Course Summary
Financial crime is multi-faceted and evolves quickly, making it hard to identify and combat. One of the best ways to stop threats facing your business is to diversify your expertise across multiple risk areas.
You’ll learn how:
• Certain products and customers could be used for financial crime
• Terrorism and weapons of mass destruction are financed
• Criminal organizations and human, animal, and drug trafficking rings conduct their operations
• Cyber criminals exploit businesses and individuals using malware, ransomware, and dark markets
Participants should have a basic level of financial crime prevention expertise.
Taking this course will help you identify and tackle a wide range of financial crimes.
1. How high-risk products and customers can be used for financial crime
Introduction
• Introductory case
• What would you do?
• Feedback
• Learning objectives
How some high-risk products are misused
• Risk-based approach to business
• Correspondent banking risk and red flags: Intermediate
• Cryptoasset risk and red flags
• Trusts risk and red flags: Intermediate
• Wealth management risk and red flags: Intermediate
• Private banking risk and red flags: Intermediate
• Private banking: Intermediate (Case example)
Some high-risk customers and types of misuse
• Cash-intensive business risk and red flags: Intermediate
• Gatekeeper risk and red flags: Intermediate
• Gatekeeper risk and red flags: Intermediate (Case example)
• Designated non-financial businesses and professions risk and red flags: Intermediate
• Beneficial ownership: Complex aggregate risk and red flags Bribery and corruption
• Bribery and corruption
• Odebrecht Group Brazil (Case example)
• Shell company risk and red flags: Intermediate
• Tax avoidance vs tax evasion: Intermediate
• Tax avoidance vs tax evasion: Intermediate (Case example)
2. How financing works for terrorism and weapons of mass destruction (WMD) proliferation
How terrorism is financed
• Terrorist financing
• Terrorist financing: Intermediate
• Crowdfunding risk and red flags: Intermediate
• Crowdfunding risk and red flags: Intermediate (Case example) terrorism funding
• Charity and NGO risk and red flags: Intermediate
• Charity and NGO risk and red flags: Intermediate (Case example) terrorism funding
• Alternative remittance systems
• FinTech payments channels
• Card schemes and red flags
• Card schemes and red flags (Case example)
How WMDs are financed
• Weapons of mass destruction
• Weapons of mass destruction financing
• Weapons of mass destruction financing: Intermediate
• Dual-use goods risk and red flags
• Dual-use goods risk and red flags (Case example)
3. How criminal organizations and drug-trafficking organizations conduct operations
Criminal and drug-trafficking organization operations
• Organized crime
• Organized crime financing
• Organized crime financing (Case example)
• Drug trafficking
• Drug trafficking financing
• Drug trafficking financing (Case example)
• Transnational crime
• Social and economic impact of not combating organized crime
Human trafficking operations
• Human trafficking and human smuggling
• Human trafficking financing
• Human trafficking financing (Case example)
• Social and economic impact of not combating human trafficking
Environmental criminal operations
• Environmental crime
• Environmental crime financing
• Environmental crime financing (Case example)
• Wildlife trafficking
• Social and economic impact of not combating environmental crime
4. How cyber-enabled financial crimes exploit businesses and individuals
How cyber criminals obtain information
• Cyber-enabled crime
• Cyber-enabled crime requires money laundering
• Social engineering
• Phishing and spoofing
• Phishing and spoofing (Case example: Wells Fargo)
• Third-party payment processor risk and red flags
• Third-party payment processor risk and red flags (Case example) How unlawful attacks can disrupt and threaten business
• Hacking and unauthorized access
• Malware and ransomware
• Business email compromise
• WannaCry ransomware attack (Case example)
Cryptoasset and blockchain
• Cryptoasset risk and red flags (Reminder)
• Dark markets risk and red flags
• Dark markets risk and red flags (Case example)
• Mixers and tumblers risk and red flags
• Mixers and tumblers risk and red flags (Case example)
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM