<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=318106&amp;fmt=gif">
Skip to content
Neil McManus 15-May-2026 16:11:36 7 min read

Why Modern Geopolitics Is Breaking Bank Resilience Models

Implications for Treasury, Trading, and ALM Platforms

For most of the last decade, resilience in banking technology has been framed as an engineering optimisation problem: reduce downtime, diversify infrastructure, rehearse recovery. Treasury, trading, and ALM platforms were designed to survive operational failure, criminal monetisation attempts, and the occasional thirdparty outage.

What they were not designed for is sustained geopolitical pressure applied through cyberspace, where the strategic objective is not theft or ransom, but systemic fragility and loss of recoverability.

The current U.S.–Iran conflict is only the most visible example. What it exposes is not a temporary spike in cyber activity, but a structural mismatch between how resilience models were designed and the environment they now operate in. For platforms that manage liquidity, collateral, payments, market risk, and balancesheet exposure, this shift is material. These systems are not just IT assets; they are mechanisms for meeting legal obligations and preserving confidence.

The old model: resilience as an availability problem

Traditional disaster recovery (DR) and business continuity (BC) frameworks in financial services evolved around a relatively narrow failure taxonomy:

  • datacentre incidents and infrastructure outages
  • isolated ransomware attacks with monetisation as the goal
  • shortlived thirdparty failures
  • recoverable data corruption events
  • backups were treated as inherently trustworthy
  • identity systems were centralised for operational efficiency
  • shared SaaS platforms were encouraged to reduce cost and complexity
  • DR tests focused on where to recover, not from what state
  • Identity must be segmented by function and recovery tier, not simply optimised for operational convenience.
  • DR testing must assume credential compromise and destructive intent, not orderly failure.
  • Backup strategies must survive the loss of production trust.
  • BC planning must focus on decision rights, communication paths, and human availability under stress.

Even where cyber risk was explicitly considered, the assumed attacker objective was financial gain. The implicit contract was that systems might be disrupted, but recovery would remain feasible given enough time, capital, and coordination.

As a result, several assumptions became embedded across Treasury, Trading, and ALM estates:

For years, these assumptions were defensible. In the current environment, they increasingly are not.

What geopolitics changes at the platform level

Geopolitical conflict introduces four properties that fundamentally alter the resilience equation.

First, attacker intent shifts from theft to degradation.
Modern campaigns increasingly deploy destructive malware, target backup infrastructure, compromise identity planes, and interfere with recovery tooling. The goal is not to extract value directly, but to prevent clean recovery and erode confidence in financial infrastructure.

Second, volume and sophistication now coexist.
Highly disciplined, statealigned operators act alongside large hacktivist and semicoordinated groups. This combination produces scale, distraction, and unpredictability. Skilled intrusions hide inside noisy, highvolume activity, overwhelming detection and response functions.

Third, deniability is operationalised.
Attribution is deliberately ambiguous. That ambiguity now affects insurance coverage, regulatory posture, and executive decisionmaking. Uncertainty no longer merely complicates response—it directly amplifies financial and governance risk.

Fourth, shared platforms become leverage points.
Treasury and ALM platforms depend on tightly coupled ecosystems: identity providers, cloud control planes, SaaS analytics, marketdata vendors, and payment rails. Geopolitical pressure exploits this interdependence by attacking points of aggregation rather than individual institutions.

Taken together, these factors produce a form of systemic stress that existing resilience playbooks were not built to absorb.

Where Treasury, Trading, and ALM systems are most exposed

Across institutions, five exposure patterns now recur.

1. Recovery assumptions are fragile.
Modern destructive campaigns explicitly target snapshots, replicas, CI/CD pipelines, and backup credentials. If backup and recovery infrastructure share identity, administrative control, or cloud tenancy with production, they fall together. Many “immutable” strategies are immutable only under laboratory conditions.

2. Identity has become the real single point of failure.
Identity governs access to trading environments, liquidity controls, payment initiation, approval workflows, and recovery tooling itself. Centralisation improves efficiency but concentrates blast radius in ways that are rarely tested under hostile assumptions.

3. Concentration risk is now exploitable.
Shared SaaS platforms, identity providers, and cloud services create correlated exposure across institutions. A single compromise can generate simultaneous operational impact that redundancy within the same trust domain cannot mitigate.

4. People are part of the attack surface.
Payment approvers, treasury operators, traders, and senior engineers are increasingly targeted outside corporate controls through personal devices, messaging platforms, and social engineering. AIassisted impersonation lowers the cost of credibility and accelerates abuse.

5. Insurance is no longer a passive backstop.
War and hostileact exclusions are now tested in real incidents. Attribution ambiguity can directly affect loss recovery. For Treasury platforms, forensic readiness has become a balancesheet consideration, not just a security one.

Why compliance is no longer enough

Regulators have not rushed to rewrite rulebooks in response to geopolitical cyber risk. Instead, they are signalling expectation shifts through supervisory focus, examination questions, and industry communications.

For Treasury, Trading, and ALM platforms, this creates a subtle but important gap. Formal compliance remains necessary, but it is no longer sufficient. Institutions are increasingly expected to demonstrate that they have interpreted the environment correctly and adapted their operating assumptions accordingly.

The uncomfortable reality is that resilience is now judged less by policy alignment and more by demonstrated adaptability.

What resilience must mean now

In this environment, resilience must be reframed. It is no longer primarily about uptime under fault conditions. It is about recoverability under adversarial pressure.

That reframing implies several difficult shifts:

Most critically, leadership must accept that resilience has a cost. The gap between paper RTOs and real recoverability is now an explicit risk decision, not a theoretical one.

The leadership obligation

Geopolitical cyber pressure does not need to be continuous to be effective. It only needs to be credible enough to expose structural weakness.

For leaders responsible for Treasury, Trading, and ALM technology, the obligation is not to predict the next incident. It is to be honest about whether current assumptions would hold under a determined, destructive adversary with no interest in ransom or reputation management.

The institutions that emerge from this period with confidence intact will not necessarily be the most innovative or automated. They will be the ones that recognised early that resilience had changed meaning—and adjusted accordingly.

 Like what you see? Get more information from our geopolitical whitepaper here.