SlideShare a Scribd company logo
1 of 30
Download to read offline
The	
  Seven	
  Pillars	
  of	
  Market	
  Surveillance	
  2.0	
  
SURVEILLANCE	
  
TOTAL	
  
A	
  combina*on	
  of	
  monitoring	
  
and	
  surveillance,	
  involving	
  	
  
both	
  data	
  and	
  human	
  	
  
behaviour	
  across	
  mul*ple	
  	
  
asset	
  classes	
  and	
  geographies,	
  	
  
helps	
  firms	
  detect	
  early	
  	
  
warning	
  signs	
  and	
  an*cipate	
  	
  
–	
  or	
  even	
  avoid	
  –	
  anomalous	
  	
  
behaviours	
  in	
  the	
  future	
  
SURVEILLANCE	
  
TOTAL	
  
A	
  combina*on	
  of	
  monitoring	
  
and	
  surveillance,	
  involving	
  	
  
both	
  data	
  and	
  human	
  	
  
behaviour	
  across	
  mul*ple	
  	
  
asset	
  classes	
  and	
  geographies,	
  	
  
helps	
  firms	
  detect	
  early	
  	
  
warning	
  signs	
  and	
  an*cipate	
  	
  
–	
  or	
  even	
  avoid	
  –	
  anomalous	
  	
  
behaviours	
  in	
  the	
  future	
  
With	
  the	
  growth	
  of	
  headline	
  
grabbing	
  scandals…	
  
	
  
It’s	
  *me	
  to	
  get	
  SERIOUS	
  
about	
  surveillance	
  
SURVEILLANCE	
  
TOTAL	
  
A	
  combina*on	
  of	
  monitoring	
  
and	
  surveillance,	
  involving	
  	
  
both	
  data	
  and	
  human	
  	
  
behaviour	
  across	
  mul*ple	
  	
  
asset	
  classes	
  and	
  geographies,	
  	
  
helps	
  firms	
  detect	
  early	
  	
  
warning	
  signs	
  and	
  an*cipate	
  	
  
–	
  or	
  even	
  avoid	
  –	
  anomalous	
  	
  
behaviours	
  in	
  the	
  future	
  
With	
  the	
  growth	
  of	
  headline	
  
grabbing	
  scandals…	
  
	
  
It’s	
  *me	
  to	
  get	
  SERIOUS	
  
about	
  surveillance	
  
There	
  are	
  seven	
  key	
  
ingredients	
  required	
  to	
  achieve	
  
the	
  next	
  genera*on	
  of	
  total	
  
surveillance;	
  or	
  the	
  	
  
Seven	
  Pillars	
  of	
  Market	
  
Surveillance	
  2.0	
  	
  
SURVEILLANCE	
  
TOTAL	
  
TOTAL	
  
PILLAR	
  #1	
  
SURVEILLANCE	
  
TOTAL	
  
A	
  single,	
  CONVERGED	
  
threat	
  system	
  
Seamlessly	
  monitor	
  across	
  the	
  en*re	
  
enterprise,	
  including:	
  
•  Market	
  Surveillance	
  
•  Opera*onal	
  Risk	
  
•  Market	
  Risk	
  
•  Trader	
  Profiling	
  
PILLAR	
  #1	
  
SURVEILLANCE	
  
TOTAL	
  
A	
  single,	
  CONVERGED	
  
threat	
  system	
  
Seamlessly	
  monitor	
  across	
  the	
  en*re	
  
enterprise,	
  including:	
  
•  Market	
  Surveillance	
  
•  Opera*onal	
  Risk	
  
•  Market	
  Risk	
  
•  Trader	
  Profiling	
  
PILLAR	
  #1	
  
SURVEILLANCE	
  
1.  Comes	
  with	
  sufficient	
  performance	
  at	
  scale	
  to	
  monitor	
  very	
  large	
  volumes	
  of	
  
streaming	
  analy*cs,	
  both	
  pre-­‐	
  and	
  post-­‐	
  trade	
  
2.  Is	
  open	
  and	
  flexible	
  enough	
  to	
  enable	
  organiza*ons	
  to	
  tailor	
  the	
  monitoring	
  based	
  
upon	
  their	
  unique	
  and	
  evolving	
  requirements	
  	
  
3.  Is	
  seamlessly	
  pre-­‐integrated	
  with…	
  
a)  Complementary	
  technologies	
  such	
  as	
  enterprise	
  grade	
  integra*on	
  
b)  Ultra-­‐low	
  latency	
  messaging,	
  in-­‐memory	
  data	
  management	
  	
  
c)  Real-­‐*me	
  data	
  visualiza*on	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  …	
  All	
  the	
  raw	
  tools	
  needed	
  to	
  break	
  down	
  monolithic	
  silos.	
  
	
  
Prerequisites	
  for	
  SUCCESS	
  
TOTAL	
  
PILLAR	
  #1	
  
SURVEILLANCE	
  
Converge	
  siloed	
  systems	
  such	
  as	
  
an*-­‐money	
  laundering,	
  
opera*onal	
  risk,	
  and	
  trader	
  
profiling	
  into	
  a	
  single,	
  monitoring	
  
system	
  for	
  a	
  correlated	
  view	
  of	
  all	
  
poten*al	
  threats.	
  	
  
TOTAL	
  SURVEILLANCE:	
   PILLAR	
  #2	
  
Past,	
  Present	
  &	
  
PredicNve	
  
ANALYSIS	
  
TOTAL	
  SURVEILLANCE:	
   PILLAR	
  #2	
  
Past,	
  Present	
  &	
  
PredicNve	
  
ANALYSIS	
  
Performing	
  analysis	
  on	
  
historical	
  data,	
  real-­‐*me	
  
data,	
  plus	
  predic*ng	
  and	
  
warning	
  of	
  threats	
  before	
  
they	
  occur	
  or	
  do	
  damage	
  
TOTAL	
  SURVEILLANCE:	
   PILLAR	
  #2	
  
An	
  out	
  of	
  control	
  algo	
  	
  
can	
  –	
  and	
  has	
  –	
  bankrupted	
  
a	
  trading	
  firm	
  	
  	
  	
  	
  	
  
Past,	
  Present	
  &	
  
PredicNve	
  
ANALYSIS	
  
Performing	
  analysis	
  on	
  
historical	
  data,	
  real-­‐*me	
  
data,	
  plus	
  predic*ng	
  and	
  
warning	
  of	
  threats	
  before	
  
they	
  occur	
  or	
  do	
  damage	
  
Analyzing	
  the	
  ‘fire	
  hose’	
  of	
  
market,	
  trade,	
  and	
  social	
  
media	
  data	
  to	
  prevent	
  fraud	
  
and	
  market	
  manipula*on,	
  
using	
  large	
  structured	
  and	
  
unstructured	
  data	
  sets	
  
TOTAL	
  
PILLAR	
  #3	
  
SURVEILLANCE	
  
Support	
  for	
  fast,	
  Big	
  Data	
  
Analyzing	
  the	
  ‘fire	
  hose’	
  of	
  
market,	
  trade,	
  and	
  social	
  
media	
  data	
  to	
  prevent	
  fraud	
  
and	
  market	
  manipula*on,	
  
using	
  large	
  structured	
  and	
  
unstructured	
  data	
  sets	
  
TOTAL	
  
PILLAR	
  #3	
  
SURVEILLANCE	
  
Support	
  for	
  fast,	
  Big	
  Data	
  
By	
  connec*ng	
  to	
  disparate	
  sources	
  of	
  	
  
	
  trading	
  rela*onship	
  informa*on	
  (i.e.,	
  IMs,	
  chat	
  	
  
rooms,	
  emails,	
  mobile	
  phones,	
  video	
  and	
  audio	
  	
  
surveillance)	
  -­‐	
  trader	
  behaviour	
  can	
  be	
  surmised…	
  
	
  
•  Was	
  the	
  trader	
  working	
  unusual	
  hours?	
  	
