“How important is this relationship to you?” That question is often asked by concerned spouses or romantically involved parties to get a status check on just how well their relationship is faring. For the first time ever, hedge fund managers could be forced to pose the same question to their prime brokers, thanks to the […]
UCITS V: What Is a Three-Year-Old Bonus Worth?
Fund management firms wanting to benefit from the latest incarnation of decades-old UCITS legislation to easily market their investment funds across Europe will find themselves facing a new hurdle: they must adapt to new restrictions on how and when they compensate many of their top-ranked executives. The provisions on compensation are considered draconian by many fund experts who […]
AML Transaction Monitoring: Five Steps to Getting it Right
If you think your anti-money laundering transaction monitoring software isn’t working correctly, what should you do? a) blame your vendor and replace the software b) blame your analysts and tell them to work harder c) review your data feeds and inputs d) throw your hands up and think you can’t do anything e) doubt your […]
The Volcker Rule: Managing the Seven Deadly Metrics
The implementation of the Volcker Rule has undoubtedly caused wailing and gnashing of teeth among some of the smartest and best-funded trading operations in the world. While its overarching principle — the prohibition of proprietary trading — might be easy to understand, proving compliance is a whole different ball of wax. With the effective date […]
When Buying Cybersecurity Insurance: Caveat Emptor
The theft of personal details of millions of individuals in a U.S. government database might sound shocking, but it really isn’t given the latest stream of well-publicized hacking events in the retail, financial and insurance industries. Neiman Marcus, eBay, Home Depot, JP Morgan Chase, Sony and Anthem are among the high-profile casualties. Given that a cyber […]
News to Use: New AML Technology and Bitcoins
AML Tech Upgrade: To avoid doing business with the wrong customers and counterparties, financial firms can now rely on a new generation of software applications that go beyond traditional rules-based screening to far more sophisticated data analysis, says a new research report from Celent. The costs of not complying with anti-money laundering rules can be […]
Cybersecurity in the C-Suite: A Matter of “Need to Know”
Cybersecurity has been described as everything from a top-down corporate mission to a shopping list for software packages that monitor networks and systems for suspicious activity. Given the breadth and complexity of even identifying the risks, it’s no wonder that all sorts of management are discovering they’re now riding the cybersecurity bus. Nowhere is this accumulation of corporate […]
Central Clearing for US Sec Lending: Coming Soon?
Central clearing: it’s a well-established concept for settling equities, fixed-income and now swap transactions. But not in the US securities lending market, where Eurex Clearing now wants to establish a new service, but could face an uphill climb, despite enlisting two of the world’s largest custodian banks BNY Mellon and State Street to help out. Granted, OCC in […]
Custody Network Management: The Rise of the Super Risk Manager
Second article of our two-part series on third-party risk management. For the first article, click here. Hands-on relationship manager. System Analyst. Recruiter. Negotiator. Risk Manager. Hatchet man. Whoa! Too many job descriptions requiring far different different personalities and skills. They couldn’t possibly all be handled effectively by any single individual. These are just a some of […]
Vendor Risk Management: Financial Firms under the Gun
First of a two-part series on third-party risk. For the second article, click here. Activities can be outsourced, liabilities can’t. Financial firms may understand the legal distinction, but when it comes to managing the risk involved with using external technology providers, they are too often falling asleep at the wheel, warn operations and IT experts. The reason: […]