أساس مكافحة المخاطر هو توفر بيانات موثوقة ومدارة ودقيقة وآمنة

تلفزيون دبي - Dubai TV
23 Sept 202409:57

Summary

TLDRIn this interview, the founder of Cedar Rose discusses the origins of his company, which specializes in financial risk solutions, and the importance of data accuracy and security in combating financial crimes. He highlights the misconception that such crimes are limited to financial institutions, emphasizing that they can involve human trafficking and modern slavery. The interviewee stresses the need for individuals and businesses to perform thorough background checks and be aware of their supply chain to avoid unwitting involvement in illegal activities.

Takeaways

  • 🚩 Financial crimes are not limited to financial institutions but include any illegal activities that generate illegal financial gain, such as human trafficking and modern slavery.
  • 🌟 The founder of Cedar Rose was drawn into the industry of financial crime investigation by chance, but had a subconscious desire to fight for humanity and a good cause.
  • 🏢 Cedar Rose started as a company providing credit reports and grew into investigating the source of funds and wealth for companies and individuals.
  • 🌐 The name 'Cedar Rose' symbolizes the union of the founder's Lebanese and English heritage, representing trust and personal commitment.
  • 🔍 Cedar Rose focuses on gathering information from ultimate sources, ensuring data is legally and ethically obtained with unique identifiers for thorough research.
  • 💼 The company's platform allows clients to search for companies and individuals to assess their operations, financial stability, and compliance with regulations.
  • 🔒 Data management is crucial in fighting financial crime, and Cedar Rose emphasizes the importance of data privacy, accuracy, and security.
  • 🛡️ Cedar Rose adheres to data protection regulations like GDPR and has achieved ISO 27001 certification to ensure the highest standards of data security.
  • 👥 Individuals can fight financial crime by being aware of who they are doing business with and conducting background checks before transactions.
  • 🌐 Supply risk is a growing concern, and companies must be aware of their entire supply chain, not just their direct clients and subsidiaries.
  • 💡 The interview concludes with a call to action for everyone to be vigilant against financial crimes and to educate themselves on the risks involved.

Q & A

  • What is the scope of financial crimes according to the transcript?

    -Financial crimes are not limited to financial institutions but include any illegal activity that generates illegal financial gain, such as trafficking, modern slavery, and more.

  • How did the founder of Cedar Rose get into the industry of financial investigations?

    -The founder co-founded a company in 1997 that provided credit reports and later started receiving inquiries to investigate companies and individuals' sources of funds and wealth, which led to the establishment of Cedar Rose.

  • What is the significance behind the name 'Cedar Rose'?

    -Cedar represents the founder's birth country Lebanon, and Rose represents England, where his wife is from. The name symbolizes the union of the founder and his wife.

  • What services does Cedar Rose provide through its platform?

    -Cedar Rose offers a platform where clients can search for companies and individuals to find out about their ownership, operations, financial stability, compliance, and any adverse information.

  • Why is data accuracy and management important in fighting financial crimes?

    -Data accuracy and management are crucial because they form the core of investigations and regulatory compliance. Ensuring data is accurate, up-to-date, clean, and secure is vital for trust and effective risk management.

  • How does Cedar Rose ensure the security and privacy of the data it handles?

    -Cedar Rose adheres to data protection regulations like GDPR, undergoes ISO 27001 certification audits, and invests in technology and security to ensure the best practices in data handling, collection, transmission, and access.

  • What is the challenge faced by institutions when adopting technology solutions to fight financial crimes?

    -The challenge is balancing the need for technology solutions to enhance risk management with the risk of exposing themselves to cybersecurity threats.

  • What role can individuals play in fighting financial crimes?

    -Individuals can fight financial crimes by being aware of who they are doing business with, conducting background checks, and not being deceived by appearances of wealth or status.

  • Why is supply risk important in the context of financial crimes?

    -Supply risk is important because it involves being aware of not just direct clients but also the entire supply chain, ensuring compliance and avoiding association with illegal activities.

  • How does Cedar Rose address supply risk?

    -Cedar Rose addresses supply risk by providing solutions that help clients assess and manage the risks associated with their suppliers and the broader supply chain.

  • What advice does the founder of Cedar Rose have for people to avoid being associated with financial crimes unknowingly?

    -The founder advises people to look beyond appearances and conduct thorough checks on the background of individuals or companies they are transacting with to avoid unknowingly financing illegal activities.

