Book with Confidence: If your plans change, go virtual, come later on, or get a full refund.

Advanced Compliance Toolkit

Course Information:

Online £2,500.00 20 hrsFlexible
In-House Agreed with client FlexiblePOA
London 10 days 28-Feb£5,900.00
London 10 days 07-Nov£5,900.00


    Please ensure you fill out all fields

    With your permission, we would also like to keep you updated about programs and/or services similar to the one you are enquiring about as well as special offers, L&D updates and content to help you with your ongoing learning and development. If this is okay please tick the box below

    Subscribe to our newsletter

    Your personal details are very important to us and we only use them for admin reasons only, unless you have asked to receive our newsletter and marketing. This is in accordance with our Privacy Policy

    LCT 2022 Brochure
    LCT 2022 Brochure

    Who should attend?

      Delegates responsible for the prevention and control of financial crime, money laundering and fraud investigators, and regulatory compliance specialists, or professionals seeking to obtain specialist skills within the modern financial crime compliance (FCC) space



    • Describe the background, nature and current trends of economic crime from a vocational perspective
    • Obtain 360-degree experience of anti-money laundering laws, regulations and FCC best practices
    • Apply effectively reporting systems, the exchange of information, and financial intelligence
    • Use realistic and proportionate action plans for combating financial crime


    Financial Crime

    • Transnational organised crime
    • Interpol’s 18 crime areas
    • Global response: the AML Regime
    • Terrorist financing and Sanctions
    • UNTOC
    • FATF
    • The Egmont Group
    • The role of FIUs
    • The private sector: gatekeepers
    • The rationale of reporting
    • The role of financial intelligence
    • FCC as the tool to protect the financial system’s integrity

    Anti-Bribery and Corruption (ABC)

    • ABC essentials explained
    • UKBA 2010
    • Anti-Bribery & Corruption videos
    • Whistleblowing
    • FCA
    • OECD
    • UNCAC
    • Stolen Asset Recovery Initiative (StAR)
    • StAR Cases
    • SFO Cases
    • FCPA Cases

    Cyber crime

    • Phishing
    • Webcam manager
    • File hijacking
    • Keylogging
    • Screenshot manager
    • Ad clicker
    • Hacking
    • Distributed Denial of Service (DDOS)
    • JMLIT
    • European Cybercrime Centre (EC3)
    • Information Assurance and Cyber Security for Information Asset and Information Risk Owners

    Anti-Money-Laundering (AML)

    • Proceeds of crime
    • The three – stage ML process
    • The three ML stages
    • ML vulnerability: the Zero point
    • Basel AML Index
    • Offences
    • The 4TH MLD
    • Case study: POCA, Part 7 ML
    • Triggering the AML investigation
    • From Suspicion to reporting
    • SAR and the Good “Narrative”
    • SAR simulation exercise: Lodging SARs to the NCA


    • Identity crime
    • Individual fraud
    • Corporate fraud
    • Online fraud
    • Advanced fee fraud
    • Tax and benefit system fraud
    • Intellectual property crime
    • Insider dealing

    Advanced AML Loadicator

    • What is “not” money laundering
    • What “is” money laundering
    • Offence 1: Concealment
    • Offence 2 Arrangements
    • Offence 3: Acquisition, use and possession
    • SAR Narrative Review – internal reporting
    • SAR lodging – external reporting

    Advanced ABC Loadicator

    • Tracing capital flight from developing countries
    • Sustainable development goals in practice
    • Illicit financial flows
    • UNCAC and beneficial ownership transparency
    • Beneficial ownership registries
    • Scanning and profiling legal entities and complex legal arrangements

    AML Tools

    • Tool 1: KYA (Know Your Assets)
    • Tool 2: KYB (Know Your Business)
    • Tool 3: KYC (Know Your Customer)
    • Tool 4: CDD (Customer Due Diligence)
    • Tool 5: EDD (Enhanced Due Diligence)
    • Tool 6: SDD (Simplified Due Diligence)

    Business Unit and Customer Profiling

    • Linking clients with transactions
    • How to regularly assess ML and TF risks: sources
    • Risk assessment and vulnerability of transactions
    • Fitting your FCC programme in the “holistic” risk-based approach – whose?
    • Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
    • Transparency: internal standards and controls
    • SYSC: Single vs Several Operations – your suspicion matrix
    • Data Protection for businesses and the rise of the Data Protection Officer

    FCC Re-tooling

    • Risk assessments – why? which? and where from?
    • FATF, Basel AML Index and ESMA reloaded
    • Risk-based approach
    • Putting it all together in the SYSC context
    • Trade-based ML – misinvoicing and third-party risk management
    • Financial sanctions: EU, International, and U.S.
    • Proliferation financing

    × Available on SundayMondayTuesdayWednesdayThursdayFridaySaturday