Podcast
Questions and Answers
In the context of the provided information, when should a red flag noted during due diligence procedures be escalated to the Operations Director and Risk & Compliance?
In the context of the provided information, when should a red flag noted during due diligence procedures be escalated to the Operations Director and Risk & Compliance?
- Prior to engaging a third party, regardless of whether it is a contractor, sub-contractor, vendor, or supplier (correct)
- Only when engaging a vendor or supplier of services or purchases
- Only after engaging a third party, for all types of third parties, and not during the due diligence procedures.
- Specifically for contracts and sub-contracts, but not for vendors or suppliers of services or purchases.
Which of the following is NOT mentioned as a due diligence procedure?
Which of the following is NOT mentioned as a due diligence procedure?
- Red flag escalation to Operations Director and Risk & Compliance (correct)
- Supplier/Vendor (services OR purchases) Procurement Policy
- Online Adverse News Search
- Third Party Risk Rating and Due Diligence
What type of third party requires the approval of the Operations Director and Risk & Compliance before engagement?
What type of third party requires the approval of the Operations Director and Risk & Compliance before engagement?
- Only contractors and sub-contractors
- Only vendors and suppliers of services
- Only third parties that are not subject to the Supplier/Vendor (services OR purchases) Procurement Policy
- All third parties, including contractors, sub-contractors, vendors, and suppliers of services (correct)
Which of the following processes should be completed before engaging a third party?
Which of the following processes should be completed before engaging a third party?
Based on the provided information, what is the primary objective of due diligence procedures?
Based on the provided information, what is the primary objective of due diligence procedures?
What has increased the risk of title fraud in real estate?
What has increased the risk of title fraud in real estate?
Which of the following is NOT a reason why criminal syndicates are drawn to the property market for money laundering?
Which of the following is NOT a reason why criminal syndicates are drawn to the property market for money laundering?
What is the primary focus for the Crane Capital Risk & Compliance Training in 2025?
What is the primary focus for the Crane Capital Risk & Compliance Training in 2025?
What is a red flag indicator that could suggest money laundering in real estate?
What is a red flag indicator that could suggest money laundering in real estate?
What is the primary focus of the Third Party Risk Management Policy?
What is the primary focus of the Third Party Risk Management Policy?
What is a potential consequence of increased rental application fraud?
What is a potential consequence of increased rental application fraud?
Which of the following is NOT explicitly mentioned as a key focus area for the training?
Which of the following is NOT explicitly mentioned as a key focus area for the training?
What is the significance of 'Reinforce Compliance Commitment' in the training's key focus?
What is the significance of 'Reinforce Compliance Commitment' in the training's key focus?
Which of the following is NOT explicitly mentioned as a focus area for Crane Capital in 2025?
Which of the following is NOT explicitly mentioned as a focus area for Crane Capital in 2025?
Which type of real estate is particularly vulnerable to rental fraud?
Which type of real estate is particularly vulnerable to rental fraud?
What type of global watchlists are mentioned in the context of Customer Due Diligence?
What type of global watchlists are mentioned in the context of Customer Due Diligence?
What is a red flag suggesting potential money laundering in a real estate transaction?
What is a red flag suggesting potential money laundering in a real estate transaction?
What is the objective of 'Adapting to Evolving Risks' in the 2025 training?
What is the objective of 'Adapting to Evolving Risks' in the 2025 training?
Why is 'Strengthening Internal Controls' a key focus of the 2025 training?
Why is 'Strengthening Internal Controls' a key focus of the 2025 training?
How can criminals use stolen identities in real estate fraud?
How can criminals use stolen identities in real estate fraud?
What is the purpose of the Whistleblower Protection policy?
What is the purpose of the Whistleblower Protection policy?
What is the purpose of 'Foster a Culture of Accountability' within the training?
What is the purpose of 'Foster a Culture of Accountability' within the training?
Why is money laundering through real estate considered relatively easy for criminals?
Why is money laundering through real estate considered relatively easy for criminals?
What is the purpose of the Anti-Fraud, Corruption, Money Laundering and Terrorism Financing Policy?
What is the purpose of the Anti-Fraud, Corruption, Money Laundering and Terrorism Financing Policy?
Which of the following is an example of a cybercrime threat mentioned in the content?
Which of the following is an example of a cybercrime threat mentioned in the content?
What is the relationship between 'Business Continuity and Crisis Management' and 'Incident Reporting' in this training?
What is the relationship between 'Business Continuity and Crisis Management' and 'Incident Reporting' in this training?
According to the content, what is the significance of the growing digitization of the financial services sector?
According to the content, what is the significance of the growing digitization of the financial services sector?
