Advanced Compliance Toolkit
Course Information:
Venue: | Duration: | Date: | Price: |
---|---|---|---|
Online | £2,500.00 | 20 hrs | Flexible |
In-House | Agreed with client | Flexible | POA |
London | 10 days | 28-Feb | £5,900.00 |
London | 10 days | 07-Nov | £5,900.00 |
Who should attend?
Delegates responsible for the prevention and control of financial crime, money laundering and fraud investigators, and regulatory compliance specialists, or professionals seeking to obtain specialist skills within the modern financial crime compliance (FCC) space
Accreditations
Outcomes
- Describe the background, nature and current trends of economic crime from a vocational perspective
- Obtain 360-degree experience of anti-money laundering laws, regulations and FCC best practices
- Apply effectively reporting systems, the exchange of information, and financial intelligence
- Use realistic and proportionate action plans for combating financial crime
COURSE TOPICS:
Financial Crime
- Transnational organised crime
- Interpol’s 18 crime areas
- Global response: the AML Regime
- Terrorist financing and Sanctions
- UNTOC
- FATF
- The Egmont Group
- The role of FIUs
- The private sector: gatekeepers
- The rationale of reporting
- The role of financial intelligence
- FCC as the tool to protect the financial system’s integrity
Anti-Bribery and Corruption (ABC)
- ABC essentials explained
- UKBA 2010
- Anti-Bribery & Corruption videos
- Whistleblowing
- FCA
- OECD
- UNCAC
- Stolen Asset Recovery Initiative (StAR)
- StAR Cases
- SFO Cases
- FCPA Cases
Cyber crime
- Phishing
- Webcam manager
- File hijacking
- Keylogging
- Screenshot manager
- Ad clicker
- Hacking
- Distributed Denial of Service (DDOS)
- JMLIT
- European Cybercrime Centre (EC3)
- Information Assurance and Cyber Security for Information Asset and Information Risk Owners
Anti-Money-Laundering (AML)
- Proceeds of crime
- The three – stage ML process
- The three ML stages
- ML vulnerability: the Zero point
- Basel AML Index
- Offences
- The 4TH MLD
- Case study: POCA, Part 7 ML
- Triggering the AML investigation
- From Suspicion to reporting
- SAR and the Good “Narrative”
- SAR simulation exercise: Lodging SARs to the NCA
Fraud
- Identity crime
- Individual fraud
- Corporate fraud
- Online fraud
- Advanced fee fraud
- Tax and benefit system fraud
- Intellectual property crime
- Insider dealing
Advanced AML Loadicator
- What is “not” money laundering
- What “is” money laundering
- Offence 1: Concealment
- Offence 2 Arrangements
- Offence 3: Acquisition, use and possession
- SAR Narrative Review – internal reporting
- SAR lodging – external reporting
Advanced ABC Loadicator
- Tracing capital flight from developing countries
- Sustainable development goals in practice
- Illicit financial flows
- UNCAC and beneficial ownership transparency
- Beneficial ownership registries
- Scanning and profiling legal entities and complex legal arrangements
AML Tools
- Tool 1: KYA (Know Your Assets)
- Tool 2: KYB (Know Your Business)
- Tool 3: KYC (Know Your Customer)
- Tool 4: CDD (Customer Due Diligence)
- Tool 5: EDD (Enhanced Due Diligence)
- Tool 6: SDD (Simplified Due Diligence)
Business Unit and Customer Profiling
- Linking clients with transactions
- How to regularly assess ML and TF risks: sources
- Risk assessment and vulnerability of transactions
- Fitting your FCC programme in the “holistic” risk-based approach – whose?
- Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
- Transparency: internal standards and controls
- SYSC: Single vs Several Operations – your suspicion matrix
- Data Protection for businesses and the rise of the Data Protection Officer
FCC Re-tooling
- Risk assessments – why? which? and where from?
- FATF, Basel AML Index and ESMA reloaded
- Risk-based approach
- Putting it all together in the SYSC context
- Trade-based ML – misinvoicing and third-party risk management
- Financial sanctions: EU, International, and U.S.
- Proliferation financing