All data are trying to tell you something, not seeing it doesn’t mean they are bad data. In the compliance…
All data are trying to tell you something, not seeing it doesn’t mean they are bad data. In the compliance…
We have discussed what is a coverage assessment before, in this article we highlight the major steps of doing coverage…
One day I had the following conversation with my independent model reviewer when he is about to issue a finding…
What is a coverage assessment? An effective AML transaction monitoring (TM) program should start with a sound risk and coverage…
Reducing Name Screening Noise Given the recent heightened sanction against Russia, many institutions experienced a significant increase in hits, a…
Detect the unknowns How do we detect the unknowns? Sound familiar? When it comes to Financial Crime Analytics, there is…
Manage End User Computing Models AML EUC (End User Computing) Management Suite provide centralized version controls and auditable testing evidence.…
Build An Analytics Function Cross AML and Fraud The Convergence of AML and Fraud Analytics has been extensively discussed in…