerous regulatory
More informationAt the Heart of Enterprise Agility
www.niit-tech.com At the Heart of Enterprise Agility Driving Business Value with End-to-End Enterprise Solutions A profound transformation is at hand, but how equipped are you to see the potential and
More informationIIROC 2015 Financial Administrators Section Conference
IIROC 2015 Financial Administrators Section Conference September 11, 2015 kpmg.ca Presenters Chris Cornell KPMG Partner, Financial Services Steven Sharma KPMG Partner, Financial Services 2 Agenda Current
More informationModernizing Anti-Money Laundering Practices
Conclusions Paper Modernizing Anti-Money Laundering Practices How Financial Institutions Can Use Predictive Analytics to Pinpoint Suspicious Activity Insights from a presentation at the ACAMS AML & Financial
More informationRisk Based Approach and Enterprise Wide Risk Assessment Edwin Somers / Inneke Geyskens-Borgions 26 September 2017
Risk Based Approach and Enterprise Wide Risk Assessment Edwin Somers / Inneke Geyskens-Borgions 26 September 2017 Contents I. Risk Based Approach 3 II. Enterprise Wide Risk Assessment 11 II.1. Introduction
More informationWhat s the cost of control? Keeping control of your business when cash is king
Get up to speed Building Better Finance Functions What s the cost of control? Keeping control of your business when cash is king whatwouldyouliketochange.com 2 PricewaterhouseCoopers LLP Contents Managing
More informationIntegrated BPO Services for BFSI Industry
Integrated BPO Services for BFSI Industry Common service offerings across BFSI Segment Global BFSI institutions have become extremely interconnected and interdependent- conditions which are driving these
More informationFinancial Crime Mitigation
Financial Crime Mitigation A uniquely flexible range of intelligent, versatile solutions for financial institutions, large and small, to combat financial crime. Introduction Our Financial Crime Mitigation
More informationEnterprise-wide Risk Case
Enterprise-wide Risk Case December 4, 2013 Management Categorizing Costs and Savings for Clearer Return on Investment (ROI) Executive Summary Greater losses from financial crime incidents, pressure to
More informationOptimizing an Enterprise Wide Effective Vendor Risk Management Program. Pam Schott Head and VP Enterprise Supplier Governance
Optimizing an Enterprise Wide Effective Vendor Risk Program Pam Schott Head and VP Enterprise Supplier Governance June 1, 2015 Emerging Industry Trends As Procurement organizations mature; their focus
More informationRiskTech Quadrant 2016
Independent research by RiskTech Quadrant 2016 Watchlist monitoring solutions May 2016 About Chartis Chartis is the leading provider of research and analysis on the global market for risk technology. It
More informationEnergy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges
Energy Trading Risk Management (ETRM) System Selection and Implementation Top Challenges May 27, 2014 Energy Trading Risk Management Challenges Agenda Agenda Speaker Introduction Overview of Energy Trading
More informationCommodity & Energy Risk Management
Commodity Introduction Organisations exposed to energy, metal, and agricultural commodity raw materials are increasingly challenged by competitive economies, volatile markets, and onerous regulatory and
More informationExtended Enterprise Risk Management
Extended Enterprise Risk Management Driving performance through the extended enterprise October 2015 A network within a network The Extended Enterprise is the concept that an organization does not operate
More informationKPMG Smart Controls. Putting you in control of your controls. kpmg.co.uk
KPMG Smart Controls Putting you in control of your controls kpmg.co.uk KPMG Smart Controls Putting you in control of your controls Our solution for Control Testing, Assurance and Clouded by controls Many
More informationAUTOMATION TECHNOLOGY SERIES: PART 2 INTEL LIGENT AUTO MATION DRIVING EFFICIENCY AND GROWTH IN INSURANCE
AUTOMATION TECHNOLOGY SERIES: PART 2 INTEL LIGENT AUTO MATION DRIVING EFFICIENCY AND GROWTH IN INSURANCE 1 SERIES INTRO DUCTION Advances in digital technologies, data & analytics capabilities, and agile
More informationResponse to the Basel Committees Sound Practices: Implication of fintech
Response to the Basel Committees Sound Practices: Implication of fintech developments for banks and bank supervisors We hereby submit our response to your Sound Practices: Implication of fintech developments
More informationThe web seminar has not yet started: A sound check will be performed 5 minutes before the start time.
The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. COPYRIGHT NOTICE USE OF WEBEX LOGIN/PASSWORD FOR ACAMS WEB SEMINARS Each site license entitles registrant
More informationArjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank
Arjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank Discuss the following Regarding Anti-Money Laundering (AML) Systems AML System Implementations
More informationBSA/AML Self-Assessment Tool. Overview and Instructions
BSA/AML Self-Assessment Tool Overview and Instructions February 2018 1129 20 th Street, N.W. Ninth Floor Washington, DC 20036 www.csbs.org 202-296-2840 FAX 202-296-1928 2 Introduction and Overview The
More informationArticle from: CompAct. April 2013 Issue No. 47
Article from: CompAct April 2013 Issue No. 47 Overview of Programmatic Framework and Key Considerations Key elements Description Items to consider Definition and identification of EUCs The statement that
More informationQUICK FACTS. Delivering a Managed Services Solution to Satisfy Exponential Business Growth TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES
[ Financial Services, Application Management Outsourcing ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Financial Services Revenue: Approximately $30 billion annually (parent
More informationInternal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation
2015 State of the Internal Audit Profession Study Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 68% of companies have gone through or
More informationRECEIVABLES360 INTEGRATED RECEIVABLES FOR CORPORATIONS
INTEGRATED RECEIVABLES FOR CORPORATIONS ACCELERATE WORKING CAPITAL AND BETTER MANAGE LIQUIDITY WITH STRAIGHT-THROUGH PROCESSING ACROSS ALL PAYMENT CHANNELS. PAYMENT AGGREGATION EPBB Internet Cash PAYMENT
More informationData Governance. Data Discovery.
Data Governance. Data Discovery. We work across teams to help organizations solve legal and regulatory challenges, starting at the source. Forensic Investigations FOR LEGAL TEAMS E-discovery Trial & deposition
More informationSolution Overview : The IBM Government Industry Framework
Meng Tay Software Consultant IBM Vietnam Solution Overview : The IBM Government Industry Framework 2010 IBM Corporation Challenges governments face in this economic environment Reduce costs Virtualization
More informationACAMS Update. John J. Byrne, Esq., CAMS Executive Vice President February 5, 2016
ACAMS Update John J. Byrne, Esq., CAMS Executive Vice President February 5, 2016 1 1 ACAMS Membership 2 ACAMS Certified Members 3 Chapter Membership *Chapters over 50 members 4 Advanced Certification Certifying
More informationLeveraging IT risk management to boost competitive advantage
Pharmaceuticals and Life Sciences Leveraging IT risk management to boost competitive advantage Achieving integrated information technology, governance, risk, and compliance Table of contents The heart
More informationRiskTech Quadrant 2017 Watchlist Monitoring Solutions
Independent research by RiskTech Quadrant 2017 Watchlist Monitoring Solutions August 2017 About Chartis Chartis Research is the leading provider of research and analysis on the global market for risk technology.