  
•  Did	
  she	
  never	
  take	
  a	
  vaca*on?	
  	
  
•  Did	
  he	
  buy	
  a	
  fishery	
  together	
  with	
  another	
  	
  
FX	
  trader,	
  who	
  happens	
  to	
  be	
  his	
  banks’	
  client?	
  
Analyzing	
  the	
  ‘fire	
  hose’	
  of	
  
market,	
  trade,	
  and	
  social	
  
media	
  data	
  to	
  prevent	
  fraud	
  
and	
  market	
  manipula*on,	
  
using	
  large	
  structured	
  and	
  
unstructured	
  data	
  sets	
  
TOTAL	
  
PILLAR	
  #3	
  
SURVEILLANCE	
  
Support	
  for	
  fast,	
  Big	
  Data	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  By	
  Including	
  data	
  from	
  social	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  media,	
  email	
  and	
  chat	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  rooms,	
  the	
  tangled	
  web	
  that	
  fraudsters	
  weave	
  becomes	
  more	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  predictable	
  when	
  management	
  can	
  watch	
  the	
  threads	
  crea*ng	
  the	
  web.	
  
	
  	
  	
  	
  Fast,	
  Big	
  Data	
  comprises	
  these	
  threads	
  of	
  anomalous	
  human	
  behaviour;	
  
Market	
  Surveillance	
  2.0	
  grabs	
  and	
  analyses	
  the	
  threads,	
  then	
  creates	
  ac*ons…	
  
TOTAL	
  
PILLAR	
  #4	
  
SURVEILLANCE	
  
Cross-­‐asset	
  class	
  
monitoring	
  
Monitoring	
  across	
  trading	
  
silos	
  for	
  mul*-­‐asset	
  
surveillance	
  and	
  across	
  
correlated	
  asset	
  classes…	
  
TOTAL	
  
PILLAR	
  #4	
  
SURVEILLANCE	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Why	
  do	
  we	
  care?	
  
	
  
Because	
  events	
  that	
  impact	
  one	
  asset	
  class	
  	
  
can	
  and	
  do	
  have	
  a	
  knock-­‐on	
  effect	
  on	
  others.	
  	
  
	
  
EXAMPLE:	
  Between	
  2007	
  and	
  2012,	
  the	
  price	
  	
  
of	
  oil	
  was	
  highly	
  correlated	
  to	
  the	
  stock	
  market.	
  	
  
On	
  May	
  5,	
  2011,	
  the	
  crude	
  oil	
  market	
  experienced	
  	
  
its	
  second-­‐largest	
  daily	
  drop	
  ever	
  when	
  trading	
  	
  
algos	
  repeatedly	
  triggered	
  sell-­‐stops.	
  The	
  $13	
  drop	
  
in	
  the	
  price	
  of	
  Brent	
  crude	
  knocked	
  the	
  Dow	
  Jones	
  
Industrial	
  Average	
  down	
  by	
  140	
  points,	
  or	
  1.1%.	
  	
  
	
  
It	
  could	
  have	
  been	
  worse	
  if	
  the	
  oil	
  algos	
  	
  
had	
  not	
  been	
  caught	
  and	
  stopped	
  in	
  *me.	
  
	
  
Today’s	
  markets	
  are	
  becoming	
  more	
  complicated	
  	
  
and	
  sophis*cated	
  by	
  the	
  day.	
  Humans	
  simply	
  	
  
cannot	
  monitor	
  and	
  react	
  to	
  mul*-­‐asset	
  classes	
  	
  
at	
  the	
  same	
  *me,	
  while	
  trading	
  at	
  lightning	
  speed.	
  	
  	
  	
  
	
  
Cross-­‐asset	
  class	
  
monitoring	
  
Monitoring	
  across	
  trading	
  
silos	
  for	
  mul*-­‐asset	
  
surveillance	
  and	
  across	
  
correlated	
  asset	
  classes…	
  
TOTAL	
  
PILLAR	
  #4	
  
SURVEILLANCE	
  
…watching	
  for	
  paferns	
  
that	
  signal	
  risk	
  or	
  
opportunity,	
  then	
  kicking	
  
out	
  real	
  ac*ons	
  to	
  take	
  	
  	
  	
  	
  
Cross-­‐asset	
  class	
  
monitoring	
  
Monitoring	
  across	
  trading	
  
silos	
  for	
  mul*-­‐asset	
  
surveillance	
  and	
  across	
  
correlated	
  asset	
  classes…	
  
TOTAL	
  
PILLAR	
  #5	
  
SURVEILLANCE	
  
Cross	
  Region	
  
Monitoring	
  
Monitoring	
  for	
  risks	
  across	
  
geographical	
  and	
  regulatory	
  
boundaries	
  and	
  differences…	
  
TOTAL	
  
PILLAR	
  #5	
  
SURVEILLANCE	
  
Cross	
  Region	
  
Monitoring	
  
Monitoring	
  for	
  risks	
  across	
  
geographical	
  and	
  regulatory	
  
boundaries	
  and	
  differences…	
  
Cross	
  border	
  surveillance	
  becomes	
  increasingly	
  cri*cal	
  as	
  financial	
  
services	
  firms	
  and	
  investors	
  trade	
  mul*ple	
  asset	
  classes	
  across	
  many	
  	
  
countries	
  and	
  disparate	
  regulatory	
  regimes,	
  which	
  can	
  cause	
  confusion	
  
and	
  create	
  opportuni*es	
  for	
  error.	
  
	
  
Regula*ons	
  in	
  different	
  countries	
  (e.g.	
  Dodd-­‐Frank	
  vs.	
  MiFID)	
  have	
  
similari*es	
  and	
  differences.	
  Regulatory	
  arbitrage	
  is	
  a	
  concern,	
  as	
  trading	
  
firms	
  could	
  choose	
  to	
  do	
  business	
  with	
  more	
  lightly	
  regulated	
  regimes;	
  	
  
taking	
  extra	
  risks	
  with	
  their	
  company’s	
  and	
  shareholders’	
  money	
  and	
  
reputa*on.	
  	
  
TOTAL	
  
PILLAR	
  #5	
  
SURVEILLANCE	
  
Cross	
  Region	
  
Monitoring	
  
Monitoring	
  for	
  risks	
  across	
  
geographical	
  and	
  regulatory	
  
boundaries	
  and	
  differences…	
  
Cross	
  border	
  surveillance	
  becomes	
  increasingly	
  cri*cal	
  as	
  financial	
  
services	
  firms	
  and	
  investors	
  trade	
  mul*ple	
  asset	
  classes	
  across	
  many	
  	
  
countries	
  and	
  disparate	
  regulatory	
  regimes,	
  which	
  can	
  cause	
  confusion	
  
and	
  create	
  opportuni*es	
  for	
  error.	
  
	
  
Regula*ons	
  in	
  different	
  countries	
  (e.g.	
  Dodd-­‐Frank	
  vs.	
  MiFID)	
  have	
  
similari*es	
  and	
  differences.	
  Regulatory	
  arbitrage	
  is	
  a	
  concern,	
  as	
  trading	
  
firms	
  could	
  choose	
  to	
  do	
  business	
  with	
  more	
  lightly	
  regulated	
  regimes;	
  	
  
taking	
  extra	
  risks	
  with	
  their	
  company’s	
  and	
  shareholders’	
  money	
  and	
  
reputa*on.	
  	
