Book with Confidence: If your plans change, go virtual, come later on, or get a full refund.
Dismiss

Corporate Finance

2021 Course Information:

Venue:Duration:Date:Price:
Online £1,750.00 12 hrsFlexible
In-House Agreed with client FlexiblePOA
In-House 5 days 05-Jul£3,050.00
London 5 days 04-Oct£3,050.00
ENQUIRE NOW

    Please ensure you fill out all fields






    Subscribe to our newsletter

    Your personal details are very important to us and we only use them for admin reasons only, unless you have asked to receive our newsletter and marketing. This is in accordance with our Privacy Policy

    LCT 2021 Brochure Download
    DOWNLOAD NOW
    LCT 2021 Brochure Download
    DOWNLOAD NOW

    Who should attend?

      Delegates responsible for the prevention and control of financial crime, anti-money laundering officers and fraud investigators, and regulatory compliance specialists, or professionals seeking to build a highly advanced FCC toolkit.

    Accreditations

    Outcomes

    • Evaluate the background, nature and evolving trends of financial crime compliance from a professional perspective
    • Obtain 360-degree experience of anti-money laundering regulation and international financial crime compliance standards
    • Master the reporting system, the collection and exchange of information, and make effective use of financial intelligence
    • Take to the workplace proportionate and sophisticated action plans and processes for combating financial crime and fraud

    COURSE TOPICS:

    Financial Statements, International Standards and interpreting them using Ratio Analysis

    • Transnational organised crime
    • Interpol’s 18 crime areas
    • Global response: the AML Regime
    • Terrorist financing and Sanctions
    • UNTOC
    • FATF
    • The Egmont Group
    • The role of FIUs
    • The private sector: gatekeepers
    • The rationale of reporting
    • The role of financial intelligence
    • FCC as the tool to protect the financial system’s integrity

    Anti-Bribery and Corruption (ABC)

    • ABC essentials explained
    • UKBA 2010
    • Anti-Bribery & Corruption videos
    • Whistleblowing
    • FCA
    • OECD
    • UNCAC
    • Stolen Asset Recovery Initiative (StAR)
    • StAR Cases
    • SFO Cases
    • FCPA Cases

    Cyber crime

    • Phishing
    • Webcam manager
    • File hijacking
    • Keylogging
    • Screenshot manager
    • Ad clicker
    • Hacking
    • Distributed Denial of Service (DDOS)
    • JMLIT
    • European Cybercrime Centre (EC3)
    • Information Assurance and Cyber Security for Information Asset and Information Risk Owners

    Anti-Money-Laundering (AML)

    • Proceeds of crime
    • The three – stage ML process
    • The three ML stages
    • ML vulnerability: the Zero point
    • Basel AML Index
    • Offences
    • The 4TH MLD
    • Case study: POCA, Part 7 ML
    • Triggering the AML investigation
    • From Suspicion to reporting
    • SAR and the Good “Narrative”

    Fraud

    • Identity crime
    • Individual fraud
    • Corporate fraud
    • Online fraud
    • Advanced fee fraud
    • Tax and benefit system fraud
    • Intellectual property crime
    • Insider dealing

    AML Tools

    • Tool 1: KYA (Know Your Assets)
    • Tool 2: KYB (Know Your Business)
    • Tool 3: KYC (Know Your Customer)
    • Tool 4: CDD (Customer Due Diligence)
    • Tool 5: EDD (Enhanced Due Diligence)
    • Tool 6: SDD (Simplified Due Diligence)

    Advanced ABC Loadicator

    • Tracing capital flight from developing countries
    • Sustainable development goals in practice
    • Illicit financial flows
    • UNCAC and beneficial ownership transparency
    • Beneficial ownership registries
    • Scanning and profiling legal entities and complex legal arrangements
    • Connecting physical persons with legal entities – best practices

    Business Unit and Customer Profiling

    • Linking clients with transactions
    • How to regularly assess ML and TF risks: sources
    • Risk assessment and vulnerability of transactions
    • Fitting your FCC programme in the “holistic” risk-based approach – whose?
    • Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
    • Transparency: internal standards and controls
    • SYSC: Single vs Several Operations – your suspicion matrix
    • Data Protection for businesses and the rise of the Data Protection Officer

    FCC Re-tooling

    • Risk assessments – why? which and where from?
    • FATF, Basel AML Index and ESMA reloaded
    • Risk-based approach
    • Putting it all together in the SYSC context
    • Trade-based ML – misinvoicing and third-party risk management
    • Financial sanctions: EU, International, and U.S.
    • Proliferation financing