Based on the information provided, what could be a potential topic covered under 'Third Party Risk Management Program'?
Based on the information provided, what could be a potential topic covered under 'Third Party Risk Management Program'?
How do financial institutions plan to enhance their cyber resilience in 2025?
How do financial institutions plan to enhance their cyber resilience in 2025?
Which of the following is NOT a step in the incident closing process?
Which of the following is NOT a step in the incident closing process?
What is the primary purpose of the Post Incident Review?
What is the primary purpose of the Post Incident Review?
What is the final step in the incident closing process?
What is the final step in the incident closing process?
When should communication plans be tailored?
When should communication plans be tailored?
What is the purpose of meeting with the WSIB's Director of Operations and Investment Operational Due Diligence Officer?
What is the purpose of meeting with the WSIB's Director of Operations and Investment Operational Due Diligence Officer?
What is the primary purpose of a password vault?
What is the primary purpose of a password vault?
What is NOT a key aspect of strong password policies?
What is NOT a key aspect of strong password policies?
Which of the following is an example of secure Wi-Fi practice?
Which of the following is an example of secure Wi-Fi practice?
What is the purpose of incident response and recovery plans in cybersecurity?
What is the purpose of incident response and recovery plans in cybersecurity?
What is a key aspect of governance and risk management in cybersecurity?
What is a key aspect of governance and risk management in cybersecurity?
Which of the following is a key component of access control and identity management?
Which of the following is a key component of access control and identity management?
What is the purpose of implementing a zero-trust architecture in cybersecurity?
What is the purpose of implementing a zero-trust architecture in cybersecurity?
What is the importance of regular software updates in cybersecurity?
What is the importance of regular software updates in cybersecurity?
Flashcards
Non-Disclosure Agreement (NDA)
Non-Disclosure Agreement (NDA)
A contract that prohibits sharing confidential information.
Due Diligence
Due Diligence
The process of investigating and evaluating potential vendors or contractors.
Red Flags
Red Flags
Warning signs indicating potential problems in a supplier or vendor.
Online Adverse News Search
Online Adverse News Search
Signup and view all the flashcards
Third Party Risk Rating
Third Party Risk Rating
Signup and view all the flashcards
Rental Application Fraud
Rental Application Fraud
Signup and view all the flashcards
Title Fraud
Title Fraud
Signup and view all the flashcards
Luxury Real Estate Risk
Luxury Real Estate Risk
Signup and view all the flashcards
Money Laundering in Real Estate
Money Laundering in Real Estate
Signup and view all the flashcards
Third Party Purchases
Third Party Purchases
Signup and view all the flashcards
Indicators of Money Laundering
Indicators of Money Laundering
Signup and view all the flashcards
Criminal Syndicates in Real Estate
Criminal Syndicates in Real Estate
Signup and view all the flashcards
Opaque Markets
Opaque Markets
Signup and view all the flashcards
Key Risk & Compliance Focus
Key Risk & Compliance Focus
Signup and view all the flashcards
Compliance Commitment
Compliance Commitment
Signup and view all the flashcards
Internal Controls
Internal Controls
Signup and view all the flashcards
Due Diligence Screening
Due Diligence Screening
Signup and view all the flashcards
Culture of Accountability
Culture of Accountability
Signup and view all the flashcards
Zero Tolerance Policy
Zero Tolerance Policy
Signup and view all the flashcards
Evolving Risks
Evolving Risks
Signup and view all the flashcards
Cybersecurity and Data Protection
Cybersecurity and Data Protection
Signup and view all the flashcards
Whistleblower Protection
Whistleblower Protection
Signup and view all the flashcards
Customer Due Diligence
Customer Due Diligence
Signup and view all the flashcards
Crisis Management
Crisis Management
Signup and view all the flashcards
Incident Reporting
Incident Reporting
Signup and view all the flashcards
Sanctions Screening
Sanctions Screening
Signup and view all the flashcards
AML Regulations
AML Regulations
Signup and view all the flashcards
Cyber Resilience
Cyber Resilience
Signup and view all the flashcards
Zero-Trust Security Model
Zero-Trust Security Model
Signup and view all the flashcards
Incident Closing Criteria
Incident Closing Criteria
Signup and view all the flashcards
WSIB Communication Plans
WSIB Communication Plans
Signup and view all the flashcards
Post Incident Review
Post Incident Review
Signup and view all the flashcards
Repatriation of Funds
Repatriation of Funds
