Criminals constantly test the defenses of financial institutions, identifying and exploiting coverage gaps to move their illicit wealth with impunity. How confident are you that your current transaction monitoring program delivers the safeguards and protection your business needs? Are you stopping all suspicious activity?
Find out what 3 key layers of protection are needed to fortify ongoing monitoring and:
- Explore risks that might expose your transaction monitoring program to threats
- Discover the optimum approach for AML detection
- Evaluate technology advancements to optimize your program
Speakers:
Ted Sausen |
|
Michael Barrett Head of AML Product Management, NICE Actimize |