
A better payment experience grows a partner network by reducing onboarding friction, clarifying compliance, improving payout visibility, and resolving exceptions faster. When partners can complete setup, understand status, and trust payout outcomes, retention risk falls and support pressure drops. The article recommends measuring changes against unit economics, NPS, and operational risk before rollout.
Payment experience is a growth lever, not just an operations layer. It shapes partner trust, retention, expansion, and margin. This guide is for founders, revenue leaders, product teams, and finance operators who need execution choices tied to measurable results, not generic payout advice.
Start by getting the scope right. A partner network is a network of businesses that go to market with you for shared audiences, and payment experience is broader than transaction processing. In practice, it covers the full money journey partners go through, from onboarding and verification to payout visibility, exception handling, and issue resolution. If you operate a marketplace model, Marketplace Economy 101 for Platform Business Models is a useful companion framing.
Treat payment changes as business decisions by default. Stripe links optimized payment experience to satisfaction, growth prospects, and bottom-line impact. Tipalti describes partner experience as closely tied to payment experience beyond paying on time. EY highlights retention and new revenue effects from embedded payments. So before you approve a change, require one clear expected effect in plain language, such as fewer onboarding stalls, better payout visibility, or lower support pressure.
Then define success before you build. This playbook uses three lenses: Unit Economics, NPS, and operational risk. Keep the definitions explicit. Unit economics may be framed as LTV/CAC or as direct revenue and cost per unit, and NPS is a directional signal, not standalone proof of growth. Bain reports NPS explained roughly 20% to 60% of variation in organic growth among competitors in most industries, with NPS leaders growing by a factor greater than two times, but that relationship is not uniform across sectors.
Keep risk in the same decision sequence as growth. In payment systems, operational risk is loss risk from failed processes, people, systems, or external events. A faster experience change can still be the wrong choice if it raises failures or rework. Use this order: define partner friction, state the expected retention or expansion effect, tie it to your unit-economics definition, check NPS implications, and test the operational-risk tradeoff before rollout.
Define payment experience before you rank friction or buy tooling, or you will optimize the wrong layer. If your team treats it as only "money sent," you will miss the journey points that shape partner outcomes day to day.
Set the boundary beyond transaction execution. Payment execution is only part of the job. Include Partner Onboarding, Compliance Reviews, payout visibility, and issue resolution in your operating definition, because partner payment experience goes beyond paying on time. If your journey map ends at "payout initiated," extend it to onboarding completion requirements, review holds, status updates, and dispute or action paths before network deadlines.
Name the network model you are serving. A Creator Economy flow is different from AdTech, an online marketplace, or a Sharing Economy platform. Creators need clear monetization paths, ad tech sits in the publisher-advertiser chain, marketplaces manage third-party seller flows and risk, and sharing-economy usage is common even though the term does not have one settled definition. If you span models, document which model drives onboarding, compliance, and payout rules first, because requirements vary by business model, transaction type, and country.
Use one definition across Product, Finance Ops, and Engineering. These teams will optimize different targets unless the definition is explicit. Decide whether onboarding data is collected up front or incrementally, define compliance-review trigger points, and publish the partner-visible payout status states. Then have each team map the same start and end points. If one starts at signup and another at first payout, your definition is still fragmented, and that fragmentation leads to delays, manual handoffs, and reporting gaps.
Before you redesign anything, lock a current-state baseline that Revenue, Finance, and Product all trust. Otherwise, you will optimize against anecdotes and internal noise.
Create one baseline artifact with four measures in one place: NPS, onboarding drop-off, payout failure rate, and reconciliation lag. Keep it strict: metric name, exact definition, source system, refresh date, and owner. For the onboarding side of that baseline, Contractor Onboarding Best Practices to Reduce Drop-Off gives a practical measurement lens.
For Net Promoter Score, use the standard 0 to 10 response scale, with 9 or 10 as promoters and 0 to 6 as detractors. For onboarding drop-off, define each funnel step explicitly so you can see where conversion actually declines. The goal is a baseline you can track regularly, not a one-time snapshot.
Collect root-cause evidence before decisions start. At minimum, pull:
Then run a practical check. Take one recent failed payout and trace it from the API call, through webhook delivery attempts, into reconciliation. If that trace is slow or incomplete, your baseline is not ready. If that evidence chain is still fuzzy, Account Reconciliation for Payment Platforms shows the handoff finance will need.
