Podcast
Questions and Answers
What is one of the criteria for incident closing when reported to WSIB?
What is one of the criteria for incident closing when reported to WSIB?
- Conducting employee surveys
- Preparation of a financial summary report
- Completion of all internal audits
- Meeting with WSIB’s Director of Operations (correct)
Which of the following is crucial for incident closure?
Which of the following is crucial for incident closure?
- Internal control verification and completion of tasks (correct)
- Notification of all stakeholders
- Public announcement of the incident
- Incident report submission only
What is emphasized in communication effective for stakeholders after an incident?
What is emphasized in communication effective for stakeholders after an incident?
- Uniform communication for all stakeholders
- No communication required until the incident is resolved
- Tailored communication plans for different stakeholders (correct)
- Only formal communication with external parties
What should be completed before considering incident closure?
What should be completed before considering incident closure?
What role does the Investment Operational Due Diligence Officer play in the incident closing process?
What role does the Investment Operational Due Diligence Officer play in the incident closing process?
What does the policy prohibit in relation to hospitality during a tender?
What does the policy prohibit in relation to hospitality during a tender?
Which situation is considered inappropriate according to the prevention measures?
Which situation is considered inappropriate according to the prevention measures?
What is required for gift purchases according to the Travel & Expense Reimbursement Policy?
What is required for gift purchases according to the Travel & Expense Reimbursement Policy?
Which of the following practices is prohibited under Crane Capital's bribery and corruption policies?
Which of the following practices is prohibited under Crane Capital's bribery and corruption policies?
What action should be taken if a potential bribe is identified?
What action should be taken if a potential bribe is identified?
According to the provided information, which of these roles are specifically mentioned in the escalation process for red flags noted during due diligence?
According to the provided information, which of these roles are specifically mentioned in the escalation process for red flags noted during due diligence?
Which of the following is NOT explicitly mentioned as a step in the due diligence process for suppliers/vendors?
Which of the following is NOT explicitly mentioned as a step in the due diligence process for suppliers/vendors?
What is the purpose of a Non-Disclosure Agreement (NDA) in the context of the provided information?
What is the purpose of a Non-Disclosure Agreement (NDA) in the context of the provided information?
According to the information provided, what is the primary responsibility of 'Third Party Risk Rating and Due Diligence'?
According to the information provided, what is the primary responsibility of 'Third Party Risk Rating and Due Diligence'?
What does the phrase 'prior to engagement of third party' signify in the context of the provided information?
What does the phrase 'prior to engagement of third party' signify in the context of the provided information?
What level of severity is indicated by an uncontained incident impacting multiple countries?
What level of severity is indicated by an uncontained incident impacting multiple countries?
Which of the following responsibilities does the Crisis Management Team (CMT) hold?
Which of the following responsibilities does the Crisis Management Team (CMT) hold?
In a Level 3 - YELLOW incident, what is primarily impacted?
In a Level 3 - YELLOW incident, what is primarily impacted?
Which member is listed as the CMT Lead for Crane Capital?
Which member is listed as the CMT Lead for Crane Capital?
What level indicates a moderate risk requiring external agency responses?
What level indicates a moderate risk requiring external agency responses?
Which of the following is NOT a responsibility of the CMT?
Which of the following is NOT a responsibility of the CMT?
What defines Level 2 - ORANGE incidents?
What defines Level 2 - ORANGE incidents?
What is indicated by a Level 3 - YELLOW incident?
What is indicated by a Level 3 - YELLOW incident?
What is the primary goal of Business Continuity Planning?
What is the primary goal of Business Continuity Planning?
What does Disaster Recovery primarily involve?
What does Disaster Recovery primarily involve?
Which team is primarily responsible for Communication with Clients during a crisis?
Which team is primarily responsible for Communication with Clients during a crisis?
What is an example of an alternate recovery strategy for IT equipment?
What is an example of an alternate recovery strategy for IT equipment?
How is a Level 1 RED crisis classified?
How is a Level 1 RED crisis classified?
What does Crisis Management primarily focus on?
What does Crisis Management primarily focus on?
What is an important aspect of a Recovery Strategy?
What is an important aspect of a Recovery Strategy?
In the context of Business Continuity, where does the Accounting/Finance team typically operate during a crisis?
In the context of Business Continuity, where does the Accounting/Finance team typically operate during a crisis?
What is a key factor in restoring internet connectivity after a disaster?
What is a key factor in restoring internet connectivity after a disaster?
Which of the following is NOT a focus of Business Continuity Planning?
Which of the following is NOT a focus of Business Continuity Planning?
Which of the following methods is NOT mentioned as a way criminals can manipulate property values to avoid scrutiny?
Which of the following methods is NOT mentioned as a way criminals can manipulate property values to avoid scrutiny?
What is a common method criminals use to distance themselves from the property they own?
What is a common method criminals use to distance themselves from the property they own?
Which of these actions is NOT necessarily a red flag for possible criminal activity?
Which of these actions is NOT necessarily a red flag for possible criminal activity?
What is a reason criminals might structure cash deposits in multiple smaller transactions?
What is a reason criminals might structure cash deposits in multiple smaller transactions?
Which of the following is a method criminals might use to cover up the source of their illicit funds?
Which of the following is a method criminals might use to cover up the source of their illicit funds?
What is the maximum amount an employee can spend on a gift without requiring approval?
What is the maximum amount an employee can spend on a gift without requiring approval?
What is a requirement for an employee to make a gift expenditure?
What is a requirement for an employee to make a gift expenditure?
Which of these is stated as a requirement for gifts exceeding US$100?
Which of these is stated as a requirement for gifts exceeding US$100?
Flashcards
Non-disclosure agreement (NDA)
Non-disclosure agreement (NDA)
A legal contract preventing sharing of confidential information.
Contractors/Sub-Contractors
Contractors/Sub-Contractors
Entities or individuals contracted to provide services or products.
Due diligence procedures
Due diligence procedures
Investigative process to assess risks before engaging third parties.
Red flags in due diligence
Red flags in due diligence
Signup and view all the flashcards
Third Party Risk Rating
Third Party Risk Rating
Signup and view all the flashcards
Undue Influence
Undue Influence
Signup and view all the flashcards
Bribery Prevention Policies
Bribery Prevention Policies
Signup and view all the flashcards
Gift Approval Process
Gift Approval Process
Signup and view all the flashcards
Red Flags
Red Flags
Signup and view all the flashcards
Whistleblower Protection
Whistleblower Protection
Signup and view all the flashcards
Incident Closing Criteria
Incident Closing Criteria
Signup and view all the flashcards
Incident Report Submission
Incident Report Submission
Signup and view all the flashcards
Communication Plans
Communication Plans
Signup and view all the flashcards
Post Incident Review
Post Incident Review
Signup and view all the flashcards
Corrective Action Verification
Corrective Action Verification
Signup and view all the flashcards
Undisclosed cash payments
Undisclosed cash payments
Signup and view all the flashcards
Structuring cash deposits
Structuring cash deposits
Signup and view all the flashcards
Legitimizing illicit funds
Legitimizing illicit funds
Signup and view all the flashcards
Shell companies
Shell companies
Signup and view all the flashcards
Overseas investment
Overseas investment
Signup and view all the flashcards
Gifts Declaration
Gifts Declaration
Signup and view all the flashcards
Value cap on gifts
Value cap on gifts
Signup and view all the flashcards
Listing recipient details
Listing recipient details
Signup and view all the flashcards
Level 2 - ORANGE
Level 2 - ORANGE
Signup and view all the flashcards
Level 3 - YELLOW
Level 3 - YELLOW
Signup and view all the flashcards
Crisis Management Team (CMT)
Crisis Management Team (CMT)
Signup and view all the flashcards
CMT Responsibilities
CMT Responsibilities
Signup and view all the flashcards
External Agencies
External Agencies
Signup and view all the flashcards
Contingency Planning
Contingency Planning
Signup and view all the flashcards
CMT Members
CMT Members
Signup and view all the flashcards
Incident Impact
Incident Impact
Signup and view all the flashcards
Business Continuity Planning
Business Continuity Planning
Signup and view all the flashcards
Disaster Recovery
Disaster Recovery
Signup and view all the flashcards
Crisis Management
Crisis Management
Signup and view all the flashcards
Crisis Classifications
Crisis Classifications
Signup and view all the flashcards
Level 1: RED
Level 1: RED
Signup and view all the flashcards
Office Premise Compromise Strategy
Office Premise Compromise Strategy
Signup and view all the flashcards
Information Service Team
Information Service Team
Signup and view all the flashcards
Communication with Clients
Communication with Clients
Signup and view all the flashcards
Data Restoration Process
Data Restoration Process
Signup and view all the flashcards
Human Resources Recovery
Human Resources Recovery
Signup and view all the flashcards
Study Notes
Crane Capital Risk & Compliance Training - February 2025
-
Training Focus: 2025 Crane Capital's key risk and compliance focus
-
Agenda Topics:
- Policies, Procedures, and Guidelines
- Third-Party Risk Management Program
- Anti-Fraud, Corruption, Money Laundering, and Terrorism Financing
- Data Privacy and Cybersecurity Hygiene
- Business Continuity and Crisis Management
- Incident Reporting
- Quiz
- Closing Remarks
2025 Crane's Key Risk & Compliance Focus
- Focus Areas:
- Reinforce Compliance Commitment
- Foster a Culture of Accountability
- Strengthen Internal Controls
- Adapt to Evolving Risks
- Enhance Crisis Management and Resilience
- Cybersecurity and Data Protection
Third-Party Risk Management (TPRM) - Lifecycle
- Stages: Onboarding, Ongoing, Offboarding
- Components: Risk Assessment and Due Diligence, Procurement and Sourcing, Vendor Creation, Vendor Maintenance (Governance), Vendor Monitoring, Oversight and Accountability, Documentation, and Reporting, Independent Review, Termination, Exit Strategy, Third-Party Closure
Third-Party Risk Management (TPRM) - Workflow
- Processes: Identification of Third Parties, Assessment, Due Diligence, Policies and Procedures, Tools (outsourcing policy, materiality assessment, procurement policy, vendor management policy, due diligence questionnaire, etc), Other Compliance Requirements, Supplier Code of Conduct Letter of Commitment, Procurement Request Form
Money Laundering Red Flags
- Use of Third Parties: Using a friend or family member to purchase property on behalf of the owner, settling differences with undisclosed cash payments, and using multiple banks for deposits to avoid transaction limits
- Manipulation of Property Values: Buying and selling property at a price exceeding or falling below market value
- Use of Illicit Funds: Paying for unneeded renovations and improvements
- Shell Companies/Trusts: Using shell companies or trusts to disguise ownership
Real Estate – Prime Target for Money Laundering
- Reasons for Attractiveness: Ease of cash transactions, stability, and reliability as investment, and the ability to improve property value
- Targeting of Regions: Regions with opaque real estate markets and limited regulatory oversight
Gifts Declaration
- Gift Policy: Gifts to external parties must be under US$100. Any exceeding US$100 requires a valid reason stated in the request and approved by the Managing Partner.