  
…to	
  assure	
  adherence	
  to	
  	
  
different	
  regulatory	
  
environments	
  	
  
TOTAL	
  
PILLAR	
  #6	
  
SURVEILLANCE	
  
Known	
  &	
  Unknown	
  
Threats	
  
Benchmarking	
  behavior	
  and	
  
performance	
  to	
  uncover	
  
previously	
  unknown	
  paferns	
  
TOTAL	
  
PILLAR	
  #6	
  
SURVEILLANCE	
  
Known	
  &	
  Unknown	
  
Threats	
  
Benchmarking	
  behavior	
  and	
  
performance	
  to	
  uncover	
  
previously	
  unknown	
  paferns	
  
Monitoring	
  for	
  ‘unknowns’	
  can	
  be	
  
achieved	
  by	
  benchmarking	
  behavior	
  
that	
  is	
  “normal”	
  over	
  *me	
  and	
  then	
  
spoing	
  behavior	
  that	
  deviates	
  from	
  
the	
  norm.	
  	
  
	
  
To	
  spot	
  suspicious	
  behavior	
  could	
  
involve	
  digitally	
  monitoring	
  loca*ons	
  
and	
  in-­‐person	
  interac*ons	
  of	
  
traders…	
  their	
  speech	
  and	
  facial	
  
expressions,	
  for	
  example	
  	
  
TOTAL	
  
PILLAR	
  #6	
  
SURVEILLANCE	
  
Known	
  &	
  Unknown	
  
Threats	
  
Benchmarking	
  behavior	
  and	
  
performance	
  to	
  uncover	
  
previously	
  unknown	
  paferns	
  
Monitoring	
  for	
  ‘unknowns’	
  can	
  be	
  
achieved	
  by	
  benchmarking	
  behavior	
  
that	
  is	
  “normal”	
  over	
  *me	
  and	
  then	
  
spoing	
  behavior	
  that	
  deviates	
  from	
  
the	
  norm.	
  	
  
	
  
To	
  spot	
  suspicious	
  behavior	
  could	
  
involve	
  digitally	
  monitoring	
  loca*ons	
  
and	
  in-­‐person	
  interac*ons	
  of	
  
traders…	
  their	
  speech	
  and	
  facial	
  
expressions,	
  for	
  example	
  	
  
Cyber-­‐terrorism	
  is	
  on	
  the	
  
upswing	
  and	
  algorithmic	
  
terrorism,	
  where	
  a	
  well-­‐funded	
  
criminal	
  or	
  terrorist	
  organiza*on	
  
causes	
  a	
  major	
  market	
  crisis,	
  
could	
  be	
  the	
  next	
  itera*on.	
  Only	
  
by	
  keeping	
  a	
  close	
  watch	
  on	
  the	
  
markets	
  and	
  the	
  par*cipants	
  
involved	
  can	
  these	
  unwanted	
  
behaviors	
  be	
  nipped	
  in	
  the	
  bud	
  	
  
TOTAL	
  
PILLAR	
  #6	
  
SURVEILLANCE	
  
Known	
  &	
  Unknown	
  
Threats	
  
Benchmarking	
  behavior	
  and	
  
performance	
  to	
  uncover	
  
previously	
  unknown	
  paferns	
  
Monitoring	
  for	
  ‘unknowns’	
  can	
  be	
  
achieved	
  by	
  benchmarking	
  behavior	
  
that	
  is	
  “normal”	
  over	
  *me	
  and	
  then	
  
spoing	
  behavior	
  that	
  deviates	
  from	
  
the	
  norm.	
  	
  
	
  
To	
  spot	
  suspicious	
  behavior	
  could	
  
involve	
  digitally	
  monitoring	
  loca*ons	
  
and	
  in-­‐person	
  interac*ons	
  of	
  
traders…	
  their	
  speech	
  and	
  facial	
  
expressions,	
  for	
  example	
  	
  
Monitor	
  for	
  ‘unknown	
  unknowns’,	
  by	
  	
  
benchmarking	
  behaviour	
  that	
  is	
  ‘normal’	
  	
  	
  
over	
  *me	
  and	
  spoing	
  behaviour	
  that	
  	
  
deviates	
  from	
  the	
  norm	
  	
  	
  
Cyber-­‐terrorism	
  is	
  on	
  the	
  
upswing	
  and	
  algorithmic	
  
terrorism,	
  where	
  a	
  well-­‐funded	
  
criminal	
  or	
  terrorist	
  organiza*on	
  
causes	
  a	
  major	
  market	
  crisis,	
  
could	
  be	
  the	
  next	
  itera*on.	
  Only	
  
by	
  keeping	
  a	
  close	
  watch	
  on	
  the	
  
markets	
  and	
  the	
  par*cipants	
  
involved	
  can	
  these	
  unwanted	
  
behaviors	
  be	
  nipped	
  in	
  the	
  bud	
  	
  
TOTAL	
  
PILLAR	
  #7	
  
SURVEILLANCE	
  
Dynamically	
  
Evolve	
  Rules	
  
Be	
  ready	
  for	
  the	
  next	
  threat.	
  
Control	
  your	
  own	
  surveillance	
  
and	
  con*nually	
  adapt	
  your	
  
monitoring	
  
TOTAL	
  
PILLAR	
  #7	
  
SURVEILLANCE	
  
Dynamically	
  
Evolve	
  Rules	
  
Be	
  ready	
  for	
  the	
  next	
  threat.	
  
Control	
  your	
  own	
  surveillance	
  
and	
  con*nually	
  adapt	
  your	
  
monitoring	
  
Once	
  a	
  new	
  unknown	
  behavior	
  is	
  found,	
  it	
  	
  needs	
  to	
  become	
  a	
  ‘known	
  
behavior’	
  and	
  a	
  new	
  rule	
  must	
  be	
  added	
  to	
  the	
  system.	
  It	
  is	
  cri*cal	
  to	
  be	
  able	
  to	
  
add	
  new	
  rules	
  dynamically	
  rather	
  than	
  relying	
  on	
  a	
  “shrink-­‐wrapped	
  
applica*ons”	
  that	
  do	
  not	
  provide	
  this	
  level	
  of	
  flexibility…	
  
TOTAL	
  
PILLAR	
  #7	
  
SURVEILLANCE	
  
Dynamically	
  
Evolve	
  Rules	
  
Be	
  ready	
  for	
  the	
  next	
  threat.	
  
Control	
  your	
  own	
  surveillance	
  
and	
  con*nually	
  adapt	
  your	
  
monitoring	
  
…Since	
  the	
  next	
  episode	
  of	
  an	
  ‘known	
  behavior’	
  could	
  occur	
  at	
  any	
  *me;	
  it	
  
would	
  be	
  complacent	
  to	
  think	
  that	
  because	
  one	
  has	
  been	
  discovered,	
  it	
  won’t	
  
happen	
  again.	
  	
  
Once	
  a	
  new	
  unknown	
  behavior	
  is	
  found,	
  it	
  	
  needs	
  to	
  become	
  a	
  ‘known	
  
behavior’	
  and	
  a	
  new	
  rule	
  must	
  be	
  added	
  to	
  the	
  system.	
  It	
  is	
  cri*cal	
  to	
  be	
  able	
  to	
  
add	
  new	
  rules	
  dynamically	
  rather	
  than	
  relying	
  on	
  a	
  “shrink-­‐wrapped	
  
applica*ons”	
  that	
  do	
  not	
  provide	
  this	
  level	
  of	
  flexibility…	
  
TOTAL	
  
PILLAR	
  #7	
  
SURVEILLANCE	
  
Dynamically	
  
Evolve	
  Rules	
  
Be	
  ready	
  for	
  the	
  next	
  threat.	
  
