how to build an audit risk assessment tool · reference guide jonathan estreich december 2014 how...

17
REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

Upload: lekhanh

Post on 10-Aug-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

R E F E R E N C E G U I D E

Jonathan EstreichDecember 2014

How to Build an Audit Risk

Assessment Tool to Combat Money Laundering

and Terrorist Financing

Page 2: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

2

Introduction

4 Key Points

10 Developing the Risk Assessment Tool

22 The Support Framework

24 Interpreting and Using Results

28 Takeaway

REFERENCE GUIDE SECtIoNS

The author is not necessarily representing the views or opinions of JPMorgan Chase or ACAMS.

This document serves as a supplemental resource to

the whitepaper published in December of 2013:

How to Build an Audit Risk Assessment Tool to Combat

Money Laundering and Terrorist Financing.

Page 3: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

Objective

To provide specific considerations for how

a financial institution’s internal audit

department can “design” a firm-wide AML

risk assessment tool that:

Improves the auditor’s ability to

identify relevant AML risks

Sets the foundation for thoughtful and

supported risk determinations

Produces results that can assist

in the development of an audit plan that

satisfies regulatory expectations

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

3

Introduction“A strong and well-designed tool should equip the auditor to identify risk and to demonstrate and evidence how risk ratings and related conclusions were derived.”

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 4: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

5

1. Regulatory expectations are high and the auditor’s role is evolving

Regulators are emphasizing the importance of

independent testing and the role of the AML

auditor in helping to manage risk and sustain an

operational AML program.

Includes a review of the FI’s risk assessment for reasonableness given the FI’s risk profile:

“Audit is responsible for conducting an objective evaluation of the AML compliance program for soundness, adequacy and sustainability while maintaining independence from compliance and business functions.”

Customers Products and Services

Transaction Activity

Geographic Presence

Additional focus on:u Risk tolerance

u The level of assurance

u The depth and precision of controls

u The nature of substantive testing

u The degree of credible challenge

Regulatory Orders (2012, 2013)u Inadequate CDD and

EDD practices

u Incomplete identification of high-risk customers

u Insufficient policies, procedures and training

u Failures in monitoring and identifying suspicious activity

u Poor suspicious activity reporting and filing practices

u Ineffective independent testing and audit functions

Key Points1Regulatory expectations are high and the auditor’s role is evolving

2The audit plan indicates to regulators whether Audit is on track

3Audit’s risk assessment process drives the audit plan

4There “is” a difference between an Audit AMLRA and other AML risk assessments

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 5: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

7

2. The audit plan indicates to regulators whether Audit is on track

“Audit is responsible for assembling an audit plan that demonstrates its organization’s knowledge of its Business Units and an understanding of the business’ associated risks.”

“An audit plan that includes every possible auditable Business Unit is arguably not a ‘plan’ and is most likely an unrealistic approach in a world of finite resources.”

The Audit Plan:u Primary roadmap for AML

testing activities

u If the plan is lacking, the FI may be exposed

u Should, at a minimum, focus on the highest-risk areas

A successful risk assessment should:u Result in a detailed

risk profile for each Business Unit

u Demonstrate the rationale and inform decisions for including or excluding a specific audit area in the plan

kEy poINtS

3. Audit’s risk assessment process drives the audit plan

Audit is expected to select audits using

a risk-based approach that provides a

reasonable belief that critical risks are identified

and assigned adequate testing coverage

in a timely fashion.

Risk Profile Audit Coverage

Scope

Freque

ncy

The process of building the audit plan should involve consideration of:

Overview Of Primary Audit Objectivesu Determine whether the overall

AML/BSA compliance program is suitably designed and operating effectively.

u Identify any material program weaknesses, control deficiencies and corresponding opportunities for program, process and control enhancements, and report them to senior management and the board (usually the audit committee).

u Assist management with identifying money laundering, terrorism financing and other financial crime vulnerabilities.

u Perform and document procedures and results that may be useful to regulators in conducting their supervisory examinations.

u Assess and identify possible gaps and opportunities for management to continually improve its suspicious activity detection, investigation, analysis, escala-tion, documentation and reporting processes and controls, including due diligence feedback and the enterprise-wide AML risk assess-ment process.

u Assess management’s AML strategic planning process.

u Identify opportunities and methods to help management make program enhancements continuous and sustainable.

u Assess and identify opportunities to enhance management’s self- monitoring and self-testing compli-ance review program.

u Assess how well AML compliance is integrated into the business. Adapted from: The SAR Activity Review—Trends, Tips and Issues (Issue 16), (October, 2009).

Existing or Prior Audit

Coverage

Unique Business Risks

Pre-existing issues

Severity of AML risk

factors

Page 6: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

9

4. There “is” a difference between an Audit AMLRA and other AMLRAs

Differences between risk assessment tools

do exist, and these may be attributed

to who the tool is designed for and how the

results will ultimately be used.

“It is reasonable for Audit to reflect a combined approach of independently deriving some pieces of information while leveraging other pieces— granted a reasonable level of comfort.”

kEy poINtS

AUDIT AMLRAIDENTIFY AND

ASSESS RISK WITH THE PURPOSE OF:

1Pinpointing areas

warranting immediate escalation

2Pinpointing areas

warranting further substantiation

and testing

Usually completed by an auditor or other audit department designee

An effective Audit AMLRA should assist with audit decisions relating to:

u Whether the FI’s risk assessment processes

are effective

u What Business Units should be audited

u What AML components within a Business Unit

may warrant testing coverage

u�The frequency for which a Business Unit

may need to be tested

u Prioritization and timing of audit coverage

across Business Units

u Potential resourcing demands for conducting

the resulting audits

Page 7: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

1 1

1. Overview

A strong AMLRA design leads, directs and guides the

auditor’s focus and helps the auditor to successfully

assess risk while avoiding generalizations.

“The two key players who will be using the tool the most are the auditor completing Audit’s assessment and the AML examiner evaluating Audit’s assessment. This is a helpful consideration when designing the tool.”

Commonly cited risk assessment weaknesses:u Assessments were not performed and/or not

evidenced through documentation

u Assessments did not include all lines of business or entities

u Assessments did not consider all major risk categories

u There was a lack of methodology for assigning risk ratings/levels

u Policies and procedures were not commensurate with the institution’s risk profile Adapted from: “Spotlight on Large Institutions: Conducting Enterprise-Wide AML Risk Assessments that Go Beyond the Expectations of Examiners and Senior Management,” ACAMS; June 26, 2013

An AMLRA tool should be conducive to:

u Identification of Risk

u Quantification of Risk

u Assessment of Risk

u Documentation of the Level of Risk

Developing The Tool1Overview

2Basic Factors

3Risk Factors

4Control Factors

5General

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 8: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

13

2. Basic Factors

The development of a robust risk assessment

model is largely dependent upon the

individual elements that are chosen as the

Risk and Control Environment Factors

to be assessed and evaluated.

DEvElopING tHE tool

“[i]nherent risks are the risks that exist before the application of controls intended to mitigate those risks. Clearly identifying inherent risks is particularly beneficial in making determinations for the scope and frequency of audit and independent reviews—determinations that should be based on a financial institution’s assessment of inherent risk without assuming that controls are functioning as intended. Residual risks are those that exist after the application of controls. In this context, risks cannot be completely eliminated, even though layered security may reduce risk to an acceptable level.”1

1 FDIC.(2007). From the Examiner’s Desk: Customer Information Risk Assessments: Moving Toward Enterprise

wide Assessments of Business Risk.

“FIs are expected to establish a control environment that minimizes and—where possible—safeguards against AML risks.”

Primary Inherent AML risks relate broadly to an FI’s:

Customers

Products and

Services

Transaction Activity

Geographic Presence

KNOW YOUR

CUSTOMER

SUSPICIOUS AND/OR

UNUSUAL ACTIVITY

OFAC AND SANCTIONS

EMPLOYEE AML EXPERTISE

AND COVERAGEOPERATIONS

AND TECHNOLOGY

POLICIES, PROCEDURES

AND PROCESSES

MANAGEMENT AND

OVERSIGHTAudit should assess the current state of controls

relating to:

Page 9: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

15

3. Risk Factors

The process of identifying and assessing the

degree of inherent risk will help to quantify the

extent of residual risk, which in turn can inform

audit planning decisions.

DEvElopING tHE tool

INHERENT RISK CONSIDERATIONS

Customers Transaction Activity

Products and Services

Geographic Presence

HR Customer

Types

HR Products and

Services

Activity Involving

HR Products/Services

Customers in HR

Locations

Duration of Relationship

New Products and

Services

International Activity

Physical Presence

in HR Locations

Closed/Blocked Accounts

Business/Sales from HR Products and

Services

Transactions Involving Indirect Parties

Transactional Activity with HR

Locations

Number and Nature of Accounts

Risk Tolerance and Business

Strategies

Reportable Transaction

Activity

Inherent Risk Considerations (Example) — CUSTOMERS

u HR Customer Types

The Business Unit reflects a significant number of accountholders categorized as HR per the FI’s pre-existing customer risk rating model.

 

u Duration of Relationship

The Business Unit reflects a significant number of accounts (those representative of establishing a new customer relationship) that have been opened within the past twelve months.

 

u Closed/Blocked Accounts

The Business Unit reflects a significant number of customer accounts or relationships that have been closed or blocked at the direction of the FI.

 

u Number and Nature of Accounts

The Business Unit reflects a significant number of customers with open (e.g., active and/or dormant) accounts in, or having access to, other Business Units within the FI.

“The focus of Audit’s assessment should be on identifying the extent to which the Business Unit’s customer population reflects high-risk characteristics such as those outlined here.”

Page 10: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

17

DEvElopING tHE toolGuidance & Training Tips

(Example)

“Magnitude provides perspective; be sure to consider context when assessing and documenting statistics and other metrics.” “You might not own

customers or products, but look deeper for potential AML risk.”

u A certain number of HR customers within one Business Unit may have a very different connotation than the same number of HR customers in another area.

u Two Business Units may have the same number of new customer relationships; however, one of these may have rapidly increased the number of new customers within the past year.

u For areas such as technology or Business Units that sell or develop products on behalf of other businesses, it may be less obvious as to how inherent risks should be identified, rated and discussed.

u Consider transactional activity (e.g., with vendors or counterparties) and think holistically about the Business Unit’s “potential” (e.g., in the absence controls) to influence AML Risk, such as whether the Business Unit affects risk in other business areas within the FI.

3. Control Factors

A well-designed risk assessment tool should

demonstrate that a strong control environment

is a continuous feedback loop of interconnected

areas within the AML program requiring

ongoing and enterprise-wide evaluation.

CONTROL ENVIRONMENT CONSIDERATIONS

KYC Suspicious and/or Unusual Activity

OFAC and Sanctions

Employee AML

Expertise and Coverage

Overall AML Infrastructure,

Framework and Practices

Exceptions or Waivers

Detection and Monitoring

OFAC Screening and Processing

AML Staffing Coverage

Management and Oversight

Policies, Procedures and

Processes

Operations and Technology

Employee Knowledge and

Capabilities

Training and Awareness

OFAC Policies and Procedures

OFAC Licenses

OFAC Reporting and Related Metrics

Source Data and Internal

Reports Relating to PSUA

Escalation and Referral of

Activity

Alert Management

Investigation

SAR/STR Completion and

Filing

Reliance

Completeness of Customer Information

Renewals, Updates and

Periodic Reviews

Customer Name Screening

Page 11: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

19

DEvElopING tHE tool

Control Environment Considerations (Example) — KYC

u Renewals, Updates and Periodic Reviews

The Business Unit reflects a significant number of accounts that have not been renewed or updated in accordance with its renewal cycle.  

u Customer Name Screening

The Business Unit reflects deficiencies in identifying name matches; there are inconsistencies in screening practices or there is poor interaction between Business Unit and central function.

 

u Exceptions or Waivers

The Business Unit reflects a significant number of exceptions or waivers to internal KYC policies, procedures or standards. 

u Reliance

The Business Unit reflects reliance on other parties for KYC functions and does not receive metrics/status reporting, does not own controls for monitoring or managing the reliance, does not reflect accountability or does not demonstrate an understanding over the process and potential risk impact.

u Completeness of Customer Information

The Business Unit reflects a significant number of active accounts with missing or incomplete KYC information.

“the focus of Audit’s assessment should be on evaluating the strength of the Business Unit’s kyC practices, its ability to collect and maintain complete and relevant information; and the capacity to use this information to make appropriate decisions regarding the level of customer risk.”

Page 12: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

21

DEvElopING tHE tool

4. General

Guidance & Training Tips (Example)

“While business provided data should be tested, it may not always be feasible to substantiate and independently validate all pieces of informa-tion as part of the Audit AMLRA process.”

u At the risk assessment stage, there may be instances where it is reasonable for Audit to allow for some level of reliance on existing information when drawing conclusions.

u Audit should have a reasonable level of comfort that the leveraged information is accurate and/or reliable (such as through previous validation exercises).

u In situations where Audit may reference or leverage information that has not been previously verified—or that relates to known issues or concerns— Audit should document this and flag for subsequent substantiation and testing.

“Central units may own particular controls, but the respective business area owns the risk.”

u In instances where an AML service is provided centrally (e.g., customer onboarding, screening, training, monitoring, investigating), it is important for Audit to: 1. evaluate the Business Unit’s understanding over the central unit’s processes, control effectiveness and potential risk impact of a control failure; and 2. determine whether the Business Unit has supplemental controls in place to either manage the risk on its own or to minimize reliance on the central function.

Guidance & Training Tips (Example)

“KYC metrics are instrumental in providing a ‘collective’ view of risk.”

u In addition to being used to derive individual customer risk profiles, KYC information can be aggregated at various levels (such as by business or location) to compare actual risk to a pre- determined risk appetite.

u If a particular Business Unit has a low-risk appetite for PEPs, but KYC metrics indicate that 20% of the customer base is comprised of PEPs, the Business Unit may wish to adjust its risk tolerance or reduce the number of PEPs.

Page 13: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

23

u Specialized knowledge in AML

u Strong understanding over the Business Unit

u Region-specific familiarity

u Risk assessment process

u Risk scoring/rating methodology

u Documentation standards

u Roles and responsibilities

u Identification and analysis of AML risk

u Develop strategy for collecting information

u Understand where the data resides

u Ascertain the quality of the data

u Assign project managers/coordinators

u Designate a central location for storage/access

u Including an introductory description of the BU

u Referencing supporting sources of information

u Representing quantitative support in context of the BU

u Avoiding information overload

u Managing the flow and organization of responses

u Indicating directional risk trends

Subject Matter Expertise

Continual Training and Guidance Specific to Risk Assessments

Supporting Data

Direction for Crafting a Strong Narrative

The Support Framework

“Each assessment should involve input and oversight from individuals with the requisite AML credentials, experience, training and subject matter expertise.”

“The development and distribution of formal training, policies/ procedures and equivalent guidance promotes consistency and enhances Audit’s ability to assess AML risk.”

“Due to the extensive labor involved with obtaining data, it is helpful to view and manage this process as a standalone project and formalize as much as possible.”

“A clear, concise and consistent narrative is critical for evidencing rating decisions and articulating potential risks.”

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 14: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

25

Interpreting and Using Results“Collective risk assessment results can be used to corroborate conclusions, assemble a comprehensive risk-based plan and illustrate a bird’s eye view of AML risk within the enterprise.”

Results can be reviewed for whether:

u Risk and control ratings make sense at a high level

u Final risk ratings align with individual risk and control ratings

u Ratings are consistent with auditor knowledge

u Any noticeable outliers or anomalies are present

u Particular assessments appear less supported than others

Results can be used to inform planning decisions based on:

u Risk ratings & scores (e.g., highest risks areas)

u Identified risk trends (e.g. areas of increasing risk)

u Line of business or other organizational structures

u Geography

u Central functions/utilities

u Common risks and control weaknesses

u Prior coverage (e.g., audit testing, regulatory exams)

Results can be aggregated and viewed at various levels to:

u See whether results align with current expectations

u Identify explanations for any deviations from expectations

u Determine whether unexplained results warrent further escalation and/or exploration

Data Quality Checks

Comprehensive Risk-based Coverage for Audit Planning

Enterprise Views of AML Risk

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 15: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

