Third Party Risk Management Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In the context of the provided information, when should a red flag noted during due diligence procedures be escalated to the Operations Director and Risk & Compliance?

  • Prior to engaging a third party, regardless of whether it is a contractor, sub-contractor, vendor, or supplier (correct)
  • Only when engaging a vendor or supplier of services or purchases
  • Only after engaging a third party, for all types of third parties, and not during the due diligence procedures.
  • Specifically for contracts and sub-contracts, but not for vendors or suppliers of services or purchases.

Which of the following is NOT mentioned as a due diligence procedure?

  • Red flag escalation to Operations Director and Risk & Compliance (correct)
  • Supplier/Vendor (services OR purchases) Procurement Policy
  • Online Adverse News Search
  • Third Party Risk Rating and Due Diligence

What type of third party requires the approval of the Operations Director and Risk & Compliance before engagement?

  • Only contractors and sub-contractors
  • Only vendors and suppliers of services
  • Only third parties that are not subject to the Supplier/Vendor (services OR purchases) Procurement Policy
  • All third parties, including contractors, sub-contractors, vendors, and suppliers of services (correct)

Which of the following processes should be completed before engaging a third party?

<p>Third Party Risk Rating and Due Diligence (A)</p> Signup and view all the answers

Based on the provided information, what is the primary objective of due diligence procedures?

<p>To identify and mitigate potential risks associated with engaging a third party (D)</p> Signup and view all the answers

What has increased the risk of title fraud in real estate?

<p>The increased use of remote transactions. (B)</p> Signup and view all the answers

Which of the following is NOT a reason why criminal syndicates are drawn to the property market for money laundering?

<p>The high risk and volatility of real estate as an investment. (A)</p> Signup and view all the answers

What is the primary focus for the Crane Capital Risk & Compliance Training in 2025?

<p>To reinforce compliance commitment, strengthen internal controls, and enhance crisis management (B)</p> Signup and view all the answers

What is a red flag indicator that could suggest money laundering in real estate?

<p>The use of third parties to buy property as legal owner. (D)</p> Signup and view all the answers

What is the primary focus of the Third Party Risk Management Policy?

<p>Customer Due Diligence (D)</p> Signup and view all the answers

What is a potential consequence of increased rental application fraud?

<p>Higher eviction risks and bad debt for property managers. (A)</p> Signup and view all the answers

Which of the following is NOT explicitly mentioned as a key focus area for the training?

<p>Investor Relations (C)</p> Signup and view all the answers

What is the significance of 'Reinforce Compliance Commitment' in the training's key focus?

<p>To emphasize the importance of adhering to internal policies and procedures (B)</p> Signup and view all the answers

Which of the following is NOT explicitly mentioned as a focus area for Crane Capital in 2025?

<p>Market Volatility (A)</p> Signup and view all the answers

Which type of real estate is particularly vulnerable to rental fraud?

<p>Luxury properties. (D)</p> Signup and view all the answers

What type of global watchlists are mentioned in the context of Customer Due Diligence?

<p>OFAC (B)</p> Signup and view all the answers

What is a red flag suggesting potential money laundering in a real estate transaction?

<p>A property being sold at a price below market value. (A)</p> Signup and view all the answers

What is the objective of 'Adapting to Evolving Risks' in the 2025 training?

<p>To train employees on how to identify and mitigate emerging risks (A)</p> Signup and view all the answers

Why is 'Strengthening Internal Controls' a key focus of the 2025 training?

<p>To reduce the risk of financial loss or reputational damage (A)</p> Signup and view all the answers

How can criminals use stolen identities in real estate fraud?

<p>All of the above. (D)</p> Signup and view all the answers

What is the purpose of the Whistleblower Protection policy?

<p>To protect employees from retaliation for reporting illegal activities (A)</p> Signup and view all the answers

What is the purpose of 'Foster a Culture of Accountability' within the training?

<p>To ensure employees are aware of their responsibilities (A)</p> Signup and view all the answers

Why is money laundering through real estate considered relatively easy for criminals?

<p>All of the above. (D)</p> Signup and view all the answers

What is the purpose of the Anti-Fraud, Corruption, Money Laundering and Terrorism Financing Policy?

