Preventing financial crime
Create the right culture within an organisation to discourage collusion in fraud and encourage reporting and disclosure.
Partner products listed exclude VAT. You will be directed to an external site to complete purchase and VAT will be applied at checkout.
For your AAT exclusive discount apply AAT101 at partner checkout for an exclusive 10% off.
Course Type
E-learning
Length
3 - 5 hours
What you’ll achieve
- Understand the range of financial crimes which can be committed, as well as the motives and profiles of those likely to commit them
- Gain comprehensive skills in risk management and improve your assessment of risk factors
- Identify how to properly approach and report financial crimes
- Develop an effective policy for IT system risks
- Know how to influence ethical behaviour and create the right kind of corporate culture.
About this course
Understand the various types of financial crime and the controls that can be used to limit the opportunities for fraudsters to commit them. Look at how to create the right culture within an organisation to discourage collusion in fraud and encourage reporting and disclosure.
Overview
E-learning |
|
3 - 5 hours |
|
Financial Crime |
Syllabus
Defining financial crime
- The role of the accountant
- What is financial crime?
- The cost of fraud
- Management fraud
- Identifying criminals to uncover crime
- Individuals and financial crimes
- Money laundering
- Bribery and corruption
- FATF and the law
Organisation wide approaches
- Corporate culture
- Financial crime within organisations
- Safeguarding against misconduct
- Policies and procedures
- The role of audit
- The tone at the top
Individual financial crimes
- Criminal motivations
- Accounting aspects
- Internal controls
- The control environment
- Monitoring controls
- Spotting opportunities
Risk management and control
- Inherent risk
- Risk management
- Risk management approaches
- CRSA and ERM
- Responding to financial crime
- Red flags
IT approaches to fraud prevention
- Assessing IT system risks
- Protecting IT systems
- The right solutions
- Policy and procedure
- Areas of vulnerability
- Actions to be taken
- Cloud computing
- Formal risk management
- Forensic readiness.
How to access
You will be directed to an external site to complete purchase and VAT will be applied at checkout.