Control	
  your	
  own	
  surveillance	
  
and	
  con*nually	
  adapt	
  your	
  
monitoring	
  
Turn	
  a	
  new	
  unknown	
  behaviour	
  into	
  
a	
  known	
  behaviour	
  by	
  dynamically	
  
adding	
  new	
  rules	
  to	
  the	
  system	
  	
  
…Since	
  the	
  next	
  episode	
  of	
  an	
  ‘known	
  behavior’	
  could	
  occur	
  at	
  any	
  *me;	
  it	
  
would	
  be	
  complacent	
  to	
  think	
  that	
  because	
  one	
  has	
  been	
  discovered,	
  it	
  won’t	
  
happen	
  again.	
  	
  
Once	
  a	
  new	
  unknown	
  behavior	
  is	
  found,	
  it	
  	
  needs	
  to	
  become	
  a	
  ‘known	
  
behavior’	
  and	
  a	
  new	
  rule	
  must	
  be	
  added	
  to	
  the	
  system.	
  It	
  is	
  cri*cal	
  to	
  be	
  able	
  to	
  
add	
  new	
  rules	
  dynamically	
  rather	
  than	
  relying	
  on	
  a	
  “shrink-­‐wrapped	
  
applica*ons”	
  that	
  do	
  not	
  provide	
  this	
  level	
  of	
  flexibility…	
  
The	
  Seven	
  Pillars	
  of	
  Market	
  Surveillance	
  2.0	
  
1.  Converge	
  siloed	
  systems	
  into	
  	
  
a	
  single	
  monitoring	
  system	
  
for	
  a	
  correlated	
  view	
  of	
  	
  
poten*al	
  threats.	
  	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
2.  Perform	
  “con*nuous	
  	
  
analy*cs”	
  to	
  predict	
  what	
  	
  
might	
  happen	
  –	
  and	
  prevent	
  it.	
  
	
  
3.  Check	
  social	
  media,	
  email	
  	
  
and	
  chat	
  rooms	
  for	
  	
  
anomalous	
  behaviour	
  
4.  Monitor	
  all	
  asset	
  classes	
  
	
  
5.  Assure	
  adherence	
  to	
  
regional	
  regulatory	
  
environments	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  	
  
6.  Benchmarking	
  “normal”	
  
behaviour	
  to	
  spot	
  deviant	
  
behaviour	
  
	
  
7.  Dynamically	
  add	
  newly	
  
discovered	
  “unknown”	
  
MEET	
  THE	
  AUTHOR	
  
Theo	
  Hildyard	
  
Theo	
  Hildyard	
  is	
  Head	
  of	
  Solu*ons	
  Marke*ng	
  at	
  
Solware	
  AG.	
  This	
  team	
  harnesses	
  Solware	
  AG	
  
technology	
  to	
  deliver	
  business	
  solu*ons	
  focused	
  on	
  
turning	
  big	
  (and	
  streaming)	
  data	
  into	
  meaningful	
  
insights	
  for	
  automated	
  decision-­‐making.	
  Solu*ons	
  
include	
  Algorithmic	
  Trading,	
  FX	
  eCommerce,	
  Market	
  
Surveillance,	
  Customer	
  Experience	
  Management,	
  	
  
and	
  Con*nuous	
  Monitoring	
  for	
  Governance	
  Risk	
  &	
  
Control	
  (iGRC)	
   Get	
  the	
  comprehensive	
  
Total	
  Surveillance	
  
White	
  paper	
  

More Related Content

What's hot

B2B Digital Marketing presentation at Riga Business School
B2B Digital Marketing presentation at Riga Business SchoolB2B Digital Marketing presentation at Riga Business School
B2B Digital Marketing presentation at Riga Business SchoolRolands Ozolins
 
Organizational setup of a bank treasury
Organizational setup of a bank treasuryOrganizational setup of a bank treasury
Organizational setup of a bank treasurynitin153
 
Innovating digital 2020 : Digital Marketing trends
Innovating digital 2020 : Digital Marketing trendsInnovating digital 2020 : Digital Marketing trends
Innovating digital 2020 : Digital Marketing trendsDave Chaffey
 
Counterparty Credit Risk and CVA under Basel III
Counterparty Credit Risk and CVA under Basel IIICounterparty Credit Risk and CVA under Basel III
Counterparty Credit Risk and CVA under Basel IIIHäner Consulting
 
Overview of BCBS 239
Overview of BCBS 239Overview of BCBS 239
Overview of BCBS 239Lewis Adams
 
03 regulatory landscape&regtech
03 regulatory landscape&regtech03 regulatory landscape&regtech
03 regulatory landscape&regtechinnov-acts-ltd
 
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016Quantopian
 
Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...
 Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo... Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...
Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...Hernan Huwyler, MBA CPA
 
Sales budgeting Methods
Sales budgeting MethodsSales budgeting Methods
Sales budgeting Methodsfolaiya
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Data Analytics for Accounting - Financial Statement Analytics
Data Analytics for Accounting -  Financial Statement AnalyticsData Analytics for Accounting -  Financial Statement Analytics
Data Analytics for Accounting - Financial Statement AnalyticsDayana Mastura FCCA CA
 
Martech Maturity Model - An Adoption Guide
Martech Maturity Model - An Adoption GuideMartech Maturity Model - An Adoption Guide
Martech Maturity Model - An Adoption GuideJosh Hill
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Marketing campaign to sell long term deposits
Marketing campaign to sell long term depositsMarketing campaign to sell long term deposits
Marketing campaign to sell long term depositsAditya Bahl
 
ICAAP - INDIAN BANKS
ICAAP - INDIAN BANKSICAAP - INDIAN BANKS
ICAAP - INDIAN BANKSVeeresh Kumar
 
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...Quantopian
 
Banking in the philippines (Sarah Olivarez-Cruz)
Banking in the philippines  (Sarah Olivarez-Cruz)Banking in the philippines  (Sarah Olivarez-Cruz)
Banking in the philippines (Sarah Olivarez-Cruz)Sarah Cruz
 

What's hot (20)

B2B Digital Marketing presentation at Riga Business School
B2B Digital Marketing presentation at Riga Business SchoolB2B Digital Marketing presentation at Riga Business School
B2B Digital Marketing presentation at Riga Business School
 
Organizational setup of a bank treasury
Organizational setup of a bank treasuryOrganizational setup of a bank treasury
Organizational setup of a bank treasury
 
Innovating digital 2020 : Digital Marketing trends
Innovating digital 2020 : Digital Marketing trendsInnovating digital 2020 : Digital Marketing trends
Innovating digital 2020 : Digital Marketing trends
 
Counterparty Credit Risk and CVA under Basel III
Counterparty Credit Risk and CVA under Basel IIICounterparty Credit Risk and CVA under Basel III
Counterparty Credit Risk and CVA under Basel III
 
Overview of BCBS 239
Overview of BCBS 239Overview of BCBS 239
Overview of BCBS 239
 
03 regulatory landscape&regtech
03 regulatory landscape&regtech03 regulatory landscape&regtech
03 regulatory landscape&regtech
 
Basel 2
Basel 2Basel 2
Basel 2
 
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016
A Guided Tour of Machine Learning for Traders by Tucker Balch at QuantCon 2016
 
Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...
 Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo... Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...
Cuantificación del riesgo de Compliance: Recomendaciones y alternativas a lo...
 
