SlideShare a Scribd company logo
1 of 15
Download to read offline
July 2020
Transforming
Surveillanceinan
UncertainWorld
Industry
Backdrop
MACROECONOMIC TRENDS CLIENT DRIVERSECOSYSTEM
Industry Context and New Market Trends
The pandemic has disrupted the trading model, compounding the complexity of pre-existing macroeconomic and
client drivers and leading to greater ecosystem risks in areas such as conduct and cyber security
“Will the Virtual Trading
Floor become the New
Reality?”2
“Surveillance of Homebound
Wall Street Traders Relies on
Pen and Paper”1
“Managers turn to surveillance
software, always-on webcams
to ensure employees are
(really) working from home”3
“Compliance Is An Issue
For Remote Trading And
Investing Firms”4
Firms needing to “bend
the cost curve,” with
risk and controls a key
area of focus
Focus on exploiting
advances in artificial
intelligence (AI) and
analytics to reduce cost
to serve and increase
process quality
Continued regulatory
expectations on
conduct, consumer
protection and
cybersecurity
Prioritizing protection
of assets given market
turbulence
Seeking diversification
in investments to
mitigate risks (e.g., new
technologies)
Strengthening risk
management techniques
to reduce potential
trading and / or
transaction errors
Though ecosystem risk has been compounded, leading surveillance programs have opportunity to emerge with a healthier cost
base, a more holistic set of surveillance tools and new ways of working
1 https://www.wsj.com/articles/taking-notes-the-challenge-of-recording-trades-while-working-from-home-11585565630 3 https://www.washingtonpost.com/technology/2020/04/30/work-from-home-surveillance/
4 https://www.gfmag.com/magazine/april-2020/compliance-remote-trading-investing
Sources
Illustrative
2 https://www.globalbankingandfinance.com/will-the-virtual-trading-floor-become-the-new-reality/
Wall Street
Journal
Washington
Post
Harvard Business
Review
Global Banking &
Finance Review
Regulatory expectations regarding controlled access to information, surveillance and effective audit trails have remained broadly
consistent, though more complex to enforce in an era of virtual trading
AREAS OF FOCUS
Maintain communications within a controlled
environment, for example prohibit use of personal
devices and provide information security of non-work
standard communication platforms
Maintain complete and timely recordkeeping to
meet lookback analysis and heightened compliance
expectations (e.g., U.S. Consolidated Audit Trail) and
minimize paper-based notes and references
Enhance detection capabilities (e.g., use of video
surveillance or virtual reality) to detect potential
conduct risks
Use virtual barrier to detect MNPI data and
surveillance controls intended to block the exchange
of information between departments that may result
in business activities with conduct and / or legal risk
Implement and raise awareness of remote work
standards (e.g., pop-ups, online training) including
secure home network security settings and use of
data collaboration tools; review screensharing
protocols
REGULATORY
EXPECTATION
Recording of internal
and external trading
communications
Audit trail of
transactions
Control access to
material non-public
information (MNPI)
Restriction of access to
trading information
Appropriate due
diligence of
oversight and access
1
2
3
4
5
Monitor and implement detection, for example monitor
employees signing in to networks from personal devices or
abnormal locations, and inadvertent exposure of client
information to cloud-based applications (e.g., personal email)
Replicate the office environment, for example use face-to-
face video conversations in place of hands-on supervision,
and monitor trade execution instructions and client
communications to detect red flags as per business as usual
(BaU)
Use of advanced analytics techniques to parse alert flow
given the impact of market volatility, as well as to inform any
increase in the frequency of attestation processes
Close any potential gap of understanding with regulators by
using company proprietary trading applications to maintain a
digital record and remove paper trails, prioritizing date / time
of calls, location of calls, solicited bids / offers, etc.
Detect market manipulation, monitor and analyze trading and
market activity, such as voice, e-comm, and (P&L) information
to help detect insider dealing and misuse or disclosure of
MNPI
OPPORTUNITIES TO ADVANCE CAPABILITY
Regulatory Areas of Focus and Opportunities
Copyright © 2020 Accenture. All rights reserved.
Virtual trading environments amplify six key risks of misconduct, notably the threat of collusion and insider trading, with the
likelihood of regulatory lookback and testing of trade data raising the stakes for effective surveillance
Collusion and Schemes of Arrangement
Increase in unmonitored communication
among traders in chat rooms, as discussions
pushed from monitored media to less
frequently monitored channels (e.g., instant
messages)
Threat of Possible Fraud
During a downturn in the economic cycle, fraud
schemes such as market manipulation, pump-
and-dump, Ponzi schemes may increase due to
the pressure to maintain commissions
Potential Insider Trading Activity
A less frequently or consistently monitored
environment facilitates potential employee
engagement in higher personal securities transactions,
and market timing activities
Risk of Investment Suitability and Improper
Advice
Surveillance monitoring and “red flags” of
unauthorized trading in a non-discretionary
account, unauthorized transfers or uses of funds,
or placing a customer in unsuitable securities to
generate commissions
Inherent Risk level
With the potential for regulatory “lookback” and testing of trade data during periods of remote work, financial
organizations are re-evaluating their detection capabilities and supporting data and technology architecture
Inappropriate Client Relationship Management
Risk of investment professionals from engaging in off-
market transfers, not acting on behalf of client interests
and proper fiduciary responsibility, or not providing full
disclosures to clients of the impact of market activity
Copyright © 2020 Accenture. All rights reserved.
Elevation of Six Key Misconduct Risks
Unauthorized Discretionary Trading
Increased risk of an investment adviser
executing trades in a customer or investor’s
account without proper permission or
authorization
Transforming
Surveillance in an
Uncertain World
Four Potential Macro Scenarios
The near-future is still uncertain and firms should think about the possible impacts of four scenarios
1. Rapid Remission
The disease is contained,
and life returns to normal
swiftly. Government
measures work quickly to
stabilize the economy.
2. Flattened Curve
The rate of infections is
slowed but does not go
into remission. The
economy shrinks in near
permanent ways. Society
bends but does not break,
pulling together to sustain
government measures.
3. Cyclical Outbreaks
Infections are controlled
in past locations but
spread to new hot spots
and rebound in old.
Patience wears thin with
social distancing, opening
societal fissures.
4. Prolonged Chaos
Effects to control the virus
seem useless.
Governments and
societies are strained to
the point of breaking. The
economy is limited to
necessities only and
inflation soars.
Source: Accenture Research analysis.
7
Infection outbreaks due to uncooperative
elements
Non-compliance on two fronts
The rate of inevitable infections is slowedInfections are rapidly isolated until
absent
Bad actors don’t often leave a trail of evidence behind – in addition to technology solutions, surveillance
investigators require the right bank-wide processes in place to detect, respond, and resolve potential misconduct
Key Questions to Address
Key Questions To Address Leading Practices
Controls
Framework
Data
Technology
▪ How do supervisory officer behaviors and cadence evolve
to maintain oversight capability?
▪ What processes are required so that the surveillance
program is executed properly and continually improved?
▪ Clear definition of surveillance controls, processes, and
roles and responsibilities across the three lines of defense
▪ Ongoing tuning and review of compliance procedures on
false positives, suspicious behaviors target list and
changes to regulatory expectations
▪ What information is available and captured by
surveillance platforms or other tools?
▪ How can firms draw the right relationships between
available data points?
▪ Assessment of data integration for a 360 supervision by
integrating disparate data sources
▪ Business requirements and high data quality as baseline to
effectively execute surveillance complemented with AI
▪ What compliance tools are fit for purpose and what
accelerators may be required to monitor trading and
communication activities effectively?
▪ How can firms take advantage of disruptive and AI
capabilities to monitor trading activities in virtual
environment?
▪ Compliance ecosystem realignment and definition of
technology blueprint for both local and virtual trading
environments
▪ Design and implementation of surveillance policies
extending them to unsupervised and supervised machine
learning provided by proven technologies
8
Effective Surveillance Across the 3 Lines of Defense
Effective surveillance requires orchestration across the three lines of defense, with each needing to play their
role in mitigating misconduct risks such as collusion
9
Control Data Tech
1st Line Of Defense 2nd Line Of Defense 3rd Line Of Defense
Providing independent assurance of
operations and oversight groups
Executing trades per client direction and
within control parameters
Monitoring and enforcing guidelines and
identifying exceptions
▪ Is trading activity per customer guidelines?
▪ Are regulatory guidelines on best execution
being adhered to?
▪ Is there assurance on trading communication
surveillance?
▪ Were trade instructions recorded?
▪ Are digital trade communications available
for comparison to actual trade executions?
▪ How do we monitor so that employees are
not transacting client trade orders outside
of compliance monitoring protocols?
▪ Were there any gaps as per identified
client trade orders and executed prices?
▪ Was there an audit sampling conducted
on all client order program trades sent to
the trading desk for execution?
Key questions Key questions Key questions
Case Study: Supervisory Officer Case Study: Compliance Officer Case Study: Internal Auditor
✓ Establish escalation triggers across lines of
business (LOB)
✓ Implement LOB management controls
✓ Stand up supervisory LOB product teams
✓ Define key risk and performance indicators
(KRIs / KPIs) across trading desks
✓ Define surveillance rules and procedures
based on comprehensive list of misbehaviors
and risks in local and virtual environments
✓ Implement alert escalation process and red
flags to allow early identification of risk
✓ Identify team groups and relationships more
likely to act in collusion
✓ Assess escalated alerts, false positives
and missed cases for rule recalibration /
tuning
✓ Ongoing testing with new misbehaviors
due to a more virtual and digital
environment
EMPLOYEE
Personal
Account
Trading
Political
Contributions
Outside
Business
Activities
Large
Holdings
Voice
eComms
Social
Media
Video
Trade
Surveillance
Financial
Crime
Licensing
and
Registration
Remote Internet
Access
3rd Party
Access
Conflicts
Clearance
and Control
Room
Policies and
Training
Gifts and
EntertainmentBankruptcy
Filings
Private
Investments
Sub-
contractors
Conduct
Sales
Practices
HR Data
EXTERNAL
PARTIES
CLIENT
Holistic Surveillance for an Effective Detection
Effective mitigation of risks demands that compliance and control groups join the dots across a
number of interconnected parties and use cases
Control Data Tech
▪ The target state is an
effective integration of
data at scale from
multiple sources, across
product lines, portfolios
and geographies, and
using AI and machine
learning is helping global
banks create an “analytics
supply chain”
▪ Organizations are seeking
surveillance based on
data and analytics
platforms to serve up
connected and contextual
data across the enterprise
which can lead to more
informed answers, greater
insights and ability to
