Transforming Banking with GenAI: Key Trends Unveiled

Current Trends

1. Hyper-personalisation & next-gen customer experience

  • GenAI enables banks to offer tailored customer interactions—chatbots that speak conversationally in multiple languages, instant financial advice based on real-time account data, and dynamically priced products cloud.google.com+15accenture.com+15research.aimultiple.com+15.
  • Domain-specific LLMs are powering personalised financial advice, virtual assistants, and FAQ support on mortgages and investments.

2. Process automation & efficiency gains

  • AI is automating back-office tasks—document processing, invoices, compliance checks—often achieving 50–85% automation levels vktr.com.
  • Banks use code-writing GenAI to modernise legacy applications and accelerate software updates.

3. Fraud detection & risk management

  • GenAI systems monitor transactions in near real-time, learn from evolving fraud patterns, and dramatically reduce false positives. ideas2it.com+1vktr.com+1.
  • It’s being used to support risk teams with climate risk, credit risk, KYC/AML compliance, and scenario simulations mckinsey.com+1itrexgroup.com+1.

4. Compliance & regulatory support

  • Banks are building “GenAI virtual experts” to summarize regulations and policies, draft compliance documents, and monitor evolving rules globenewswire.com+7mckinsey.com+7getdynamiq.ai+7.
  • Tactical adoption is growing: only ~8% of banks had a systematic GenAI strategy in 2024, but most now use it tactically across such functions newsroom.ibm.com.

Future Trends (12–36 months)

1. Fully integrated AI–human hybrids

  • By 2030, expect collaborative workflows where GenAI partners with employees across customer service, advisory, product creation and compliance accenture.com+1getdynamiq.ai+1.

2. Multimodal AI & advanced GenAI agents

  • AI that processes voice, text, documents, and images, enabling richer customer and employee interactions.
  • Emergence of GenAI ‘copilots’ that assist advisors, compliance officers, and analysts directly within their tools.

3. Synthetic data generation & stress‑testing

4. Domain-specific LLMs in production

  • Institutions like JPMorgan, BofA, and HSBC are moving from PoCs to deploying specialised LLMs fine-tuned on internal data, e.g. BloombergGPT for financial chat cleveroad.com.

5. Increasing regulatory scrutiny & AI governance

  • As usage grows, new frameworks (e.g. EU AI Act) will enforce guardrails, human-in-the-loop monitoring, output explainability, and audit trails mckinsey.com.

6. Rising GenAI market & investments

  • The GenAI market in financial services is set to grow from ~$2.8 bn (2023) to ~$75 bn by 2028 (~94% CAGR) and reach $85 bn by 2030 in banking spend globenewswire.com.

Summary Table

TrendNow (2025)Coming (2025–2030)
Customer experience24/7 intelligent multilingual chatbotsMultimodal copilots and immersive AI assistants
Operations & automationDoc processing, coding assistanceFully embedded AI in all workflows
Fraud & risk managementReal-time monitoring & anomaly flaggingSynthetic data generation, stress simulations
Compliance & governanceRegulatory Q&A bots, policy summarizersEnterprise AI governance, real-time guardrails
Technology evolutionOff-the-shelf GenAI models in POCsDomain-specific LLMs in live production
Industry investmentTactical GenAI projects & pilots~$75–85 bn GenAI market by 2028–2030

What this means for banks and FIs:

  • Competitive differentiation: those moving beyond pilots to embed AI across functions will lead in personalisation, efficiency, and regulatory agility.
  • Strategic investments: building specialised LLMs, AI risk frameworks, and multimodal tools will be essential.
  • Governance-first approach: A robust AI risk and compliance infrastructure is crucial for scaling safely.

Notable Case Examples

1. JP Morgan – COIN & Contract Intelligence

JP Morgan’s COIN tool utilises AI (rooted initially in machine learning, now evolving toward Generative AI) to read and interpret legal contracts. By automating document reviews, it eliminated 360,000 hours of manual work annually, enhancing speed and reducing errors. This demonstrates how GenAI can transform high-volume, unstructured tasks.

2. Bank Chatbots & Virtual Assistants

Many major global banks (e.g., HSBC, Bank of America, and others) have implemented advanced AI chatbots for customer services, handling multilingual interactions, real-time FAQs, and transactional guidance. These assistants are being upgraded with GenAI capabilities to engage in richer, more human-like conversations, including follow-up, context retention, and document-driven queries.

3. Goldman Sachs – Internal “Marcus” Assistant

Goldman Sachs developed an intelligent internal assistant (“Marcus” for employees/advisors) that helps streamline product recommendations, compliance queries, and data analysis. It’s moving toward GenAI to interpret voice and unstructured data, providing actionable insights faster.


Strategies for GenAI Adoption in Financial Services

Below are six foundational strategies to guide effective GenAI adoption in banking:

1. Start with High-Value, Narrow Use Cases

  • Begin with tasks that handle structured or semi-structured data, e.g., document summarisation, compliance checks, and chat-based customer support.
  • Ensure rapid returns and measurable KPIs, such as reduced time-to-resolution or automation of compliance checklists.

