FinCrime Virtual Week 2025

Ghost in the Machine

VIRTUAL EVENT | August 11-15, 2025

00
:
00
:
00
:
00

Complete your registration, grab your login credentials, and join the event through the link below!
Platform Opens July 28th.

Sign on to FinCrime Week!

ABOUT THE EVENT

Financial crime compliance is no longer just about what we can see—it's about what lurks beneath the surface. Like the "ghost in the machine," financial crime is often an invisible force, concealed within complex systems, emerging in ways that defy traditional detection. Whether through synthetic identities, hidden transaction layers, or decentralized networks, today’s criminals exploit the gaps between technology, human oversight, and regulatory frameworks to launder illicit funds, evade detection, and manipulate financial systems. 

This week-long virtual event brings together financial crime compliance officers, regulators, and law enforcement professionals to confront the hidden forces influencing financial crime today. Just as the human mind is shaped by emotions and unconscious impulses, fraud and illicit finance are shaped by unseen systemic vulnerabilities, weak controls, and evolving technologies. This event will explore how financial institutions can detect these elusive threats, bridge the gap between regulatory oversight and emerging risks, and fortify defenses against financial crime that operates in the shadows. 

Top Sessions

Haunted by Loopholes: How Criminals Exploit Regulatory Gaps

Echoes of the Unseen: Leveraging Data and Intelligence to Detect Hidden Threats

Ghost Protocols: Tracking Financial Crime in Decentralized and Obfuscated Systems

Whistleblowers Awakened: What Compliance Officers Need to Know About the DOJ’s Whistleblower Program

The Shape-Shifters: Unmasking Synthetic Identity Fraud

WHY ATTEND?

Financial criminals are evolving, using new technologies and deceptive tactics to stay one step ahead—but compliance officers, regulators, and law enforcement can’t afford to let the Monsters win.  

FinCrime Virtual Week 2025: Ghost in the Machine – Detecting Hidden Threats in Financial Crime Compliance is your chance to sharpen your investigative instincts, uncover hidden risks, and strengthen your defenses against the latest threats in financial crime. From AI-driven laundering schemes to deepfake fraud and dark web money trails, this immersive event will equip you with the tools, strategies, and intelligence you need to detect, disrupt, and dismantle financial crime operations.  

With expert-led sessions, real-world case studies, and opportunities to engage with top minds in the field, you’ll walk away ready to tackle the ghosts lurking in the financial system. Don’t just fear the spirits—learn how to stop them

WHO SHOULD ATTEND

This event is designed for professionals across financial crime compliance, law enforcement, regulatory agencies, and investigative fields. Attendees will gain critical insights into emerging financial crime threats and best practices for detection and prevention.

Financial Crime Compliance & Anti-Money Laundering (AML) Professionals

  • Chief Compliance Officer (CCO)
  • Anti-Money Laundering (AML) Officer
  • Financial Crime Compliance Specialist
  • Bank Secrecy Act (BSA) Officer
  • AML Investigations Manager
  • Financial Intelligence Unit (FIU) Analyst
  • Know Your Customer (KYC) Analyst
  • Customer Due Diligence (CDD) Specialist
  • Enhanced Due Diligence (EDD) Analyst
  • Sanctions Compliance Officer
  • Transaction Monitoring Analyst
  • Fraud Prevention & Investigations Manager
  • Law Enforcement & Government Agencies
  • Regulatory & Government Oversight Professionals
  • Technology & Digital Forensics Experts

AGENDA
August 11-15th, 2025

Platform Orientation on Friday August 8 - 12-12:30 PM ET

11:00 AM – 12:00 PM ET
Into the Machine: Welcome & Keynote

Every system has a moment of activation, this is ours. In this opening keynote, we power up the core of Ghost in the Machine, exploring the forces shaping financial crime prevention today and the unseen risks that lie ahead. Details coming soon, but trust us: this is the transmission that starts it all.

 

12:15 PM – 12:45 PM ET
Speed Networking: Signals in the System

Step into the network, literally. "Signals in the System" is your chance to connect with fellow attendees, industry pros, and potential collaborators in fast-paced, one-on-one conversations. Using the Grip Events platform, you’ll be matched based on shared interests, goals, and perhaps…something more mysterious. You never know what connections might be hiding in the machine.

1:00 PM – 2:30 PM ET
Beyond the Machine: Examining SARs to Strengthen Financial Crime Investigations

Suspicious Activity Reports (SARs) are often treated as compliance check-boxes—generated, filed, and forgotten. Yet when investigators move “beyond the machine” and examine the narrative, context, and data threads woven into each SAR, they unlock a powerful intelligence asset that can guide broader financial-crime investigations.
 