reconstruct entire trades
10
Controls Technology Blueprint
Leading financial institutions are allowing their technology estates to deliver the holistic surveillance required in
a virtual world through analytics, specialized applications and intelligent automation, and supported by an
advanced data processing core
11
Complex Event Processing (CEP) Engine
Big Data Core (e.g., Apache™ Hadoop®)
In Memory Analytics
Query Engine
CEP Cache Distributed Cache In-Memory DB
Workflow Alerts and Notification
HBase Data Storage on HDFS
Service Layer Interface
Internal and External Data Sources
Compliance
Portal
Employee
Portal
Management
Reporting
Regulatory
Reporting
Internal
Reporting
Analytics User Interface ( UI) / Dashboard UI (tablets / phone friendly)
Applications
Personal Account
Dealing App
Outside Business
Interest App
Gifts and
Entertainment App
Control Room
App
Policy and
Training Tool
Risk Assessment
Tool
Whistleblowing
App
Reg Change
Tracking Tool
Horizon Tracking
Tool
eComms
Surveillance
Audio
Surveillance
Social Media
Surveillance
Trade
Surveillance
Payment
Screening Tool
Sanctions
Screening Tool
KYC and PEP
Screening Tool
Suitability
Commentary
▪ Analytics UI provides flexible review
capabilities that allow selective / holistic views
and simple manipulation of aggregated data
through analytics (e.g., slicing of the
application output and sentiment analysis to
drive escalation)
▪ Specialized applications to transform
operational capabilities to execute functional
tasks to manage system / human workflow
integration
▪ An advanced data processing core underpins
the above functionalities and provides sufficient
storage to store all auditable evidence (e.g.,
surveillance applications identify sharing of
MNPI, with AI able to accelerate data mining
and understanding of relevant patterns)
▪ Intelligent automation to connect the dots to
provide insights across disparate data sources
and reduce manual processes related to data
aggregations (e.g., comms on clients’ orders
and bid-ask spreads across emails, instant
messaging, text messaging, social media, …)
Control Data Tech
KYC: Know Your Customer
PEP: Politically Exposed Person
Tactical turnarounds to extend
existing surveillance solutions
that require process and control
enhancements
Three Surveillance Transformation Approaches
The traditional way of operating in the Surveillance function has lagged on effective controls, data
management and technology which doesn’t cover short and long term business needs. Three transformation
approaches can change this trend
Enhance
Existing
Capability
Invest in
Proven
Techs
Integrate
Isolated
Functions
Address technology gaps to bring
notable advancements in
detection, investigation and
reconstruction surveillance
capabilities
360 supervision to reduce false
positives significantly and
improve proactiveness of the
Surveillance function to
anticipate misbehaviors or
misconduct risks
12
How can Accenture help?
Accenture is positioned to provide immediate support to help organizations respond to the virtual trading floor
implications from the pandemic crisis. Below are indicative areas where we can help
COVID-19 Banking: Navigating the human and business impact of COVID-19
Subject Matter Advisors “On Demand”: Support for regulatory assessment, industry benchmarking and change planning
Program Support: Dedicated team to assess, recommend and implement program enhancements
Service Delivery: Delivery of new surveillance methods as-a-service, with advisory support as appropriate
Challenge
Solution
Support
13
Control Reviews and Look Back
Existing monitoring controls are
typically not prepared to allow
remote working on an enterprise
scale and require “stress testing”
Provide support for:
➢ Technology architecture
review and planning
➢ Process and technology
control evaluation
➢ Remediation support
Platform Implementation and
Service Delivery
Analytics and more advanced
techniques (e.g., Virtual Reality) can
get de-prioritized in the move to
remote and focus on continuity
planning
Provide support for:
➢ Selection of preferred
vendor platforms
➢ Proofs of concept
➢ Implementation
➢ Service delivery
Regulatory Compliance
Validating conformance to
regulatory requirements during
remote working and confirming
procedures are in place to hold
traders to account
Provide support for
➢ Regulatory analysis and
recommendations
➢ Policy and procedure review
➢ Training updates
Contacts
Samantha Regan
Managing Director
Accenture Strategy & Consulting
Global Reg and Compliance lead
samantha.regan@accenture.com
Robimon Varughese
Senior Manager
Accenture Strategy & Compliance
Technology Lead - Reg and Compliance
robimon.varughese@accenture.com
Ben Shorten
Managing Director
Accenture Strategy & Consulting
Compliance & Privacy
benjamin.j.shorten@accenture.com
TRANSFORMING SURVEILLANCE
IN AN UNCERTAIN WORLD
About Accenture
Accenture is a leading global professional
services company, providing a broad range of
services in strategy and consulting, interactive,
technology and operations, with digital
capabilities across all of these services. We
combine unmatched experience and
specialized capabilities across more than 40
industries – powered by the world’s largest
network of Advanced Technology and
Intelligent Operations centers. With 509,000
people serving clients in more than 120
countries, Accenture brings continuous
innovation to help clients improve their
performance and create lasting value across
their enterprises. Visit us at
www.accenture.com
Disclaimer
This presentation is intended for general
informational purposes only and does not
take into account the reader’s specific
circumstances, and may not reflect the most
current developments. Accenture disclaims,
to the fullest extent permitted by applicable
law, any and all liability for the accuracy and
completeness of the information in this
presentation and for any acts or omissions
made based on such information. Accenture
does not provide legal, regulatory, audit, or
tax advice. Readers are responsible for
obtaining such advice from their own legal
counsel or other licensed professionals.

