RegTech: A Guide to Effective Procurement - Part I
As many know, I've spent the last few years working in RegTech. During that time, I must have sat in hundreds of meetings with IT and compliance managers, considering their options as they look to meet regulatory obligations, manage costs, and select partners from an ever-growing list. As that list has expanded, many have turned to third-party consultants, standardised RFPs, or rely heavily on word of mouth.
This ever-more competitive landscape has led to bold claims and sharp pencils, but if history is anything to go by, the lowest price is not always the most reliable partner.
I thought it might be helpful to share experiences and key themes to help folks avoid some classic pitfalls.
Build vs. Buy: Deciphering the Best Path
Let's start with the obvious. Do you need to buy a system? (I hear the awkward shuffle of salespeople's feet).
But in all seriousness, it will depend on your appetite for substantial IT projects. It is often assumed, usually by senior management, divorced from the day-to-day rigmarole, that RegTech can be built, calibrated, and left to run. However, regulations continually change, and so do the businesses they cover.
New 'flavours' of behavioural patterns, such as 'spoofing' or changes to margin methodology, constantly shift the goalposts. Furthermore, trading firms evolve, adding new desks, products, and asset classes, generating a perpetual need for system maintenance - that shouldn't be underestimated (see J.P. Morgan's 2024 e-Trading Survey).
Let's take a practical example: if a traditional equities or futures trading firm decides to enter crypto, new connectivity may need to be built, additional contextual market data included, and parameters set. 'Insider dealing' in equities may simply relate to trading ahead of sensitive stock news, but in crypto, this may be buying a large number of tokens before a public exchange listing. The system must be seeded with that information to generate relevant feedback. Furthermore, the architect of the original system may leave the company. Despite this, regulators will require detailed paperwork explaining how the system works and a well-documented paper trail of changes for audit purposes. Internal builds can be good for firms with significant resources to meet these requirements (as well as the capital!) or for much smaller firms with vanilla trading and limited regulatory exposure. However, on the whole, they are few and far between.
There is plenty of material on this subject available online. I will admit that much is written from a vendor perspective, but the bottom line is simple: building may be suitable for some, but it shouldn't be underestimated. RegTech is complex and continually evolving, so any build should not be considered a one-time capital expenditure, and strong, relevant expertise is critical.
As a large U.S. proprietary trading firm once suggested to me: "Our quants should be building alpha-generating strategies, not surveillance tools".
Do:
Don't:
News Team Assemble: Defining Your Project Team
In many initial conversations, a compliance manager is tasked with quickly reaching out to a few vendors, perhaps due to a call from a regulator or a peer receiving a wrap on the knuckles. Meetings are set up and details exchanged, but the inevitable outcome is a need for further discussion and gathering responses from stakeholders who weren't in that initial meeting.
The most successful processes include critical stakeholders from the outset. Compliance may be the end-user, but IT, legal and risk are often heavily involved. Understanding the organisation's IT infrastructure, access to trade/market data and relevant third-party licenses immediately cuts down time and helps vendors scope the required platform. Preparing a document outlining the market coverage needs (ideally by MIC code - see here) and volumes (total messages, i.e. orders, trades, cancellations and amendments) is also valuable information to have on hand. This helps understand server capacity/throughput as well as the viable risks given geographical needs and regulatory exposure. Furthermore it quickly ascertains whether certain vendors are capable of meeting the coverage needs, removing wasted effort if they can't.
Do:
Don't:
Scope Definition: Beyond the Obvious
I often got a quizzical look when I asked about the project's scope—as if perhaps it was obvious. Answers have ranged from "Equities" to "We trade a bit of ICE and some CME" (sic). One firm insisted they only traded Asian bonds only to send a sample file containing a vast array of U.S. equity product codes.
领英推荐
Start with a broad scope but then narrow it down:
Do:
Don't:
Risk Assessment: The Core of RegTech Deployment
The nub of most RegTech deployments is interpreting and meeting the risk assessment. Whilst not mandated by all major financial jurisdictions, firms should consider preparing an assessment that addresses what risks the firm is exposed to should its employees decide to 'go rogue'. For example, if a trader has direct access to a market, then it is feasible that they may be able to enter false impressions of price. Thus, knowing how to monitor activities such as layering/spoofing would be advisable! This exercise should be considered across all key risks depending on the regulations of the relevant markets/jurisdictions the firm is exposed to. Having this document to hand when exploring with technology providers will help assess whether the vendor meets all requirements. It will also help rule out certain requirements - for instance, should the firm route orders to a third party (who executes on the firm's behalf). It is unlikely (if not impossible) that activities such as layering are feasible, but insider dealing may still be a risk.
J.P. Morgan's recent $348.2m fine from the OCC and Fed for lack of surveillance may be eye-popping (suggesting 30+ venues were not adequately monitored between 2014-23), but what is interesting is the response from the regulators. In both cases, the OCC and Fed demanded well-documented policies and procedures covering (i) controls, (ii) effective automated data reconciliation processes, (iii) parameters & calibration, (iv) measures to ensure routine and annual monitoring and (v) testing. The importance of good governance should never be underestimated.
Do:
Don't:
To RFP or Not to RFP: A 'Painful' Question
I've seen my fair share of RFPs. They typically fall into three categories: (i) ill-conceived, (ii) ill-structured, and/or (iii) unnecessarily complex. It's fair to say I'm not a fan, but here's why:
Do:
Don't:
In Part II, we'll examine some options to help reduce the selection headache. We'll also discuss the pros and cons of POCs/Trials and why it's important to define a project plan early with your selected vendor.
Product Management | Trade Surveillance | Compliance | OTC Subject-Matter Expertise
11 个月Very interesting Nick Wallis. Looking forward to Part II.
Capital Markets: Cash and Derivatives Clearing and Settlement Front to Back Office Subject Matter Expert
11 个月This is a very good article Nick. Thank you.
Head of End User Adoption at Nasdaq
11 个月Well written Nick!
RegTech | Trade Surveillance | eComms |Algo Trading | Compliance | Code of Ethics
11 个月Thank you Nick Wallis
Board Member & Advisor | Conduct, Risk & Governance | FinTech | RegTech | Expert Witness
11 个月Great insights Nick Wallis!