Outlines

00:00

🔍 The Journey into Financial Crime Investigation

The speaker begins by highlighting the misconception that financial crimes are only related to financial institutions, emphasizing that any illegal activity generating illegal financial gain, such as human trafficking or modern slavery, falls under this category. They recount their journey into this field, which began by chance but was driven by a subconscious desire to fight for humanity. In 1997, they co-founded a company providing credit reports and conducting research on companies in the Middle East. Their expertise grew as they accessed hard-to-obtain information, leading to inquiries about investigating the source of funds for companies and individuals. This led to the establishment of Cedar Rose, a company named after the speaker's Lebanese heritage and his wife's English background. Cedar Rose specializes in providing financial risk solutions and has built a comprehensive database of companies and individuals, ensuring data is collected legally and ethically with unique identifiers for thorough research and investigation.

05:01

💼 The Importance of Data Management in Combating Financial Crimes

The speaker discusses the importance of data management, privacy, accuracy, and security in the context of fighting financial crimes. They emphasize the challenge and cost of obtaining, curating, and transforming data, particularly in regions like the Middle East and Africa where Cedar Rose specializes. The company has invested in talent, technology, and security to ensure data is normalized, standardized, and translated accurately. They have also undergone ISO 27001 certification to ensure rigorous data security practices. The speaker advises individuals and institutions to be aware of who they are doing business with, conducting background checks to avoid association with unethical or illegal activities. They stress the importance of not being deceived by appearances of wealth or success, as these can mask criminal activities. The discussion also touches on supply risk, advising companies to be aware of their entire supply chain to ensure compliance with regulations and avoid reputational and financial damage.

Mindmap

Keywords

💡Financial crimes

Financial crimes refer to illegal activities that generate illegal financial gain. The video script emphasizes that these crimes aren't limited to financial institutions but can encompass a wide range of activities like human trafficking and modern slavery. The term is integral to the video's theme, which is about raising awareness and fighting against such crimes.

💡Cedar Rose

Cedar Rose is a company co-founded by the speaker in 1997, specializing in providing company credit reports and conducting research on companies in the Middle East. The name 'Cedar Rose' is derived from the emblems of Lebanon (Cedar) and England (Rose), symbolizing the union of the speaker and his wife's origins. It is a key part of the narrative as it illustrates the journey from a credit report company to a leader in financial risk solutions.

💡Data

Data is highlighted as the core element in combating financial crimes. The script mentions that accurate, up-to-date, and secure data is crucial for investigations and ensuring trust in business dealings. The company Cedar Rose is described as having a comprehensive database that helps clients conduct due diligence and avoid engaging in unethical activities.

💡Regulatory requirements

Regulatory requirements are the legal obligations that businesses must meet to ensure compliance with laws and regulations. The script discusses how these requirements often necessitate investigations into companies and individuals to prevent financial crimes. Compliance is a significant theme, as it underscores the necessity for businesses to verify the legitimacy of their transactions.

💡Data privacy

Data privacy is the practice of safeguarding personal and sensitive information from unauthorized access and improper use. The video script mentions that Cedar Rose adheres to data protection regulations like GDPR, ensuring that the data they handle is secure and private. This is crucial as it relates to the trust clients place in the company to manage their sensitive information.

💡Data accuracy

Data accuracy refers to the correctness and reliability of data. The script stresses the importance of ensuring that data is accurate to make informed decisions and avoid being associated with illicit activities. Cedar Rose invests in talent and technology to maintain data accuracy, which is vital for the company's services and the prevention of financial crimes.

💡Supply risk

Supply risk is the potential for negative impacts on an organization's operations due to problems in its supply chain. The video script discusses how companies need to be aware of their entire supply chain to mitigate risks, including those related to financial crimes. This concept is important as it extends the discussion from individual transactions to the broader business ecosystem.

💡Technology

Technology plays a critical role in managing and securing data, as discussed in the script. It is necessary for collecting, storing, and analyzing data but also poses risks if not properly secured. The company Cedar Rose invests in technology to ensure data is handled securely and efficiently, reflecting the balance between leveraging technology and managing cybersecurity risks.

💡Cybersecurity

Cybersecurity is the protection of computer systems and networks from digital attacks. The script addresses the concern that while technology is essential, it can also expose organizations to cyber threats. Cedar Rose's investment in cybersecurity measures, such as ISO 27001 certification, demonstrates their commitment to safeguarding their clients' data.

💡Compliance

Compliance refers to the act of conforming to laws, regulations, guidelines, or industry standards. The script mentions that financial crimes investigations are often due to regulatory requirements, making compliance a key aspect of preventing such crimes. Compliance is highlighted as a measure that helps ensure businesses operate within legal boundaries.

💡Human trafficking

Human trafficking is a form of modern-day slavery and is mentioned as an example of a financial crime. The video script emphasizes that financial crimes are not limited to financial institutions but can involve severe human rights abuses. This keyword is used to illustrate the broader implications and types of financial crimes that the company Cedar Rose aims to combat.

Highlights

Financial crimes are not limited to financial institutions but include any illegal activity generating illegal financial gain.

The journey into fighting financial crimes began accidentally but was driven by a subconscious desire to fight for humanity.

Cedar Rose was founded in 1997 to provide company credit reports, specializing in the Middle East.

The company's expertise lies in accessing difficult-to-obtain information and conducting research in opaque jurisdictions.

In 2001, Cedar Rose began receiving inquiries to investigate the source of funds and wealth of companies and individuals.

The name 'Cedar Rose' symbolizes the founders' Lebanese and English backgrounds.

Cedar Rose provides financial risk solutions and compliance solutions, essential for trust in business transactions.

The company has a comprehensive database of approximately 50 million companies and 10 million UBOs.

Cedar Rose collects information from ultimate sources, ensuring data is legally and ethically obtained.

Data management is crucial, with a focus on privacy, accuracy, and security.

Cedar Rose adheres to data protection regulations, including GDPR, and has ISO 27001 certification for information security.

The company has a large database covering the Middle East and Africa, with a focus on normalization and standardization of data.

Investment in talent, technology, and security is essential for managing data effectively.

Balancing the need for technology solutions with the risk of cybersecurity is a significant challenge.

Individuals can fight financial crime by conducting background checks on those they transact with, even on a personal level.

Emotional triggers can lead to financial crimes, and it's important to be aware of who you associate with to avoid unwitting involvement.

Supply risk is a growing concern, with regulations like those in the EU requiring due diligence down the supply chain.

Cedar Rose educates clients on the importance of knowing their suppliers and the potential risks involved.