More Related Content

What's hot

Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accentureaccenture
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signalsaccenture
 
Technology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | AccentureTechnology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | Accentureaccenture
 
Digital Finance - Beyond the Hype | Accenture
Digital Finance - Beyond the Hype | AccentureDigital Finance - Beyond the Hype | Accenture
Digital Finance - Beyond the Hype | Accentureaccenture
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Intelligent Enterprise Unleashed
Intelligent Enterprise UnleashedIntelligent Enterprise Unleashed
Intelligent Enterprise Unleashedaccenture
 
Network Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final ResultsNetwork Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final Resultsaccenture
 
Reinventing the Last Mile: Win the Race to the Top
Reinventing the Last Mile: Win the Race to the TopReinventing the Last Mile: Win the Race to the Top
Reinventing the Last Mile: Win the Race to the Topaccenture
 
Trash the Rulebook
Trash the RulebookTrash the Rulebook
Trash the Rulebookaccenture
 
Accenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends InfographicAccenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends Infographicaccenture
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterpriseaccenture
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveaccenture
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationCognizant
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Hereaccenture
 
A Responsible Future for Immersive Technologies
A Responsible Future for Immersive TechnologiesA Responsible Future for Immersive Technologies
A Responsible Future for Immersive Technologiesaccenture
 
Digital strategy a 5 point approach
Digital strategy   a 5 point approachDigital strategy   a 5 point approach
Digital strategy a 5 point approachVed Sen
 
Digital Cyprus: Catalyst for Change (Volume 1)
Digital Cyprus: Catalyst for Change (Volume 1)Digital Cyprus: Catalyst for Change (Volume 1)
Digital Cyprus: Catalyst for Change (Volume 1)accenture
 
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...Capgemini
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the Newaccenture
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 

What's hot (20)

Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accenture
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signals
 
Technology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | AccentureTechnology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | Accenture
 
Digital Finance - Beyond the Hype | Accenture
Digital Finance - Beyond the Hype | AccentureDigital Finance - Beyond the Hype | Accenture
Digital Finance - Beyond the Hype | Accenture
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Intelligent Enterprise Unleashed
Intelligent Enterprise UnleashedIntelligent Enterprise Unleashed
Intelligent Enterprise Unleashed
 
Network Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final ResultsNetwork Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final Results
 
Reinventing the Last Mile: Win the Race to the Top
Reinventing the Last Mile: Win the Race to the TopReinventing the Last Mile: Win the Race to the Top
Reinventing the Last Mile: Win the Race to the Top
 
Trash the Rulebook
Trash the RulebookTrash the Rulebook
Trash the Rulebook
 
Accenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends InfographicAccenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends Infographic
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
 
A Responsible Future for Immersive Technologies
A Responsible Future for Immersive TechnologiesA Responsible Future for Immersive Technologies
A Responsible Future for Immersive Technologies
 
Digital strategy a 5 point approach
Digital strategy   a 5 point approachDigital strategy   a 5 point approach
Digital strategy a 5 point approach
 
Digital Cyprus: Catalyst for Change (Volume 1)
Digital Cyprus: Catalyst for Change (Volume 1)Digital Cyprus: Catalyst for Change (Volume 1)
Digital Cyprus: Catalyst for Change (Volume 1)
 
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...
Thousands of Employees, Millions of Devices, Billions of Things – Welcome to ...
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Similar to Transforming Surveillance in an Uncertain World 

Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationThieu Nguyen Bao Chau
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...PascalOtieno
 
Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1anthonywong
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...Opus
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk ManagementShaun Sloan
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2Eric Young
 
V14 056 capital markets digital transformation v2[1]
V14 056 capital markets digital transformation v2[1]V14 056 capital markets digital transformation v2[1]
V14 056 capital markets digital transformation v2[1]Ignacio Gil Bárez
 
Internal Audit in Retail Industry UAE.pptx
Internal Audit in Retail Industry UAE.pptxInternal Audit in Retail Industry UAE.pptx
Internal Audit in Retail Industry UAE.pptxRishalHalid1
 
Shift at work of Fraud Management
Shift at work of Fraud ManagementShift at work of Fraud Management
Shift at work of Fraud ManagementcVidya Networks
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud managementcVidya Networks
 
Data-Centric Insurance: How the London market can embrace analytics and regai...
Data-Centric Insurance: How the London market can embrace analytics and regai...Data-Centric Insurance: How the London market can embrace analytics and regai...
Data-Centric Insurance: How the London market can embrace analytics and regai...Accenture Insurance
 
From Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesFrom Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesRob Rensman
 
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...Gary S. Kaminsky
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile MenacesNalneesh Gaur
 

Similar to Transforming Surveillance in an Uncertain World  (20)

Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
 
Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Fintech Risks and Benefits--DR. Emmanuel Moore ABOLO
Fintech Risks  and Benefits--DR. Emmanuel Moore ABOLOFintech Risks  and Benefits--DR. Emmanuel Moore ABOLO
Fintech Risks and Benefits--DR. Emmanuel Moore ABOLO
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
V14 056 capital markets digital transformation v2[1]
V14 056 capital markets digital transformation v2[1]V14 056 capital markets digital transformation v2[1]
V14 056 capital markets digital transformation v2[1]
 
Internal Audit in Retail Industry UAE.pptx
Internal Audit in Retail Industry UAE.pptxInternal Audit in Retail Industry UAE.pptx
Internal Audit in Retail Industry UAE.pptx
 
Shift at work of Fraud Management
Shift at work of Fraud ManagementShift at work of Fraud Management
Shift at work of Fraud Management
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud management
 
Data-Centric Insurance: How the London market can embrace analytics and regai...
Data-Centric Insurance: How the London market can embrace analytics and regai...Data-Centric Insurance: How the London market can embrace analytics and regai...
Data-Centric Insurance: How the London market can embrace analytics and regai...
 
From Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesFrom Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial Services
 
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
Retail 2.0
Retail 2.0Retail 2.0
Retail 2.0
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Recently uploaded (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Transforming Surveillance in an Uncertain World 

  • 3. MACROECONOMIC TRENDS CLIENT DRIVERSECOSYSTEM Industry Context and New Market Trends The pandemic has disrupted the trading model, compounding the complexity of pre-existing macroeconomic and client drivers and leading to greater ecosystem risks in areas such as conduct and cyber security “Will the Virtual Trading Floor become the New Reality?”2 “Surveillance of Homebound Wall Street Traders Relies on Pen and Paper”1 “Managers turn to surveillance software, always-on webcams to ensure employees are (really) working from home”3 “Compliance Is An Issue For Remote Trading And Investing Firms”4 Firms needing to “bend the cost curve,” with risk and controls a key area of focus Focus on exploiting advances in artificial intelligence (AI) and analytics to reduce cost to serve and increase process quality Continued regulatory expectations on conduct, consumer protection and cybersecurity Prioritizing protection of assets given market turbulence Seeking diversification in investments to mitigate risks (e.g., new technologies) Strengthening risk management techniques to reduce potential trading and / or transaction errors Though ecosystem risk has been compounded, leading surveillance programs have opportunity to emerge with a healthier cost base, a more holistic set of surveillance tools and new ways of working 1 https://www.wsj.com/articles/taking-notes-the-challenge-of-recording-trades-while-working-from-home-11585565630 3 https://www.washingtonpost.com/technology/2020/04/30/work-from-home-surveillance/ 4 https://www.gfmag.com/magazine/april-2020/compliance-remote-trading-investing Sources Illustrative 2 https://www.globalbankingandfinance.com/will-the-virtual-trading-floor-become-the-new-reality/ Wall Street Journal Washington Post Harvard Business Review Global Banking & Finance Review
  • 4. Regulatory expectations regarding controlled access to information, surveillance and effective audit trails have remained broadly consistent, though more complex to enforce in an era of virtual trading AREAS OF FOCUS Maintain communications within a controlled environment, for example prohibit use of personal devices and provide information security of non-work standard communication platforms Maintain complete and timely recordkeeping to meet lookback analysis and heightened compliance expectations (e.g., U.S. Consolidated Audit Trail) and minimize paper-based notes and references Enhance detection capabilities (e.g., use of video surveillance or virtual reality) to detect potential conduct risks Use virtual barrier to detect MNPI data and surveillance controls intended to block the exchange of information between departments that may result in business activities with conduct and / or legal risk Implement and raise awareness of remote work standards (e.g., pop-ups, online training) including secure home network security settings and use of data collaboration tools; review screensharing protocols REGULATORY EXPECTATION Recording of internal and external trading communications Audit trail of transactions Control access to material non-public information (MNPI) Restriction of access to trading information Appropriate due diligence of oversight and access 1 2 3 4 5 Monitor and implement detection, for example monitor employees signing in to networks from personal devices or abnormal locations, and inadvertent exposure of client information to cloud-based applications (e.g., personal email) Replicate the office environment, for example use face-to- face video conversations in place of hands-on supervision, and monitor trade execution instructions and client communications to detect red flags as per business as usual (BaU) Use of advanced analytics techniques to parse alert flow given the impact of market volatility, as well as to inform any increase in the frequency of attestation processes Close any potential gap of understanding with regulators by using company proprietary trading applications to maintain a digital record and remove paper trails, prioritizing date / time of calls, location of calls, solicited bids / offers, etc. Detect market manipulation, monitor and analyze trading and market activity, such as voice, e-comm, and (P&L) information to help detect insider dealing and misuse or disclosure of MNPI OPPORTUNITIES TO ADVANCE CAPABILITY Regulatory Areas of Focus and Opportunities Copyright © 2020 Accenture. All rights reserved.
  • 5. Virtual trading environments amplify six key risks of misconduct, notably the threat of collusion and insider trading, with the likelihood of regulatory lookback and testing of trade data raising the stakes for effective surveillance Collusion and Schemes of Arrangement Increase in unmonitored communication among traders in chat rooms, as discussions pushed from monitored media to less frequently monitored channels (e.g., instant messages) Threat of Possible Fraud During a downturn in the economic cycle, fraud schemes such as market manipulation, pump- and-dump, Ponzi schemes may increase due to the pressure to maintain commissions Potential Insider Trading Activity A less frequently or consistently monitored environment facilitates potential employee engagement in higher personal securities transactions, and market timing activities Risk of Investment Suitability and Improper Advice Surveillance monitoring and “red flags” of unauthorized trading in a non-discretionary account, unauthorized transfers or uses of funds, or placing a customer in unsuitable securities to generate commissions Inherent Risk level With the potential for regulatory “lookback” and testing of trade data during periods of remote work, financial organizations are re-evaluating their detection capabilities and supporting data and technology architecture Inappropriate Client Relationship Management Risk of investment professionals from engaging in off- market transfers, not acting on behalf of client interests and proper fiduciary responsibility, or not providing full disclosures to clients of the impact of market activity Copyright © 2020 Accenture. All rights reserved. Elevation of Six Key Misconduct Risks Unauthorized Discretionary Trading Increased risk of an investment adviser executing trades in a customer or investor’s account without proper permission or authorization