Signup and view all the flashcards
Incident Closure
Incident Closure
Signup and view all the flashcards
Password Vault
Password Vault
Signup and view all the flashcards
Data Protection
Data Protection
Signup and view all the flashcards
Data Disposal
Data Disposal
Signup and view all the flashcards
Software Updates
Software Updates
Signup and view all the flashcards
Strong Password Policies
Strong Password Policies
Signup and view all the flashcards
Phishing Awareness
Phishing Awareness
Signup and view all the flashcards
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Signup and view all the flashcards
Monitoring
Monitoring
Signup and view all the flashcards
Study Notes
Crane Capital Risk & Compliance Training
- Date: February 2025
- Agenda:
- 2025 Crane's Key Risk & Compliance Focus
- Policies, Procedures and Guidelines
- Third Party Risk Management Program
- Anti-Fraud, Corruption, Money Laundering and Terrorism Financing
- Data Privacy and Cybersecurity Hygiene
- Business Continuity and Crisis Management
- Incident Reporting
- Quiz
- Closing Remarks
2025 Crane's Key Risk & Compliance Focus
- Reinforce Compliance Commitment
- Foster a Culture of Accountability
- Strengthen Internal Controls
- Adapt to Evolving Risks
- Enhance Crisis Management and Resilience
- Cybersecurity and Data Protection
Third Party Risk Management Program (TPRM) - Lifecycle
- Onboarding: Risk Assessment and Due Diligence, Procurement and Sourcing, Vendor Creation
- Ongoing: Performance Monitoring, Re-assessment and Due Diligence, Renewals, Vendor Maintenance, Governance Oversight and Accountability, Documentation, and Reporting, Independent Review
- Offboarding: Termination, Exit Strategy, Third Party Closure, Vendor Monitoring
Third Party Risk Management (TPRM) - Workflow
- Third Party (Non-Exhaustive List): Joint Venture Partners, Outsourced Service Providers, Commercial Agents/Sales Representatives, Consultants/Advisors, Contractors/Sub-Contractors, Vendors/Suppliers of Services, Insurance Brokers, Service Providers
- Third Party Assessment - Determine whether a service provider is already provided by Crane Capital, Outsourcing.
- Applicable Due Diligence Policies and Procedures- Outsourcing Policy, Outsourcing and Materiality Assessment, Procurement Policy, Vendor Management Policy, Supplier Code of Conduct.
- Tools: Online Adverse News Search, Initial Due Diligence Questionnaire, Outsourced Service Provider Assessment, Ongoing Performance Monitoring, Third Party Risk Rating and Due Diligence, etc.
- Other Relevant Risk and Compliance Requirement: Conflicts of Interest Declaration, Related Party Transactions, Non-disclosure agreements (NDA).
Money Laundering Red Flags Indicator in Real Estate
- Use of Third Parties: Buying property as legal owner (using a friend or family member to purchase property on their behalf)
- Manipulation of Property Values: Buying and selling property at prices above or below market value
- Large Deposits (avoiding reporting thresholds): Paying large deposits for property with checks from multiple banks
- Use of Tenants for Commingling Funds: Using a "tenant" collaborator to combine funds to cover rent payments
- Illicit Funds for Renovations: Using illicit funds to pay for unnecessary renovations and improvements
- Shell Companies/Trusts: Using shell companies, trusts, and company structures
- Overseas Investment: Foreign criminals investing in real estate
- Excessive Renovation: To distance from criminals from the property they own
Real Estate - Prime Target for Money Laundering
- Ease of Cash Purchases
- Disguising Ownership
- Investment Stability
- Increased Market Value
Sector Specific Fraud Tactics - Real Estate and Property Management
- Increase in Rental Application Fraud: Exploiting digital systems to forge documents, leading to higher eviction risk and bad debt.
- Rise in Title Fraud: Criminals altering property ownership records using stolen identities, securing fraudulent loans, or selling properties they don't own. Remote transactions risk this fraud.
- Luxury Real Estate as a High-Risk Target: Rental fraud is especially prevalent in the luxury market where fake documents often go undetected.
Gifts Declaration
- Submission: Gift requests through Concur before purchase.
- Value Limit: Gifts below US$100 are allowed; gifts exceeding US$100 need justification.
- Recipient Specification: Recipient company and individual names/amounts in gift request.
- Prohibited Acts: Offering gifts/hospitality for undue influence, during a tender/contract renewal, exceeding thresholds, using vouchers, etc.
Prevention Measures within Crane Capital Policies and Procedures
- Fraud Prevention: Information Technology Policy, Multifactor Authentication, Biometric authentication, Segregation of Duties, Invoice and Cash Management, and Whistleblower Protection
- Bribery & Corruption Prevention: Travel & Expense Policies, Gift Requests, Third Party Risk Management.
