BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//TCA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.tcaregs.com
X-WR-CALDESC:Events for TCA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221109T130000
DTEND;TZID=America/New_York:20221109T153000
DTSTAMP:20260408T073701
CREATED:20221017T145953Z
LAST-MODIFIED:20221017T145953Z
UID:1657-1667998800-1668007800@www.tcaregs.com
SUMMARY:Anti-Money Laundering Model Risk Management
DESCRIPTION:The 2020 AML Act encourages financial institutions to explore innovative solutions for suspicious activity monitoring. Many institutions either are already or are considering automated solutions to aid in this process. However\, in spite of what a salesperson may tell you\, these systems are not “plug and play.” Guidance from regulators make it clear that financial institutions are expected to evaluate monitoring parameters\, risk rating methodologies\, and OFAC filtering models to ensure that they are calibrated based on your unique risk profile. Recently\, a community bank was fined $8 million for missing suspicious activity in part due to misuse of its automated system. In this session we will cover the requirements of developing and maintaining a suspicious activity monitoring model. \nAs financial crimes grow in complexity\, the systems needed to monitor\, identify\, and report suspicious activity must keep pace. The key to a compliance BSA Program is developing adequate policies\, procedures\, and processes for model risk management\, periodic testing of the system to ensure that data feeds are working\, and evaluation of the model’s performance to ensure outcomes are generated as expected. \nWhen considering which vendor to utilize\, financial institutions should carefully evaluate the system’s capabilities and compare those to the institution’s needs. System limitations may necessitate that some customers and transactions are still monitored manually or require separate monitoring systems/ The process for selecting the right vendor for your institution is just as important as managing the software once it is implemented. \nThe most common frustration with model risk management is the volume of alerts systems can generate. Proper evaluation and calibration of parameters is necessary to ensure that you are not missing suspicious activity because the model is too narrowly defined\, but also that you mitigate the risk of missing suspicious activity because the model is so broad that you cannot keep up with the volume of false alerts. \nIn this two-hour session\, Brian will cover: \n\nModel Development\nModel Governance\nModel Risk Assessment\nPreparing a gap analysis\nData Integrity Analysis\nParameter testing\nModel Validation\n\nWritten materials will be provided for the listener to refer to during the presentation. \nWHO SHOULD ATTEND: \nBSA Officer\, BSA Analysts\, BSA Auditors
URL:https://www.tcaregs.com/event/anti-money-laundering-model-risk-management/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://www.tcaregs.com/wp-content/uploads/bol-learning.jpg
END:VEVENT
END:VCALENDAR