  • 7. Four Potential Macro Scenarios The near-future is still uncertain and firms should think about the possible impacts of four scenarios 1. Rapid Remission The disease is contained, and life returns to normal swiftly. Government measures work quickly to stabilize the economy. 2. Flattened Curve The rate of infections is slowed but does not go into remission. The economy shrinks in near permanent ways. Society bends but does not break, pulling together to sustain government measures. 3. Cyclical Outbreaks Infections are controlled in past locations but spread to new hot spots and rebound in old. Patience wears thin with social distancing, opening societal fissures. 4. Prolonged Chaos Effects to control the virus seem useless. Governments and societies are strained to the point of breaking. The economy is limited to necessities only and inflation soars. Source: Accenture Research analysis. 7 Infection outbreaks due to uncooperative elements Non-compliance on two fronts The rate of inevitable infections is slowedInfections are rapidly isolated until absent
  • 8. Bad actors don’t often leave a trail of evidence behind – in addition to technology solutions, surveillance investigators require the right bank-wide processes in place to detect, respond, and resolve potential misconduct Key Questions to Address Key Questions To Address Leading Practices Controls Framework Data Technology ▪ How do supervisory officer behaviors and cadence evolve to maintain oversight capability? ▪ What processes are required so that the surveillance program is executed properly and continually improved? ▪ Clear definition of surveillance controls, processes, and roles and responsibilities across the three lines of defense ▪ Ongoing tuning and review of compliance procedures on false positives, suspicious behaviors target list and changes to regulatory expectations ▪ What information is available and captured by surveillance platforms or other tools? ▪ How can firms draw the right relationships between available data points? ▪ Assessment of data integration for a 360 supervision by integrating disparate data sources ▪ Business requirements and high data quality as baseline to effectively execute surveillance complemented with AI ▪ What compliance tools are fit for purpose and what accelerators may be required to monitor trading and communication activities effectively? ▪ How can firms take advantage of disruptive and AI capabilities to monitor trading activities in virtual environment? ▪ Compliance ecosystem realignment and definition of technology blueprint for both local and virtual trading environments ▪ Design and implementation of surveillance policies extending them to unsupervised and supervised machine learning provided by proven technologies 8
  • 9. Effective Surveillance Across the 3 Lines of Defense Effective surveillance requires orchestration across the three lines of defense, with each needing to play their role in mitigating misconduct risks such as collusion 9 Control Data Tech 1st Line Of Defense 2nd Line Of Defense 3rd Line Of Defense Providing independent assurance of operations and oversight groups Executing trades per client direction and within control parameters Monitoring and enforcing guidelines and identifying exceptions ▪ Is trading activity per customer guidelines? ▪ Are regulatory guidelines on best execution being adhered to? ▪ Is there assurance on trading communication surveillance? ▪ Were trade instructions recorded? ▪ Are digital trade communications available for comparison to actual trade executions? ▪ How do we monitor so that employees are not transacting client trade orders outside of compliance monitoring protocols? ▪ Were there any gaps as per identified client trade orders and executed prices? ▪ Was there an audit sampling conducted on all client order program trades sent to the trading desk for execution? Key questions Key questions Key questions Case Study: Supervisory Officer Case Study: Compliance Officer Case Study: Internal Auditor ✓ Establish escalation triggers across lines of business (LOB) ✓ Implement LOB management controls ✓ Stand up supervisory LOB product teams ✓ Define key risk and performance indicators (KRIs / KPIs) across trading desks ✓ Define surveillance rules and procedures based on comprehensive list of misbehaviors and risks in local and virtual environments ✓ Implement alert escalation process and red flags to allow early identification of risk ✓ Identify team groups and relationships more likely to act in collusion ✓ Assess escalated alerts, false positives and missed cases for rule recalibration / tuning ✓ Ongoing testing with new misbehaviors due to a more virtual and digital environment
  • 10. EMPLOYEE Personal Account Trading Political Contributions Outside Business Activities Large Holdings Voice eComms Social Media Video Trade Surveillance Financial Crime Licensing and Registration Remote Internet Access 3rd Party Access Conflicts Clearance and Control Room Policies and Training Gifts and EntertainmentBankruptcy Filings Private Investments Sub- contractors Conduct Sales Practices HR Data EXTERNAL PARTIES CLIENT Holistic Surveillance for an Effective Detection Effective mitigation of risks demands that compliance and control groups join the dots across a number of interconnected parties and use cases Control Data Tech ▪ The target state is an effective integration of data at scale from multiple sources, across product lines, portfolios and geographies, and using AI and machine learning is helping global banks create an “analytics supply chain” ▪ Organizations are seeking surveillance based on data and analytics platforms to serve up connected and contextual data across the enterprise which can lead to more informed answers, greater insights and ability to reconstruct entire trades 10