<p>To prevent financial crimes by ensuring compliance with relevant laws and regulations (D)</p> Signup and view all the answers

Which of the following is an example of a cybercrime threat mentioned in the content?

<p>Social engineering attacks (D)</p> Signup and view all the answers

What is the relationship between 'Business Continuity and Crisis Management' and 'Incident Reporting' in this training?

<p>Business continuity plans are activated in case of an incident (D)</p> Signup and view all the answers

According to the content, what is the significance of the growing digitization of the financial services sector?

<p>It increases the risk of cybercrime (B)</p> Signup and view all the answers

Based on the information provided, what could be a potential topic covered under 'Third Party Risk Management Program'?

<p>Developing a framework for managing risks associated with external vendors (D)</p> Signup and view all the answers

How do financial institutions plan to enhance their cyber resilience in 2025?

<p>By implementing zero-trust security models and multi-layered encryption (C)</p> Signup and view all the answers

Which of the following is NOT a step in the incident closing process?

<p>Repatriation of funds (D)</p> Signup and view all the answers

What is the primary purpose of the Post Incident Review?

<p>To prevent future incidents (B)</p> Signup and view all the answers

What is the final step in the incident closing process?

<p>Completing corrective actions (C)</p> Signup and view all the answers

When should communication plans be tailored?

<p>Before and after the incident (D)</p> Signup and view all the answers

What is the purpose of meeting with the WSIB's Director of Operations and Investment Operational Due Diligence Officer?

<p>To provide an update on the status of the incident investigation (D)</p> Signup and view all the answers

What is the primary purpose of a password vault?

<p>To generate and manage strong, unique passwords for various accounts. (C)</p> Signup and view all the answers

What is NOT a key aspect of strong password policies?

<p>Reusing the same password across multiple accounts. (C)</p> Signup and view all the answers

Which of the following is an example of secure Wi-Fi practice?

<p>Disabling Wi-Fi when not in use. (D)</p> Signup and view all the answers

What is the purpose of incident response and recovery plans in cybersecurity?

<p>To detect and respond to cyberattacks promptly and effectively. (B)</p> Signup and view all the answers

What is a key aspect of governance and risk management in cybersecurity?

<p>Creating a comprehensive information technology policy framework. (A)</p> Signup and view all the answers

Which of the following is a key component of access control and identity management?

<p>Implementing multi-factor authentication for user logins. (D)</p> Signup and view all the answers

What is the purpose of implementing a zero-trust architecture in cybersecurity?

<p>To assume that no user or device can be trusted by default. (C)</p> Signup and view all the answers

What is the importance of regular software updates in cybersecurity?

<p>To fix vulnerabilities and patch security holes in systems. (A)</p> Signup and view all the answers

Flashcards

Non-Disclosure Agreement (NDA)

A contract that prohibits sharing confidential information.

Due Diligence

The process of investigating and evaluating potential vendors or contractors.

Red Flags

Warning signs indicating potential problems in a supplier or vendor.

Online Adverse News Search

A method to find negative news about a third party before engagement.

Signup and view all the flashcards

Third Party Risk Rating

An assessment of potential risks associated with engaging a third party.

Signup and view all the flashcards

Rental Application Fraud

Fraudsters forge documents like bank statements and pay stubs on rental applications.

Signup and view all the flashcards

Title Fraud

Criminals use stolen identities to change ownership records or obtain fraudulent loans.

Signup and view all the flashcards

Luxury Real Estate Risk

Luxury properties are targeted due to unverified documents leading to rental fraud.

Signup and view all the flashcards

Money Laundering in Real Estate

Criminals use real estate for laundering money due to cash purchases and opaque markets.

Signup and view all the flashcards

Third Party Purchases

Using others to buy property, masking the true owner of the asset.

Signup and view all the flashcards

Indicators of Money Laundering

Buying and selling properties at unusually high or low prices as a red flag.

Signup and view all the flashcards

Criminal Syndicates in Real Estate

Groups attracted to real estate for cash purchases and minimal regulatory oversight.