- Company Recipient Specification: Recipient company must be specified in the gift request. If gifts are to individuals within the company, individual names and gift amounts need listing.
- Restrictions:
- Offering gifts or hospitality may be seen as influence-seeking.
- Gifts/hospitality offered during tenders or contract renewals to foreign officials.
- Gifts exceeding company thresholds.
- Using vouchers/discounts to circumvent rules
- Donations or sponsorships may appear as undisclosed bribes.
- Actions disregarding red flags.
- Actions that are inappropriate in nature.
- Actions taken during pending business decisions.
- Violations of laws or regulations
- Prohibited Activities: Crane Capital does not support charitable or political donations.
Prevention Measures
- Fraud Prevention: Information Technology Policy Framework and Procedures, Multifactor Authentication, Biometric authentication, Segregation of Duties, Invoice and Cash Management, Whistleblowing Policy, Whistleblower Protection
- Bribery & Corruption Prevention: Policies for gift allowance, zero tolerance for bribery, due diligence screening for adverse news reports, anti-fraud, corruption, money laundering, and terrorism financing policy and global compliance regulations
Key Fraud, Bribery, Corruption, AML/CFT Cases of 2024
- Evergrande: China property giant and its founder accused of $78bn fraud
- Mas Imposes Composition Penalty: S$2.5M on Swiss-Asia for AML/CFT Breaches.
- TD Bank: Hit with record $3 billion fine over drug cartel money laundering
- UK Engineering Firm Arup: Victim of a £20 million deepfake scam
- Deepfake Elon Musk: AI-generated scams contributing to billions in fraud
Cybersecurity Hygiene
- Problems: Weak passwords, ignoring updates, clicking on suspicious links, not backing up data and sharing too much online.
- Solutions: Regular software updates, strong passwords, phishing awareness, secure Wi-Fi practices, system & network security, regular patching, secure third-party access, monitoring
Business Continuity
- Business Continuity Planning: Ensure Crane Capital can continue operating during and after a crisis, plans for uninterrupted business operations
- Disaster Recovery: Process of restoring IT infrastructure and data access, reestablish access to applications and data quickly
- Crisis Management Response: Focus on responding effectively to unexpected events
Crisis Management Team (CMT)
- Responsibilities: Ensuring continued operations, response-to-disruptions, allocating resources, providing updates to board, coordinating crisis-related tasks, implementation of communication plans with stakeholders
Information Security Incidents:
- Types: Unauthorized disclosure of sensitive information, theft/loss of devices, virus/malware outbreaks, denial-of-service attacks, unauthorized access to systems/data, compromised user accounts from phishing attempts by criminals.
- Reporting Process: Report to the Crisis Management Team (CMT)
Incident Reporting
- Key Elements: Incident Types (fraud, theft, cyber threats, operational disruptions, financial reporting irregularities, etc), Response Strategy (timely notification to CMT, investigation, validation, communication to WSIB), Incident Notification Process (who, when, where, why, how data received, how reported to CMT), Incident Investigation, Reporting (escalation process, reports to WSIB), Incident Closing and Follow-Up
Data Protection Principles
- Data Protection: Technologies, processes, practices for data availability
- Data Security: Protecting data from theft, corruption, unauthorized access throughout its lifecycle
- Data Privacy: Ensuring data users and sources understand data collection, usage, management, and monetization of sensitive data.
- Data Minimisation: Only the necessary data is collected.
- Principle of Least Privilege: Only authorized users get necessary access, reducing compromise risks
- Data Classification: Categorizing data based on sensitivity (personal, work, protected, confidential, highly confidential) for prevention
- Encryption: Protecting data using encryption techniques
Closing Remarks
- Reduce Risk: Reduce likelihood of misconduct, regulatory violations, and reputational harm
- Promote Ethical Culture: Foster a workplace culture of integrity, honesty, and transparency.
- Employee Engagement: Engage employees in ethics and compliance, making them more likely to act responsibly.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.