In this practical, forward-looking webinar we will:
  • Demystify the SAR lifecycle – from initial alert generation through regulatory filing and law-enforcement use, highlighting where investigative value is most often missed.
  • Dissect real-world SAR narratives to show how seemingly minor details (counter-party identifiers, transaction timing, typology clues) can connect disparate cases and surface hidden networks.
  • Explore technology’s evolving role—AI, entity resolution, and graph analytics—and how human insight remains essential for spotting red flags algorithms overlook.
  • Share proven review frameworks that help analysts triage high-volume alerts, extract actionable intelligence, and feed findings back into monitoring models.
  • Map collaboration pathways between banks, fintechs, law enforcement, and regulators to turn isolated SARs into coordinated disruption of fraud, money laundering, sanctions evasion, and crypto-enabled crime.

 

3:00 PM – 3:30 PM ET
ACFCS presents Ghost Stories from the Front Lines: Continuing Education with ACFCS

True tales of financial crime prevention from the pros who’ve lived it.

Step into the shadowy world of real-world financial crime cases, told by professionals who’ve faced the unknown and lived to share what they learned. In this session, you'll hear how ACFCS Certification and Membership helped arm them with the knowledge and tools to navigate complex threats. Learn how continuing education through ACFCS can help you stay ahead of the next haunting headline.

3:45 PM – 4:45 PM ET
Whistleblowers Awakened: What Compliance Officers Need to Know About the DOJ’s Whistleblower Program

The U.S. Department of Justice’s three-year Corporate Whistleblower Awards Pilot Program—launched in August 2024 and updated in May 2025—has dramatically altered the risk-reward calculus for employees who spot misconduct. With potential cash awards of up to 30 percent of the first US $100 million recovered and new protections for qualifying tipsters, “business‐as‐usual” speak-up channels are no longer enough. Compliance officers must quickly grasp how the DOJ program differs from SEC, CFTC, and False Claims Act regimes; where it overlaps; and how it will influence prosecutors’ assessments of corporate cooperation, remediation, and culture .
 
This practical webinar demystifies the DOJ framework, highlights early guidance, and translates policy into actionable steps for building resilient, whistleblower-ready compliance programs. Through real-world scenarios and regulator insights, you’ll learn how to anticipate whistleblower leverage, close internal control gaps, and turn a revitalized speak-up culture into a strategic advantage.
 
Learning Objectives:
After attending, participants will be able to:
  1. Explain key eligibility and award criteria of the DOJ program—including “first-in” timing, exclusions for culpable individuals, and how the 30% / 5% award tiers are calculated.
  2. Differentiate the DOJ pilot from existing whistleblower regimes (SEC, CFTC, OSHA, FCA) and understand when dual filings, conflicts, or priority determinations may arise.
  3. Assess and enhance internal reporting channels to encourage early escalation, preserve privilege, and mitigate the risk of external tipping that could trigger DOJ scrutiny.
  4. Integrate whistleblower considerations into corporate investigations—from document holds and retaliation safeguards to coordination with voluntary self-disclosure and remediation efforts.
  5. Prepare board and senior management briefings that quantify whistleblower-program exposure, outline governance updates required by the DOJ’s 2025 compliance-program guidance, and benchmark “speak-up culture” metrics.

4:45 PM – 5:30 PM ET
Welcome Reception: Ghosts, Games & Good Company

The machine may run on logic, but there's more to this system than circuits and code. Join us for trivia, networking, and prizes at the Ghost in the Machine Welcoming Reception. It’s a chance to connect, compete, and conjure up meaningful conversations with fellow attendees and your ACFCS hosts.

9:00 AM – 10:00 AM ET
False Shadows: Deepfake Risks and How to Counter Them

From identity theft to deepfake deception, fraudsters are evolving, assuming the identities of unsuspecting victims and evading detection. This session will expose the monstrous world of identity fraud, where stolen credentials fuel financial crimes, money laundering, and cyber fraud. Attendees will learn about cutting-edge fraud prevention techniques, biometric authentication, and regulatory considerations that can help institutions defend against imposters lurking in their customer base.