Transcripts

play00:06

good morning great to have you here

play00:07

today

play00:10

morning when we say Financial crimes um

play00:14

I think there's misunderstanding people

play00:15

think sometimes that it's related only

play00:18

to financial institution because the

play00:20

word has Financial while it's any

play00:23

illegal activity which generates illegal

play00:26

financial gain which is which can be

play00:30

trafficking modern slavery any anything

play00:33

I know that your journey when you

play00:34

started you were telling me happened by

play00:36

chance but I think deep inside

play00:38

subconsciously it's by choice if you

play00:41

didn't like it or you didn't Aspire

play00:43

always to fight for Humanity and good

play00:46

cause you wouldn't continue even if it

play00:48

started by accident tell us about this

play00:51

journey and thank you Hala to tell you

play00:53

about this journey I need to go back a

play00:54

little bit in time um so back in 1997 we

play00:59

I co-founded RO with my wife a company

play01:01

that was providing company credit

play01:03

reports we were at the time specialized

play01:05

in conducting research and compiling

play01:08

reports on companies specifically in the

play01:10

Middle East um during the time as well

play01:12

we obviously were able to access

play01:14

information difficult to optain research

play01:17

places that were too OPAC and

play01:19

jurisdictions were not making

play01:20

information publicly available this gave

play01:22

us certain expertise few years later

play01:25

fast track to 2001 we started to receive

play01:28

inquiries on um companies and

play01:31

individuals to investigate them

play01:32

investigate their source of funds their

play01:34

source of wealth all in line with

play01:36

financial Financial transactions at the

play01:38

time um and this is what brought us into

play01:41

this uh this element and this industry

play01:43

in fact and see the rose and actually

play01:45

see the rose talking about Cedar Rose

play01:47

first I'm curious why it's Nam Cedar

play01:49

Rose and second when we if I anyone now

play01:52

will Google the name CED the rose it's a

play01:55

very prominent company which finds

play01:57

either Financial Risk Solutions or comp

play02:00

solutions for people not from the domain

play02:02

what does this mean as well sure so the

play02:05

name cidos derives from two words Cedar

play02:08

being the emblem of my birth country

play02:10

Lebanon which I'm very proud of I'm

play02:12

Lebanese and I grew up in Lebanon and

play02:15

Rose is the emblem of England and my

play02:16

wife is English so Cedar Ro stands for

play02:18

me and my wife basically so technically

play02:20

speaking thank you we we when we put the

play02:23

name cedos on any product of our company

play02:25

we putting our name on it my name and my

play02:28

wife's name in fact um now going back to

play02:31

what I was saying earlier on the

play02:32

collection of information and

play02:33

investigation and the research we were

play02:35

during the course of time able to

play02:37

collect lot of information but that

play02:39

information came from different sources

play02:41

yeah at CID Ro we always aim to get that

play02:43

information from the ultimate sources

play02:45

yes always compiling information from

play02:48

the um reliable sources obtaining it

play02:51

legally ethically and then making sure

play02:53

each data point that we obtain has a

play02:56

unique identifier such as registration

play02:58

number ID number and so on this made us

play03:00

create a very important database for

play03:03

research and investigations today this

play03:06

is available to our clients through our

play03:07

platform so through the platform you are

play03:09

able to search for companies and

play03:11

individuals find out about their

play03:13

ownership into their companies their

play03:14

operations their financial um stability

play03:17

and so on and if they are compliant if

play03:20

they are sanctioned if they are

play03:22

associated to any adverse uh information

play03:25

Financial crime is a big part of it

play03:26

because a lot of the investigation is

play03:28

due to regulatory requirements of course

play03:30

um and obviously having that information

play03:32

to hand in one place is very unique for

play03:35

anyone that wants to make sure they are

play03:36

doing business with the people that they

play03:38

are trusting the element is trust is

play03:40

very important yes so knowing who the

play03:42

compan is owned by knowing if the compan

play03:44

is engaged in unethical activity as you

play03:48

mentioned everything's core start is the

play03:50

data is the information and I think also

play03:53

there's another misconception that when

play03:55

we fight for any crime we just find the

play03:57

solution we we reactive we don't go to

play04:00

the core thing which is the data and the

play04:03

data that's why we say data management

play04:05

data privacy data accuracy the data has

play04:07

a path from the moment it's created

play04:10

until it's ended like the the life ends

play04:13

of the data and it needs preserving how

play04:15

do you manage your data because this is

play04:17

the core of everything how do you make

play04:19

sure it's accurate it's up toate it's

play04:22

clear it's clean it's secure it's

play04:24

private all of that first of all it's

play04:27

very challenging secondly it's very

play04:29

costly and it takes time yeah it takes

play04:31

time first to be able to obtain that

play04:33

information in that first instance

play04:35

curate that information transform that

play04:37

information as you know we specialize in

play04:38

the middle eastn Africa we have a global

play04:40

coverage but our core area is the Middle

play04:42

East in Africa and we have a database

play04:44

today that is unmatched is the largest

play04:46

more most comprehensive database of his

play04:48

kind we have roughly about 50 million

play04:50

companies in our records we have over 10

play04:53

million ubos in our database so that

play04:55

information to be collected from the

play04:57

regions that we specialize in is very

play04:59

challenging in the first instance the

play05:00

data has to be normalized standardized

play05:03

translated transliterated we do a lot of