Sales budgeting Methods
Sales budgeting MethodsSales budgeting Methods
Sales budgeting Methods
 
Core banking
Core bankingCore banking
Core banking
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
Data Analytics for Accounting - Financial Statement Analytics
Data Analytics for Accounting -  Financial Statement AnalyticsData Analytics for Accounting -  Financial Statement Analytics
Data Analytics for Accounting - Financial Statement Analytics
 
Martech Maturity Model - An Adoption Guide
Martech Maturity Model - An Adoption GuideMartech Maturity Model - An Adoption Guide
Martech Maturity Model - An Adoption Guide
 
New ifrs 9
New ifrs 9New ifrs 9
New ifrs 9
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Marketing campaign to sell long term deposits
Marketing campaign to sell long term depositsMarketing campaign to sell long term deposits
Marketing campaign to sell long term deposits
 
ICAAP - INDIAN BANKS
ICAAP - INDIAN BANKSICAAP - INDIAN BANKS
ICAAP - INDIAN BANKS
 
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...
Automated Selection and Robustness for Systematic Trading Strategies by Dr. T...
 
Banking in the philippines (Sarah Olivarez-Cruz)
Banking in the philippines  (Sarah Olivarez-Cruz)Banking in the philippines  (Sarah Olivarez-Cruz)
Banking in the philippines (Sarah Olivarez-Cruz)
 

Viewers also liked

Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010GHY International
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
10 Common Hadoop-able Problems Webinar
10 Common Hadoop-able Problems Webinar10 Common Hadoop-able Problems Webinar
10 Common Hadoop-able Problems WebinarCloudera, Inc.
 
Brand positioning & strategy
Brand positioning & strategy Brand positioning & strategy
Brand positioning & strategy Dominic Mackenzie
 
Introduction to cambridge semantics trade surveillance 2015
Introduction to cambridge semantics trade surveillance 2015Introduction to cambridge semantics trade surveillance 2015
Introduction to cambridge semantics trade surveillance 2015John Rueter
 

Viewers also liked (6)

Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
10 Common Hadoop-able Problems Webinar
10 Common Hadoop-able Problems Webinar10 Common Hadoop-able Problems Webinar
10 Common Hadoop-able Problems Webinar
 
Brand positioning & strategy
Brand positioning & strategy Brand positioning & strategy
Brand positioning & strategy
 
Introduction to cambridge semantics trade surveillance 2015
Introduction to cambridge semantics trade surveillance 2015Introduction to cambridge semantics trade surveillance 2015
Introduction to cambridge semantics trade surveillance 2015
 
Hadoop Family and Ecosystem
Hadoop Family and EcosystemHadoop Family and Ecosystem
Hadoop Family and Ecosystem
 

Similar to The 7 Pillars of Market Surveillance 2.0

Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse DetectionRaja Das
 
Rapport du FSB sur les cryptomonnaies
Rapport du FSB sur les cryptomonnaiesRapport du FSB sur les cryptomonnaies
Rapport du FSB sur les cryptomonnaiesSociété Tripalio
 
Trade Surveillance with Big Data
Trade Surveillance with Big DataTrade Surveillance with Big Data
Trade Surveillance with Big DataCognizant
 
P101018 Penelitian Crypto Untuk Ekonomi Negara FSB
P101018   Penelitian Crypto Untuk Ekonomi Negara FSBP101018   Penelitian Crypto Untuk Ekonomi Negara FSB
P101018 Penelitian Crypto Untuk Ekonomi Negara FSBRein Mahatma
 
trend analysis of Indian stock exchange
trend analysis of Indian stock exchangetrend analysis of Indian stock exchange
trend analysis of Indian stock exchangeVikash Kumar Jha
 
3 Steps Strategy for 2024 Crypto Gains !
3 Steps Strategy for 2024 Crypto Gains !3 Steps Strategy for 2024 Crypto Gains !
3 Steps Strategy for 2024 Crypto Gains !alexastrambeanu
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1CA.Kolluru Narayanarao
 
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...BigDataCloud
 
Algorithmic trading Research by hushbot
Algorithmic trading  Research by hushbotAlgorithmic trading  Research by hushbot
Algorithmic trading Research by hushbotedayaldis43
 
Transforming Surveillance in an Uncertain World 
Transforming Surveillance in an Uncertain World Transforming Surveillance in an Uncertain World 
Transforming Surveillance in an Uncertain World accenture
 
CoinShares 2019 Crypto Trends Report
CoinShares 2019 Crypto Trends ReportCoinShares 2019 Crypto Trends Report
CoinShares 2019 Crypto Trends ReportCoinShares
 
170116 newsletter FinGuard - Regulatory Competition Investigation
170116 newsletter  FinGuard - Regulatory Competition Investigation170116 newsletter  FinGuard - Regulatory Competition Investigation
170116 newsletter FinGuard - Regulatory Competition InvestigationJaya Patten
 
170116 newsletter
170116 newsletter170116 newsletter
170116 newsletterJaya Patten
 
170116 newsletter FinGuard - Regulatory Competition Investigation
170116 newsletter  FinGuard - Regulatory Competition Investigation170116 newsletter  FinGuard - Regulatory Competition Investigation
170116 newsletter FinGuard - Regulatory Competition InvestigationJaya Patten
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013Stephen Selby
 
Quant BC Fund
Quant BC FundQuant BC Fund
Quant BC Fundbalthakre
 
Shield - Stay one Step Ahead Using Technology
Shield - Stay one Step Ahead Using TechnologyShield - Stay one Step Ahead Using Technology
Shield - Stay one Step Ahead Using TechnologyShield
 

Similar to The 7 Pillars of Market Surveillance 2.0 (20)

Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse Detection
 
Rapport du FSB sur les cryptomonnaies
Rapport du FSB sur les cryptomonnaiesRapport du FSB sur les cryptomonnaies
Rapport du FSB sur les cryptomonnaies
 
Trade Surveillance with Big Data
Trade Surveillance with Big DataTrade Surveillance with Big Data
Trade Surveillance with Big Data
 
April_2013
April_2013April_2013
April_2013
 
P101018 Penelitian Crypto Untuk Ekonomi Negara FSB
P101018   Penelitian Crypto Untuk Ekonomi Negara FSBP101018   Penelitian Crypto Untuk Ekonomi Negara FSB
P101018 Penelitian Crypto Untuk Ekonomi Negara FSB
 
trend analysis of Indian stock exchange
trend analysis of Indian stock exchangetrend analysis of Indian stock exchange
trend analysis of Indian stock exchange
 
3 Steps Strategy for 2024 Crypto Gains !
3 Steps Strategy for 2024 Crypto Gains !3 Steps Strategy for 2024 Crypto Gains !
3 Steps Strategy for 2024 Crypto Gains !
 
Part 1-frauds
Part 1-fraudsPart 1-frauds
Part 1-frauds
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1
 
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...
BigDataCloud Sept 8 2011 Meetup - Big Data Analytics for DoddFrank Regulation...
 
Algorithmic trading Research by hushbot
Algorithmic trading  Research by hushbotAlgorithmic trading  Research by hushbot
Algorithmic trading Research by hushbot
 
Transforming Surveillance in an Uncertain World 
Transforming Surveillance in an Uncertain World Transforming Surveillance in an Uncertain World 
Transforming Surveillance in an Uncertain World 
 
CoinShares 2019 Crypto Trends Report
CoinShares 2019 Crypto Trends ReportCoinShares 2019 Crypto Trends Report
CoinShares 2019 Crypto Trends Report
 
BigFastData
BigFastDataBigFastData
BigFastData
 
170116 newsletter FinGuard - Regulatory Competition Investigation
170116 newsletter  FinGuard - Regulatory Competition Investigation170116 newsletter  FinGuard - Regulatory Competition Investigation
170116 newsletter FinGuard - Regulatory Competition Investigation
 
170116 newsletter
170116 newsletter170116 newsletter
170116 newsletter
 
170116 newsletter FinGuard - Regulatory Competition Investigation
170116 newsletter  FinGuard - Regulatory Competition Investigation170116 newsletter  FinGuard - Regulatory Competition Investigation
170116 newsletter FinGuard - Regulatory Competition Investigation
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013
 
Quant BC Fund
Quant BC FundQuant BC Fund
Quant BC Fund
 
Shield - Stay one Step Ahead Using Technology
Shield - Stay one Step Ahead Using TechnologyShield - Stay one Step Ahead Using Technology
Shield - Stay one Step Ahead Using Technology
 

More from Software AG

NA Adabas & Natural User Group Meeting April 2023
NA Adabas & Natural User Group Meeting April 2023NA Adabas & Natural User Group Meeting April 2023
NA Adabas & Natural User Group Meeting April 2023Software AG
 
Adabas & Natural Virtual User Group Meeting NAM 2022
Adabas & Natural Virtual User Group Meeting NAM 2022Adabas & Natural Virtual User Group Meeting NAM 2022
Adabas & Natural Virtual User Group Meeting NAM 2022Software AG
 
Process management and GRC in ARIS Practical Implementation
Process management and GRC in ARIS Practical ImplementationProcess management and GRC in ARIS Practical Implementation
Process management and GRC in ARIS Practical ImplementationSoftware AG
 
Adabas & Natural User Group
Adabas & Natural User GroupAdabas & Natural User Group
Adabas & Natural User GroupSoftware AG
 
NaturalONE & DevOps
NaturalONE & DevOpsNaturalONE & DevOps
NaturalONE & DevOpsSoftware AG
 
One Path to a Successful Implementation of NaturalONE
One Path to a Successful Implementation of NaturalONEOne Path to a Successful Implementation of NaturalONE
One Path to a Successful Implementation of NaturalONESoftware AG
 
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls Software AG
 
Ten Disruptive Digital Trends Retailers Need To Know
Ten Disruptive Digital Trends Retailers Need To Know Ten Disruptive Digital Trends Retailers Need To Know
Ten Disruptive Digital Trends Retailers Need To Know Software AG
 
Command Central Overview
Command Central OverviewCommand Central Overview
Command Central OverviewSoftware AG
 
Innovation World 2015 General Session - Dr. Wolfram Jost
Innovation World 2015 General Session - Dr. Wolfram JostInnovation World 2015 General Session - Dr. Wolfram Jost
Innovation World 2015 General Session - Dr. Wolfram JostSoftware AG
 
Tech Trends: The Fusion of Business and IT
Tech Trends: The Fusion of Business and ITTech Trends: The Fusion of Business and IT
Tech Trends: The Fusion of Business and ITSoftware AG
 
VEA: ARIS and Alfabet Journey Together
VEA: ARIS and Alfabet Journey Together VEA: ARIS and Alfabet Journey Together
VEA: ARIS and Alfabet Journey Together Software AG
 
The Future of Customer Centricity
The Future of Customer Centricity The Future of Customer Centricity
The Future of Customer Centricity Software AG
 
webMethods Integration Cloud Deep Dive
webMethods Integration Cloud Deep DivewebMethods Integration Cloud Deep Dive
webMethods Integration Cloud Deep DiveSoftware AG
 
Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics Software AG
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015Software AG
 
The Digital Business Platform
The Digital Business PlatformThe Digital Business Platform
The Digital Business PlatformSoftware AG
 

More from Software AG (20)

NA Adabas & Natural User Group Meeting April 2023
NA Adabas & Natural User Group Meeting April 2023NA Adabas & Natural User Group Meeting April 2023
NA Adabas & Natural User Group Meeting April 2023
 
Adabas & Natural Virtual User Group Meeting NAM 2022
Adabas & Natural Virtual User Group Meeting NAM 2022Adabas & Natural Virtual User Group Meeting NAM 2022
Adabas & Natural Virtual User Group Meeting NAM 2022
 
Process management and GRC in ARIS Practical Implementation
Process management and GRC in ARIS Practical ImplementationProcess management and GRC in ARIS Practical Implementation
Process management and GRC in ARIS Practical Implementation
 
Adabas & Natural User Group
Adabas & Natural User GroupAdabas & Natural User Group
Adabas & Natural User Group
 
Adabas Roadmap
Adabas RoadmapAdabas Roadmap
Adabas Roadmap
 
NaturalONE & DevOps
NaturalONE & DevOpsNaturalONE & DevOps
NaturalONE & DevOps
 
One Path to a Successful Implementation of NaturalONE
One Path to a Successful Implementation of NaturalONEOne Path to a Successful Implementation of NaturalONE
One Path to a Successful Implementation of NaturalONE
 
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls
Apama, Terracotta, webMethods Upgrade: Avoiding Common Pitfalls
 
Ten Disruptive Digital Trends Retailers Need To Know
Ten Disruptive Digital Trends Retailers Need To Know Ten Disruptive Digital Trends Retailers Need To Know
Ten Disruptive Digital Trends Retailers Need To Know
 
Command Central Overview
Command Central OverviewCommand Central Overview
Command Central Overview
 
Innovation World 2015 General Session - Dr. Wolfram Jost
Innovation World 2015 General Session - Dr. Wolfram JostInnovation World 2015 General Session - Dr. Wolfram Jost
Innovation World 2015 General Session - Dr. Wolfram Jost
 
Tech Trends: The Fusion of Business and IT
Tech Trends: The Fusion of Business and ITTech Trends: The Fusion of Business and IT
Tech Trends: The Fusion of Business and IT
 
VEA: ARIS and Alfabet Journey Together
VEA: ARIS and Alfabet Journey Together VEA: ARIS and Alfabet Journey Together
VEA: ARIS and Alfabet Journey Together
 
The Future of Customer Centricity
The Future of Customer Centricity The Future of Customer Centricity
The Future of Customer Centricity
 
webMethods Integration Cloud Deep Dive
webMethods Integration Cloud Deep DivewebMethods Integration Cloud Deep Dive
webMethods Integration Cloud Deep Dive
 
ARIS World
ARIS World ARIS World
ARIS World
 
Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015
 
Thingalytics
ThingalyticsThingalytics
Thingalytics
 
The Digital Business Platform
The Digital Business PlatformThe Digital Business Platform
The Digital Business Platform
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The 7 Pillars of Market Surveillance 2.0