Learning Objectives:

Identify different types of identity fraud, including identity theft, account takeovers, and synthetic fraud.
Understand how fraudsters leverage stolen data, deepfakes, and social engineering to bypass security controls.
Explore emerging fraud prevention technologies such as biometric verification and behavioral analytics.
Learn about global regulatory frameworks and compliance requirements for identity fraud detection.
Gain insights from real-world fraud cases and strategies for enhancing fraud investigation and intelligence sharing.

10:15 AM – 11:15 AM ET
How Criminals Are Using AI to Launder Money – And How to Stop Them

Like a mad scientist’s creation, artificial intelligence is being stitched into financial crime schemes, making money laundering faster, smarter, and harder to detect. Criminals are leveraging AI-powered tools to automate illicit transactions, manipulate identity verification, and outpace traditional compliance measures.
This session will explore how AI is being weaponized for laundering operations, from deepfake-enhanced fraud to AI-generated money mule networks. Compliance professionals will learn how to counter these evolving threats with advanced detection strategies, forensic techniques, and AI-driven compliance solutions to ensure their institutions stay ahead of the financial crime monsters lurking in the shadows.

Learning Objectives:

Understand how AI is being exploited for financial crime, including laundering, fraud, and identity deception.
Identify key risks associated with deepfakes, AI-generated transactions, and synthetic identities.
Explore how AI-driven compliance tools can detect, prevent, and disrupt AI-assisted laundering schemes.
Learn best practices for enhancing AML frameworks and investigative capabilities in response to emerging AI threats.
Analyze real-world case studies of AI-powered laundering and discuss future trends in financial crime prevention.
 

11:30 AM – 12:00 PM ET
Apparition Incoming: Sponsor Demo Details Coming Soon

Details Coming Soon

12:15 PM – 1:15 PM ET
The Shape-Shifters: Unmasking Synthetic Identity Fraud

Like creatures stitched together from stolen data, synthetic identities lurk in the financial system, deceiving banks, fintechs, and regulators. This session will dissect the anatomy of synthetic ID fraud, revealing how criminals fabricate personas, build credit profiles, and exploit vulnerabilities to commit large-scale fraud. Experts will explore red flags, emerging fraud detection technologies, and best practices for financial institutions to identify and shut down these elusive fraudsters before they strike.

Learning Objectives:

Understand the fundamentals of synthetic identity fraud and its impact on financial institutions.
Recognize key red flags and behavioral patterns associated with synthetic identities.
Explore advanced detection methods, including AI, machine learning, and digital forensics.
Learn regulatory expectations and compliance strategies for mitigating synthetic ID fraud risks.
Examine real-world case studies and best practices for fraud prevention and response.

1:15 PM – 2:00 PM ET
Midday Manifest: Linkedin-Live from the Machine

Join us live on Linkedin for a midday pulse check on all things Ghost in the Machine. We'll share standout moments, unexpected insights, and what (or who 👻) you shouldn’t miss next. Whether you’re already plugged in or just tuning in, this is your window into the heart of the event.

2:00 PM – 3:00 PM ET
Sanctions Graveyard: Investigating the Undead Financial Networks

Sanctioned entities don’t always stay buried—bad actors find ways to resurrect financial networks, evade restrictions, and continue illicit operations. From shell companies and cryptocurrency laundering to complex trade-based schemes, criminals are constantly evolving their tactics to bypass global sanctions.
 
This session will explore how compliance professionals can detect and dismantle these undead financial networks. Experts will discuss cutting-edge investigative tools, red flag indicators, and case studies of major sanctions evasions that have haunted financial institutions.

Learning Objectives:

1. Understand how sanctioned entities attempt to bypass restrictions using financial crime tactics.
2. Learn investigative strategies to track and disrupt sanctions evasion schemes.
3. Explore the role of blockchain forensics, trade finance monitoring, and AI in sanctions compliance.
4. Identify key red flags that indicate hidden ties to sanctioned individuals or entities.
5. Gain insights from real-world cases of sanctions violations and enforcement actions.

3:15 PM – 3:45 PM ET
ACFCS presents: The Machine Learns- Training Humans for the Next FinCrime Threat with CFCS Certification

AI may be evolving, but your greatest weapon is still human intelligence.
 
As technology becomes smarter, so must the professionals working to prevent financial crime. This session explores the intersection of AI, risk, and education, showing how ACFCS Certification and the Certification Accelerator Program prepare you for tomorrow’s threats, today. Discover how our training sharpens human insight where the machines fall short.

4:00 PM – 5:00 PM ET
Ghost Protocols: Tracking Financial Crime in Decentralized and Obfuscated Systems

Lurking beneath the surface of every financial institution are hidden risks—shell companies, illicit transactions, and bad actors disguising their footprints. Just like monsters in the dark, these threats evolve, becoming harder to detect and more dangerous to ignore.
This session will delve into advanced risk assessment techniques, investigative strategies, and forensic methodologies to uncover concealed financial crime risks. Attendees will explore real-world case studies and gain insights into leveraging technology, behavioral analysis, and enhanced due diligence to shine a light on the shadows of financial crime.

Learning Objectives:

Identify hidden risks in financial transactions, supply chains, and customer networks.
Learn investigative techniques to uncover money laundering, fraud, and corruption.
Explore the role of AI, analytics, and forensic accounting in detecting financial crime.
Understand best practices for risk mitigation and compliance frameworks.
Analyze case studies of institutions that failed to spot shadow risks—and the consequences.
 

5:00 PM – 5:30 PM ET
Speed Networking: Ghost Connections

Not all connections are visible at first glance. Tap into the unseen network of professionals working to stop financial crime. "Ghost Connections" gives you quick, meaningful conversations with other attendees, driven by AI-powered matchmaking through the Grip platform. Who, or what, you meet may surprise you.

7:15 AM – 7:45 AM ET
Speed Networking: Circuit Breaker

Break out of your routine and into a circuit of fast-paced conversations. Whether you're chasing leads, insights, or inspiration, "Circuit Breaker" helps you find them—one rapid connection at a time. You bring the spark; we’ll help you find the current.

8:00 AM – 9:00 AM ET
FinCrime Insights from West Africa - Fraud Trends, Compliance Challenges and More

West Africa’s fast-growing, tech-savvy economies are reshaping how money moves— and how criminals exploit the system. From sophisticated business-email-compromise rings in Lagos to social-engineering scams that piggyback on mobile-money adoption in Accra and cross-border trade mis-invoicing through Abidjan’s ports, the region offers a microcosm of the next wave of global fraud threats.
 
This webinar brings together on-the-ground investigators, banking compliance leads, and regional regulators to decode the latest schemes, unpack the regulatory patchwork that financial institutions must navigate, and spotlight proven counter-measures that work in high-growth, resource-constrained environments.
 
Whether you process payments into Africa, support correspondent-banking corridors, or simply want to understand how fraud innovations born in West Africa are being exported worldwide, this session will equip you with practical intelligence—and a roadmap for action.
 
Learning Objectives
After attending, participants will be able to:
  1. Identify at least three dominant fraud typologies currently proliferating in West Africa, including mobile-money phishing, advance-fee (419) variants, BEC “hybrid” attacks, romance scams, and trade-based money-laundering structures.
  2. Explain the key regulatory frameworks (e.g., WAEMU, ECOWAS, individual central-bank guidelines) and where gaps in supervision or enforcement create compliance blind spots for domestic and international firms.
  3. Assess the impact of rapid fintech adoption—agent banking, crypto remittances, and super-apps—on KYC, transaction-monitoring, and sanctions-screening controls.
  4. Apply a risk-based approach to enhance due-diligence, fraud-detection, and investigative workflows tailored to West-African counterparties, merchants, and payment channels.
  5. Collaborate more effectively with local banks, law-enforcement units, and public–private partnerships to share intelligence, freeze illicit proceeds, and prosecute offenders.

9:15 AM – 10:15 AM ET
Integrity Risks in Global Development Projects: Preventing, Detecting, and Deterring Fraud and Corruption to Achieve Impact

Billions of development dollars flow each year into infrastructure, health, education, climate, and humanitarian programs—but with them come heightened integrity risks. Procurement collusion, diversion of grant funds, ghost beneficiaries, and off-the-books kickbacks can silently erode outcomes, threaten community trust, and trigger costly donor sanctions. This webinar examines the full fraud-and-corruption lifecycle in global development projects and translates hard-won lessons from multilaterals, NGOs, and implementing partners into practical safeguards.
 
Learning Objectives:
1. Identify common fraud and corruption schemes that threaten development projects and recognize early warning signs in procurement, disbursement, and reporting processes.
2. Compare major donor integrity frameworks—including investigation triggers, debarment standards, and remedy expectations—and position their organization to comply across jurisdictions.
3. Deploy data-driven detection techniques (AI anomaly scoring, network analysis, open-source intelligence) to uncover suspicious patterns while maintaining project momentum.
4. Design risk-based prevention and deterrence measures—such as enhanced due diligence, milestone-linked payments, and community monitoring—that are proportionate to the project’s context and risk profile.