Signup and view all the flashcards

Opaque Markets

Real estate markets lacking transparency and regulatory scrutiny make for risky investments.

Signup and view all the flashcards

Key Risk & Compliance Focus

The main areas Crane Capital aims to concentrate on for 2025 regarding risks and compliance.

Signup and view all the flashcards

Compliance Commitment

A pledge to follow laws, regulations, and internal policies.

Signup and view all the flashcards

Internal Controls

Procedures put in place to ensure compliance and minimize risk.

Signup and view all the flashcards

Due Diligence Screening

Process of checking for adverse news findings before onboarding third parties.

Signup and view all the flashcards

Culture of Accountability

An environment where individuals take responsibility for their actions.

Signup and view all the flashcards

Zero Tolerance Policy

Strict adherence to laws against fraud and corruption without exceptions.

Signup and view all the flashcards

Evolving Risks

New and changing threats that organizations must adapt to.

Signup and view all the flashcards

Cybersecurity and Data Protection

Measures to safeguard information technology systems and sensitive data.

Signup and view all the flashcards

Whistleblower Protection

Safeguards for individuals reporting unethical conduct.

Signup and view all the flashcards

Customer Due Diligence

Verifying identity and assessing risks related to a customer before onboarding.

Signup and view all the flashcards

Crisis Management

Strategies to manage and mitigate emergencies or unexpected events.

Signup and view all the flashcards

Incident Reporting

The process of documenting and communicating incidents that occur.

Signup and view all the flashcards

Sanctions Screening

Checking third parties against global watchlists to prevent risky associations.

Signup and view all the flashcards

AML Regulations

Laws and guidelines designed to combat money laundering and terrorism financing.

Signup and view all the flashcards

Cyber Resilience

Ability of financial institutions to withstand and recover from cyber threats.

Signup and view all the flashcards

Zero-Trust Security Model

A security approach that requires verification for every access attempt.

Signup and view all the flashcards

Incident Closing Criteria

Requirements for concluding an incident report, including investigation and communication with WSIB.

Signup and view all the flashcards

WSIB Communication Plans

Strategies tailored for engaging with stakeholders after an incident.

Signup and view all the flashcards

Post Incident Review

A process involving corrective actions and verification of internal controls after an incident.

Signup and view all the flashcards

Repatriation of Funds

Return of funds to their original source, if applicable in incident resolution.

Signup and view all the flashcards

Incident Closure

Official ending of an incident report after all tasks and actions are completed.

Signup and view all the flashcards

Password Vault

A tool to securely store and manage passwords for various accounts.

Signup and view all the flashcards

Data Protection

Methods used to secure data against unauthorized access or breaches.

Signup and view all the flashcards

Data Disposal

The proper elimination of data that is no longer required.

Signup and view all the flashcards

Software Updates

Regular updates to software to enhance security and functionality.

Signup and view all the flashcards

Strong Password Policies

Guidelines for creating and maintaining secure passwords.

Signup and view all the flashcards

Phishing Awareness

Recognizing and avoiding deceptive attempts to steal information.

Signup and view all the flashcards

Multi-Factor Authentication (MFA)

An extra layer of security requiring multiple forms of identification.

Signup and view all the flashcards

Monitoring

Continuous observation to detect unusual activity or potential breaches.

Signup and view all the flashcards

Study Notes

Crane Capital Risk & Compliance Training

  • Date: February 2025
  • Agenda:
    • 2025 Crane's Key Risk & Compliance Focus
    • Policies, Procedures and Guidelines
    • Third Party Risk Management Program
    • Anti-Fraud, Corruption, Money Laundering and Terrorism Financing
    • Data Privacy and Cybersecurity Hygiene
    • Business Continuity and Crisis Management
    • Incident Reporting
    • Quiz
    • Closing Remarks

2025 Crane's Key Risk & Compliance Focus

  • Reinforce Compliance Commitment
  • Foster a Culture of Accountability
  • Strengthen Internal Controls
  • Adapt to Evolving Risks
  • Enhance Crisis Management and Resilience
  • Cybersecurity and Data Protection