Do not treat raw failed webhook counts as final failure. Stripe retries undelivered events for up to 3 days, and Stripe's Events API history goes back up to 30 days.
Assign decision owners before tradeoffs show up. If Revenue owns growth targets, Finance owns controls, and Product owns roadmap sequencing, document that split instead of leaving it implied.
This matters when metrics conflict. If onboarding drop-off is high while reconciliation lag is rising, decide in advance who chooses what moves first and who signs off on the risk.
Map the real path from signup to first successful payout, then require evidence at every handoff. If a stage has no timestamped event trail and no reconciliation record, it is not diagnosable yet.
Start with one real partner and rebuild the journey from production records, not internal process docs. In a Connect-style flow, that usually means: create the connected account, complete onboarding requirements, capture or receive funds, route funds to the connected account, let funds accumulate in that balance, then initiate payout.
Use a simple map, but make ownership, timestamps, partner-visible status, and proof explicit.
| Stage | What actually happens | Partner-visible state | Verification checkpoint |
|---|---|---|---|
| Partner Onboarding | Account is created and onboarding requirements are completed | "Setup in progress" or equivalent | Account creation record and onboarding completion state |
| Funding | Customer payment or platform funding event is created | "Payment received" only when internally confirmed | Provider payment-status event and internal transaction ID |
| Payment Routing | Platform charges, then transfers funds to the connected account if you use separate charges and transfers | Often invisible unless exposed | Transfer record linked to the original payment |
| Settlement and payout | Funds accumulate in the connected account balance and payout is initiated, then paid or failed | "Payout pending," "Paid," or "Action needed" | Payout lifecycle webhook events and the reconciliation report |
The output should be one row per stage with owner, source of truth, and incident-ready evidence.
Trust usually breaks at handoffs, not at a single API call. Mark four patterns first: unclear status, duplicate requests, manual data re-entry, and delayed exception handling.
Unclear status is a common break. Onboarding is done, but the partner only sees "pending" with no reason or next step. Duplicate requests usually follow that silence, and retries get hard to untangle when attempts span multiple tools, especially if idempotency-key handling is not aligned with the provider's minimum 24-hour window. Manual re-entry is another risk signal. If Support, Finance, and Product are all working from different records, the partner experience looks inconsistent even when the payout eventually lands. Delayed exception handling compounds all of this. Marketplace operators have described sellers waiting weeks when manual check workflows and address verification intervene.
Once you know where trust breaks, make each stage diagnosable. Add two checkpoints per stage: one operational event checkpoint and one financial reconciliation checkpoint. The event checkpoint confirms status changes in near real time. Reconciliation confirms the money movement matches your records.
For payouts, webhook checkpoints are especially useful. Stripe emits payout lifecycle events, and when a payout fails, payout.failed includes a failure code. For instant payouts, payout.paid typically arrives within 30 minutes. Use that to verify what was sent and why something failed, then verify reconciliation across the originating transaction, transfer, fees, and payout outcome.
Set one strict rule: any status shown to partners must have both an internal event trail and a reconciliation trail behind it. If either trail is missing, fix that checkpoint before you redesign the interface.
Once you can trace each handoff, prioritize friction by economic impact, operating cost, and risk exposure. Ticket volume can help, but it should stay a secondary signal.
Start with one row per friction point in the partner money journey, and score each one the same way every time: revenue impact, cost-to-serve, risk exposure, and implementation effort. That keeps prioritization tied to benefits, total cost of ownership, and risk instead of headline upside alone.
| Friction point | Revenue impact | Cost-to-serve | Risk exposure | Implementation effort | What to verify first |
|---|---|---|---|---|---|
| Repeated onboarding data requests before first payout | High | Medium | Medium | Medium | Funnel drop-off by step, duplicate submissions, and time to completion |
| Missing payout failure reason or next step in the partner UI | Medium | High | Medium | Low | Tickets per failed payout, retry volume, and failure-reason coverage |
| Bank-account or payout-rail mismatch for a corridor | High in affected markets | High | High | High | Failure rate by country or currency, rail eligibility, and manual interventions |
| Manual review queue blocking payout release | Medium | High | High | Medium | Queue age, hold duration, release rate, and escalation outcomes |
Use evidence, not memory: onboarding logs, payout event history, reconciliation records, and support reasons.
Use this as a working rule, not a universal law: if one friction point hurts activation and payout success in the same journey segment, move it ahead of cosmetic UX fixes unless effort or risk is clearly disproportionate.
Validate that by cohort. Link partner IDs across onboarding completion, first funding, first payout attempt, and payout outcome. If the same cohort has higher drop-off and higher payout failure in one segment, treat it as one compounding defect, not two separate team problems.
Not every fix belongs in the same queue, so split the backlog into quick wins and structural fixes. Use Unit Economics as the commercial screen, with LTV/CAC in the HBS framing and 3:1 as a common target, not a rule. Use NPS as a directional signal, not causal proof.
Quick wins are usually status and exception-handling improvements that reduce support load quickly. Structural fixes, like rail selection or cross-border payout logic changes, take longer but can reshape partner trust and repeat usage. Read NPS movement alongside payout success, time to first payout, and support demand before you expand a fix.
Do not model impact as universal. Coverage varies by market and program, especially for Account-to-Account Payments and cross-border payouts.
In the U.S., instant rails can move funds within seconds, but availability and participation differ by institution and setup. RTP reach is substantial but not universal at 71% of U.S. DDAs, and technical reach is not the same as active production coverage for your partner base. In Europe, SEPA Instant Credit Transfer can deliver euro funds in under ten seconds where participating institutions and program design support it. For cross-border payouts, conditions are still uneven and costly, with a reported global average remittance cost of 6.49%.
When controls are still maturing, phase rollout by capability or corridor. As one finance-operations team described it: "we broke it into receive only capability and then send capability."
Make the ownership call with a practical default: if compliance updates and payout exceptions are already slowing execution, buy the core rails and keep only strategic differentiators in-house. Use the infrastructure view in Global Payment Processing Platforms: Complete Infrastructure Guide to pressure-test the build-vs-buy assumptions.
Run a Build-vs-Buy Analysis on four axes: control, time-to-market, compliance burden, and ongoing maintenance risk. Teams often overweight feature control and undercount post-launch operational load.
In practice, the hard part is the ongoing work: compliance reviews, partner-data maintenance, exception handling, and coverage changes across rails and geographies. If exception queues are already backlogged, assume a fully in-house core will add pressure before it reduces it. That is usually a sign you should compare against Guide to Bulk Payment Processing Platforms rather than a feature wishlist.
Use one gating check before approving build: assign a clear owner for ongoing rule and operations changes, not just initial delivery. If ownership is unclear, treat that as a staffing gap, not a technical plan.
PCI is a useful pressure test. PCI DSS v4.x introduced 64 new requirements, with 51 future-dated requirements effective 31 March 2025. The planning signal is simple: compliance moves continuously, so your estimate should too.
Compare vendor and in-house options on the operating surfaces your teams use every day.
| Criterion | Buy signal | Build signal | What to verify before deciding |
|---|---|---|---|
| API quality | Clear docs, consistent object model, retry guidance, and idempotency support | You need custom request semantics or a custom domain model | Confirm duplicate-prevention behavior. Stripe documents idempotency keys up to 255 characters and notes keys may be pruned after at least 24 hours. |
| Webhook reliability | Event delivery is observable and replayable | You need custom event design across internal services | Confirm outage behavior. Stripe documents automatic retries for up to 3 days and event retrieval for the last 30 days in the cited guide. |
| Payment routing flexibility | Multi-provider or multi-rail routing is configurable | Routing logic is a core differentiator by corridor, cost, or success rate | Confirm routing by market, use case, and failure condition. |
| Reconciliation depth | References, statuses, and exports support finance review | You need ledger-level control or custom matching logic | Review sample outputs for a failed payout, retry, and reversal before deciding. |
Before you decide, check the choice against the actual network bottleneck.
Tipalti-style patterns fit when the constraint is operational sprawl: ongoing compliance and data upkeep plus payout exceptions. Plaid's OBaaS framing fits when the alternative is building regulated or data-connectivity infrastructure internally. BaaS patterns fit when you want to offer financial services via bank infrastructure exposed by APIs, while recognizing accountability does not disappear in regulated contexts. If ownership boundaries are still unclear, compare that with Stripe Connect vs Merchant of Record for Marketplace Builders.
For governance discipline, apply a third-party risk lifecycle across planning, due diligence, contract negotiation, ongoing monitoring, and termination. The interagency guidance was final June 6, 2023.
Set exit and migration constraints before signature, not during incident response.