2. Build Domain-Specific Models

  • Fine-tune LLMs with proprietary internal data—contracts, policy documents, customer interactions—to align outputs with your institution’s tone and standards.
  • Test deployment in governance or compliance scenarios before extending to customer-facing channels.

3. Operationalise ‘Human-in-the-Loop’ & Governance

  • Design systems that utilise GenAI to provide initial drafts or suggestions, always subject to human review.
  • Capture audit logs, track decisions, and implement oversight frameworks to ensure regulatory compliance (e.g., with EU AI Act, UK regulators).

4. Use Synthetic Data for Training

  • Create privacy-safe synthetic transaction data to train fraud detection and credit risk models.
  • Deploy stress-test simulations using GenAI-generated scenarios (e.g., macroeconomic downturns, market shocks) to enhance capital planning and resilience.

5. Integrate Across the Workforce

  • Equip employees with role-based GenAI copilots, e.g., advisors get tools that draft personalised investment reports; compliance officers get summarised regulatory updates.
  • Focus on UI/UX that embeds GenAI in tools staff already use, rather than siloed applications.

6. Scale with Ecosystem & Vendor Partnerships

  • Partner with leading GenAI providers (e.g., VMware by Broadcom, Google Cloud, AWS, Microsoft Azure, Anthropic, etc.) for secure, compliant LLM infrastructure.
  • Leverage specialist vendors offering generative models tailored for financial language (e.g., BloombergGPT-like or fine-tuned alternatives).

Sample Roadmap for Implementation

PhaseActivities
1. AssessmentAudit use-case inventory (customer service, compliance, fraud, advisory). Prioritise by ROI.
2. PilotLaunch PoCs in 1–2 domains (e.g., contract summarisation, chatbot). Define metrics.
3. ValidationTest performance, compliance support, and user feedback. Refine models & prompts.
4. GovernanceMonitor usage, retrain models, and assess the financial, legal, and reporting impact.
5. ScaleExpand GenAI to additional processes (fraud detection, credit); integrate with core systems.
6. OptimiseMonitor usage, retrain models,and assess financial/legal/reporting impact.

Critical Considerations

  • Ethical & legal compliance: Ensure privacy and data protection, especially when handling customer information.
  • Explainability: Foster interpretability of AI outputs, particularly vital for compliance and advisory functions.
  • Talent & training: Invest in data science skills, prompt engineering, and employee readiness.
  • Change management: Promote adoption through internal champions and clear communication of benefits.

Final Thoughts

While impressive case studies exist (e.g., COIN at JPMorgan, internal copilots at leading firms), the key is pragmatic, phased adoption. Start small with achievable use cases, enforce strong governance, and embed GenAI tools into everyday workflows. This enables banks to unlock real ROI—greater efficiency, compliance resilience, and customer satisfaction—while preparing for future innovations, such as multimodal AI and fully autonomous agents.

Understanding Air-Gapped IT Infrastructure: Security and Challenges

Intro

I will start with what I consider to be one of this year’s most obvious IT statements, yes, even this early on in the year, so much so that it sounds to me more like a marketing spiel (no offence to my marketing friends) than a technical blog article. However, this conversation comes up daily with colleagues and customers, so I’ll set the scene a little here.

In today’s digital landscape, cybersecurity threats are becoming increasingly sophisticated, putting sensitive data and critical infrastructure at constant risk. While firewalls, intrusion detection systems, and endpoint security solutions form a solid defence, some environments require an even more extreme measure. It is something that the most security-conscious folks have known…. forever, but one that is increasingly becoming an accepted standard way of designing enterprise IT infrastructures.

Air-Gapped Infrastructure.

But what exactly is an ‘air-gapped’ infrastructure, and how does it compare to other isolation and control methods like ‘air-locking’? 
As a side note, I probably didn’t invent the term ‘airlock ‘in the context of IT infrastructure, but I am vain enough to hope so. The nerd in me thinks of Sci-Fi films set in space, where an airlock exists to keep the bad out (vacuum of space) and the good (Air) in while providing a way to safely cross between the two environments.

More importantly, what are the challenges in building and maintaining such an infrastructure? Let’s dive in.

Well, to quote Spiderman’s nerdy, IT-admin best friend; “with great security (in terms of IT infrastructure) comes greatly constrained functionality and increased complexity” (he never said that)

What is Air-Gapped IT Infrastructure?

Air-gapping is the practice of physically isolating a computer system or network from all external, untrusted networks, including the Internet. It is one of the highest levels of security and is often deployed in military, intelligence, critical infrastructure, and high-security corporate environments.

The goal? To create a barrier that cyber threats simply cannot cross—at least not remotely. However, this presents significant challenges for IT administrators who must manage updates, data transfers, and operational continuity without direct online access.

Why Air-Gapping is So Challenging

While air-gapped systems offer unparalleled security, they are notoriously difficult to build and maintain due to:

  • Software and Patch Management: How do you keep systems updated without connecting to the internet?
  • Data Transfer and Integrity: Moving data in and out requires extreme caution—one mistake could compromise an entire network.
  • Operational Continuity: Without cloud services, online monitoring tools or connected networks, IT teams must rely on manual processes and offline backups.
  • Physical Security: Protecting air-gapped hardware from insider threats and supply chain attacks is just as critical as preventing remote exploits.

