No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Financial Services

Vendor Selection & Model Design for FinCrime Compliance Solutions

Selection and deployment will usually take 6-12 months at least

by Shayne Begin and Ozgur Vural
September 10, 2024
in Financial Services
money laundering digital collage

An effective financial crime compliance solution isn’t something a company can just pull off a shelf. Depending on the organization, the process can take as long as a year. Shayne Begin and Ozgur Vural of FTI Consulting explore the finer points of vendor selection and model design in the finserv sector.

One of the most important decisions a compliance team will make regarding their financial crime compliance program pertains to implementing effective and automated transaction monitoring, sanction screening and customer due diligence controls — often performed by third-party solutions if not developed internally. With an ever-evolving regulatory landscape and an increased expectation for companies to use data and digital systems appropriately to be as compliant as possible, vendor selection, model design and implementation testing have become critical steps in successfully carrying out such responsibilities.

Know your pain points

Financial services companies must address financial crime and compliance issues to avoid severe consequences. Regulatory inquiries, consent orders and monitorships are often results of program deficiencies associated with inadequate anti-money laundering (AML), sanctions and watchlist screening and Know Your Customer (KYC) programs and controls. These deficiencies can lead to significant operational and reputational risks, making it essential for clients to ensure robust and effective compliance frameworks by doing the following:

  • Conduct a proper vendor selection process to identify vendors and system solutions best aligned with the client’s risk profile, business requirements and compliance needs.
  • Develop an understanding of how a particular vendor solution will operate on a day-to-day basis. The selected solution must provide adequate risk coverage and contain critical functionality and capabilities to carry out the business and compliance requirements.
  • Perform a proof of concept or pilot testing before going live in production to ensure everything is working as intended and aligned with expectations.
  • Conduct comprehensive pre- and post-implementation data and model validation testing to assure an accurate and complete set of model inputs (customers, transactions, data attributes, quality of the data, etc.) are being considered and screened. The model validation should assure the system and model was implemented correctly.
  • Properly design, configure and validate system solution processes, settings and rule logic are set as expected to prevent issues down the road, such as suspicious activity going undetected and unreported.
  • Conduct a comprehensive coverage assessment, red-flag analysis and incorporate your risk assessments to prevent inadequate risk coverage.
  • Map risk indicators to effective monitoring rules and risk typologies, especially those designed to detect complex financial crime schemes.
  • Establish appropriate parameter and threshold settings supported by underlying data analytics (among other regulatory and qualitative factors) and tune them using below-the-line/above-the-line testing periodically given risk-based intervals.

The above action items, especially a lack of data and model validation, conducting a proper coverage assessment and not appropriately setting and tuning parameter settings, are often overlooked steps that result in program deficiencies and undetected suspicious activity. If these steps are addressed during the design and testing phases of the system implementation, many of the underlying issues we often observe would be identified early on through proper due diligence, preventing them from becoming significant problems later in the process.

Compliance teams often operate with limited resources and are already occupied with their daily responsibilities. Asking them to carry out a proper vendor selection process, implement a new system solution and cover the above discussed action items can seem like an additional full-time job. 

Many companies find it daunting and overwhelming when deciding on the right vendor solution, especially given the myriad existing and emerging advanced technologies enabled by AI and machine learning. Additionally, the regulatory pressure to remain compliant, manage all risks and support a growing business demands innovative, automated and data-driven approaches (e.g., data collection, verification, screening, monitoring and reporting). We’ve seen numerous instances where a vendor solution and design process was rushed or improperly implemented, leading to significant headaches down the line related to regulatory scrutiny and cost implications associated with fixing such problems.

bernie madoff illustration
Featured

How Much Has Changed in AML & KYC Since Bernie Madoff Went to Prison?

by Tracy Moore
June 19, 2024

In the 15 years since Bernie Madoff’s conviction for running the largest known Ponzi scheme in history, regulatory agencies have sought to tighten their oversight of the financial sector, paying special attention to anti-money laundering (AML) and know your customer (KYC) rules.

Read moreDetails

The path forward

Here are several key considerations for companies planning to conduct a vendor assessment — whether implementing a new system solution or replacing an existing one:

  • Assessment of current needs
  • Define criteria for vendor selection
  • Market research and peer benchmarking
  • Request for proposal (RFP)
  • Vendor evaluation and due diligence
  • Demos and proof of concept (POC)
  • Contract agreements, provisions and SLA
  • Implementation plan and testing
  • Documentation — methodology, support and rationale
  • Training and support
  • Monitoring and evaluation
  • Continuous validation and enhancement

Once your team identifies the right vendor solution, designing and making sure the model is working as intended are additional but critically important next steps that often take time. There is typically a six- to 12-month window for most companies and vendor partners to stand up and go live with implementing solutions, keeping in mind variability depending on the vendor solution, scope and complexity of the implementation. 

When it comes to designing the model, many companies are often regulated by regulatory bodies (DFS, OCC, SEC, etc.) that set notable guidance and expectations, especially through publications, frameworks and enforcement action releases. Understanding your regulatory requirements and model risk management expectations will assist with creating an appropriate, risk-based model design and allow you to validate everything is working as intended.


Tags: AMLFinancial CrimeKnow Your Customer (KYC)Sanctions
Previous Post

Here We Go Again: Keeping Up With State Moves on AI Regulation

Next Post

What CrowdStrike Outage Can Teach Us About Vendor Risks

Shayne Begin and Ozgur Vural

Shayne Begin and Ozgur Vural

Shayne Begin is a senior director at FTI Consulting in the data and analytics practice based in New York City. He has over 11 years of experience providing consulting services to institutions, law firms and regulators specializing in data analytics with large and complex financial, operational and compliance data.
Ozgur Vural is a senior managing director at FTI Consulting. He has more than 25 years of professional experience and specializes in advanced data analytics and data science in the context of counter-terrorism financing, BSA/AML program, fraud risk management, and financial crime compliance.

Related Posts

boundary line on roadway

Reckless or Just Unprepared? How UK Tribunals Are Drawing Lines on Financial Integrity

by David Hamilton
June 2, 2025

Courts increasingly distinguish between personal failings and systemic compliance gaps when assessing whether financial professionals acted with integrity

monies illustrating money laundering

Power Shift: What Happens When America Steps Back From Global AML Enforcement?

by Joe Biddle
April 15, 2025

EU's new anti-money laundering authority emerges as potential counterweight amid uncertain US priorities

LexisNexis Sanctions Pusle 2024

Sanctions Pulse 2024

by Corporate Compliance Insights
April 10, 2025

How prepared is your organization for the new era of heightened sanctions activity? Annual sanctions report Sanctions Pulse: Looking Back...

robot reading book generated by ai

Teaching Machines to Spot What Matters

by Kevin Lee
April 8, 2025

How emerging technologies are transforming inefficient alert systems and reshaping financial crime prevention

Next Post
crowdstrike building sign

What CrowdStrike Outage Can Teach Us About Vendor Risks

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights