Implementing FATF Travel Rule Compliance

Implementing FATF Travel Rule Compliance

The Financial Action Task Force (FATF) Travel Rule is essential for preventing money laundering and terrorist financing. Implementing compliance with this rule requires a strategic approach to ensure all regulatory requirements are met seamlessly. This article provides best practices for implementing FATF Travel Rule compliance and ensuring seamless compliance processes.

Best Practices for Implementing FATF Travel Rule Compliance

1. Establish a Compliance Framework

Description: Develop a comprehensive compliance framework that outlines the policies and procedures for meeting FATF Travel Rule requirements.

Steps:

  • Policy Development: Create detailed policies that define the scope, objectives, and procedures for compliance.
  • Procedural Guidelines: Establish clear procedural guidelines for collecting, transmitting, and retaining required information.
  • Compliance Team: Form a dedicated compliance team responsible for overseeing and managing compliance activities.

Benefits:

  • Consistency: Ensures a consistent approach to compliance across the organization.
  • Accountability: Clearly defines roles and responsibilities, promoting accountability.
  • Efficiency: Streamlines compliance processes, reducing the risk of errors and non-compliance.

2. Leverage Advanced Technology

Description: Utilize advanced technologies to enhance the efficiency and accuracy of compliance processes.

Tools:

  • Data Management Systems: Implement robust data management systems to collect, store, and manage transaction information.
  • Encryption and Security: Use encryption technologies to secure data during transmission and storage.
  • Automation Tools: Employ automation tools to streamline data collection, verification, and transmission processes.

Benefits:

  • Efficiency: Automates time-consuming tasks, reducing manual effort.
  • Accuracy: Enhances the accuracy of data collection and transmission.
  • Security: Provides robust security measures to protect sensitive information.

3. Conduct Regular Training

Description: Provide regular training to employees on FATF Travel Rule requirements and compliance procedures.

Steps:

  • Training Programs: Develop comprehensive training programs for employees at all levels.
  • Regular Updates: Update training materials regularly to reflect changes in regulations and best practices.
  • Interactive Sessions: Use interactive training sessions, case studies, and simulations to enhance learning.

Benefits:

  • Knowledgeable Staff: Ensures employees are well-informed about compliance requirements.
  • Improved Compliance: Enhances the ability to detect and report suspicious activities.
  • Compliance Culture: Fosters a culture of compliance within the organization.

4. Monitor and Audit Compliance

Description: Implement monitoring and auditing mechanisms to ensure ongoing compliance with the FATF Travel Rule.

Steps:

  • Regular Audits: Conduct regular internal audits to assess compliance with policies and procedures.
  • Real-Time Monitoring: Use real-time monitoring tools to detect and address compliance issues promptly.
  • Continuous Improvement: Implement feedback mechanisms to continuously improve compliance processes.

Benefits:

  • Compliance Assurance: Provides assurance that the organization meets regulatory requirements.
  • Risk Mitigation: Identifies and mitigates compliance risks proactively.
  • Operational Integrity: Enhances the overall integrity of compliance operations.

5. Collaborate with Industry Peers

Description: Collaborate with other financial institutions and industry bodies to stay updated on best practices and regulatory changes.

Steps:

  • Industry Forums: Participate in industry forums and working groups focused on FATF Travel Rule compliance.
  • Knowledge Sharing: Share knowledge and experiences with peers to enhance collective compliance efforts.
  • Regulatory Engagement: Engage with regulators to stay informed about upcoming changes and expectations.

Benefits:

  • Best Practices: Gain insights into best practices for compliance.
  • Regulatory Awareness: Stay updated on regulatory changes and expectations.
  • Collaboration: Foster collaboration and knowledge sharing within the industry.

Implementing FATF Travel Rule compliance requires a strategic approach that includes establishing a comprehensive compliance framework, leveraging advanced technology, conducting regular training, monitoring and auditing compliance, and collaborating with industry peers. By following these best practices, financial institutions can ensure seamless compliance with the FATF Travel Rule, reduce compliance risks, and enhance the security and transparency of financial transactions.

Understanding the FATF Travel Rule

Understanding the FATF Travel Rule

The Financial Action Task Force (FATF) Travel Rule is a significant regulation in the global fight against money laundering and terrorist financing. It mandates that financial institutions share certain information about the originators and beneficiaries of wire transfers. This article explores the FATF Travel Rule, its significance, key requirements, and implications for financial institutions.

What is the FATF Travel Rule?

The FATF Travel Rule, officially known as Recommendation 16, requires financial institutions to collect, retain, and transmit specific information about the parties involved in wire transfers and other forms of electronic funds transfers. This rule aims to enhance transparency and traceability of financial transactions to combat money laundering and terrorist financing.

Key Requirements of the FATF Travel Rule

1. Information Collection

Description: Financial institutions must collect specific information about the originators and beneficiaries of wire transfers.

Requirements:

  • Originator Information: Name, account number, address, national identity number, or date and place of birth.
  • Beneficiary Information: Name and account number.
  • Additional Information: Institutions should also collect information about the transaction amount, date, and purpose.

Implications:

  • Compliance: Ensures that institutions adhere to regulatory requirements.
  • Traceability: Enhances the ability to trace the source and destination of funds.
  • Risk Management: Improves the ability to assess and manage transaction risks.

2. Information Transmission

Description: Financial institutions must ensure that the collected information travels with the transaction throughout the payment chain.

Requirements:

  • Data Integrity: Ensure that the information remains intact and accurate during transmission.
  • Secure Transmission: Use secure channels to transmit information to prevent unauthorized access or tampering.
  • Intermediary Institutions: Ensure that intermediary institutions in the payment chain also comply with the Travel Rule.

Implications:

  • Security: Protects sensitive information from being compromised.
  • Compliance: Ensures all parties in the transaction chain adhere to regulatory requirements.
  • Transparency: Enhances transparency in financial transactions.

3. Record Retention

Description: Financial institutions must retain records of the information collected and transmitted for a specified period.

Requirements:

  • Retention Period: Retain records for at least five years, or as required by local regulations.
  • Accessibility: Ensure that records are easily accessible for regulatory audits and investigations.
  • Data Protection: Implement measures to protect stored data from unauthorized access and breaches.

Implications:

  • Compliance: Meets regulatory requirements for record retention.
  • Audit Trail: Provides a clear audit trail for regulatory reviews.
  • Data Security: Ensures the protection of sensitive information.

Significance of the FATF Travel Rule

1. Enhancing Transparency

Description: The Travel Rule improves the transparency of financial transactions, making it easier to trace the flow of funds.

Benefits:

  • Fraud Prevention: Reduces the risk of fraud by ensuring that transaction details are accurate and traceable.
  • Accountability: Holds financial institutions accountable for the accuracy and integrity of transaction information.
  • Regulatory Confidence: Increases confidence among regulators in the financial system’s integrity.

2. Combating Money Laundering and Terrorist Financing

Description: The Travel Rule is a critical tool in the global fight against money laundering and terrorist financing.

Benefits:

  • Detection: Enhances the ability to detect and prevent illicit financial activities.
  • Collaboration: Promotes international collaboration among financial institutions and regulatory bodies.
  • Security: Strengthens the overall security of the financial system.

3. Ensuring Compliance

Description: Compliance with the Travel Rule is mandatory for financial institutions, with significant penalties for non-compliance.

Benefits:

  • Regulatory Adherence: Ensures adherence to global AML/CFT (Anti-Money Laundering/Counter-Terrorist Financing) standards.
  • Risk Mitigation: Reduces the risk of regulatory penalties and reputational damage.
  • Operational Integrity: Promotes the integrity of financial operations by ensuring compliance with regulatory requirements.

The FATF Travel Rule is a crucial regulation in enhancing the transparency and traceability of financial transactions. By mandating the collection, transmission, and retention of specific information about the parties involved in wire transfers, the Travel Rule helps combat money laundering and terrorist financing. Understanding and complying with the FATF Travel Rule is essential for financial institutions to ensure regulatory adherence, manage risks, and enhance the security of financial transactions.

The Importance of KYC Compliance in Financial Services

The Importance of KYC Compliance in Financial Services

Know Your Customer (KYC) compliance is a critical aspect of financial services. It ensures that financial institutions verify the identities of their customers, assess risks, and prevent illegal activities such as money laundering and fraud. This article explores the importance of KYC compliance, key requirements, and best practices for effective customer verification.

Understanding KYC Compliance

KYC compliance involves verifying the identity of customers, understanding their financial activities, and assessing their risk profiles. Financial institutions must adhere to KYC regulations to prevent financial crimes and protect the integrity of the financial system.

