February Half-Day Seminar (In-Person)
February Half-Day Seminar (In-Person)
Session I
Speaker: Jack Healey
Speaker Bio: Jack Healey is the current CEO of the Bear Hill Advisory Group. He was formally the CFO of a highly acquisitive public company and in over 14 years acquired and integrated more than 60 companies. He currently works with private equity firms in evaluating the risks and opportunities associated with portfolio companies. He is an expert in operational, financial and organizational crisis management, strategies, and tactics as well as cyber incident response strategies and tactics.Jack is a frequent speaker at national and regional conferences. His credentials include: Certified Fraud Examiner, Certified Public Accountant, Certified in Fraud and Forensics, Cybersecurity SOC, and Cybersecurity Services. He is also a member of the ACFE, InfraGard, ISACA , AICPA, and NACD.He authored the Business Crisis Diagnostic and Prevention Model™, which provides businesses with the framework necessary to identify impending business crises before they occur.
Applying Risk Fundamentals to Emerging Technologies - Cryptocurrency, Coins and Digital Tokens
Session Summary: We are constantly hearing of new technologies- “the next great thing”. Often management will incorporate these new technologies into our business to stay ahead of the competition. Many times, these strategies are implemented without adequate consideration to the risks associated with these technologies, the impact to us by others deploying these technologies or how we will quantify and manage these risks. The adoption of Cryptocurrency, Artificial Intelligence, Non-Fungible Tokens are current day examples. We will look at the risks associated with the crypto ecosystem and how we manage those risks.
Session Objectives:
Understand the Common Risk Fundamental Frameworks- a quick review.
How to apply these fundamentals to emerging technologies when practical experience is limited, hubris abounds and FOMO has infected the C-Suite?
What are the risks associated with Crypto Ecosystem- Block Chain, Cryptocurrency- Coins and Digital Tokens?
What can go wrong when we don’t effectively manage our exposure to Crypto Risk?
How do we manage Crypto Risk to ensure their effectiveness?
Session II
Speaker: Lourdes Miranda
Speaker Bio: Lourdes Miranda is Chief Consultant for Global AML Compliance, Crypto, and Investigations at RaLytics, a Washington, DC and Florida-based consulting firm.
Lourdes is former CIA and FBI and is currently working in the private industry, with over 20 years specializing in financial crime investigations, compliance, risk management; and, intelligence collection and analysis globally. She has extensive experience working on money laundering, fraud, and terrorist financing investigations and operations.
Since 2018, Lourdes has been working as a consultant for FinTechs, Money Service Businesses, International Remittance Services, Money Service Businesses, Payment Processors, and Blockchain Technology entities as a Chief Compliance Officer, Crypto Investigator, Financial Crimes Investigator, Risk Manager, and Intelligence Analyst building compliance programs, conducting investigations, leading teams, collaborating with legal, engineers, product developers; and designing and delivering training.
Crypto 101 | Compliance & Investigations
Session Summary: As cryptocurrencies become even more incorporated into regular business transactions and organizations’ asset portfolios, investigations involving cryptocurrency and other digital asset elements will become more commonplace. In this session, Lourdes will utilize her real-world experience in digital asset investigations and tracing cryptocurrencies to share her experiences and offer perspective on a discipline that will only increase in importance.
Session Objectives:
Understand how bad actors, “The Other KYC…Know-Your-Criminal™,” are committing financial crimes involving crypto
Understand how to build a strong crypto compliance and crypto investigations program
Discern successful strategies for tracing and analyzing crypto transactions
Understand what triggers an investigation and what to include in Suspicious Activity Reports + Suspicious Transaction Reports + Reports of Investigation
Understand how to investigate and building a crypto case