  • 11. Controls Technology Blueprint Leading financial institutions are allowing their technology estates to deliver the holistic surveillance required in a virtual world through analytics, specialized applications and intelligent automation, and supported by an advanced data processing core 11 Complex Event Processing (CEP) Engine Big Data Core (e.g., Apache™ Hadoop®) In Memory Analytics Query Engine CEP Cache Distributed Cache In-Memory DB Workflow Alerts and Notification HBase Data Storage on HDFS Service Layer Interface Internal and External Data Sources Compliance Portal Employee Portal Management Reporting Regulatory Reporting Internal Reporting Analytics User Interface ( UI) / Dashboard UI (tablets / phone friendly) Applications Personal Account Dealing App Outside Business Interest App Gifts and Entertainment App Control Room App Policy and Training Tool Risk Assessment Tool Whistleblowing App Reg Change Tracking Tool Horizon Tracking Tool eComms Surveillance Audio Surveillance Social Media Surveillance Trade Surveillance Payment Screening Tool Sanctions Screening Tool KYC and PEP Screening Tool Suitability Commentary ▪ Analytics UI provides flexible review capabilities that allow selective / holistic views and simple manipulation of aggregated data through analytics (e.g., slicing of the application output and sentiment analysis to drive escalation) ▪ Specialized applications to transform operational capabilities to execute functional tasks to manage system / human workflow integration ▪ An advanced data processing core underpins the above functionalities and provides sufficient storage to store all auditable evidence (e.g., surveillance applications identify sharing of MNPI, with AI able to accelerate data mining and understanding of relevant patterns) ▪ Intelligent automation to connect the dots to provide insights across disparate data sources and reduce manual processes related to data aggregations (e.g., comms on clients’ orders and bid-ask spreads across emails, instant messaging, text messaging, social media, …) Control Data Tech KYC: Know Your Customer PEP: Politically Exposed Person
  • 12. Tactical turnarounds to extend existing surveillance solutions that require process and control enhancements Three Surveillance Transformation Approaches The traditional way of operating in the Surveillance function has lagged on effective controls, data management and technology which doesn’t cover short and long term business needs. Three transformation approaches can change this trend Enhance Existing Capability Invest in Proven Techs Integrate Isolated Functions Address technology gaps to bring notable advancements in detection, investigation and reconstruction surveillance capabilities 360 supervision to reduce false positives significantly and improve proactiveness of the Surveillance function to anticipate misbehaviors or misconduct risks 12
  • 13. How can Accenture help? Accenture is positioned to provide immediate support to help organizations respond to the virtual trading floor implications from the pandemic crisis. Below are indicative areas where we can help COVID-19 Banking: Navigating the human and business impact of COVID-19 Subject Matter Advisors “On Demand”: Support for regulatory assessment, industry benchmarking and change planning Program Support: Dedicated team to assess, recommend and implement program enhancements Service Delivery: Delivery of new surveillance methods as-a-service, with advisory support as appropriate Challenge Solution Support 13 Control Reviews and Look Back Existing monitoring controls are typically not prepared to allow remote working on an enterprise scale and require “stress testing” Provide support for: ➢ Technology architecture review and planning ➢ Process and technology control evaluation ➢ Remediation support Platform Implementation and Service Delivery Analytics and more advanced techniques (e.g., Virtual Reality) can get de-prioritized in the move to remote and focus on continuity planning Provide support for: ➢ Selection of preferred vendor platforms ➢ Proofs of concept ➢ Implementation ➢ Service delivery Regulatory Compliance Validating conformance to regulatory requirements during remote working and confirming procedures are in place to hold traders to account Provide support for ➢ Regulatory analysis and recommendations ➢ Policy and procedure review ➢ Training updates
  • 14. Contacts Samantha Regan Managing Director Accenture Strategy & Consulting Global Reg and Compliance lead samantha.regan@accenture.com Robimon Varughese Senior Manager Accenture Strategy & Compliance Technology Lead - Reg and Compliance robimon.varughese@accenture.com Ben Shorten Managing Director Accenture Strategy & Consulting Compliance & Privacy benjamin.j.shorten@accenture.com
  • 15. TRANSFORMING SURVEILLANCE IN AN UNCERTAIN WORLD About Accenture Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. We combine unmatched experience and specialized capabilities across more than 40 industries – powered by the world’s largest network of Advanced Technology and Intelligent Operations centers. With 509,000 people serving clients in more than 120 countries, Accenture brings continuous innovation to help clients improve their performance and create lasting value across their enterprises. Visit us at www.accenture.com Disclaimer This presentation is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.