 

10:30 AM – 11:30 AM ET
Phantom Circuits - Insider Risks and How to Counter Them

They’re trusted with your data, systems, and brand reputation—yet a single disaffected employee, contractor, or business partner can quietly “bleed” an organization of millions in assets and priceless intellectual property. Phantom Circuits– Insider Risks and How to Counter Them pulls back the curtain on the motives, methods, and tell-tale behaviors of insider threat actors—from negligent staff who leave doors open to sophisticated saboteurs who monetize confidential information on the dark web.

In this webinar, attendees will learn how today’s organizational culture, human motivations, vulnerabilities and today's AI threats have reshaped insider-risk exposure—and what a holistic counter-strategy looks like in 2025.

Expect pragmatic guidance on aligning user-behavior analytics, and “people-first” culture programs into one cohesive defense-in-depth model that deters, detects, and responds to internal threats before the bleeding begins.

Learning Objectives
After completing this session, participants will be able to:

1. Differentiate the primary insider-risk archetypes—malicious, negligent, and compromised actors—and map typical threat pathways for each.
2. Recognize early warning indicators in user activity, access patterns, and behavioral cues that precede data theft, fraud, or sabotage events.
3. Compare leading frameworks and regulatory expectations to benchmark an effective insider-risk program.
4. Design a layered control set—combining technical safeguards with governance measures (segregation of duties, continuous vetting, whistle-blower channels).

11:40 AM – 12:10 PM ET
ACFCS presents: Exorcising your institutional Risk with Enterprise Solutions

Banish weak compliance and lurking vulnerabilities, for good.
 
No Ouija board required. This session uncovers how training, awareness, and a culture of compliance can drive out the hidden demons of financial risk. Learn how ACFCS Membership and Enterprise Training Solutions empower institutions to take a proactive stance against regulatory hauntings. Your defense starts with knowledge.

12:15 PM – 12:45 PM ET
Ghost Feed: Your Linkedin-Live Lunchtime Transmission 

Tap into the Linkedin live stream of insights, updates, and surprise moments from the event. Ghost Feed is your midday transmission for what’s happening and what’s coming. Tune in, recharge, and get ready to dive back in.

12:45 PM – 1:45 PM ET
Elder Financial Abuse Trends and Typologies

2:00 PM – 2:30 PM ET
Shadow Drop: Sponsor Spotlight Details Coming Soon

Details Coming Soon

2:45 PM – 4:15 PM ET
Human Trafficking Uncovered: Dispelling Myths and Understanding the Reality

4:30 PM – 5:30 PM ET
Glitch in the Agenda- A Paranormal Interlude

A ghostly good time is brewing behind the scenes. This mysterious entertainment segment will offer a break from the logic of the machine and maybe even a few chills. Full session details dropping soon...

8:15 AM – 8:45 AM ET
ACFCS Presents: Ghostbusters- The FinCrime Edition, tackling typologies with ACFCS Membership

Who you gonna call when risk gets weird? ACFCS.
 
Join this energetic session to see how our suite of eLearning modules, Membership resources, and Certification programs give professionals the power to tackle fraud, money laundering, cybercrime, and more. Suit up for a rapid-fire tour of what makes ACFCS your partner in prevention, and your proton pack in the fight against financial phantoms.

9:00 AM – 10:00 AM ET
Ghost in the Blockchain - Illuminating the Shadows of Illicit Crypto Transactions

Step into the enigmatic world of digital finance with "Ghost in the Blockchain – Illuminating the Shadows of Illicit Crypto Transactions." This webinar explores how illicit actors exploit blockchain technology to obscure their financial trails and evade detection. Our expert panel will break down the sophisticated methods used to launder funds and facilitate illegal transactions, and discuss the emerging tools and techniques designed to reveal these hidden operations.
 
Throughout this session, you'll gain insights into:
  • Detection Strategies: Learn about advanced analytical tools and methodologies for identifying suspicious patterns in blockchain data.
  • Regulatory Perspectives: Understand the evolving legal frameworks and compliance challenges in addressing illicit crypto activities.
  • Real-World Case Studies: Examine illustrative examples that reveal how cybercriminals exploit the blockchain and how financial institutions can fortify their defenses.

10:15 AM – 11:45 AM ET
Night of the Living Loophole - Real Estate and FinCrime Risks

12:00 PM – 1:00 PM ET
Echoes of the Unseen: Leveraging Data and Intelligence to Detect Hidden ThreatsFake IDs, Real Problems - Untangling the Identity Challenge

1:10 PM – 1:40 PM ET
Awaiting Manifestation from the Sponsor Realm - Sponsor Demo Details Coming Soon

1:45 PM – 2:45 PM ET
Ghost Signal Detected… Stand By. FINRA Session Title Coming Soon

2:45 PM – 3:15 PM ET
Reboot: Midday Linkedin-Live Lunch and Recap

Step away from your inbox and into a rapid reset. Reboot is our live LinkedIn lunch broadcast featuring updates from the floor, session reactions, and what’s generating buzz. Perfect for those looking to reconnect before the afternoon charge.

3:15 PM  – 4:15 PM ET
Digital Specters - Detecting Corruption in the Financial System

Deep in the shadows of the financial world lurk bribery, sanctions evasion, and shell companies—tools of corruption that allow illicit money to creep undetected through global financial systems. Just like monsters hiding under the bed, these financial crime tactics thrive in the dark corners of weak compliance frameworks, haunting institutions that fail to recognize their red flags.
 
In this session, we will unmask the ghosts of corruption, exposing how fraudsters, politically exposed persons (PEPs), and organized crime syndicates use financial institutions to move illicit funds.  
Learning Objectives:

1. Identify common corruption techniques used to exploit financial institutions, including bribery, sanctions evasion, and shell companies.
2. Recognize key red flags and suspicious transaction patterns associated with corruption-related financial crime.
3. Understand the role of regulatory frameworks such as the FCPA, UK Bribery Act, and AML laws in combatting corruption.
4. Apply forensic investigative techniques and enhanced due diligence (EDD) to detect and prevent corruption risks.
5. Learn from real-world cases and regulatory enforcement actions to strengthen anti-corruption compliance programs.
 

4:30 PM – 5:30 PM ET
Real Identities, Real Problems - Unpacking the Identity Mess and its Impact on KYC 

9:30 AM – 10:00 AM
Speed Networking: The Web Within

Beneath every event lies an invisible network of opportunity, this is your chance to access it. “The Web Within” offers fast-paced conversations designed to surface meaningful connections and hidden common ground. Step in and see what’s been waiting to connect with you.

10:15 AM – 11:15 AM ET
The Future of Compliance: AI, RegTech, and the Changing Role of Financial Crime Risk Management

11:30 AM – 12:00 PM ET
ACFCS Presents: Invisible Threats, Visible Solutions with ACFCS Membership & Certification

What you can’t see can hurt you, but we can help you find it.
 
Financial crime is full of hidden dangers, from suspicious patterns to subtle gaps in compliance. In this session, we’ll show how ACFCS education, Certification, and Membership shine a light on the unseen, empowering you to uncover threats before they strike. Don’t fear the unknown, understand it.

12:15 PM – 1:15 PM ET
Transmission from the Beyond (Details Coming Soon)

2:00 PM – 2:30 PM
Speed Networking: Ghost Circuit

Some of the most powerful connections aren’t obvious, until they are. “Ghost Circuit” pairs you with fellow professionals in rapid conversations designed to surface insights, opportunities, and unexpected alignments. Step into the flow and see where the current leads.

2:45 PM – 3:45 PM ET
Phantom Transactions: Unraveling Invisible Laundering Networks

3:45 PM – 4:30 PM ET
Closing Remarks: Echoes & Endings

As the signal fades and the system winds down, join us for one final gathering to celebrate the connections, insights, and milestones of the event. The Ghost in the Machine Closing Reception features prize announcements, scholarship winner reveals, and a chance to celebrate the community powering financial crime prevention. Don’t miss this meaningful send-off.

FEATURED SPEAKERS

Laura Ferris

Interim Director of Illicit Financial Policy

 

The Sentry

Kevin Metcalf

Founder

Grey Beard Consulting LLC

Mouhamadou Diagne

VP, Integrity Unit

 

The World Bank

Charles Finfrock

Founder

Vigilance LLC

Shawnee Delaney

CEO

Vaillance Group

Matthew Hedger

Founder

Artemist Advisory Group

Olagoke Salawu

Head, Financial Crimes Compliance

Sterling Bank

Vadim Slavin

Head of Product

 

GlobaliD

Pravin Chandrasekaran

BSA Officer

Varo Money

Sheetal Bhardwaj

Head of Compliance, Digital Assets/Emerging Technologies

Commercial Bank of Dubai

John Wiethorn

Head of Financial Crime Compliance & AML/BSA Officer

Gusto

Ruth Kruse

Deputy BSA Officer

Southwest Heritage Bank

Brody Burks

Assistant Attorney General

Office of Texas Attorney General

Dr. Nicholas Gilmour

Founder

Vortex Risk

Rio Miner

Founder & CEO

FCI Tradecraft

Sharon Blanchette

Writer / Content Creator

Independent

Gold Sponsors

Silver Sponsors

REGISTER NOW

Like FinCrime Virtual Week?