More informationEnterprise risk management Protecting and enhancing value Advisory
Enterprise risk management Protecting and enhancing value Advisory October 2016 kpmg.co.za 2016 KPMG Services (Pty) Ltd, a South African company and a member firm of the KPMG network of independent member
More informationHow ITIL Can Revolutionize Your Service Center
How ITIL Can Revolutionize Your Service Center Helping IT departments adapt to the growing demand for their services in strategic corporate initiatives A White paper from By John Todaro iet Product Marketing
More informationEmbracing SaaS: A Blueprint for IT Success
Embracing SaaS: A Blueprint for IT Success 2 Embracing SaaS: A Blueprint for IT Success Introduction THIS EBOOK OUTLINES COMPELLING APPROACHES for CIOs to establish and lead a defined software-as-a-service
More informationTactical Implementation of Enterprise Risk Management
Tactical Implementation of Enterprise Risk Management Presented by: Glen Cooper Copyright Tactical Implementation of ERM CONGRATULATIONS YOU HAVE SUCCESSFULLY MADE YOUR BUSINESS CASE AND ACHIEVED MANAGEMENT
More informationProduct Frontier Reconciliation
Product Frontier Reconciliation Mitigate Risk, Improve Operational Efficiency and Enable Regulatory Compliance Product Frontier Reconciliation from Fiserv takes an enterprise approach to reconciliation
More informationThe Case for the SIO. A guide to navigate the new challenges of Service Management. kpmg.ca
The Case for the SIO A guide to navigate the new challenges of Service Management kpmg.ca Contents 1 Introduction to the Services Integration Office (SIO) 2 2 The SIO broken down 4 3 Final thoughts 9
More informationfs viewpoint
fs viewpoint www.pwc.com/fsi 02 10 13 21 23 Point of view Competitive intelligence A framework for response How PwC can help Appendix Let s make a difference: Managing compliance and operational risk in
More informationRobotic Process Automation in Insurance. An ACORD/Capgemini Perspective
Robotic Process Automation in Insurance An ACORD/Capgemini Perspective A New Era in Insurance Insurers have been accustomed to the current market realities of relatively low premium growth, rising loss
More informationGUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))
GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2)) Operational Risk Management MARCH 2017 STATUS OF GUIDANCE The Isle of Man Financial Services Authority ( the Authority ) issues guidance for
More informationPlanning and design for smarter cities
IBM Software Government Planning and design for smarter cities 2 Planning and design for smarter cities Infusing intelligence into the way cities work The interconnected nature of people, resources and
More informationGuideline. Operational Risk Management. Category: Sound Business and Financial Practices. No: E-21 Date: June 2016
Guideline Subject: Category: Sound Business and Financial Practices No: E-21 Date: June 2016 1. Purpose and Scope of the Guideline This Guideline sets out OSFI s expectations for the management of operational
More informationThe Value- Driven CFO. kpmg.com
The Value- Driven CFO kpmg.com 2 Leading the Way in a Data-Driven Enterprise Several years of global uncertainty have made even the toughest executives flinch, and that s certainly true for chief financial
More informationTrust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce
Trust Your Suppliers, Manage Your Risk The Importance of Third-Party Supplier Visibility About Perfect Commerce Since 1994, Perfect Commerce has been automating spend management initiatives offering world-class
More informationThe compliance investment
The compliance investment Realising the value of compliance through greater effectiveness, efficiency, and sustainability kpmg.com.au 2017 KPMG, an Australian partnership and a member firm of the KPMG
More informationBusiness Process Services: A Value-Based Approach to Process Improvement and Delivery
WHITE PAPER Business Process Services: A Value-Based Approach to Process Improvement and Delivery In this white paper, we examine how your business can be improved through business process services. Business
More informationA Strategic Approach to Bank Fraud
Fraud Case Study A Strategic Approach to Bank Fraud How Banks Can Move From Reactive to Proactive Fraud Prevention and Detection Fraud prevention and detection remains one of the biggest and most pressing
More informationFinancial Services. Testing anxiety Bank Secrecy Act/Anti-money laundering independent testing survey
Financial Services Testing anxiety Bank Secrecy Act/Anti-money laundering independent testing survey Contents Executive summary 1 Introduction 2 Organizational structure and resources 3 Use of third-party
More informationThe Future of Internal Auditing:
Internal Audit The Future of Internal Auditing: Changing Internal Audit s Value Proposition October 12, 2010 Istanbul, Turkey Presented by: Naman Parekh Partner, Agenda Background of the 2012 Study Key
More informationSarbanes-Oxley Act of 2002 Can private businesses benefit from it?