Key Requirements of KYC Compliance

1. Customer Identification Program (CIP)

Description: CIP involves collecting and verifying customer information to establish their identity.

Key Requirements:

  • Identity Verification: Collect reliable documents, data, or information to verify customer identity.
  • Document Verification: Use government-issued IDs, passports, or other official documents.
  • Non-Documentary Methods: Utilize non-documentary methods, such as cross-referencing databases, when necessary.

2. Customer Due Diligence (CDD)

Description: CDD requires financial institutions to understand the nature and purpose of customer relationships and assess risks.

Key Requirements:

  • Risk Assessment: Evaluate the risk level of each customer based on their profile and behavior.
  • Ongoing Monitoring: Continuously monitor transactions to identify unusual or suspicious activities.
  • Enhanced Due Diligence (EDD): Apply additional scrutiny to high-risk customers.

3. Record Keeping

Description: Maintain records of customer information and transactions for a specified period.

Key Requirements:

  • Retention Period: Retain records for the period mandated by regulatory authorities.
  • Accessible Storage: Ensure records are securely stored and easily accessible for audits.

4. Reporting Requirements

Description: Financial institutions must report suspicious activities to regulatory authorities.

Key Requirements:

  • Suspicious Activity Reports (SARs): Submit SARs when transactions appear suspicious or do not match the customer’s profile.
  • Threshold Reporting: Report large transactions that exceed specified thresholds.

Best Practices for Effective KYC Compliance

1. Implement Digital Onboarding

Description: Use digital solutions to streamline the onboarding process and verify customer identities quickly and accurately.

Benefits:

  • Efficiency: Speeds up the verification process.
  • Accuracy: Reduces human error by automating data entry and verification.
  • Customer Experience: Enhances customer experience by simplifying the onboarding process.

2. Leverage Advanced Technology

Description: Utilize advanced technologies such as artificial intelligence (AI) and machine learning to enhance KYC processes.

Benefits:

  • Enhanced Detection: Improves the detection of suspicious activities and anomalies.
  • Scalability: Handles large volumes of data efficiently.
  • Real-Time Monitoring: Provides real-time insights and alerts.

3. Regular Training and Awareness

Description: Conduct regular training sessions for employees to ensure they understand KYC requirements and best practices.

Benefits:

  • Knowledgeable Staff: Ensures employees are well-informed about KYC compliance.
  • Improved Detection: Enhances the ability to identify and report suspicious activities.
  • Compliance Culture: Fosters a culture of compliance within the organization.

4. Conduct Regular Audits

Description: Perform regular audits to assess the effectiveness of KYC processes and identify areas for improvement.

Benefits:

  • Compliance Assurance: Ensures adherence to regulatory requirements.
  • Continuous Improvement: Identifies gaps and opportunities for process enhancements.
  • Risk Mitigation: Reduces the risk of regulatory penalties and reputational damage.

KYC compliance is essential for financial institutions to verify customer identities, assess risks, and prevent financial crimes. By adhering to key requirements and implementing best practices such as digital onboarding, advanced technology, regular training, and audits, organizations can ensure effective KYC compliance. A robust KYC program not only protects the institution but also contributes to the overall integrity of the financial system.

KYC for Education: The Role of KYC in Educational Institutions for Verifying Student Identities

KYC for Education: The Role of KYC in Educational Institutions for Verifying Student Identities

In an increasingly digital world, educational institutions face the challenge of ensuring the authenticity of student identities and safeguarding sensitive information. Know Your Customer (KYC) processes, traditionally used in financial services, are now being adopted by educational institutions to verify student identities, prevent fraud, and ensure compliance with regulatory requirements. This article explores the role of KYC in education, highlighting its importance and best practices for implementation.

Importance of KYC in Educational Institutions

KYC processes in educational institutions help verify the identities of students, ensuring that admissions, examinations, and certifications are awarded to legitimate individuals. This verification is crucial for maintaining the integrity of the education system, preventing fraud, and protecting sensitive information.

Key KYC Requirements for Educational Institutions

1. Identity Verification

Description: Verifying the identity of students to prevent fraud and ensure the authenticity of admissions and records.

How It Works:

  • Document Collection: Collect and verify government-issued documents such as passports, national ID cards, and birth certificates.
  • Digital Verification: Utilize digital methods, including biometric checks and facial recognition, for online admissions and examinations.

Importance:

  • Ensures that admissions and records are authentic
  • Prevents identity fraud and academic dishonesty

2. Academic Background Verification

Description: Verifying the academic history and qualifications of students.

How It Works:

  • Document Verification: Verify previous academic records, including transcripts and certificates.
  • Database Checks: Cross-check academic credentials with educational databases and institutions.

Importance:

  • Ensures that students meet the required academic standards
  • Prevents the submission of forged academic records

3. Payment Verification

Description: Verifying the payment methods used for tuition fees and other financial transactions.

How It Works:

  • Payment Gateway Integration: Use secure payment gateways to verify the authenticity of credit card and bank transactions.
  • Fraud Detection Systems: Implement systems that monitor for unusual payment patterns and flag suspicious transactions for further review.

Importance:

  • Prevents payment fraud
  • Ensures the security of financial transactions

4. Compliance with Education Regulations

Description: Ensuring compliance with local and international education regulations.

How It Works:

  • Data Sharing with Authorities: Share necessary student information with education authorities as required.
  • Regulatory Compliance Audits: Conduct regular audits to ensure compliance with education regulations and standards.

Importance:

  • Ensures compliance with regulatory requirements
  • Protects the institution from legal and financial repercussions

Best Practices for KYC in Educational Institutions

1. Seamless Digital Onboarding

Description: Implement digital onboarding processes to verify student identities quickly and efficiently.

Benefits:

  • Enhances the student experience by reducing wait times
  • Provides a convenient and secure method for identity verification

2. Biometric Verification

Description: Utilize biometric verification methods such as facial recognition and fingerprint scanning for online admissions and examinations.

Benefits:

  • Provides a high level of security
  • Streamlines the admissions and examination processes

3. Advanced Fraud Detection Systems

Description: Implement advanced fraud detection systems to identify and prevent fraudulent activities.

Benefits:

  • Early detection of potential fraud
  • Protects the integrity of the admissions and examination processes

4. Student Education

Description: Educate students about the importance of KYC processes and the measures taken to ensure their security.

Benefits:

  • Builds trust with students
  • Encourages compliance with KYC processes

5. Regular Compliance Audits

Description: Conduct regular audits of KYC processes to ensure compliance with regulatory requirements and identify areas for improvement.

Benefits:

  • Ensures that KYC practices remain up-to-date with regulatory changes
  • Identifies gaps and weaknesses in existing processes

KYC processes are crucial for verifying student identities, preventing fraud, and ensuring compliance with regulatory requirements in educational institutions. By implementing robust KYC practices, educational institutions can maintain the integrity of their admissions, examinations, and records. Effective KYC practices include seamless digital onboarding, biometric verification, advanced fraud detection systems, student education, and regular compliance audits. These measures help educational institutions protect their reputation, ensure compliance, and build trust with students and stakeholders.

KYC for Gaming and Gambling: Ensuring compliance and preventing fraud in the gaming industry.

KYC for Gaming and Gambling: Ensuring compliance and preventing fraud in the gaming industry.

The gaming and gambling industry faces unique challenges in ensuring compliance and preventing fraud. Know Your Customer (KYC) processes are essential in this sector to verify the identities of players, detect fraudulent activities, and comply with regulatory requirements. This article explores the role of KYC in the gaming and gambling industry, highlighting specific requirements and best practices.

Importance of KYC in the Gaming Industry

KYC processes are crucial for gaming and gambling operators to maintain the integrity of their platforms, prevent money laundering, and ensure compliance with local and international regulations. By verifying the identities of players, operators can mitigate risks, enhance security, and build trust with their customers.

Key KYC Requirements for Gaming and Gambling Operators

1. Identity Verification

Description: Verify the identity of players to prevent fraud and ensure compliance with regulations.

How It Works:

  • Document Verification: Collect and verify government-issued documents such as passports, driver’s licenses, and utility bills.
  • Digital Authentication: Use digital methods like facial recognition, biometric checks, and electronic identity verification.

Importance:

  • Prevents underage gambling
  • Ensures that players are who they claim to be

2. Age Verification

Description: Ensure that players meet the legal age requirement for gambling.

How It Works:

  • Document Checks: Verify the age of players through official identification documents.
  • Automated Age Verification: Use software that automatically verifies the age of players during the registration process.

Importance:

  • Prevents underage gambling
  • Ensures compliance with legal requirements

3. Source of Funds Verification

Description: Verify the source of funds used by players to detect and prevent money laundering.

