Banking Finance

  • An introduction to the aims of CRS.
  • The key obligations on Financial Institutions.
  • The roles of relationship managers and other front-line staff.
  • The practicalities of tracking changes in circumstance.
  • The reporting obligations of financial institutions and the use that Revenue authorities will make of the data.

FATCA Training Session

The important Provisions

Introduction and Scope.

What is FATCA?.
  • Background
  • Core Elements of the FATCA Provisions
  • FATCA Impositions
  • The Withholding Tax Obligation
  • Withholding Agents
  • How Are Entities Affected

Foreign Financial Institutions (FFIs)

Non-Financial Foreign Entities (NFFEs)

The Key Terms

  • Withholdable Payments
  • Definition of ‘US Source FDAP Income’
  • Definition of ‘Sale Or Other Disposition’
  • Exceptions
  • Pass thru payments
  • Financial Account

Intergovernmental Agreements (IGAs)

  • Model 1 IGA
  • Model 2 IGA
  • Current IGAs

Timeline for Implementation

Information to Be Reported

  • Global Intermediary Identification Number (GIIN)
  • Taxpayer identification number (TIN)
  • NFFEs and Passive NFFEs

Submitting FATCA Return

  • Online questions
  • Accountholder types
  • Accountholder details and number
  • Account types

Financial Crime Compliance / AML/FCC Escalation & Suspicion Reporting Workshop


  • The three stages of money laundering
  • The three lines of defense model
  • Customer due diligence
  • High risk customers
  • Sanctions

Risk Based Approach

  • Risk assessment methodology
  • Risk categories – standard, medium, high
  • Key controls

Sign off

Intensity of CDD

Review frequency

Transaction monitoring

  • The financial crime lifecycle
  • The 3 lines of defense working as a team

Case study/Example Escalation Process – The initial alert

  • Who generates alerts & why
  • What should prompt an alert

Doesn’t make sense

Doesn’t fit our knowledge of the client

Doesn’t fit in with normal business activity

You have a bad feeling/misgivings

  • First line alerts
  • Second line alerts
  • Sanction alerts
  • Alert options


Seek more information

Escalate immediately

  • The importance of getting more information where applicable
  • Balancing the risk of tipping off with information gathering

Escalation Process

  • SAR’s or an internal intermediate stage – the pros and cons
  • Methods of escalation

Direct to MLRO

Via line manager

Via a confidential email


  • Essential SAR information





  • What does the MLRO do with alerts?
  • When must we involve specialist sanctions colleagues?
  • Deciding to escalate to the Non-cooperative Account
  • Time limits for escalation
  • Personal and potentially criminal liability of all parties
  • What happens once an SAR has been raised
  • What happens next
  • The mitigation process
  • The exit process

Other Key Issues

  • Staff training – must be risk based
  • Creating a holistic not process based regime
  • Embedding escalation into “business as usual” processes
  • False positives
  • Ensuring the level of escalations are appropriate to the profile of the business
  • The role of internal audit
  • The MLRO report
  • Checking it all works well
  • Senior and top management oversight

Course Conclusion

  • Wrap up
  • Summary
  • Open Forum

Fraud Prevention, Detection, and Investigation Training Program

  • Statistical Overview of Fraud Problem
  • Common Types of Fraud
  • Who Commits Fraud?
  • The Fraud Triangle
  • The Fraud Diamond
  • Red Flags
  • Fraud Risk Program – Components
  • Fraud Risk Assessment – Components
  • Conducting Fraud Risk Assessment – Case Studies
  • Case Studies – A Practical Perspective
  • Fraud Prevention Program
  • Fraud Prevention Check list – A Practical Perspective
  • Fraud Detection Program
  • Fraud Prevention and Detection Score Cards
  • Fraud Investigation Program

Case study/Example

Course Conclusion

  • 1. Reviewing current trends and new techniques in combating fraud and financial crimes to anticipate future needs
  • 2. Setting effective fraud detection and prevention procedures
  • 3. Improving customer data protection through effective identity theft prevention
  • 4. Eradicating common areas of potential internal frauds
  • 5. Developing a robust fraud awareness program within the organization
  • 6. Identifying and assessing organization’s vulnerability to fraud and financial crimes
  • 7. Establishing a sustainable corporate environment conducive to combating fraud at all levels
  • 8. Exploring the latest technological solutions in combating fraud and financial crimes
  • 9. Discovering the necessary preventive measures taken to combat fraudsters and money launders
  • 10. Utilizing this event to learn, network and benchmark with key players in the industry

Risk-based Compliance Monitoring

This Risk-based Compliance Monitoring course will cover the following key topics

  • The risk based monitoring approach
  • Latest regulatory developments in risk based monitoring
  • Researching the risks facing your firm
  • Preparing the monitoring plan
  • Reporting results
  • Remedial monitoring

Course Conclusion

  • Demonstrate the effectiveness of your controls to the regulator
  • Effectively identify, categories and priorities compliance risks
  • Explore the use of Key Indicators for risks and controls
  • Examine monitoring techniques (desk based, exception reporting, systems, visits); and know how to select the most appropriate option
  • Determine when to escalate issues and change monitoring levels
  • Construct a comprehensive compliance monitoring plan that will priorities risks and drive out resource requirements
  • Tailor your reporting to different groups to make sure critical messages are received and understood
  • Keep your programme up to date: respond to monitoring results emerging regulatory hot spots
  • Develop both your technical monitoring and ‘softer’ skills set: establishing credibility, obtaining buy-in, managing resistance

Enterprise Risk management (ERM)

  • What is operational risk?
  • Categories of operational risk
  • Managing risk
  • Business continuity management
  • Employee roles in managing operational risk

Credit Risk Management


  • Risk Appetite
  • Types of retail clients
  • Common Retail products
  • Specialist retail products
  • Low and High margin products
  • Medium and long term lending
  • Mortgages
  • What is credit risk
  • How do we measure credit risk
  • What are the key risks in retail credit?
  • Secured versus unsecured

Regulatory Approaches to Credit Risk

  • The three methods
  • Standardized
  • Treating Customers Fairly

Introduction to Credit Scoring

  • What is Credit Scoring
  • When should we use it
  • What are we trying to measure
  • Setting the score swim lines
  • The challenge with “refers”
  • The strengths of credit scoring
  • The weaknesses
  • The case for using both manual and automated systems

Anti-Money Laundering

  • Understanding Money Laundering, Terrorist Financing and Sanctions
  • Vulnerabilities of financial institutions to money laundering and terrorist financing
  • Anti-money laundering and combating terrorist financing in practice
  • Anti-money laundering and combating terrorist financing – legal and regulatory structures
  • Management obligations and the risk-based approach to money laundering and terrorist financing
  • Design an effective anti-money laundering programme compliant with anti-money laundering and financial crime regulations
  • Improve the efficiency and effectiveness of your anti-money laundering systems by adopting best practice and guidelines designed to detect, investigate, report, and resolve red flags
  • Draft internal policies and directives related to anti-money laundering and financial crime regulations
  • Apply a risk-based approach and ensure effective management of incidents that may create regulatory and reputation risks
  • Annalise the SAR (Suspicion Activity Report) activities; including cheque fraud and kiting, computer intrusion, counterfeiting credit/debit cards, defalcation and embezzlement, Offshore Banking, Hawala and Zakat Activities, Money Trail, Penny Stock Manipulation
  • Comprehend the Customer Due Diligence (CDD) processes and tools and construct a CDD Framework

Department Contact Info

Office Of Development

G-35, Block 2A,
Knowledge Park,


Social Info