All timings are in SAST

SESSION ONE : 10:05 – 10.45am

Human Risk: just because you can, doesn't mean you should 

When things go wrong within organisations, often the immediate response is to invest in new technology to address the failure. Therefore, while compliance officers may have traditionally come from a legal or audit background, we have seen an increasing requirement for them to develop technological understanding or expertise. However, in the midst of this trend, the human component of compliance has often been overlooked. Key to mitigating risk in an environment run by people is the ability to understand how people are likely to behave. By having the right skills and knowledge, the right mindset and, ultimately, the right supporting culture, companies can harness the full potential of their greatest assets: their people.
Christian Hunt of Human Risk will discuss why the human component is integral to building a successful compliance culture and programme, providing insight into the skills you need to acquire be a modern compliance professional. 

Christian Hunt, Founder, Human Risk, UK

SESSION TWO: 10:50 – 11.40am

Green Crime: Intel to Action 

Environmental crime – including environmental pollution, the illegal wildlife trade, and illegal logging, fishing and mining – is estimated to be worth over US$250 billion per year globally, making it the fourth largest criminal activity after drugs trafficking, counterfeiting and human trafficking. Furthermore, according to the UN, environmental crimes are constantly increasing, by 5-7% per year. 
This session will provide a high-level discussion of environmental crime, including its links to transnational organised crime, corruption as an enabler, and its ever-changing typologies. It will also consider how financial institutions, via their compliance functions, can combat environmental crime by utilising their ability to follow the money and to identify valuable information that can be  shared across the sector and reported to authorities. 

Amanda GoreManaging DirectorCentre for Global Advancement (C4GA), Kenya
Dr Ian CruickshankTransport Taskforce ManagerUnited for Wildlife, South Africa
Atuweni AgbermodjiAML/CFT Program OfficerUnited Nations Office on Drugs and Crime (UNODC), Malawi
Julian Rademeyer, Director (East and Southern Africa), Global Initiative Against Transnational Organized Crime, South Africa

SESSION THREE: 11:45 – 12.35pm

Known Unknowns: The Threat of Cybercrime

Before 2000, Africa hosted only 4.5 million internet users. Today there are close to 400 million users online across the continent. With improvements in internet coverage, the growing availability of cyber-tools, and the increasing maturity and flexibility of cybercrimes, cybercriminals in Africa are becoming bolder and more sophisticated.

This session will examine the latest trends in cybercrime and the evolving conditions that enable criminals to commit such offences. It will also provide advice on how companies and individuals can build more cyber secure and resilient digital capabilities.

Mohamed Chawki, Senior Judge and Founder Chairman, International Association of Cybercrime Prevention (AILCC)
Charl van der Walt, Head of Security Research, Orange Cyberdefense
Collins Oduor, Cyber Security Expert, Tanzania

SESSION FOUR: 12:45 – 1.25pm

Working Between the Lines

Do your frontline staff truly regard themselves as accountable risk owners? And what is their view of compliance and risk oversight? 
The gulf between theory and practice can be glaring when implementing 3 lines of defence (3LOD) or a combined assurance model. The knock-on effects include questionable governance and friction in the relationship between the first, second and third lines of defence. 
This session offers a real-world perspective on how to practically develop a positive and constructive relationship between the risk ownership and risk oversight functions, as well as the benefits of doing so from both a business and compliance perspective. 

Pattison BoleighaGroup Chief Conduct and Compliance Officer, Access Bank Plc, Nigeria
Nicola ComninosGroup Chief Risk Officer, Johannesburg Stock Exchange (JSE), South Africa

SESSION FIVE: 1.30pm – 2.20pm

The Crime-Terror Nexus

Terrorist activity in Africa has risen sharply over the last decade, with key developments including the increased sophistication of terrorist financing, the potential for bioterrorism in Africa, and the growing resilience of the most prominent regional terrorist groups, such as Boko Haram in Nigeria, Al-Shabaab in Somalia, and Ansar al-Sunna in Mozambique.
These regional terrorist groups take advantage of poor governance and widespread corruption to engage in criminal activities, including kidnapping for ransom (KFR), drugs trafficking, cattle rustling and the smuggling of precious metals. This convergence is known as the ‘crime-terror nexus’. 
Understanding the crime-terror Nexus provides the first step towards countering the problem of terrorism. In this session the panel will discuss the nexus and its most recent developments. Typologies linked to terrorist activity in Africa will also be considered, as well as how financial institutions can use past regional and international responses to combat this threat going forwards.

Ross Savage, Course Director, Global Lead Sanctions, ICA
Chris Hessenflow, Special Agent, US Homeland Security, and Assistant Attaché, US Embassy in Pretoria, South Africa
Christopher (Topher) HockeyResearch Fellow, Royal United Services Institute (RUSI), Kenya

SESSION SIX: 2.25pm – 3.10pm

Codes of Conduct: Preparation, compliance and enforcement

Codes of conduct are not a new concept, but have been a comparatively rarely used mechanism in the European privacy landscape. Recently, this has started to change. With South Africa's Information Regulator notifying receipt of various codes of conducts regarding the financial, medical and telecommunications sectors, among others, understanding the drafting, approval and compliance processes are an increasingly dynamic aspect of complying with the conditions of lawful processing under POPIA.

This session will discuss what has happened so far, who is impacted and how, as well as what this process looks like in South Africa and beyond. It will also consider the benefits and potential challenges related with the mechanism 

Amelia WilliamsPrivacy Analyst EMEA, OneTrust DataGuidance
Alexis Galanis, Lead Privacy Analyst EMEA, OneTrust DataGuidance