How It Works:

  • Bank Statements: Request bank statements and other financial documents to verify the source of funds.
  • Transaction Monitoring: Monitor player transactions for any unusual or suspicious activities.

Importance:

  • Detects and prevents money laundering
  • Ensures that funds used for gambling are legitimate

4. Ongoing Monitoring

Description: Continuously monitor player activities and transactions for signs of suspicious behavior.

How It Works:

  • Automated Systems: Implement automated monitoring systems that flag unusual activities.
  • Manual Reviews: Conduct manual reviews of flagged activities to determine if further investigation is needed.

Importance:

  • Early detection of potential fraud
  • Ensures ongoing compliance with regulatory requirements

Best Practices for KYC in Gaming and Gambling

1. Multi-Factor Authentication (MFA)

Description: Use multi-factor authentication to enhance security during the registration and login processes.

Benefits:

  • Provides an additional layer of security
  • Reduces the risk of account takeovers and fraud

2. Advanced Fraud Detection Tools

Description: Implement advanced fraud detection tools to identify and prevent fraudulent activities.

Benefits:

  • Early detection of potential fraud
  • Protects the integrity of the gaming platform

3. Regular Compliance Audits

Description: Conduct regular audits of KYC processes to ensure compliance with regulatory requirements and identify areas for improvement.

Benefits:

  • Ensures that KYC practices remain up-to-date with regulatory changes
  • Identifies gaps and weaknesses in existing processes

4. Player Education

Description: Educate players about the importance of KYC and the measures taken to ensure their security.

Benefits:

  • Builds trust with players
  • Encourages compliance with KYC processes

5. Data Privacy and Protection

Description: Implement robust data privacy and protection measures to safeguard player information.

Benefits:

  • Ensures compliance with data protection regulations
  • Protects players’ personal and financial information

KYC processes are vital for ensuring compliance and preventing fraud in the gaming and gambling industry. By implementing robust KYC practices, operators can verify the identities of players, detect fraudulent activities, and comply with regulatory requirements. Effective KYC practices include multi-factor authentication, advanced fraud detection tools, regular compliance audits, player education, and data privacy measures. These measures help gaming and gambling operators maintain the integrity of their platforms, protect their business, and build trust with their players.

KYC for Insurance: How Insurance Companies Use KYC to Verify Policyholders

KYC for Insurance: How Insurance Companies Use KYC to Verify Policyholders

Insurance companies handle significant financial transactions and sensitive personal information, making robust Know Your Customer (KYC) processes crucial. Effective KYC practices help verify the identities of policyholders, assess their risk profiles, and detect fraudulent activities. This article explores how insurance companies implement KYC to verify policyholders, highlighting its importance in preventing fraud and ensuring compliance.

Importance of KYC for Insurance Companies

KYC processes are essential for insurance companies to ensure that policies are not issued under false pretenses or used for illegal activities like money laundering and fraud. By verifying the identity of policyholders and assessing their risk, insurance companies can maintain the integrity of their services and comply with regulatory requirements.

Key KYC Requirements for Insurance Companies

1. Identity Verification

Description: Insurance companies must verify the identity of policyholders using official documents.

How It Works:

  • Document Collection: Collect and verify government-issued documents such as passports, driver’s licenses, and utility bills.
  • Digital Verification: Use digital verification methods, such as facial recognition and biometric checks, for online applications.

Importance:

  • Ensures the authenticity of policyholders’ identities
  • Prevents the issuance of policies to fraudulent individuals

2. Risk Assessment

Description: Assess the risk profile of each policyholder based on various factors.

How It Works:

  • Data Collection: Gather information about the policyholder’s background, occupation, and financial status.
  • Risk Profiling: Evaluate the risk level based on the collected data and determine if enhanced due diligence is required.

Importance:

  • Identifies high-risk policyholders who may require additional scrutiny
  • Helps in tailoring insurance products to meet specific risk profiles

3. Enhanced Due Diligence (EDD)

Description: Conduct more thorough checks for high-risk policyholders.

How It Works:

  • In-Depth Verification: Collect additional information about the policyholder’s source of funds and wealth.
  • Ongoing Monitoring: Continuously monitor high-risk policyholders for suspicious activities.

Importance:

  • Provides an additional layer of security for high-risk accounts
  • Helps in detecting and preventing fraudulent activities

4. Transaction Monitoring

Description: Monitor policyholder transactions and activities for signs of suspicious behavior.

