Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L

Slides:



Advertisements
Similar presentations
Presented by The Office of International Programs.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Confidentiality and HIPAA
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
1 Compliance Requirements November 27, Client registration & KRA requirements Formalities rationalized (agreements, signatures, documents) Availability.
© Chery F. Kendrick & Kendrick Technical Services.
Anti-Money Laundering (AML)
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Portfolio Committee on the Department of Police Auditor’s General perspective 2 March 2010.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
FATF Updates, Common AML Exam Deficiencies & AML Supplement Amendments
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
NYSAIS | Webinar | May 11, 2011 Electronic Signatures and Red Flag Rules Presented by: Donald J. Mosher Partner Schulte Roth & Zabel LLP
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Best Practices FX Business. Pre-trade preparation and documentation.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Challenges and Opportunities in the Caribbean Financial Services Sector Rudolph F. Zepeda, Jr. Federal Reserve Bank of Atlanta Miami Branch.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Fraudsters’ Accounts Malek Costa, CPA Head of Group Compliance BLOM Bank sal.
Beirut – Fall 2015 Special Investigation Commission Cyber Crimes.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
IMPLEMENTATION STRUCTURE & EXPECTED OUTCOMES FOR RECOMMENDATION 16, 17, 18, 19 & 20 Oladele Adeoye.
Compliance Update 11 December
Regular Payments First and Subsequent Payments
Correspondent Banking (1)
Privacy of Client Data.
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Electronic Records Management Program
Tax Identity Theft Presenter Date
Own Your Identity.
BY GAWARE S.R. DEPT.OF COMP.SCI
What is an anonymous reporting hotline?
Red Flags Rule An Introduction County College of Morris
Current Privacy Issues That May Affect Your Credit Union
RECORDS AND INFORMATION
Own Your Identity.
Contents subject to change.
Internal controls 01-Nov-2017.
Clemson University Red Flags Rule Training
Headings.
Personnel Training for Privacy
Business Compromise and Cyber Threat
What is an anonymous reporting hotline?
A fundamental principle of UNCAC
Indiana Department of Insurance Wire Fraud Prevention
Getting the Green Light on the Red Flags Rule
Contract Requirements for Suppliers
From Baby Boomers to Millennials
Presentation transcript:

Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L

Setting an effective control framework Definition of BEC. Awareness as a Key factor for an effective control environment. Identify critical products/Services and set the necessary control measures. Lessons learned.

Business E-mail Compromise (BEC) BEC schemes target financial institutions’ commercial customers. Criminals seek to: Typology Type Impersonate a Financial Institution’s commercial customer to instruct fraudulent transactions from the FI. Bank Email Compromise (BEC1). Impersonate a Financial Institution’s Executive to instruct fraudulent transactions from the FI’s branches/departments. Bank Email Compromise (BEC2). Impersonate a Financial Institution’s Executive in order to request personal or account information from the Financial Institution’s commercial customer . Bank Email Compromise (BEC3). Impersonate a supplier to instruct fraudulent transactions from the FI’s commercial customer . Company Email Compromise (CEC1). Impersonate a Financial Institution’s commercial customer to instruct fraudulent transactions from their clients. Company Email Compromise (CEC2). Impersonate an Executive of the Financial Institution’s commercial customer to instruct fraudulent transactions from the FI’s branches/departments. Company Email Compromise (CEC3).

Awareness Program Employees. Customers.

Staff Awareness Recruitment policy. Maintaining an effective Code of Conduct: Banking secrecy. Fighting financial crimes (not to facilitate, not to be involved, report). Access rights and unauthorized access. Transparency (customers, colleagues, third parties) Data privacy and confidentiality. Whistleblowing. Incident reporting. Disciplinary measures.

Staff Awareness Establishing an effective training program: New employees Vs. Key Personnel. Evolving risks. Red flags (Cybercrimes prevention guide for the financial sector). Staff Rotation.

Staff Awareness Red flags: Customer/Senior manager sending instructions by/limiting communication to e-mails. Online banking/e-mail instructions to process transfers from savings/dormant accounts. E-mailed transaction instructions direct payment to a known beneficiary; however, the beneficiary’s account information is different from what was previously used (ex: different IBAN, country, etc…). E-mailed transaction instructions are delivered in a way that give the FI limited time or opportunity to confirm the authenticity of the requested transaction or that include markings, assertions, or language designating the transaction request as “Urgent”, “Secret”, or “confidential”. Customer requesting by e-mail, online banking or by phone to change his phone number or to cancel the SMS service. Customer refraining from answering the security questions during the identity validation call. Customer requesting a sudden change to the name/account number of the beneficiary party of an outgoing transfer. Transfer request (by e-mail or online banking) ,where neither the purpose of the transaction nor the relationship with the beneficiary party is clear. A wire transfer received for credit into an account however, the wire transfer names a beneficiary that is not the account holder of record. E-mailed transaction instructions direct wire transfers to a foreign bank account that has been documented in customer complaints as the destination of fraudulent transactions.

Customers Awareness Customer’s rights and Obligations: Critical products and services and related risks. Red flags (Cybercrimes prevention guide for the non-financial sector). Reporting.

Control Procedures: Preventive Measures. Process Implemented control On-Boarding Properly communicate risks to the customer. Implement prior EDD on the customer’s main expected activities (transactions with major customers, suppliers, other third parties). Maintain an electronic database on the collected information. On-going Ensure transactions are in compliance with the implemented EDD. Update EDD measures when necessary. Online banking Pre-approved transfers list. Prior EDD. Transaction Validation. E-mail instructions Refrain from accepting transaction requests or providing financial information. Refer customer to Online banking. Forward and don’t reply. Validate the request. Phone validation Always ask the Identity validation question. Ask the customer to restate the request instead of confirming it. Ensure calls are recorded. Review calls. Credit cards Implement Visa/MC guidelines. Wire transfers Include alerts in the transfer request. Maintain an updated blacklist for suspicious names (banks, customers, IBAN) on the swift screening tool. Request the customer to validate the transaction with the beneficiary party prior to execution. Enable the SMS service, acquire a signed confirmation on the transaction.

Transfer request: alert questions Ask the customer to confirm: 1- If he had previously performed any transaction with the related beneficiary party? 2- Whether the previous transactions performed with the same beneficiary party was done on the same IBAN number? 3- In case the answer on any of the above questions was no, did he validate the transaction with the beneficiary party through methods other than the e-mail?

Lesson Learned Incident reporting. Revisiting our controls. Communication and Training.

Thank you!