Description
AGENDA
- Techniques used to obscure beneficial ownership
- Overview of commonly exploited intermediaries
- Overview of vulnerabilities
What you will learn
Upon completion of this training workshop, you will be able:
- To evaluate the common techniques used in ownership concealment.
- To consider how intermediaries are commonly exploited.
- To criticise vulnerabilities in the asset ownership process that opens the door for exploitation.