How It Works:

  • Automated Systems: Implement automated systems to flag unusual transactions and activities.
  • Manual Reviews: Conduct manual reviews of flagged transactions to determine if further investigation is needed.

Importance:

  • Timely detection of potential fraud
  • Ensures compliance with regulatory requirements

Best Practices for KYC in Insurance

1. Comprehensive Data Collection

Description: Collect detailed information about policyholders during the onboarding process.

Benefits:

  • Provides a complete understanding of the policyholder’s risk profile
  • Enhances the accuracy of risk assessments and due diligence

2. Advanced Fraud Detection Systems

Description: Implement advanced fraud detection systems to identify and prevent fraudulent activities.

Benefits:

  • Early detection of potential fraud
  • Reduces the risk of financial losses and reputational damage

3. Regular Audits

Description: Conduct regular audits of KYC processes to ensure compliance and identify areas for improvement.

Benefits:

  • Ensures that KYC practices remain up-to-date with regulatory changes
  • Identifies gaps and weaknesses in existing processes

4. Employee Training

Description: Provide ongoing training for employees on KYC procedures and regulatory updates.

Benefits:

  • Keeps staff informed about the latest regulations and best practices
  • Ensures consistent and effective implementation of KYC processes

KYC processes are critical for insurance companies to verify the identities of policyholders, prevent fraud, and ensure compliance with regulatory requirements. By implementing robust KYC practices, insurance companies can protect their business, maintain the integrity of their services, and build trust with their customers. Effective KYC practices include comprehensive data collection, advanced fraud detection systems, regular audits, and employee training.

Vaidyanathan Chandrashekhar

Vaidyanathan Chandrashekhar

Advisors

“Chandy,” is a technology and risk expert with executive experience at Boston Consulting Group, Citi, and PwC. With over two decades in financial services, digital transformation, and enterprise risk, he advises iComply on scalable compliance infrastructure for global markets.
Thomas Linder

Thomas Linder

Advisors

Thomas is a global tax and compliance expert with deep specialization in digital assets, blockchain, and tokenization. As a partner at MME Legal | Tax | Compliance, he advises iComply on regulatory strategy, cross-border compliance, and digital finance innovation.
Thomas Hardjono

Thomas Hardjono

Advisors

Thomas is a renowned identity and cybersecurity expert, serving as CTO of Connection Science at MIT. With deep expertise in decentralized identity, zero trust, and secure data exchange, he advises iComply on cutting-edge technology and privacy-first compliance architecture.
Rodney Dobson

Rodney Dobson

Advisors

Rodney is the former President of ADP Canada and international executive with over two decades of leadership in global HR and enterprise technology. He advises iComply with deep expertise in international service delivery, M&A, and scaling high-growth operations across regulated markets.
Praveen Mandal

Praveen Mandal

Advisors

Praveen is a serial entrepreneur and technology innovator, known for leadership roles at Lucent Bell Labs, ChargePoint, and the Stanford Linear Accelerator. He advises iComply on advanced computing, scalable infrastructure, and the intersection of AI, energy, and compliance tech.
Paul Childerhose

Paul Childerhose

Advisors

Paul is a Canadian RegTech leader and founder of Maple Peak Group, with extensive experience in financial services compliance, AML, and digital transformation. He advises iComply on regulatory alignment, operational strategy, and scaling compliance programs in complex markets.
John Engle

John Engle

Advisors

John is a seasoned business executive with senior leadership experience at CIBC, UBS, and Accenture. With deep expertise in investment banking, private equity, and digital transformation, he advises iComply on strategic growth, partnerships, and global market expansion.
Jeff Bandman

Jeff Bandman

Advisors

Jeff is a former CFTC official and globally recognized expert in financial regulation, fintech, and digital assets. As founder of Bandman Advisors, he brings deep insight into regulatory policy, market infrastructure, and innovation to guide iComply’s global compliance strategy.
Greg Pearlman

Greg Pearlman

Advisors

Greg is a seasoned investment banker with over 35 years of experience, including leadership roles at BMO Capital Markets, Morgan Stanley, and Citigroup. Greg brings deep expertise in financial strategy and growth to support iComply's expansion in the RegTech sector.
Deven Sharma

Deven Sharma

Advisors

Deven is the former President of S&P and a globally respected authority in risk, data, and capital markets. With decades of leadership across financial services and tech, he advises iComply on strategic growth, governance, and the future of trusted data in AML compliance.