Notable Fraud, Bribery, Corruption, AML/CFT in 2024
- Evergrande: Accused of $78 billion fraud.
- MAS Imposes Composition Penalty: On Swiss-Asia Financial Services for AML/CFT breaches.
- TD Bank Fine: $3 billion fine over drug cartel money laundering.
- UK Engineering Firm Scam: Arup falls victim to a £20 million deepfake scam.
- Deepfake Musk Scam: AI-powered version of Elon Musk appears in thousands of inauthentic ads, creating billions in fraud.
Strengthening Cyber Resilience
- Zero-Trust Security Models
- Multi-Layered Encryption
- Biometric Security Systems
- Voice Recognition Technologies
- Generative AI Defenses
Principles of Data Protection (1/4)
- Data Protection: Embraces technologies/processes/workflows needed for the availability of data when needed.
- Data Security: Safeguards data against theft, corruption, or unauthorized access throughout the data lifecycle.
- Data Privacy: Understanding the collection, use, management, and monetization of sensitive data.
Principles of Data Protection (2/4)
- Data Minimization: Collect only necessary data.
- Principle of Least Privilege: Authorized users are granted the minimum access required for their work.
Principles of Data Protection (3/4)
- Data Classification and Encryption: Classifying data by sensitivity and importance (e.g., Personal, Work - Unprotected, Work - Protected, Confidential, Highly Confidential) and protecting it via encryption.
Principles of Data Protection (4/4)
- Password Vault: Store passwords centrally and protect them with encryption to eliminate the need to memorize multiple passwords.
- Data Storage and Backup: Secure methods for storing data and proper disposal of no-longer-needed data.
- Prevent unauthorized access: Preventing unauthorized access, breaches and data leaks.
Cybersecurity Hygiene (1/2)
- Common Cyber Hygiene Problems: Weak Passwords, Ignoring Updates, Clicking on Suspicious Links, Not Backing Up Data, Sharing Too Much Online.
Cybersecurity Hygiene (2/2)
- Prevention Measures: Regular Software Updates, Strong Password Policies, Phishing Awareness, Secure Wi-Fi Practices, System & Network Security, Regular patching, Secure third-party access, Monitoring for unusual activity.
Business Continuity
- Business Continuity Planning: Ensure Crane Capital can continue operating during and after a crisis.
- Disaster Recovery: Processes for restoring IT infrastructure, data access, IT resources after a disaster.
- Crisis Management: Focus on responding effectively to unexpected events.
Business Continuity - Recovery Strategy
- Recovery Strategy for Office premise compromise, IT equipment destruction, and other scenarios.
Crisis Management - Crisis Classifications and CMT
- Crisis Classification Levels: RED (imminent threat), ORANGE (moderate risk), and YELLOW (low risk) based on impact.
- Crisis Management Team (CMT): Key contact persons responsible for crisis response, including alternate members.
- CMT Responsibilities: Ensuring Crane Capital can operate during and after a crisis, planning for uninterrupted operations, coordinating crisis response, allocating resources, and monitoring communication protocols.
Crisis Communication
- Crisis Communication Plan: Focus on minimizing damage when responding to unexpected events.
- Crisis Communications Coordinator: Contact numbers available for different departments in Hong Kong and Singapore.
Incident Reporting
- Introduction: Crane Capital's formal process for managing incidents to protect its reputation and operations.
- Key Elements: Incident Types (e.g., fraud, theft, cyber threats), Response Strategy (e.g., notification to crisis management team, investigation, validation), and Incident reporting form /process (5W1H)
- Incident Notification: Report incidents to the CMT as soon as possible (ideally within 1-3 hours).
- Incident Investigation: CMT validates and determines whether further investigation is required.
- WSIB Reporting: Reporting escalated incidents to WSIB (if applicable).
- Incident Closing and Following-Up: Incident Resolution, Communication, Corrective action, Internal control verification and Incident closure.
Information Security Incidents
- Examples: Unauthorized disclosure of sensitive information, theft/loss of device, virus/malware outbreaks, denial of service, attempts to gain unauthorized access, compromised user accounts due to phishing.
- Contact Methods: ECI (External Cyber Incident) Security Operations Center (SOC) Contact - Primary Method (email - [email protected]) and SOC Hotline Numbers for different regions (US, UK, HK, SG).
Closing Remarks – Reminder on Ethics Standard
- Reduce Risk: Helps reduce the likelihood of misconduct, regulatory violations, legal actions and reputational harm.
- Promote Ethical Culture: Fosters a workplace culture that prioritizes integrity, honesty, and transparency.
- Employee Engagement: Engage employees who understand the importance of ethics and compliance.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.