play05:06

investment into the talent that does

play05:08

this for us and transform that data we

play05:10

invest a lot in the technology and we

play05:12

invest a lot also in the security of the

play05:15

data actually technology the last two

play05:17

things you mentioned technology and

play05:19

security I know that many people would

play05:21

love it's not like also would love it's

play05:24

a necessity and something we need to

play05:26

have to have the right solutions to

play05:28

fight any risks or breaches or potential

play05:31

red flags or anything at the same time

play05:34

if I'm an institution I will be a little

play05:37

bit confused or concerned I want the

play05:40

right solution at the same time I'm

play05:42

afraid if I adopt any technology

play05:45

solution I'm exposing myself to to cyber

play05:48

security so it's a double sword from one

play05:50

side I have to have it from the other

play05:52

side okay I'm opening another Pandora

play05:54

box for me how do you manage this fine

play05:56

line between it's it's very challenging

play05:59

yes sure I totally understand it has two

play06:01

elements to it first of all the data the

play06:03

Privacy side of it and then it's the

play06:04

security part of it in terms of data

play06:07

privacy we adhered to or we started to

play06:09

adhere to since Inception with the data

play06:12

um protection act of 1997 in the UK

play06:14

subsequently we moved on to the gdpr in

play06:17

20189 so we made sure our staff

play06:19

especially key staff that handle data

play06:21

are very familiar with the gdpr most

play06:24

recently in the last three years we

play06:26

undergone an ISO 27,1 certification by

play06:30

doing so we go through an audit rigorous

play06:32

audit you know by by the authorities and

play06:34

by The Regulators to make sure we have

play06:36

the best data security information

play06:39

security in terms of data hosting

play06:41

holding collection transmission access

play06:45

um and all the rest of it to make sure

play06:46

that our clients feel safe doing

play06:48

business with us knowing that their data

play06:50

is secured and is handled as well to to

play06:52

the best practices yeah very thoughtful

play06:55

you said now our clients to feel safe

play06:58

and secure people watching us now either

play07:02

from the field or not from the field

play07:03

just regular people a mother taking her

play07:06

kids to school kids if we want to just

play07:09

educate them or give them tips how to

play07:12

make sure everyone of us fights

play07:15

Financial crime because as we said it's

play07:16

not about Banks and financial

play07:18

institutions Financial crimes can be

play07:20

human trafficking a child we're saving

play07:22

it um a modern slavery a child labor

play07:26

like very evilness out there

play07:28

unfortunately how can every one of us do

play07:31

something to move the needle even for a

play07:33

little bit sure I believe everyone need

play07:36

to be uh aware of who they are doing

play07:38

business with who they are transacting

play07:40

with who they are rubbing shoulders with

play07:42

and go beyond the external appearances

play07:45

of lushness or expensive cars or fancy

play07:48

offices and the right do do the checks

play07:50

on the background of these people even

play07:52

if you are transacting on a personal

play07:53

level buying a property or buying a car

play07:55

or a yacht or a private jet or anything

play07:57

like that do check the people you buying

play07:59

from or you selling to because the last

play08:01

thing you would want to do is be

play08:03

associated with people that you don't

play08:04

really want to be associated with

play08:06

because it could tarnish your reputation

play08:08

or could impact you financially yes from

play08:10

the reputation side you might be without

play08:13

knowing you know um finance an activity

play08:16

that you really don't want to be

play08:17

associated with like human trafficking

play08:19

drug trafficking terrorism um and many

play08:22

others many other um you know Financial

play08:25

crimes that people are not aware of

play08:26

usually I like that you said don't be

play08:28

deceived by appearance

play08:30

and lavish lifestyle and all of that

play08:31

because I think it all starts with

play08:33

emotions and I call it actually not

play08:35

Financial crimes I call it emotional

play08:37

crimes sometimes because everything

play08:39

start when we we trigger a certain

play08:41

emotion in us whether my greediness or

play08:44

my Laing to be famous or public figure

play08:47

or Laing to be associated with people

play08:50

with a yacht or people with and that's

play08:52

how criminals actually use this weakness

play08:55

that's a point of weakness to Target and

play08:57

I'm sure this is something you educate

play08:59

your clients on and that's why whom to

play09:02

deal with their suppliers and as you

play09:04

were telling me before we start it's not

play09:06

only with our clients it's the new era

play09:09

which is the supply risk you do things

play09:11

about Supply risk in C the rose right

play09:13

yes absolutely Supply risk uh is very

play09:16

serious today in the US and in the EU

play09:18

and I have no doubt it will come to this

play09:20

part of the world is in fact been acted

play09:22

as as a regulation and the law in the EU

play09:24

countries so people need to be not aware

play09:27

only of their client doing the kyc but

play09:29

also be aware of their own subsidiaries

play09:31

and their own supply chain including you

play09:34

know 10 20 30 companies down the line

play09:36

they can't say oh I'm a company based in

play09:38

Germany I don't care about my supplier

play09:40

in in in Dubai or in Lebanon or

play09:42

somewhere like that they are responsible

play09:43

for that absolutely it's very important

play09:45

an masad wishing you an amazing fight

play09:48

against Financial crimes and for

play09:50

Humanity and thank you so much for being

play09:51

with us today thank you for hosting me

play09:53

thank you very much to you and to Dubai

play09:55

TV thank you thank you

Rate This

5.0 / 5 (0 votes)

関連タグ
Financial CrimeInvestigationData PrivacySupply RiskRegulatory ComplianceCybersecurityHuman TraffickingDue DiligenceCorporate ResearchRisk Management
英語で要約が必要ですか?