Cover three areas: data portability, operational continuity, and rollback. Confirm the exact exports and event history needed for reconciliation and exception workflows, and define how dual-run and revert would work during migration.
If you cannot name migration constraints up front, treat lock-in as an explicit tradeoff rather than an accidental one.
The right balance is simple to state and hard to execute: keep signup light, but make payout eligibility explicit. Use staged Partner Onboarding with risk-based depth. Collect what is needed for the next milestone, then require the rest before payout or higher-risk activity.
Do not front-load every KYC requirement at signup when full payout capability is not yet needed. Collect information either up front or incrementally, and tie each request to a milestone such as account creation, profile completion, payout setup, and first payout release. The tax-document side of that milestone planning pairs well with How to Automate W-9 Collection for a 1099 Contractor Pool.
Track requirements.currently_due and requirements.current_deadline on the relevant capability or account. They show what is outstanding and when required information must be submitted and verified. Surface both internally and to partners to reduce avoidable support escalations and surprise disables.
Run Compliance Reviews with a risk-based approach: stronger controls for higher-risk cases, simplified measures for lower-risk cases. That lets lower-risk partners move faster while higher-risk profiles trigger deeper checks before payout.
When risk signals rise in a specific route, program, or segment, tighten checks there first instead of slowing all partner cohorts. For escalations, keep an evidence trail: failed field, requested document, submission timestamp, and next decision point. If deeper verification is needed, additional documentation can include a valid government-issued ID scan.
Make status explicit so delays feel managed, not arbitrary. Expose partner-facing states tied to real verification and payout progress, and include payout lifecycle states such as processing, posted, failed, returned, and canceled. On the partner-facing side, What Is Supplier Portal Contractor Self-Service Payment Status? is a good design reference.
Define SLA windows as your platform targets for each internal review stage, and pair each state with the next action and a due-by date where one exists. If current_deadline is approaching, say so directly. If a payout is returned, communicate that returns are typically seen within 2-3 business days, while some recipient countries may take longer.
This model only works if you monitor it continuously. Use webhooks for verification and payout status changes, especially account.updated, and route updates to both operator queues and partner notifications.
Verify that new requirements move from currently_due to resolved and that partner-facing status updates with them. If required information becomes past due without action, capability can be disabled, which turns early conversion gains into downstream trust loss.
Execution reliability starts with one rule: treat the API call as the start of a payout attempt, not final settlement. From day one, retries, Webhook handling, and Payment Routing all need to be traceable.
If retry behavior is loose, you will create duplicate side effects before you create reliability. Safe retries require reusing the same idempotency key for the same operation after a timeout or transport failure. Changing the key on retry can create a second side effect instead of a replay.
Provider constraints differ, so define one internal standard around them. Stripe returns the same result for repeated requests with the same key, including 500 responses. Stripe keys can be up to 255 characters and may be pruned after 24 hours. Adyen supports safe retry after no response when the same idempotency header is reused, with a maximum key length of 64 characters. If you want one format across Stripe and Adyen, keep it at 64 characters or less.
Release check: force a timeout in test, resend the exact same request with the exact same key, and verify one logical payout attempt.
For payout state, webhook events should drive status because asynchronous flows do not always produce a final result in the initial API response.
Adyen's operating pattern is explicit: return 2xx, store the webhook, then process it. That order gives you a durable event record before downstream updates, exception queues, and partner notifications. Stripe retries undelivered webhook events for up to three days. Adyen retries failed deliveries three times immediately, then continues from a retry queue for up to 30 days.
Verification check: after a simulated endpoint outage, confirm you can recover events, update the original payout record, and show which messages arrived, failed, and were reprocessed.
Fallback routing only helps if the whole decision path stays auditable. Keep one parent payout record and attach each routing decision, processor response, and failure reason so Finance can reconcile and Support can explain outcomes.
Stripe routing rules support main and retry processor selection by condition, and rule evaluation is deterministic because the first matching condition and action is applied. Test rule order in sandbox before live activation so retries do not quietly follow an unintended path.
Do not release this layer on single-path success. Release only when failure and recovery paths are clear end to end.
Before rollout, confirm:
If any check fails, fix it before launch. The core risk is not only duplicate payouts or delayed updates, but erosion of partner trust in platform status.
Treat Reconciliation as a product control, not a month-end cleanup task. Once retries and webhooks are stable, the next risk is invisible money movement, so both operators and partners need a traceable status chain from the start. That principle lines up with the operating view in Payment Reconciliation Dashboard for Subscription Platforms.
Run reconciliation daily, not at month end. Adyen's platform reporting explicitly supports daily payout reconciliation and daily report generation, so teams can work from current data.
Your exception view should quickly show what paid out, what is unmatched, and who owns the next action. A practical structure is separate queues for unmatched payouts, amount mismatches, and missing status updates. Without a named daily owner, exceptions become backlog instead of control.
Verification point: each day, sample one completed payout and confirm you can trace it to the transactions it settles.
For disputes and partner questions, keep one connected record across internal payout ID, provider reference, ledger postings, webhook event IDs, bank-deposit match, and partner-visible status history.
Stripe's reconciliation tooling shows payouts and reconciliation status with bank deposits in one place, and payout reconciliation supports transaction-level drill-down. Use equivalent provider views as checkpoints, but persist the references in your own model so your audit path does not depend on one external interface.
A common failure mode is split truth: payout status in the product database, transaction detail in provider reports, and bank matches in separate finance files. That creates parallel records, and Support usually sees the weakest one.
Partner-facing status should reflect the same underlying event chain operators use. Partners do not need every internal event, but they do need clear, accurate checkpoints tied to real state changes.
This directly affects partner confidence. Tipalti cites that 74% of partners across creator, AdTech, marketplace, and sharing-economy segments would leave a platform because of an inadequate payment experience, and transparency is part of that experience.
Verification point: when internal state changes from a webhook event, confirm the partner view updates the original payout record instead of creating a conflicting second history.
In Banking-as-a-Service (BaaS) and Account-to-Account Payments flows, asynchronous state changes are normal, so you need explicit event controls. A2A payments move funds directly between bank accounts, and state can change after the initial API response. If your event model is still coarse, review Real-Time Ledger vs Batch Settlement Architecture for Platform Volume before widening the lane.
Subscribe to relevant events, store them durably, and process them idempotently. Event-driven payment guidance treats persistent storage and idempotent processing as core integrity controls, and webhook APIs are a common way platform ecosystems expose those events.
Your incident evidence pack should include the original payout request, idempotency key, provider reference, webhook delivery record, ledger postings, reconciliation report row, and partner-facing status timeline. If any link is missing, the audit trail is incomplete.
Partner trust usually breaks from repeated operational surprises, not a single failed payout. The pattern to avoid is straightforward: payout promises that outpace compliance readiness, API releases without reliable webhook handling, and incident recovery that resumes expansion before reconciliation is closed.
Do not promise payout speed your verification path cannot support. If you manage connected accounts, monitor requirement status updates continuously and handle changes quickly, rather than treating verification as a one-time onboarding task.
Use a daily check of accounts with requirements.currently_due. When that field is not empty, outstanding requirements can restrict capabilities, and payouts or charges may not be enabled if required verification or capabilities are missing. The red flag is a product state that says "ready for payout" while compliance requirements are still unresolved.
An API integration is not production-ready until its Webhook Endpoint is monitored. Event delivery runs over HTTP requests, and temporary processing failures can trigger repeated retries, including automatic redelivery for up to three days.
After each release, trigger a real or test event and confirm it is received, stored durably, and applied to the original payout record. A common break pattern is an initial API call succeeding while the follow-up event remains undelivered or stuck in retries, leaving partners with no visible status movement.
When incidents happen, contain first. Pause noncritical changes, identify whether the break is in verification, event delivery, or settlement matching, and publish status updates on a defined cadence. A practical benchmark is every 30 minutes, or another cadence appropriate to severity, which also helps reduce repeat support load. For routing-response design, Gateway Routing for Platforms is the right adjacent playbook.
Before you resume expansion work, close reconciliation. Pull the payout reconciliation report, match bank payouts to underlying transaction batches, and use webhook-driven payout events such as payout.paid or payout.reconciliation_completed to confirm state. Then sample the affected day's activity window, from 12:00 am to 11:59 pm, and confirm each impacted payout is traceable from request to bank match.
Use the quarter to ship controlled, measurable improvements, not a broad rewrite. Start only after you can show where partners stall, how state changes are recorded, and who owns each decision.
Create one current-state artifact that combines baseline metrics, the full partner journey, and the ownership model. Name each stage from signup to first successful payout, mark manual-review points, and assign one decision owner each from Product, Finance, and Revenue.
