top of page

Your clients chose you for discretion and trust. Have your AI agents been briefed on that?

Agentic AI systems & Trust
Autonomous Agentic AI Systems & Trust Deficit

Twenty-two Years of Trust.

One Agent Update.

One Data Flow Nobody Authorized.

On the governance gap that private banking cannot afford to ignore.

 

The client had been with the bank for twenty-two years.

Not the kind of client who appears in earnings presentations. The kind whose relationship manager knows their children’s names, attends their family events, and has been trusted with the full complexity of a multi-generational wealth structure spanning four jurisdictions. A relationship representing €280 million in AUM and a referral network worth considerably more.


When the family office CFO called on a Thursday morning, the relationship manager assumed it was routine. It was not.


A competing bank had sent a pitch presentation to the family’s Singapore office in error. The deck contained a market analysis section with allocation patterns and sector exposures that were recognizable. Not identical to the client’s actual portfolio. But close enough that the family’s investment committee had flagged it immediately. Specific enough that coincidence was not a credible explanation.

Nobody at the bank had leaked anything. There had been no breach, no social engineering, no disgruntled employee. The client’s data had not been stolen.


The bank’s AI agent had shared allocation signals with a platform it was authorized to work with. The platform’s agent, updated three weeks earlier, had done something with those signals that the bank had not anticipated and could not document. A competitor firm, using the same platform, received analytics that should not have been visible to anyone outside the bank’s walls.


Twenty-two years of trust. One agent update. A data flow nobody had reviewed, scoped, or approved.

 

HOW THE ARCHITECTURE WORKED

The bank had deployed an AI agent for portfolio optimization across its private banking book. To source alternative investment opportunities like private equity allocations, real asset co-investments, select hedge fund access, the agent connected to a third-party alternatives platform which is a standard practice. The agent shared anonymized allocation signals like percentage exposures by asset class, liquidity preferences, return thresholds. The platform’s matching agent used these signals to surface relevant co-investment opportunities. The relationship had been in production for eleven months without incident.


Three weeks before the CFO’s call, the platform released a major update to their agent. The update introduced a peer analysis module which had a capability that cross-referenced allocation patterns across all platform participants to identify co-investment clusters and generate market intelligence for subscribers.

From the platform’s perspective, a legitimate product enhancement. From the bank’s perspective, a fundamental change in what the external agent was doing with their data and surprisingly nobody at the bank had been informed, let alone consulted.


The anonymization the bank had relied upon was not a contractual constraint encoded at the agent interaction level. It was an assumption about what the platform would do with the signals it received. When the platform’s agent gained the ability to triangulate those signals against other participants’ data, the anonymization collapsed. The bank’s client’s allocation patterns became inferable. A competitor subscribed to the same platform’s analytics received market intelligence that traced, indirectly, back to a relationship the bank had spent two decades building.

 

FOUR GOVERNANCE FAILURES

The investigation that followed surfaced four specific failures.


The first is identity.

When the bank’s agent connected to the platform on any given day, it verified nothing about which version of the platform’s agent it was communicating with. It authenticated to the endpoint. There was no mechanism to detect that the agent’s behavioral profile had changed three weeks earlier, no flag that new capabilities had been introduced, no trigger to prompt a governance review before the data sharing continued.


The second is scope.

The data contract between the bank and the platform defined what data could be shared. It did not define what the receiving agent was permitted to infer, cross-reference, or derive from that data. In a world where agents can run analytics, train on signals, and generate new intelligence from aggregate inputs, the absence of an inference boundary is a material governance gap. Nobody had written that boundary. Nobody had encoded it at the agent level.


The third is authorization chain.

When the alternatives platform updated their agent, nobody at the bank’s data governance function was notified. Nobody re-validated whether the existing data sharing arrangement remained appropriate given the new capabilities. The agent continued operating under an authorization granted to a previous version of its counterpart, a version that no longer existed.


The fourth is the audit trail.

When compliance needed to reconstruct exactly what signals had been shared, over what period, and what the platform’s agent had done with them, the records were partial. The bank had logs of what its agent had sent. The platform had logs of what their agent had processed. The two sets of records did not produce a coherent reconstruction of the inference chain.

 

WHY PRIVATE BANKING IS UNIQUELY EXPOSED

Private banking is not a forgiving environment for this kind of failure.


The clients who sit in this space have chosen their institution partly on the basis of discretion. They are not casual retail customers who will overlook a data incident and move on. They are individuals and families who have structured significant portions of their lives around the assumption that their bank treats their information as genuinely confidential. When that assumption is violated - even indirectly, even through a mechanism nobody fully understood, the relationship does not recover. The AUM moves & the referrals stop.


The regulatory dimension compounds this. MiFID II suitability requirements, cross-border reporting obligations, data residency rules under GDPR, and banking secrecy frameworks in certain jurisdictions all create an environment where the bank must not only act correctly but demonstrate that it acted correctly. An AI agent governance structure that cannot produce a clear record of what was shared, with whom, under what authorization, fails that standard before anyone asks a single question.

 

THREE QUESTIONS FOR YOUR LEADERSHIP TABLE

When your agents share client data or derived signals with external systems, is the scope of permitted use defined at the agent interaction level. Is it just in a contract document, or enforced in the technical boundary between the two systems?


When an external agent your systems interact with is updated, what is the mechanism that notifies your data governance team, and what triggers a re-validation of the data-sharing arrangement?


If a regulator, a client’s legal counsel, or your own compliance function asked tomorrow to see the complete record of what your portfolio agents had shared externally over the past ninety days & what those agents had received in return, and what the counterpart systems had done with those inputs then how complete would that record be?

 

The scenario above is fictional. The architecture it describes is not.


Private banking has always understood that trust is the asset class that underlies every other. Two decades of client relationship, carefully managed, can transfer more value than any single investment mandate. The institutions that have built enduring books of business in this space understand that the work of protecting trust is never finished.


What has changed is the surface area of that work. The introduction of AI agents into wealth management workflows, portfolio optimization, and client servicing has created a new category of interaction: automated, cross-system, operating faster than any human review cycle.


The trust that took twenty-two years to build traveled through an API endpoint on a Tuesday morning. Nobody saw it happen. Nobody could explain it afterward.

The agents are already in production. The governance infrastructure that should sit beneath them is not. That gap will not stay invisible indefinitely. In private banking, it tends to surface at the worst possible moment.


____________________________________________________________________________

I follow the development of cross-ecosystem AI agent communication and the accountability infrastructure being built around it, with particular interest in what this means for institutions where trust is the core product. If this connects to challenges your team is working through, I'd welcome the conversation.


Comments


I Sometimes Send Newsletters

Thanks for submitting!

© 2023 by Sofia Franco. Proudly created with Wix.com.

bottom of page