  • 1. The  Seven  Pillars  of  Market  Surveillance  2.0   SURVEILLANCE   TOTAL  
  • 2. A  combina*on  of  monitoring   and  surveillance,  involving     both  data  and  human     behaviour  across  mul*ple     asset  classes  and  geographies,     helps  firms  detect  early     warning  signs  and  an*cipate     –  or  even  avoid  –  anomalous     behaviours  in  the  future   SURVEILLANCE   TOTAL  
  • 3. A  combina*on  of  monitoring   and  surveillance,  involving     both  data  and  human     behaviour  across  mul*ple     asset  classes  and  geographies,     helps  firms  detect  early     warning  signs  and  an*cipate     –  or  even  avoid  –  anomalous     behaviours  in  the  future   With  the  growth  of  headline   grabbing  scandals…     It’s  *me  to  get  SERIOUS   about  surveillance   SURVEILLANCE   TOTAL  
  • 4. A  combina*on  of  monitoring   and  surveillance,  involving     both  data  and  human     behaviour  across  mul*ple     asset  classes  and  geographies,     helps  firms  detect  early     warning  signs  and  an*cipate     –  or  even  avoid  –  anomalous     behaviours  in  the  future   With  the  growth  of  headline   grabbing  scandals…     It’s  *me  to  get  SERIOUS   about  surveillance   There  are  seven  key   ingredients  required  to  achieve   the  next  genera*on  of  total   surveillance;  or  the     Seven  Pillars  of  Market   Surveillance  2.0     SURVEILLANCE   TOTAL  
  • 5. TOTAL   PILLAR  #1   SURVEILLANCE  
  • 6. TOTAL   A  single,  CONVERGED   threat  system   Seamlessly  monitor  across  the  en*re   enterprise,  including:   •  Market  Surveillance   •  Opera*onal  Risk   •  Market  Risk   •  Trader  Profiling   PILLAR  #1   SURVEILLANCE  
  • 7. TOTAL   A  single,  CONVERGED   threat  system   Seamlessly  monitor  across  the  en*re   enterprise,  including:   •  Market  Surveillance   •  Opera*onal  Risk   •  Market  Risk   •  Trader  Profiling   PILLAR  #1   SURVEILLANCE   1.  Comes  with  sufficient  performance  at  scale  to  monitor  very  large  volumes  of   streaming  analy*cs,  both  pre-­‐  and  post-­‐  trade   2.  Is  open  and  flexible  enough  to  enable  organiza*ons  to  tailor  the  monitoring  based   upon  their  unique  and  evolving  requirements     3.  Is  seamlessly  pre-­‐integrated  with…   a)  Complementary  technologies  such  as  enterprise  grade  integra*on   b)  Ultra-­‐low  latency  messaging,  in-­‐memory  data  management     c)  Real-­‐*me  data  visualiza*on                      …  All  the  raw  tools  needed  to  break  down  monolithic  silos.     Prerequisites  for  SUCCESS  
  • 8. TOTAL   PILLAR  #1   SURVEILLANCE   Converge  siloed  systems  such  as   an*-­‐money  laundering,   opera*onal  risk,  and  trader   profiling  into  a  single,  monitoring   system  for  a  correlated  view  of  all   poten*al  threats.    
  • 9. TOTAL  SURVEILLANCE:   PILLAR  #2   Past,  Present  &   PredicNve   ANALYSIS  
  • 10. TOTAL  SURVEILLANCE:   PILLAR  #2   Past,  Present  &   PredicNve   ANALYSIS   Performing  analysis  on   historical  data,  real-­‐*me   data,  plus  predic*ng  and   warning  of  threats  before   they  occur  or  do  damage  
  • 11. TOTAL  SURVEILLANCE:   PILLAR  #2   An  out  of  control  algo     can  –  and  has  –  bankrupted   a  trading  firm             Past,  Present  &   PredicNve   ANALYSIS   Performing  analysis  on   historical  data,  real-­‐*me   data,  plus  predic*ng  and   warning  of  threats  before   they  occur  or  do  damage  
  • 12. Analyzing  the  ‘fire  hose’  of   market,  trade,  and  social   media  data  to  prevent  fraud   and  market  manipula*on,   using  large  structured  and   unstructured  data  sets   TOTAL   PILLAR  #3   SURVEILLANCE   Support  for  fast,  Big  Data  
  • 13. Analyzing  the  ‘fire  hose’  of   market,  trade,  and  social   media  data  to  prevent  fraud   and  market  manipula*on,   using  large  structured  and   unstructured  data  sets   TOTAL   PILLAR  #3   SURVEILLANCE   Support  for  fast,  Big  Data   By  connec*ng  to  disparate  sources  of      trading  rela*onship  informa*on  (i.e.,  IMs,  chat     rooms,  emails,  mobile  phones,  video  and  audio     surveillance)  -­‐  trader  behaviour  can  be  surmised…     •  Was  the  trader  working  unusual  hours?     •  Did  she  never  take  a  vaca*on?     •  Did  he  buy  a  fishery  together  with  another     FX  trader,  who  happens  to  be  his  banks’  client?  
  • 14. Analyzing  the  ‘fire  hose’  of   market,  trade,  and  social   media  data  to  prevent  fraud   and  market  manipula*on,   using  large  structured  and   unstructured  data  sets   TOTAL   PILLAR  #3   SURVEILLANCE   Support  for  fast,  Big  Data                                                  By  Including  data  from  social                                media,  email  and  chat                                      rooms,  the  tangled  web  that  fraudsters  weave  becomes  more                        predictable  when  management  can  watch  the  threads  crea*ng  the  web.          Fast,  Big  Data  comprises  these  threads  of  anomalous  human  behaviour;   Market  Surveillance  2.0  grabs  and  analyses  the  threads,  then  creates  ac*ons…  
  • 15. TOTAL   PILLAR  #4   SURVEILLANCE   Cross-­‐asset  class   monitoring   Monitoring  across  trading   silos  for  mul*-­‐asset   surveillance  and  across   correlated  asset  classes…  
  • 16. TOTAL   PILLAR  #4   SURVEILLANCE                          Why  do  we  care?     Because  events  that  impact  one  asset  class     can  and  do  have  a  knock-­‐on  effect  on  others.       EXAMPLE:  Between  2007  and  2012,  the  price     of  oil  was  highly  correlated  to  the  stock  market.     On  May  5,  2011,  the  crude  oil  market  experienced     its  second-­‐largest  daily  drop  ever  when  trading     algos  repeatedly  triggered  sell-­‐stops.  The  $13  drop   in  the  price  of  Brent  crude  knocked  the  Dow  Jones   Industrial  Average  down  by  140  points,  or  1.1%.       It  could  have  been  worse  if  the  oil  algos     had  not  been  caught  and  stopped  in  *me.     Today’s  markets  are  becoming  more  complicated     and  sophis*cated  by  the  day.  Humans  simply     cannot  monitor  and  react  to  mul*-­‐asset  classes     at  the  same  *me,  while  trading  at  lightning  speed.           Cross-­‐asset  class   monitoring   Monitoring  across  trading   silos  for  mul*-­‐asset   surveillance  and  across   correlated  asset  classes…  
  • 17. TOTAL   PILLAR  #4   SURVEILLANCE   …watching  for  paferns   that  signal  risk  or   opportunity,  then  kicking   out  real  ac*ons  to  take           Cross-­‐asset  class   monitoring   Monitoring  across  trading   silos  for  mul*-­‐asset   surveillance  and  across   correlated  asset  classes…  
  • 18. TOTAL   PILLAR  #5   SURVEILLANCE   Cross  Region   Monitoring   Monitoring  for  risks  across   geographical  and  regulatory   boundaries  and  differences…  