Air-Gapping vs. Air-Locking: What’s the Difference?

Not all isolation methods are created equal. Many organisations employ controlled air-gapped environments, also known as ‘air-locked’ systems, where temporary access to external networks is permitted through highly controlled gateways.

For example, software updates might be transferred through a designated firewall or proxy server, ensuring some level of connectivity under strict supervision. However, there’s a major caveat: air-locked systems are not truly air-gapped.

The Hidden Risk of Air-Locked Systems

While air-locking provides a practical compromise, it introduces a significant security risk: human error or insider threats could leave the ‘air-lock’ open. A misconfiguration, malicious insider, or even a moment of negligence could create a vulnerability that compromises the entire system.

This is why air-gapped environments remain the gold standard for maximum security—but at the cost of operational complexity.

Best Practices for Running Air-Gapped Environments

Successfully operating air-gapped infrastructure requires a combination of strict security policies and well-defined operational procedures. Here are some key best practices:

1. Secure Data Transfers

  • Use vetted USB drives, optical media, or one-way data diodes.
  • Ensure all transfers undergo forensic scanning and approval processes.
  • Keep an immutable log of all data movements.

2. Software and Patch Management

  • Maintain a trusted offline repository for updates.
  • Deploy patches only after extensive testing in an isolated environment.
  • Use cryptographic verification to prevent tampering.

3. Access Control and Monitoring

  • Implement strict physical access controls, such as biometric authentication.
  • Use multi-factor authentication for any system interactions.
  • Deploy host-based intrusion detection systems (HIDS) to monitor for anomalies.

4. Incident Response and Disaster Recovery

  • Maintain fully offline backups that are physically stored in a secure location.
  • Regularly test disaster recovery procedures to ensure they work without cloud dependencies.
  • Use isolated forensic workstations to investigate any suspected breaches.

Is Air-Gapping Right for Your Organisation?

If your organisation handles highly classified information, critical infrastructure, or intellectual property, air-gapped environments provide an unmatched level of security. However, if usability and efficiency are major concerns, an air-locked or hybrid approach may be a more practical choice.

Ultimately, the decision comes down to risk tolerance vs. operational feasibility—a balance that every security-conscious organisation must carefully consider.

Final Thoughts

Air-gapping remains one of the most effective cybersecurity measures available today, but it’s not without its trade-offs. While fully air-gapped environments offer unparalleled security, the operational challenges can be significant. Meanwhile, air-locked systems provide a compromise but introduce potential vulnerabilities if not carefully managed.

Whether you’re building an air-gapped infrastructure from scratch or refining your organisation’s security posture, one thing is clear: true cybersecurity requires a multi-layered approach that prioritises both protection and practicality.

The above steps are by no means all there is to designing and operating secure environments, obviously, but I felt the need to put down my thoughts based on conversations I often have about the definition of the term ‘air-gapped’ and just like other topics, such as ‘multi-tenancy’, and what they actually mean in the real world.

What are your thoughts on air-gapped vs. air-locked security? Let’s discuss in the comments! 👇

Introducing Summarize-and-Chat service for…

Introducing Summarize-and-Chat service for…

GenAI text summarization is becoming mainstream given its ability to quickly generate accurate and coherent summaries. While publicly available tools for summarization exist, companies may opt for internal solutions for data privacy, security, and governance reasons. So, there is a need for an on-pr


Broadcom Social Media Advocacy

From Cloud-First to Cloud-Smart to Repatriation…

From Cloud-First to Cloud-Smart to Repatriation…

Recent reports suggest that cloud repatriation is becoming more common, especially among large enterprises. But it does not mean that business are decreasing their public cloud spend.


Broadcom Social Media Advocacy

Introducing VMware Cloud Foundation 9

Introducing VMware Cloud Foundation 9

At VMware Explore 2024 in Las Vegas we are introducing VMware Cloud Foundation 9 – a significant leap forward that will streamline the transition from siloed IT environments to a unified, integrated private cloud platform. VMware Cloud Foundation 9 will make the deployment, consumption, and […]


Broadcom Social Media Advocacy

Recap of #VMwareExplore Major Announcements

Recap of #VMwareExplore Major Announcements

Chris Wolf, Global Head of Private AI, VCF Division at Broadcom, gives a high-level recap of the major announcements shared during the VMware Explore General Session. See more announcement details in our media kit: https://brcm.tech/3YVsdgt


Broadcom Social Media Advocacy

AI without GPUs: A Reference Architecture for…

AI without GPUs: A Reference Architecture for VMware Private AI™ with Intel

AI without GPUs: A Reference Architecture for…

Introduction Executive Summary In today’s rapidly evolving digital landscape, the demand for AI Everywhere is on the rise, and organizations are looking for optimal solutions to support their AI workloads. VMware Private AI™ with Intel supports Xeon 4th Gen CPUs with Advanced Matrix Extensions (AMX) and VMware® Cloud Foundation™ offers a comprehensive and scalable collaboration for unlocking


Broadcom Social Media Advocacy