Sarbanes-Oxley Act of 2002 Can private businesses benefit from it? As used in this document, Deloitte means Deloitte Tax LLP, which provides tax services; Deloitte & Touche LLP, which provides assurance
More informationPartnering for Business Value
Partnering for Business Value Explore how Capgemini and Pegasystems have helped our clients transform customer relationships, reach new levels of agility, dramatically improve productivity, and generate
More informationCustomized Client Onboarding for Clearing Firms with OpenAdvantage From Doxim
Solution Summary Customized Client Onboarding for Clearing Firms with OpenAdvantage From Doxim Clearing firms are continually trying to develop strategic services to help their correspondents grow their
More informationAgenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)
The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview
More informationPOSSE System Review. January 30, Office of the City Auditor 1200, Scotia Place, Tower Jasper Avenue Edmonton, Alberta T5J 3R8
1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor POSSE System Review January 30, 2017 The conducted this project in accordance with the International Standards
More informationPROTEGENT PTA Automated compliance for personal trading regulations
PROTEGENT PTA Automated compliance for personal trading regulations WHAT IS PROTEGENT PTA? SunGard s Protegent PTA is a browser-based application that automates compliance with personal trading regulations
More informationIBM Cognos Controller
IBM Cognos Controller Full financial close management in a solution managed by the office of finance Highlights Addresses your extended financial close process close, consolidate, report and file Delivers
More informationCatching Fraud During a Recession Through Superior Internal Controls. FICPA s 25 th Annual Accounting Show. J. Stephen Nouss September 29, 2010
Catching Fraud During a Recession Through Superior Internal Controls FICPA s 25 th Annual Accounting Show J. Stephen Nouss September 29, 2010 1 Session Objectives Fraud Facts (2008 Association of Certified
More informationWhy CIP? AIIM International's Certified Information Professional designation was designed to allow information professionals to:
Why CIP? Over the past decade, there has been a perfect storm of change driven by consumerization, cloud, mobile, and the Internet of Things. It has changed how we think about enterprise information and
More informationTrusted by more than 150 CSPs worldwide.
RAID is a platform designed for Communication Service Providers that want to leverage their data assets to improve business processes and gain business insights, while at the same time simplify their IT
More informationISACA. The recognized global leader in IT governance, control, security and assurance
ISACA The recognized global leader in IT governance, control, security and assurance High-level session overview 1. CRISC background information 2. Part I The Big Picture CRISC Background information About
More informationCompliance Program Effectiveness Guide
Compliance Program Effectiveness Guide June 2017 This Guide is a comparison of: Compliance Program Elements New York State, Social Services Law 363-D Office of Inspector General (OIG) Compliance Program
More informationDE-RISK YOUR INVESTMENT IN AN INFORMATION MANAGEMENT STRATEGY.
DE-RISK YOUR INVESTMENT IN AN INFORMATION MANAGEMENT STRATEGY. DE-RISK YOUR INVESTMENT IN AN INFORMATION MANAGEMENT STRATEGY. The success in understanding the value of information to your organisation
More informationA trade name of Wells Fargo Clearing Services EMPOWERING SOLUTIONS FOR YOUR BUSINESS
A trade name of Wells Fargo Clearing Services EMPOWERING SOLUTIONS FOR YOUR BUSINESS Deep knowledge of you and your firm plus the power of collaboration brings success. know you & your firm + COLLABORATE
More informationIT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
More informationGuidance Note: Corporate Governance - Audit Committee. March Ce document est aussi disponible en français.