Third Party Risk Management Program (TPRM) - Lifecycle

  • Onboarding: Risk Assessment and Due Diligence, Procurement and Sourcing, Vendor Creation
  • Ongoing: Performance Monitoring, Re-assessment and Due Diligence, Renewals, Vendor Maintenance, Governance Oversight and Accountability, Documentation, and Reporting, Independent Review
  • Offboarding: Termination, Exit Strategy, Third Party Closure, Vendor Monitoring

Third Party Risk Management (TPRM) - Workflow

  • Third Party (Non-Exhaustive List): Joint Venture Partners, Outsourced Service Providers, Commercial Agents/Sales Representatives, Consultants/Advisors, Contractors/Sub-Contractors, Vendors/Suppliers of Services, Insurance Brokers, Service Providers
  • Third Party Assessment - Determine whether a service provider is already provided by Crane Capital, Outsourcing.
  • Applicable Due Diligence Policies and Procedures- Outsourcing Policy, Outsourcing and Materiality Assessment, Procurement Policy, Vendor Management Policy, Supplier Code of Conduct.
  • Tools: Online Adverse News Search, Initial Due Diligence Questionnaire, Outsourced Service Provider Assessment, Ongoing Performance Monitoring, Third Party Risk Rating and Due Diligence, etc.
  • Other Relevant Risk and Compliance Requirement: Conflicts of Interest Declaration, Related Party Transactions, Non-disclosure agreements (NDA).

Money Laundering Red Flags Indicator in Real Estate

  • Use of Third Parties: Buying property as legal owner (using a friend or family member to purchase property on their behalf)
  • Manipulation of Property Values: Buying and selling property at prices above or below market value
  • Large Deposits (avoiding reporting thresholds): Paying large deposits for property with checks from multiple banks
  • Use of Tenants for Commingling Funds: Using a "tenant" collaborator to combine funds to cover rent payments
  • Illicit Funds for Renovations: Using illicit funds to pay for unnecessary renovations and improvements
  • Shell Companies/Trusts: Using shell companies, trusts, and company structures
  • Overseas Investment: Foreign criminals investing in real estate
  • Excessive Renovation: To distance from criminals from the property they own

Real Estate - Prime Target for Money Laundering

  • Ease of Cash Purchases
  • Disguising Ownership
  • Investment Stability
  • Increased Market Value

Sector Specific Fraud Tactics - Real Estate and Property Management

  • Increase in Rental Application Fraud: Exploiting digital systems to forge documents, leading to higher eviction risk and bad debt.
  • Rise in Title Fraud: Criminals altering property ownership records using stolen identities, securing fraudulent loans, or selling properties they don't own. Remote transactions risk this fraud.
  • Luxury Real Estate as a High-Risk Target: Rental fraud is especially prevalent in the luxury market where fake documents often go undetected.

Gifts Declaration

  • Submission: Gift requests through Concur before purchase.
  • Value Limit: Gifts below US$100 are allowed; gifts exceeding US$100 need justification.
  • Recipient Specification: Recipient company and individual names/amounts in gift request.
  • Prohibited Acts: Offering gifts/hospitality for undue influence, during a tender/contract renewal, exceeding thresholds, using vouchers, etc.

Prevention Measures within Crane Capital Policies and Procedures

  • Fraud Prevention: Information Technology Policy, Multifactor Authentication, Biometric authentication, Segregation of Duties, Invoice and Cash Management, and Whistleblower Protection
  • Bribery & Corruption Prevention: Travel & Expense Policies, Gift Requests, Third Party Risk Management.

Notable Fraud, Bribery, Corruption, AML/CFT in 2024

  • Evergrande: Accused of $78 billion fraud.
  • MAS Imposes Composition Penalty: On Swiss-Asia Financial Services for AML/CFT breaches.
  • TD Bank Fine: $3 billion fine over drug cartel money laundering.
  • UK Engineering Firm Scam: Arup falls victim to a £20 million deepfake scam.
  • Deepfake Musk Scam: AI-powered version of Elon Musk appears in thousands of inauthentic ads, creating billions in fraud.

