AML Compliance Fundamentals
-
AML Basics - Enforcement Action Case Studies AML Compliance Culture
Case studies highlighting how weak AML culture, poor oversight, and ignored risks lead to major enforcement actions.
-
AML Red Flags Cheat Sheet
A concise guide outlining common AML red flags by role and when to escalate suspicious activity internally.
-
Money Laundering Stage - Placement Patterns Checklist
Checklist of suspicious fund placement patterns, highlighting cash, crypto, shell companies, and rapid movements for AML detection.
-
Suspicious Activity Report (SARs) Internal Report Writing Exercise
Guides staff to document and report structured or unusual account activity objectively for internal compliance review and monitoring.
-
Money Laundering Stages - Case Study Layering Through Crypto and Real Estate
Illustrates how criminals launder money through crypto and real estate, highlighting placement, layering, integration, and red flags.
Artificial Intelligence
-
AI Risk Evaluation Worksheet – Questions to ask when vetting AI tools for compliance
A worksheet to evaluate tools for compliance, covering data, risk, regulations, and vendor controls.
Cryptocurrencies: Know Your Customer (KYC), Typologies, Screening
-
Crypto and AML Risks and Compliance Essentials - Case study - mixer and darknet tracing example
A case study showing how stolen cryptocurrency moved through mixers and darknet wallets, highlighting tracing and compliance reporting strategies.
-
Crypto KYC Comparison Table – How Crypto Onboarding Differs from Traditional Finance
A comparison of crypto and traditional finance KYC processes, highlighting differences in verification, monitoring, and regulatory requirements.
-
Crypto Risk Typology Cheat Sheet
A cheat sheet outlining common cryptocurrency laundering patterns and red flags to identify suspicious wallet and transaction activity.
-
Step-by-Step Guide for Screening Crypto Wallets and Counterparties
Outlines a step-by-step process for screening crypto wallets and counterparties to identify sanctions risks and ensure compliance.
-
Crypto Money Laundering Typologies Guide
A beginner-friendly guide explaining common cryptocurrency money laundering methods using clear language, practical examples, and easy-to-read tables to support compliance investigations.
-
High-Risk Crypto Customer Indicators Checklist
A practical checklist to help compliance teams identify high-risk crypto customers and activities that may require enhanced due diligence, escalation, or SAR filing across fintech and crypto platforms.
-
Blockchain Tracing Workflow – Step-by-Step Guide
Step-by-step guide for fintechs and compliance teams: identify wallets, map transactions, cluster, attribute, assess risk, and document for SARs using clear, regulator-aligned processes.
-
Common Crypto SAR Filing Mistakes
A practical guide identifying common crypto SAR filing errors and best practices to improve clarity, context, documentation, and regulatory defensibility.
-
Crypto Money Laundering Typologies Guide
A beginner-friendly guide explaining common crypto money laundering typologies, red flags, and SAR considerations to support effective detection and compliance.
-
High-Risk Crypto Customer Indicators Checklist
A concise checklist identifying high-risk crypto customers and behaviors to guide EDD, escalation, and SAR filing decisions.
-
Crypto Use Case vs Risk Matrix
Helps fintechs assess crypto risk by use case, retail trading, payments, DeFi, NFTs, aligning controls, monitoring, CDD/EDD, and SAR filing for a risk-based, compliant program.
-
Crypto SAR Narrative Examples
Provides illustrative SARs for structuring, ransomware, and scam-related crypto activity, emphasizing plain language, timelines, typologies, wallet references, and documented actions for regulatory defensibility.
Fintech Tools
-
CaseStudy - New fintech product launch
A structured guide to assess and manage fraud risks throughout a fintech product launch, from planning to post-launch monitoring.
-
Fintech Inherent Risk Assessment (IRA)
A structured assessment framework defining fintech inherent risks across products, customers, geographies, and channels to support a defensible, risk-based AML program.
Fraud Assessment, Prevention, & Guides
-
Fraud Detection Red Flag Reference Guide
A reference guide listing common red flags across identity theft, romance scams, money mule networks, and elder fraud cases.
-
Fraud escalation email template
A template for escalating suspected fraud via email, detailing suspicious activity, actions taken, and requesting immediate investigation.
-
Fraud Investigations Case Study and Roleplay
A roleplay-based case study for practicing fraud detection, handling suspicious activity, and following proper escalation procedures.
-
Fraud Pattern Recognition Guide
A guide identifying patterns and red flags for synthetic identity fraud, money mule activity, and various scam behaviors.
-
Fraud Red Flag Reference Card
A quick reference card outlining common fraud types, behavioral and transaction red flags, and steps for immediate escalation.
-
Fraud Risk Assessment Fundamentals Control Evaluation Checklist
A control evaluation table outlining objectives, methods, responsible teams, and status for monitoring transactions, security, and fraud prevention.
-
Detecting Fraud in Digital Payments - Roleplay exercise suspicious P2P transfers
A scenario-based exercise for identifying and responding to suspicious P2P payment activity, highlighting red flags and escalation steps.
Investigative Tools
-
OSINT Tool Guide for Investigating Suspicious Transactions
Lists OSINT tools and methods to verify identities, investigate suspicious transactions, and gather publicly available evidence for investigations.
-
OSINT Sources & Validation Checklist – Fintech Investigations
A practical checklist guiding reliable OSINT use in fintech investigations, ensuring accurate validation, false-positive prevention, proper documentation, and regulatory defensibility.
-
Investigations Intake & Case Triage Checklist
A standardized checklist for intake and triage of investigation alerts, ensuring consistent risk scoring, prioritization, escalation, and audit-ready documentation.
-
Investigations Documentation & Audit Trail Standards Checklist
A checklist defining clear, defensible investigation documentation standards to ensure audit readiness, regulatory compliance, and transparent decision-making.
-
Escalation & Case Closure Decision Framework Checklist
A decision framework ensuring consistent case closure, escalation, or SAR filing with clear rationale, management review, and audit-ready documentation.
Payments, Exceptions & Product-Specific Risks
-
Payments Exception Handling Matrix Matrix for ACH, RTP, and FedNow transactions
Outlines common ACH, RTP, and FedNow payment exceptions, causes, compliance considerations, and recommended resolution steps.
-
Failed & Returned Payments Risk Indicators
Guide helping teams identify fraud, AML, or sanctions risks hidden within failed or returned payments, ensuring escalation, documentation, and readiness.
-
Red Flags by Product Type Chart
A comprehensive chart highlighting product-specific red flags, risks, and typologies to strengthen transaction monitoring, fraud detection, and AML compliance.
-
Product-Specific Risk Mapping Guide (Payments, Wallets, Lending, Crypto)
A practical guide mapping product-specific risks to AML, fraud, and sanctions controls, enabling proactive design, aligned teams, and regulatory readiness.
-
Payments Exception Handling Checklist
A checklist ensuring consistent, compliant handling of payment exceptions with clear escalation, documentation, and regulatory alignment across all payment rails.
Risk Assessment, Third-Party & Vendor Oversight
-
Risk Rating Template
Assesses customer risk by scoring transaction volume, source, KYC status, and account type to determine overall risk tier.
-
Third-Party Risk Assessment Template
Provides a structured framework to assess, monitor, and mitigate operational, compliance, financial, and cybersecurity risks of vendors.
-
Risk & Compliance Basics
AI is transforming work faster than expertise alone can keep up—adaptability and curiosity now matter most. This session shows how risk and compliance professionals can use AI responsibly as a creative partner to boost productivity, decision-making, and stay ahead of emerging threats.
Sanctions Compliance
-
OFAC Sanctions Compliance FAQ Guide
Summarizes OFAC sanctions rules, compliance requirements, screening procedures, red flags, and steps for handling potential violations.
-
Sanctions Compliance Case Study
Analyzes scenarios to identify and escalate potential OFAC sanctions violations, emphasizing proper due diligence and internal controls.
-
Sanctions Screening Flowchart: Step-by-Step Guide for Screening Crypto Wallets and Counterparties
A concise step-by-step framework to screen crypto wallets and counterparties for sanctions risk, ensuring compliance, risk mitigation, and proper regulatory reporting.
-
Sanctions Screening & Alert Disposition Guide
A practical guide for handling sanctions alerts with consistent evaluation, documentation, escalation, and regulatory compliance across financial and crypto transactions.
-
Sanctions Evasion Typologies for Fintechs & Crypto Platforms
A focused guide outlining common sanctions evasion tactics in fintech and crypto, with risk indicators and controls to strengthen detection and compliance.
-
Sanctions Escalation & Blocking vs Rejecting Decision Guide
A clear operational guide for deciding when to block or reject sanctions-related transactions, ensuring proper escalation, documentation, approvals, and regulatory compliance.
Suspicious Activity Reporting
-
SAR Writing Checklist - What to Include and Avoid
Provides a structured checklist for writing clear, factual, and compliant SAR narratives while avoiding speculation or subjective language.
-
Suspicious Activity Report (SAR) Red Flag Reference Guide
Lists common red flags in financial transactions indicating suspicious activity, aiding detection of fraud, money laundering, or AML breaches.
-
Investigating Suspicious Transactions - Case-based alert simulations
Simulated case studies for investigating suspicious transactions, helping compliance teams identify red flags and assess potential money laundering activity.
-
Investigating Suspicious Transactions - Sample SAR Narrative
Guidelines for drafting a clear, detailed SAR narrative, documenting suspicious transactions and supporting evidence for regulatory reporting.
Transaction Monitoring: Alerts, Tuning
-
Alert Tuning Cheat Sheet for AML Compliance
A guide to adjust AML alerts, set thresholds, track customer behavior, and focus on high-risk transactions.
-
Financial Investigator Log Worksheet
A structured worksheet for tracking investigations, documenting transactions, evidence, risk indicators, and follow-up actions systematically.
-
Transaction Monitoring Building Effective Rules and Scenarios - Sample rule writing templates
Provides templates for setting transaction monitoring rules to detect suspicious activity, including cash deposits, crypto, and structuring patterns.
-
Red Flags by Product Type Chart
Identifies common red flags and risks across financial products to guide monitoring and detect potential fraud or money laundering.

