Finance & Accounts

FA 6 Advanced Compliance Toolkit

Advanced Compliance Toolkit

The classics of staying compliant while maximising profits

Accredited by: LONDON INSTITUTE OF SKILLS DEVELOPMENT SIGNATURE PROGRAMME

Who should attend?

Managers and executives from all sectors who input into strategic and financial planning for their organisation, including:

  • Delegates responsible for the prevention and control of financial crime, anti-money laundering officers and fraud investigators, and regulatory compliance specialists, or professionals seeking to build a highly advanced FCC toolkit
  • Junior Managers, Fresh Graduates & Final Semester Students to acquire a promising career in a reputable organization.
Course Code:F/A.6
Subject:Finance
Course Fee:£385
Duration:4 Days

Learning Objectives

By the end of the course delegates will be able to:

  • Evaluate the background, nature and evolving trends of financial crime compliance from a professional perspective
  • Obtain 360-degree experience of anti-money laundering regulation and international financial crime compliance standards
  • Master the reporting system, the collection and exchange of information, and make effective use of financial intelligence
  • Take to the workplace proportionate and sophisticated action plans and processes for combating financial crime and fraud

Course Content

Financial Crime

  • Transnational organised crime
  • Interpol’s 18 crime areas
  • Global response: the AML Regime
  • Terrorist financing and Sanctions
  • UNTOC
  • FATF
  • The Egmont Group
  • The role of FIUs
  • The private sector: gatekeepers
  • The rationale of reporting
  • The role of financial intelligence
  • FCC as the tool to protect the financial system’s integrity

Anti-Bribery and Corruption (ABC)

  • ABC essentials explained
  • UKBA 2010
  • Anti-Bribery & Corruption videos
  • Whistleblowing
  • FCA
  • OECD
  • UNCAC
  • Stolen Asset Recovery Initiative (StAR)
  • StAR Cases
  • SFO Cases
  • FCPA Cases

Anti-Money-Laundering (AML)

  • Proceeds of crime
  • The three – stage ML process
  • The three ML stages
  • ML vulnerability: the Zero point
  • Basel AML Index
  • Offences
  • The 4TH MLD
  • Case study: POCA, Part 7 ML
  • Triggering the AML investigation
  • From Suspicion to reporting
  • SAR and the Good “Narrative”

AML Tools

  • Tool 1: KYA (Know Your Assets)
  • Tool 2: KYB (Know Your Business)
  • Tool 3: KYC (Know Your Customer)
  • Tool 4: CDD (Customer Due Diligence)
  • Tool 5: EDD (Enhanced Due Diligence)
  • Tool 6: SDD (Simplified Due Diligence)

Cyber crime

  • Phishing
  • Webcam manager
  • File hijacking
  • Keylogging
  • Screenshot manager
  • Ad clicker
  • Hacking
  • Distributed Denial of Service (DDOS)
  • JMLIT
  • European Cybercrime Centre (EC3)
  • Information Assurance and Cyber Security for Information Asset and Information Risk Owners

Fraud

  • Identity crime
  • Individual fraud
  • Corporate fraud
  • Online fraud
  • Advanced fee fraud
  • Tax and benefit system fraud
  • Intellectual property crime
  • Insider dealing

Advanced ABC Loadicator

  • Tracing capital flight from developing countries
  • Sustainable development goals in practice
  • Illicit financial flows
  • UNCAC and beneficial ownership transparency
  • Beneficial ownership registries
  • Scanning and profiling legal entities and complex legal arrangements
  • Connecting physical persons with legal entities – best practices

Business Unit and Customer Profiling

  • Linking clients with transactions
  • How to regularly assess ML and TF risks: sources
  • Risk assessment and vulnerability of transactions
  • Fitting your FCC programme in the “holistic” risk-based approach – whose?
  • Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
  • Transparency: internal standards and controls
  • SYSC: Single vs Several Operations – your suspicion matrix
  • Data Protection for businesses and the rise of the Data Protection Officer

FCC Re-tooling

  • Risk assessments – why? which and where from?
  • FATF, Basel AML Index and ESMA reloaded
  • Risk-based approach
  • Putting it all together in the SYSC context
  • Trade-based ML – misinvoicing and third-party risk management
  • Financial sanctions: EU, International, and U.S.
  • Proliferation financing