Check out other ACFCS products and save today with code FVW25 for 10% off at checkout through August 29th. Don't miss member and government exclusive pricing!

1 Year Membership

Sold out

1 Year Membership and Certification

Sold out

Frequently Asked Questions

Registration

How do I register?

This event is free to the ACFCS community! Sign up through the form above.

Can we register as a group?

Please have each member of the group complete the form above to ensure access to the event.

When should I register?

For the smoothest user experience, we recommend registering for the event at least 2 business days prior to the event start.

I registered on or after the event start date, when will I get access to the platform?

An email with your unique platform login credentials will be sent via email.

For day-of or mid-event registration: If you do not receive this email within 1 hour of registering, please reach out to eventsupport@acfcs.org for assistance with your credentials.

Access

How do I access the virtual event platform?

An email with your unique platform login credentials will be sent via email from the domain: events.acfcs.org.

You can access the Grip Login Page here: FinCrime Virtual Week 2025 Event Login

For day-of or mid-event registration: If you do not receive this email within 1 hour of registering, please reach out to eventsupport@acfcs.org for assistance with your credentials.

What if I lose my login credentials?

Use the "Forgot Password" feature on the login page.
If you are still have difficulty logging in, please contact our support team at eventsupport@acfcs.org.

When can I access the virtual event platform?

The event platform opens 1-2 weeks prior to the event start.

Will I have access to the content after the event?

Content will be accessible through the Grip platform for up to 1 week following the event. All recorded sessions will be available in the learning portal for members within 1 week of the event end date.

Technical Requirements

What devices can I use to join the virtual event?

Supported Devices

Desktop or laptop computer (recommended for best experience)
iPad or Android tablet
iPhone or Android smartphone

Which browsers work best for the virtual platform?

Recommended Browsers

Google Chrome (preferred browser)
Mozilla Firefox (latest version)

Will I need to download any software?

Software Requirements

No additional software download required for browser access

Optional Grip mobile app available for:
iOS devices (iOS 13.0 or later)
Android devices (Android 8.0 or later)

Will I need audio / video capabilities?

Audio/Video Requirements

  • Webcam or built-in camera for video meetings
  • Microphone (built-in or external)
  • Speakers or headphones
  • Recommended: Headset with microphone for best audio quality

Internet Connection

  • Minimum speed: 1.5 Mbps upload/download
  • Recommended: 5+ Mbps for optimal video quality
  • Wired connection preferred over WiFi when possible

System Requirements

  • Windows 10 or later
  • macOS 10.14 or later
  • 4GB RAM minimum
  • Processor: Intel Core i3 or equivalent (i5 or better recommended)

Additional Recommendations

  • Close unnecessary browser tabs and applications
  • Ensure your device is plugged in or fully charged
  • Test your audio/video setup before important meetings
  • Have a backup device ready if possible

During the Event

How do I ask questions during sessions?

Questions should be submitted through the Q&A box available on screen during the live session.

What if I experience technical difficulties during the event?

Some trouble shooting tips:

Refresh your screen
Close additional tabs
Use Chrome or Firefox browsers
Log out and log back in
Access the session through an incognito window

If you need additional assistance, please contact eventsupport@acfcs.org

How can I network with other attendees?

Smart Matches
Find your recommended connections in the "Recommended" tab
Get matched with people who share your interests
View profiles and send meeting requests
Receive new suggestions daily

Schedule 1:1 Video Meetings
Click "Meet" on someone's profile
Choose an available time slot
Add a short message
Join the video meeting through the automatic link

Message Other Attendees
Use the chat feature to start conversations
Respond to messages in your inbox
Connect with speakers after sessions

Speed Networking
Join scheduled speed networking sessions
Meet new people in quick 3-5 minute video chats
Get matched automatically with other participants
Choose to extend conversations or schedule follow-ups
Move to the next match when the timer ends

Engage During Live Sessions
Chat with other attendees during presentations
Ask questions through Q&A
Connect with people who share your interests
Message speakers and fellow attendees

Tips for Success
Complete your profile with a photo and bio
Respond to meeting requests promptly
Join at least one group discussion
Follow up with your new connections
Export your contacts after the event

How do I access the recording of a previous session?

To access a previous session:

  1. Go to the "Schedule" or "Content" tab
  2. Click on "On-Demand" or "Previous Sessions"
  3. Locate the session you want to watch
  4. Click "Watch Recording"
  5. Use the video player controls to navigate the content

Why do I have to provide my details after adding a session to my schedule?

The Grip events platform works with existing webinar platforms to host the agenda. Because of this, you will be asked to provide additional information for the webinar platform (first, last, and email) for each session. Please be sure to provide your full name and email in order for your certificate of completion to be credited correctly.

Where do I find my Certificate of Participation?

Certificates of Participation are available following the session as long as 80% of the session was viewed. This is available on screen during the session. Following the completion of the event certificates for specific sessions can be located within the session in the ACFCS learning portal.

Why are there sessions unavailable for On-Demand viewing?

Some sessions may not be recording due to the sensitive nature of information being shared. Such sessions are conducted under the Chatham House Rule and will be marked in the agenda as a Live Only.

When a meeting is held under the Chatham House Rule, participants are free to use the information they receive, but they may not reveal the identity or affiliation of any other participant who shared that information.

In practice, this means:

  • You can share what was discussed in the meeting
  • You can share any information or insights you learned
  • You can act on the information received
  • You cannot disclose who said what
  • You cannot reveal which organizations were represented by particular views or comments

Event Platform: Grip

How do I access the Grip platform?

You'll receive a welcome email with a unique link to access the platform. Click the link and set up your password. You can then access the platform through the event homepage or download the Grip mobile app.

How do I set up my Grip profile?

After logging in:

  1. Upload a professional photo
  2. Add your job title and company
  3. Include your professional interests
  4. Set your networking objectives
  5. Add your LinkedIn profile (optional)

Who can see my profile information?

By default, only registered event participants can view your basic profile. You can adjust your visibility settings in your profile preferences.

How do I schedule meetings with other attendees?

To schedule a meeting:

  1. Find an attendee through the "Networking" tab
  2. Click "Meet" on their profile
  3. Select an available time slot
  4. Choose virtual meeting room or text chat
  5. Add a personalized message
  6. Wait for confirmation

Can I create my own schedule?

Yes, you can:

  • Browse the "Schedule" tab
  • Click the star icon to bookmark sessions
  • View your personalized agenda in "My Schedule"

In what time zone is the schedule displayed?

All times are displayed in Eastern Time, but the platform will automatically show session times in your local time zone once you log in.

What if I miss part of a session?

Live sessions can be accessed at any point during the live session or viewed in full on demand.

To access a previous session:

  1. Go to the "Schedule" or "Content" tab
  2. Click on "On-Demand" or "Previous Sessions"
  3. Locate the session you want to watch
  4. Click "Watch Recording"
  5. Use the video player controls to navigate the content

Additional Support

Where can I find help during the event?

Support is available through multiple channels:
- Help desk email: eventsupport@acfcs.org
- FAQ section in the platform
- Orientation Video

What if I forgot to download my certificates?

Certificates will be available in the learning portal following the end of the event. Just search for the session you missed and download your certificate.

Where do I find more information on CFCS?

Interested in getting certified? Find more information here: CFCS Certification Overview

Where do I find more information on Enterprise and Group pricing?

Interested in getting an Enterprise or Group Package? Find more information here for groups of 10 or more : Enterprise Solutions and Groups

How do I get involved with my local Chapter?

Interested in getting involved with your local ACFCS Chapter? Find your chapter here: ACFCS Chapters

Speakers, Sponsors, and Contributors: How do I get involved with ACFCS?

How do I become a speaker?

Interested in Speaking at an ACFCS event? Tell us more!
Complete a Speaker Interest Form Here!

How do I become an event sponsor?

Interested in Sponsoring a future ACFCS Event?

Check out our Sponsors page to learn more or fill out this form to get in touch.

How do I become a contributor?

State Your Case Podcast
Do you have an interesting financial crime case that you have worked on? Has it been adjudicated and is ready for prime time? Whether you are public or private sector we want to hear from you! Check out the State Your Case Podcast Interest Form here!

Member Spotlight
We're so excited to have so many amazing people in our community and we're even more excited to highlight our Members!
Complete this form for a chance to be featured in a Member Spotlight on the ACFCS website.