EMIR Refit: Potential for hidden costs & huge fines
EMIR Refit’s implementation date is edging ever closer, we investigate the two big concerns still filtering through the market
AI could be capital market’s ‘Robin’ rather than their ‘Batman’
While AI offers exciting possibilities for capital markets, separating hype from reality will be crucial.
Interview series with Don Byron of DMIST
We recently sat down with seasoned industry veteran and current Head of Global Industry Operations and Execution at the FIA, Don Byron.
Capital Markets ready for the volatility storm?
The numerous geopolitical events taking place this year could end up shaping the trajectory of post-trade operations for years to come.
Automation, the ultimate trump card in 2024?
Two years after our initial research, we visit the landscape of automation within capital markets to asses its evolution and impact. Where is the industry looking to for success and are there any alternative investment drivers in 2024.
Rising threats associated with cybersecurity breaches
In an increasingly interconnected digital world, cybersecurity must remain a top priority for the post-trade industry to safeguard financial assets and maintain the trust of stakeholders.
FCMs report significant progress in reconciliations efficiency since 2021
Our latest study, two years after our first, reveals that investment over the past two years by sell-side clearing firms in automation has had a significant impact on post-trade operations.
Path to Perfect: Investment in Derivatives Reconciliations
Two years after conducting our initial report we revisit the findings and ask what has changed since then and where there is still work to be done.
Sell-side Clearing Management Insight Report
This report is based on a survey of Acuiti’s Sell-Side Clearing Network, and takes a detailed look at EMIR 3.0, CCP default risk, DORA and training in manual clearing.
FIA Cyber Risk: Concrete plan of action or regurgitated recommendations?
The FIA’s report has been lauded for addressing critical cyber security issues however, is it reliant on existing programs or is it a new forward-thinking approach?