Your readiness check is simple: from this document alone, a teammate should be able to answer where partners drop out, which event confirms each state transition, and who can approve control changes.
Approve an economic prioritization table with only three friction fixes for this cycle. Score issues on commercial impact, cost to serve, risk exposure, and implementation effort, and prioritize fixes that improve both activation and first successful payout in the same journey segment.
Set a strict approval bar. Each selected fix needs a defined cohort, expected operational change, and clear success and failure evidence for post-launch review.
Ship onboarding and execution-layer changes only with two release gates: explicit idempotency-key behavior for retry safety in API calls, and verified Webhook handling for asynchronous payment events.
Before release, replay at least one request to confirm no duplicate state change occurs, and confirm your HTTPS webhook endpoint accepts JSON event payloads and updates the correct internal state.
Launch reconciliation and incident dashboards before volume scales. Reconciliation should match each payout to the settlement batch of transactions, not just show top-line payout totals.
Run this daily, with dashboards that show payout reference, settlement batch, exception age, current owner, and escalation path.
Do not decide the next investment tranche until you have a post-launch read on Unit Economics, partner retention signals, and NPS trend by segment. Track NPS regularly using the zero-to-ten recommend scale, including promoter, 9 or 10, and detractor, 0 to 6, movement across cohorts or geographies.
For Unit Economics, use LTV relative to CAC and treat 3:1 as a common heuristic, not a fixed rule. Before broader rollout or external claims, confirm market or program support by country or region and keep compliance and coverage language conservative until support is verified.
Beyond speed, the biggest levers are onboarding friction, compliance clarity, and clear payment status. Partners are more likely to churn on uncertainty and repeated process friction than on a known wait time. Prioritize the step where they stall between submitting details and becoming payout-ready.
Better payment experience improves more than operations. It can improve satisfaction, reduce retention risk, and support growth outcomes. The article also notes vendor-reported survey data that 74% of partners in surveyed segments would leave over an inadequate payment experience, and treats that as directional rather than universal.
Prioritize the highest-friction step tied to conversion or first successful payment outcomes. Score issues by revenue impact, cost-to-serve, risk exposure, and implementation effort. If one fix improves both activation and payout completion in the same step, move it ahead of cosmetic UX work.
Automate when manual reviews, batch files, or spreadsheet checks start delaying onboarding or payment-state updates. The need becomes more urgent as you move toward instant payments, where batch processing is less practical. If daily operations depend on constant human queue monitoring to keep status current, automation is overdue.
Faster payouts increase pressure on fraud, liquidity, compliance, and third-party risk controls because instant payments settle quickly and are irrevocable. A faster change can still be the wrong choice if it increases failures or rework. Expand access in controlled cohorts instead of relaxing checks across the board.
Start with funnel evidence such as onboarding drop-off, payout failure rate, reconciliation lag, and how quickly partners reach a successful payout. Pair that with NPS as a directional monetization-adjacent signal, not standalone proof. Use one shared weekly view so teams can connect friction points to commercial impact.
Treat it as a control-versus-investment decision across control, time-to-market, compliance burden, and ongoing maintenance risk. Building can increase control over the experience, but it adds ongoing work in compliance reviews, partner-data maintenance, exception handling, and coverage changes. Buying is often the practical choice when compliance workload and operational reliability are already bottlenecks. If legal-entity onboarding or card data handling is in scope, the design must also support CDD obligations and relevant PCI DSS SAQ validation.
Avery writes for operators who care about clean books: reconciliation habits, payout workflows, and the systems that prevent month-end chaos when money crosses borders.
Educational content only. Not legal, tax, or financial advice.

The hard part is not calculating a commission. It is proving you can pay the right person, in the right state, over the right rail, and explain every exception at month-end. If you cannot do that cleanly, your launch is not ready, even if the demo makes it look simple.

Step 1: **Treat cross-border e-invoicing as a data operations problem, not a PDF problem.**

Cross-border platform payments still need control-focused training because the operating environment is messy. The Financial Stability Board continues to point to the same core cross-border problems: cost, speed, access, and transparency. Enhancing cross-border payments became a G20 priority in 2020. G20 leaders endorsed targets in 2021 across wholesale, retail, and remittances, but BIS has said the end-2027 timeline is unlikely to be met. Build your team's training for that reality, not for a near-term steady state.