Course description
Advanced Financial Crime Compliance
Upcoming start dates
Outcome / Qualification etc.
Participants will learn how to avoid financial crimes in their organisations
Training Course Content
Financial Crime
- Transnational organised crime
- Interpol’s 18 crime areas
- Global response: the AML Regime
- Terrorist financing and Sanctions
- UNTOC
- FATF
- The Egmont Group
- The role of FIUs
- The private sector: gatekeepers
- The rationale of reporting
- The role of financial intelligence
- FCC as the tool to protect the financial system’s integrity
Anti-Bribery and Corruption (ABC)
- ABC essentials explained
- UKBA 2010
- Anti-Bribery & Corruption videos
- Whistleblowing
- FCA
- OECD
- UNCAC
- Stolen Asset Recovery Initiative (StAR)
- StAR Cases
- SFO Cases
- FCPA Cases
Anti-Money-Laundering (AML)
- Proceeds of crime
- The three – stage ML process
- The three ML stages
- ML vulnerability: the Zero point
- Basel AML Index
- Offences
- The 4TH MLD
- Case study: POCA, Part 7 ML
- Triggering the AML investigation
- From Suspicion to reporting
- SAR and the Good “Narrative”
AML Tools
- Tool 1: KYA (Know Your Assets)
- Tool 2: KYB (Know Your Business)
- Tool 3: KYC (Know Your Customer)
- Tool 4: CDD (Customer Due Diligence)
- Tool 5: EDD (Enhanced Due Diligence)
- Tool 6: SDD (Simplified Due Diligence)
Cyber crime
- Phishing
- Webcam manager
- File hijacking
- Keylogging
- Screenshot manager
- Ad clicker
- Hacking
- Distributed Denial of Service (DDOS)
- JMLIT
- European Cybercrime Centre (EC3)
- Information Assurance and Cyber Security for Information Asset and Information Risk Owners
Fraud
- Identity crime
- Individual fraud
- Corporate fraud
- Online fraud
- Advanced fee fraud
- Tax and benefit system fraud
- Intellectual property crime
- Insider dealing
Advanced ABC Loadicator
- Tracing capital flight from developing countries
- Sustainable development goals in practice
- Illicit financial flows
- UNCAC and beneficial ownership transparency
- Beneficial ownership registries
- Scanning and profiling legal entities and complex legal arrangements
- Connecting physical persons with legal entities – best practices
Business Unit and Customer Profiling
- Linking clients with transactions
- How to regularly assess ML and TF risks: sources
- Risk assessment and vulnerability of transactions
- Fitting your FCC programme in the “holistic” risk-based approach – whose?
- Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
- Transparency: internal standards and controls
- SYSC: Single vs Several Operations – your suspicion matrix
- Data Protection for businesses and the rise of the Data Protection Officer
FCC Re-tooling
- Risk assessments – why? which and where from?
- FATF, Basel AML Index and ESMA reloaded
- Risk-based approach
- Putting it all together in the SYSC context
- Trade-based ML – misinvoicing and third-party risk management
- Financial sanctions: EU, International, and U.S.
- Proliferation financing
Why choose LCT International
We have trained over 25,000 delegates from almost 500 client organisations
Highly qualified and experienced trainers who offer a unique learning experience tailored to you
Endorsed by various organisational and subject specific accrediting bodies
Expenses
Please contact us for more information on pricing.
Request info
LCT International - High value, high impact training programmes delivered globally to teams and individuals For almost 30 years we have delivered tangible improvements to organisations by enabling their leaders, managers and professionals to reach their full potential through transformational...