27

INHERENt RISkS CoNtRol ENvIRoNmENt

Business Unit A

Business Unit B

Business Unit C

Business Unit D

Lin

e o

f B

usi

ne

ss

Co

un

try

AM

L R

isk

Tre

nd

Pri

or

Co

vera

ge

Cu

sto

me

rs

Pro

du

cts

and

S

erv

ice

s

Ge

og

rap

hic

P

rese

nce

Kn

ow

Yo

ur

Cu

sto

me

r

Su

spic

iou

s

and

/or

Un

usu

al

Act

ivit

y

OFA

C a

nd

S

anct

ion

s

Sta

ffin

g a

nd

Tr

ain

ing

Ove

rsig

ht

and

G

ove

rnan

ce

Op

era

tio

ns

and

Te

chn

olo

gy

Po

lici

es,

P

roce

du

res,

P

roce

sse

s

AM

L S

CO

RE

Tran

sact

ion

Act

ivit

y

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

"_"

Simplified Example—for illustration purposes only

Collective risk assessment data can be organized, stratified and dissected in a number of ways to create a variety of views for reporting and analysis.

Page 16: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

“The development of the AMLRA tool should encompass core AML principles and criteria that can be used as a benchmark for guiding the assessment process without endorsing a checklist-style approach.”

Design the tool to:u Direct auditors

towards relevant considerations

u Facilitate thoughtful analysis

u Encourage supported conclusions

Establish a Support Framework with:u Subject matter

expertise

u Continual training and guidance

u Planning for supporting data

u Direction for crafting strong narratives

Enhanced assessment results

more effective audit p

lan

RISK ASSESSMENT

DESIGN

How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

29

TakeawayThe risk assessment design can better equip Audit.

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61

Page 17: How to Build an Audit Risk Assessment Tool · REFERENCE GUIDE Jonathan Estreich December 2014 How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing

About the Author

BioJonathan Estreich is currently a vice president within the internal audit department at JPMorgan Chase. With over nine years of experience working with financial services firms such as Deloitte Financial Advisory Services LLP and UBS Investment Bank, Mr. Estreich specializes in providing anti-money laundering and counter- terrorist financing services with a focus on AML policies, procedures and internal controls, including those relating to transaction monitoring, Know Your Customer initiatives, customer due diligence and risk assessments. By servicing many different financial institutions within the banking sector in multiple capacities, he has accumulated a broad range of industry knowledge and expertise in diverse areas such as global AML compliance and Office of Foreign Assets Control as well as in working with complex product and customer types. He has had considerable involvement in leading, managing and advising on BSA/AML-related matters, including authoring several works with Thomson Reuters Complinet, ACAMS Today, InsideCounsel and Corporate Compliance Insights.

Professional Credentials Include:u Advanced Anti-Money Laundering

Audit designation (CAMS-Audit)

u Certified Anti-Money Laundering Specialist (CAMS)

u Certified Fraud Examiner (CFE)

u Certified Associate in Project Management (CAPM)

Related Works by Authoru How to Build an Audit Risk

Assessment Tool to Combat Money Laundering and Terrorist Financing—Equipping Your Last Line of Defense, ACAMS, (December 2013).

u CISADA Section 104(e): A glance into the final rule’s counter terrorist financing requirements and challenges for U.S. Financial Institutions, Corporate Compliance Insights, (October 2012).

u Understanding recent developments in prepaid access: Considerations for deterring money laundering, ACAMS Today, (March 2012).

u “Knowing” your Latin American customer: Enhanced due diligence practices to mitigate the risks of money laundering and terrorist financing, InsideCounsel, (March 2012).

u Enhanced due diligence program for correspondent banking: Minimizing the risk of money laundering and drug trafficking, Thomson Reuters Complinet, (August 2011).

174.27

918.56

182.97

89.00

247.42

81.20

531.81

217.33

120.08

1944.31

388.92

1678.0

204.5

-0.97

3.13

77.2

326.2

30.2

1.49

-1.3

450.2

12.7

166.59

421.95

223.54

470.16

119.75

53.84

229.32

557.88

32.29

318.36

86.61