Guidance Note: Corporate Governance - Audit Committee March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance Audit Committee (the Guidance Note )
More informationSolution Sheet. Profitable Small Business Lending
Solution Sheet Profitable Small Business Lending Improve Profitability by Making Your Small Business Lending Scalable & Efficient Overview Small Business Lending is a complex process. The risk associated
More informationFINANCIAL MARKETS. Loan Solutions. IHS Markit s comprehensive solutions in syndicated and leveraged loans
FINANCIAL MARKETS Loan Solutions IHS Markit s comprehensive solutions in syndicated and leveraged loans IHS Markit is the provider of choice to the loan market. With our long experience in the asset class
More informationTransforming the HR function for high performance. kpmg.com
Transforming the HR function for high performance kpmg.com Contents 01 Driving the people agenda 5 02 Measuring value 8 03 Succeeding in a changing world 10 04 Taking HR to the next level 12 05 Getting
More informationadp.ca Outsourcing: Today s Approach to Doing More with Less Your guide to getting the most from your HR outsourcing experience
adp.ca Outsourcing: Today s Approach to Doing More with Less Your guide to getting the most from your HR outsourcing experience Executive Summary Table of Contents Executive Summary... 2 Recommendations
More informationinvest in leveraging mobility, not in managing it Solution Brief Mobility Lifecycle Management
MOTOROLA MOBILITY LIFECYCLE MANAGEMENT invest in leveraging mobility, not in managing it If you have any doubt about the impact of mobility on your future, consider this: In a recent Broadsoft survey of
More informationThe Challenge of AML Models Validation
The Challenge of AML Models Validation September 2015 Reema Al-Rabea P a g e 1 Executive Summary Anti-money laundering (AML) violations and enforcement actions have hit the headlines so often these past
More informationCMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide
processlabs CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide CMMI-DEV V1.3 Process Areas Alphabetically by Process Area Acronym processlabs CAR - Causal Analysis and Resolution...
More informationThomson Reuters Client On-boarding. An end-to-end client lifecycle management solution.
Thomson Reuters Client On-boarding An end-to-end client lifecycle management solution. Thomson Reuters Client On-boarding An end-to-end client lifecycle management solution 3 Thomson Reuters Client On-boarding
More informationCOMPLIANCE PROTEGENT MARKET ABUSE
Protegent Market Abuse 1 COMPLIANCE PROTEGENT MARKET ABUSE Protegent Market Abuse 2 PROTEGENT MARKET ABUSE A COMPREHENSIVE SET OF TOOLS TO ADDRESS MARKET MANIPULATION AND INSIDER TRADING CONCERNS 1 Protegent
More informationWHITE PAPER. Guiding principles and dimensions of testing transformation
Guiding principles and dimensions of testing transformation Defining testing transformation Simply put, testing transformation is the process of defining a set of processes and methodologies to accomplish
More informationA guide to assessing your risk data aggregation strategies. How effectively are you complying with BCBS 239?
A guide to assessing your risk data aggregation strategies How effectively are you complying with BCBS 239? This page was left blank intetionally. BCBS 239: A guide to assessing your risk data aggregation
More informationAnti-Money Laundering Solution Deep Dive WHITE PAPER
Anti-Money Laundering Solution Deep Dive An AI-Driven Approach to AML Anti-Money Laundering (AML) is a particularly challenging area of regulation for banks even more so for large, geographically diverse
More informationComprehensive Enterprise Solution for Compliance and Risk Monitoring
Comprehensive Enterprise Solution for Compliance and Risk Monitoring 30 Wall Street, 8th Floor New York, NY 10005 E inquiries@surveil-lens.com T (212) 804-5734 F (212) 943-2300 UNIQUE FEATURES OF SURVEILLENS
More informationImproved Risk Management via Data Quality Improvement
Improved Risk Management via Data Quality Improvement Prepared by: David Loshin Knowledge Integrity, Inc. January, 2011 Sponsored by: 2011 Knowledge Integrity, Inc. 1 Introduction All too frequently, we
More information