  • 19. TOTAL   PILLAR  #5   SURVEILLANCE   Cross  Region   Monitoring   Monitoring  for  risks  across   geographical  and  regulatory   boundaries  and  differences…   Cross  border  surveillance  becomes  increasingly  cri*cal  as  financial   services  firms  and  investors  trade  mul*ple  asset  classes  across  many     countries  and  disparate  regulatory  regimes,  which  can  cause  confusion   and  create  opportuni*es  for  error.     Regula*ons  in  different  countries  (e.g.  Dodd-­‐Frank  vs.  MiFID)  have   similari*es  and  differences.  Regulatory  arbitrage  is  a  concern,  as  trading   firms  could  choose  to  do  business  with  more  lightly  regulated  regimes;     taking  extra  risks  with  their  company’s  and  shareholders’  money  and   reputa*on.    
  • 20. TOTAL   PILLAR  #5   SURVEILLANCE   Cross  Region   Monitoring   Monitoring  for  risks  across   geographical  and  regulatory   boundaries  and  differences…   Cross  border  surveillance  becomes  increasingly  cri*cal  as  financial   services  firms  and  investors  trade  mul*ple  asset  classes  across  many     countries  and  disparate  regulatory  regimes,  which  can  cause  confusion   and  create  opportuni*es  for  error.     Regula*ons  in  different  countries  (e.g.  Dodd-­‐Frank  vs.  MiFID)  have   similari*es  and  differences.  Regulatory  arbitrage  is  a  concern,  as  trading   firms  could  choose  to  do  business  with  more  lightly  regulated  regimes;     taking  extra  risks  with  their  company’s  and  shareholders’  money  and   reputa*on.     …to  assure  adherence  to     different  regulatory   environments    
  • 21. TOTAL   PILLAR  #6   SURVEILLANCE   Known  &  Unknown   Threats   Benchmarking  behavior  and   performance  to  uncover   previously  unknown  paferns  
  • 22. TOTAL   PILLAR  #6   SURVEILLANCE   Known  &  Unknown   Threats   Benchmarking  behavior  and   performance  to  uncover   previously  unknown  paferns   Monitoring  for  ‘unknowns’  can  be   achieved  by  benchmarking  behavior   that  is  “normal”  over  *me  and  then   spoing  behavior  that  deviates  from   the  norm.       To  spot  suspicious  behavior  could   involve  digitally  monitoring  loca*ons   and  in-­‐person  interac*ons  of   traders…  their  speech  and  facial   expressions,  for  example    
  • 23. TOTAL   PILLAR  #6   SURVEILLANCE   Known  &  Unknown   Threats   Benchmarking  behavior  and   performance  to  uncover   previously  unknown  paferns   Monitoring  for  ‘unknowns’  can  be   achieved  by  benchmarking  behavior   that  is  “normal”  over  *me  and  then   spoing  behavior  that  deviates  from   the  norm.       To  spot  suspicious  behavior  could   involve  digitally  monitoring  loca*ons   and  in-­‐person  interac*ons  of   traders…  their  speech  and  facial   expressions,  for  example     Cyber-­‐terrorism  is  on  the   upswing  and  algorithmic   terrorism,  where  a  well-­‐funded   criminal  or  terrorist  organiza*on   causes  a  major  market  crisis,   could  be  the  next  itera*on.  Only   by  keeping  a  close  watch  on  the   markets  and  the  par*cipants   involved  can  these  unwanted   behaviors  be  nipped  in  the  bud    
  • 24. TOTAL   PILLAR  #6   SURVEILLANCE   Known  &  Unknown   Threats   Benchmarking  behavior  and   performance  to  uncover   previously  unknown  paferns   Monitoring  for  ‘unknowns’  can  be   achieved  by  benchmarking  behavior   that  is  “normal”  over  *me  and  then   spoing  behavior  that  deviates  from   the  norm.       To  spot  suspicious  behavior  could   involve  digitally  monitoring  loca*ons   and  in-­‐person  interac*ons  of   traders…  their  speech  and  facial   expressions,  for  example     Monitor  for  ‘unknown  unknowns’,  by     benchmarking  behaviour  that  is  ‘normal’       over  *me  and  spoing  behaviour  that     deviates  from  the  norm       Cyber-­‐terrorism  is  on  the   upswing  and  algorithmic   terrorism,  where  a  well-­‐funded   criminal  or  terrorist  organiza*on   causes  a  major  market  crisis,   could  be  the  next  itera*on.  Only   by  keeping  a  close  watch  on  the   markets  and  the  par*cipants   involved  can  these  unwanted   behaviors  be  nipped  in  the  bud    
  • 25. TOTAL   PILLAR  #7   SURVEILLANCE   Dynamically   Evolve  Rules   Be  ready  for  the  next  threat.   Control  your  own  surveillance   and  con*nually  adapt  your   monitoring  
  • 26. TOTAL   PILLAR  #7   SURVEILLANCE   Dynamically   Evolve  Rules   Be  ready  for  the  next  threat.   Control  your  own  surveillance   and  con*nually  adapt  your   monitoring   Once  a  new  unknown  behavior  is  found,  it    needs  to  become  a  ‘known   behavior’  and  a  new  rule  must  be  added  to  the  system.  It  is  cri*cal  to  be  able  to   add  new  rules  dynamically  rather  than  relying  on  a  “shrink-­‐wrapped   applica*ons”  that  do  not  provide  this  level  of  flexibility…  
  • 27. TOTAL   PILLAR  #7   SURVEILLANCE   Dynamically   Evolve  Rules   Be  ready  for  the  next  threat.   Control  your  own  surveillance   and  con*nually  adapt  your   monitoring   …Since  the  next  episode  of  an  ‘known  behavior’  could  occur  at  any  *me;  it   would  be  complacent  to  think  that  because  one  has  been  discovered,  it  won’t   happen  again.     Once  a  new  unknown  behavior  is  found,  it    needs  to  become  a  ‘known   behavior’  and  a  new  rule  must  be  added  to  the  system.  It  is  cri*cal  to  be  able  to   add  new  rules  dynamically  rather  than  relying  on  a  “shrink-­‐wrapped   applica*ons”  that  do  not  provide  this  level  of  flexibility…  
  • 28. TOTAL   PILLAR  #7   SURVEILLANCE   Dynamically   Evolve  Rules   Be  ready  for  the  next  threat.   Control  your  own  surveillance   and  con*nually  adapt  your   monitoring   Turn  a  new  unknown  behaviour  into   a  known  behaviour  by  dynamically   adding  new  rules  to  the  system     …Since  the  next  episode  of  an  ‘known  behavior’  could  occur  at  any  *me;  it   would  be  complacent  to  think  that  because  one  has  been  discovered,  it  won’t   happen  again.     Once  a  new  unknown  behavior  is  found,  it    needs  to  become  a  ‘known   behavior’  and  a  new  rule  must  be  added  to  the  system.  It  is  cri*cal  to  be  able  to   add  new  rules  dynamically  rather  than  relying  on  a  “shrink-­‐wrapped   applica*ons”  that  do  not  provide  this  level  of  flexibility…  
  • 29. The  Seven  Pillars  of  Market  Surveillance  2.0   1.  Converge  siloed  systems  into     a  single  monitoring  system   for  a  correlated  view  of     poten*al  threats.                     2.  Perform  “con*nuous     analy*cs”  to  predict  what     might  happen  –  and  prevent  it.     3.  Check  social  media,  email     and  chat  rooms  for     anomalous  behaviour   4.  Monitor  all  asset  classes     5.  Assure  adherence  to   regional  regulatory   environments                         6.  Benchmarking  “normal”   behaviour  to  spot  deviant   behaviour     7.  Dynamically  add  newly   discovered  “unknown”  
  • 30. MEET  THE  AUTHOR   Theo  Hildyard   Theo  Hildyard  is  Head  of  Solu*ons  Marke*ng  at   Solware  AG.  This  team  harnesses  Solware  AG   technology  to  deliver  business  solu*ons  focused  on   turning  big  (and  streaming)  data  into  meaningful   insights  for  automated  decision-­‐making.  Solu*ons   include  Algorithmic  Trading,  FX  eCommerce,  Market   Surveillance,  Customer  Experience  Management,     and  Con*nuous  Monitoring  for  Governance  Risk  &   Control  (iGRC)   Get  the  comprehensive   Total  Surveillance   White  paper