Advanced Compliance Toolkit
The classics of staying compliant while maximising profits
Accredited by: LONDON INSTITUTE OF SKILLS DEVELOPMENT SIGNATURE PROGRAMME

Who should attend?
Managers and executives from all sectors who input into strategic and financial planning for their organisation, including:
- Delegates responsible for the prevention and control of financial crime, anti-money laundering officers and fraud investigators, and regulatory compliance specialists, or professionals seeking to build a highly advanced FCC toolkit
- Junior Managers, Fresh Graduates & Final Semester Students to acquire a promising career in a reputable organization.
Course Code: | F/A.6 |
Subject: | Finance |
Course Fee: | £795 |
Duration: | 4 Days |
Venue: | London School of Economics UK |
Learning Objectives
By the end of the course delegates will be able to:
- Evaluate the background, nature and evolving trends of financial crime compliance from a professional perspective
- Obtain 360-degree experience of anti-money laundering regulation and international financial crime compliance standards
- Master the reporting system, the collection and exchange of information, and make effective use of financial intelligence
- Take to the workplace proportionate and sophisticated action plans and processes for combating financial crime and fraud
Course Content
Financial Crime
- Transnational organised crime
- Interpol’s 18 crime areas
- Global response: the AML Regime
- Terrorist financing and Sanctions
- UNTOC
- FATF
- The Egmont Group
- The role of FIUs
- The private sector: gatekeepers
- The rationale of reporting
- The role of financial intelligence
- FCC as the tool to protect the financial system’s integrity
Anti-Bribery and Corruption (ABC)
- ABC essentials explained
- UKBA 2010
- Anti-Bribery & Corruption videos
- Whistleblowing
- FCA
- OECD
- UNCAC
- Stolen Asset Recovery Initiative (StAR)
- StAR Cases
- SFO Cases
- FCPA Cases
Anti-Money-Laundering (AML)
- Proceeds of crime
- The three – stage ML process
- The three ML stages
- ML vulnerability: the Zero point
- Basel AML Index
- Offences
- The 4TH MLD
- Case study: POCA, Part 7 ML
- Triggering the AML investigation
- From Suspicion to reporting
- SAR and the Good “Narrative”
AML Tools
- Tool 1: KYA (Know Your Assets)
- Tool 2: KYB (Know Your Business)
- Tool 3: KYC (Know Your Customer)
- Tool 4: CDD (Customer Due Diligence)
- Tool 5: EDD (Enhanced Due Diligence)
- Tool 6: SDD (Simplified Due Diligence)
Cyber crime
- Phishing
- Webcam manager
- File hijacking
- Keylogging
- Screenshot manager
- Ad clicker
- Hacking
- Distributed Denial of Service (DDOS)
- JMLIT
- European Cybercrime Centre (EC3)
- Information Assurance and Cyber Security for Information Asset and Information Risk Owners
Fraud
- Identity crime
- Individual fraud
- Corporate fraud
- Online fraud
- Advanced fee fraud
- Tax and benefit system fraud
- Intellectual property crime
- Insider dealing
Advanced ABC Loadicator
- Tracing capital flight from developing countries
- Sustainable development goals in practice
- Illicit financial flows
- UNCAC and beneficial ownership transparency
- Beneficial ownership registries
- Scanning and profiling legal entities and complex legal arrangements
- Connecting physical persons with legal entities – best practices
Business Unit and Customer Profiling
- Linking clients with transactions
- How to regularly assess ML and TF risks: sources
- Risk assessment and vulnerability of transactions
- Fitting your FCC programme in the “holistic” risk-based approach – whose?
- Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
- Transparency: internal standards and controls
- SYSC: Single vs Several Operations – your suspicion matrix
- Data Protection for businesses and the rise of the Data Protection Officer
FCC Re-tooling
- Risk assessments – why? which and where from?
- FATF, Basel AML Index and ESMA reloaded
- Risk-based approach
- Putting it all together in the SYSC context
- Trade-based ML – misinvoicing and third-party risk management
- Financial sanctions: EU, International, and U.S.
- Proliferation financing
GROUP Package Highlights:
(prices applicable to a group of minimum 8 persons)
*Maximum 15 persons will be enrolled in each workshop
- 4 Days + 3 Nights Programme
- Programme Registration with the invoice
- 2 Scientific Knowledge-sharing sessions
- Certificate of Participation signed by the authorities
- 3 Night-accommodation in B&B (Double accommodation)
- 2 Networking Dinners
- 3 Lunches
- 3 Networking Tea/Coffee
- Airport Group-Pick & Drop Service
- City Crawl
- Group Excursion- Famous Tourist Attractions
Generic Schedule:
4 Days/ 3 Nights Programme
Day 1:
Hotel Group Pick-up Service from the nearest Airport to the Bed & Breakfast (Hotel)
Check-in: (between 2:00-4:00 pm)
City Crawl includes Takeaway Lunch and Coffee
(1st Night)
Day 2:
Interactive Learning Sessions: 9:00 am – 4:00 pm
Includes 2 Tea Breaks + Lunch
7:30 pm Networking Dinner
(2nd Night)
Day 3:
Interactive Learning Session/ Award Ceremony: 9:00 am- 1:00pm
Includes 1 Tea + Lunch
Excursion: 2:00-7:00 pm
Networking Dinner: 7:30 pm
(3rd Night)
Day 4:
Hotel Check-out at 10:00 a.m
Luggage can be Deposited in the Hotel
Free to Shop and Roam (independently)
Back to the Hotel at least 3.5 hours before the flight
Group Drop-off to the Airport
Register Per Person
Workshop Venue | Full 4 Days + 3 Nights Workshop Package PER PERSON IN GROUP inclusive all taxes | ![]() |
Credit/Debit Card |
---|---|---|---|
University of Oxford, U.K | GBP 1350 | Register Now | Register Now |
University of Cambridge, U.K | GBP 1350 | Register Now | Register Now |
King’s College London, U.K (University of London) | GBP 1350 | Register Now | Register Now |
University of Edinburgh, U.K | GBP 1350 | Register Now | Register Now |
London Institute of SD – Learning Center | GBP 1145 | Register Now | Register Now |
Baku, Azerbaijan | GBP | ||
Istanbul, Turkey | GBP |