Strengthening Cyber Resilience

  • Zero-Trust Security Models
  • Multi-Layered Encryption
  • Biometric Security Systems
  • Voice Recognition Technologies
  • Generative AI Defenses

Principles of Data Protection (1/4)

  • Data Protection: Embraces technologies/processes/workflows needed for the availability of data when needed.
  • Data Security: Safeguards data against theft, corruption, or unauthorized access throughout the data lifecycle.
  • Data Privacy: Understanding the collection, use, management, and monetization of sensitive data.

Principles of Data Protection (2/4)

  • Data Minimization: Collect only necessary data.
  • Principle of Least Privilege: Authorized users are granted the minimum access required for their work.

Principles of Data Protection (3/4)

  • Data Classification and Encryption: Classifying data by sensitivity and importance (e.g., Personal, Work - Unprotected, Work - Protected, Confidential, Highly Confidential) and protecting it via encryption.

Principles of Data Protection (4/4)

  • Password Vault: Store passwords centrally and protect them with encryption to eliminate the need to memorize multiple passwords.
  • Data Storage and Backup: Secure methods for storing data and proper disposal of no-longer-needed data.
  • Prevent unauthorized access: Preventing unauthorized access, breaches and data leaks.

Cybersecurity Hygiene (1/2)

  • Common Cyber Hygiene Problems: Weak Passwords, Ignoring Updates, Clicking on Suspicious Links, Not Backing Up Data, Sharing Too Much Online.

Cybersecurity Hygiene (2/2)

  • Prevention Measures: Regular Software Updates, Strong Password Policies, Phishing Awareness, Secure Wi-Fi Practices, System & Network Security, Regular patching, Secure third-party access, Monitoring for unusual activity.

Business Continuity

  • Business Continuity Planning: Ensure Crane Capital can continue operating during and after a crisis.
  • Disaster Recovery: Processes for restoring IT infrastructure, data access, IT resources after a disaster.
  • Crisis Management: Focus on responding effectively to unexpected events.

Business Continuity - Recovery Strategy

  • Recovery Strategy for Office premise compromise, IT equipment destruction, and other scenarios.

Crisis Management - Crisis Classifications and CMT

  • Crisis Classification Levels: RED (imminent threat), ORANGE (moderate risk), and YELLOW (low risk) based on impact.
  • Crisis Management Team (CMT): Key contact persons responsible for crisis response, including alternate members.
  • CMT Responsibilities: Ensuring Crane Capital can operate during and after a crisis, planning for uninterrupted operations, coordinating crisis response, allocating resources, and monitoring communication protocols.

Crisis Communication

  • Crisis Communication Plan: Focus on minimizing damage when responding to unexpected events.
  • Crisis Communications Coordinator: Contact numbers available for different departments in Hong Kong and Singapore.

Incident Reporting

  • Introduction: Crane Capital's formal process for managing incidents to protect its reputation and operations.
  • Key Elements: Incident Types (e.g., fraud, theft, cyber threats), Response Strategy (e.g., notification to crisis management team, investigation, validation), and Incident reporting form /process (5W1H)
  • Incident Notification: Report incidents to the CMT as soon as possible (ideally within 1-3 hours).
  • Incident Investigation: CMT validates and determines whether further investigation is required.
  • WSIB Reporting: Reporting escalated incidents to WSIB (if applicable).
  • Incident Closing and Following-Up: Incident Resolution, Communication, Corrective action, Internal control verification and Incident closure.

Information Security Incidents

  • Examples: Unauthorized disclosure of sensitive information, theft/loss of device, virus/malware outbreaks, denial of service, attempts to gain unauthorized access, compromised user accounts due to phishing.
  • Contact Methods: ECI (External Cyber Incident) Security Operations Center (SOC) Contact - Primary Method (email - [email protected]) and SOC Hotline Numbers for different regions (US, UK, HK, SG).

Closing Remarks – Reminder on Ethics Standard

  • Reduce Risk: Helps reduce the likelihood of misconduct, regulatory violations, legal actions and reputational harm.
  • Promote Ethical Culture: Fosters a workplace culture that prioritizes integrity, honesty, and transparency.
  • Employee Engagement: Engage employees who understand the importance of ethics and compliance.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser