The course is designed to ensure that financial crime risk professionals acquire the necessary knowledge to efficiently and effectively manage the risks of money laundering, tax evasion and financial crime and terrorist financing within their organizations.
A good KYC process must include three stages:Customer identification - the first part of the process is to ascertain the true identity of the customer and to ensure that all controls are proven;Customer due diligence - the process of evaluating who the customer is, what activities they are engaged in and in which geographic areas they operate. Requests for due diligence can range from simple measures to higher levels of control for high-risk individuals, businesses or areas of operations.Continuous Monitoring - It is important to maintain continuous monitoring of customers and any significant changes or variations in the business to be investigated.The course focuses on these issues and on specific aspects of governance and internal controls, identified by international and local regulatory bodies.
The course draws on the trainers' extensive experience in collaborating and delivering courses for a wide range of financial institutions.
As such, it will be both practical and interactive and should be of interest to compliance, finance and risk professionals from financial institutions and other relevant entities.
The course aims to provide a systematic and comprehensive analysis of the legal and regulatory guidelines that companies must follow in managing the risks of money laundering, tax evasion and terrorist financing.
The course deals with best practices in governance, risk management and internal control of the aforementioned financial crime risks. It includes several case studies, exercises and talking points, and as such will be highly practical and interactive.
Participants will develop a greater appreciation and greater understanding of the KYC process:international legal and regulatory framework within which customer due diligence is required;Incorporation of this framework into local laws and client risk management practices;Specific high-risk threats and challenges to customers, products, geography and business;Framework for the risk-based corporate assessment required for a holistic approach to managing the risks of money laundering, tax evasion and terrorist financing;Importance of client due diligence in deterring, identifying and protecting against financial crime risks;Importance of governance, internal control and culture in managing financial crime risks;Continuous escalation and threat management procedures in financial crime risk management.Structure
In the BLENDED version the course is structured in 4 modules corresponding to 4 days of training.
For both training modalities it is possible to optionally add the e-learning activity and the Certification of Outgoing Skills with final written and oral exam.
Module 1: First part
Opening exercise: You are the Money Launderer
Prerequisite crimes of money laundering and terrorist financing;
Scope and scope of financial crimes
Regulatory and legal framework (notes):United Nations Security Council ResolutionsUnited Nations conventionsInternational Financial Action Group (FATF)Egmont GroupEU directivesWolfsberg GroupJoint Money Laundering Steering Group (JMLSG)FinCEN & USA Patriot ActOFAC (Office of Foreign Assets Control)Risk-based business assessments:ClientsProducts and servicesGeographical locationsTransactionsDelivery channelsSize, nature and complexity of the businessCase study: Standard Rented BankModule 1: Second partRisk mitigation and managementStrategic businessGovernanceOrganizational culture and the importance of the 3 lines of defense (3LOD)Policies and proceduresRisk managementInternal controlsSpecific products and servicesRecord keepingTrainingCommunicationsReportingDue Diligence for the clientExercise: Communicate the change in anti-money laundering policy
Customer Due Diligence (CDD)When is the CDD required?The CDD processIdentification and verification (ID and V)ScreeningIndividualsBusiness owners and controllersCompaniesModule 2: First part
Know your customer (KYC)Purpose of the reportSource of fundingSource of wealthNature of businessEnhanced Due Diligence (EDD)
Due diligence in progress
Risk approval framework
Client risk model and valuation
Simplified due diligence
Case study: Danske Bank Estonia
Specific guidelines for CDDs
Module 2: Second part
Remote customers and digital IDs
Trust and trust accounts
Group exercise: Is there a UBO?
Obligation to perform EDD
High risk of money laundering and terrorist financingCharities companiesCasino and gaming companyMilitary and DefenseState propertyHigh-risk third countryPEP and PEP'sModule 3: First partRelations with correspondentsTransparency of paymentsTrade finance transactionsTransactions with no apparent economic and legal purposeNew technologies: crypto currenciesCorporate scams by emailNon-financial activities and professionsCase study: Deutsche Bank Mirror TradesCase study: Latvian banksCase study: London's housing boomModule 3: Second part
Customer risk managementTransaction monitoringNegative news screeningEscalation proceduresUnusual activitySuspicious activity reports (SARs)Reports on suspicious transactions and ordersReputation risk managementWhistleblowingCase study: Sanctioning measures in Italy and Malta
Module 4: First partOSINT (Open Source INTelligence) techniques as an alternative to finding reliable data to support KYCWhat is OSINT and why it is useful in KYC (Identification, Due Diligence, Monitoring)Open Source SourcesBasic techniques for OSINT analyzesOperator safety: Tor, VPN, profilesSearch engines: basic use, dorks, custom enginesCase study: Start up Zelp ltdModule 4: Second part
OSINT (Open Source INTelligence) techniques as an alternative to finding reliable data to support KYC
Search for information in Social NetworksFacebookInstagramLinkedinTwitterThe Deep Web
Case study: OSINT analysis of one of the 10 richest football teams in the world.