Opinion: Why Your “Move Fast and Break Things” Culture Will Fail in Europe

TL;DR — What works in Silicon Valley will get you blocked — or fined — in the EU

Shipping fast is great for prototypes, but Europe’s regulated markets demand a different operating system. Privacy by design, reliability, and auditability are not “enterprise features” — they are the table stakes for accessing finance, healthcare, public sector, and critical infrastructure. A product strategy that ignores GDPR, the EU AI Act, DORA, NIS2, eIDAS, and e‑invoicing rails like Peppol, SdI and NAV Online Számla will fail in procurement, stall during security reviews, or trigger regulatory risk that kills your deal later. The winning playbook is compliance-led, integration-first, and documentation-heavy — without sacrificing product velocity.

The structural reasons “move fast” breaks in the EU

  • Regulators are first-class stakeholders — Data Protection Authorities, sectoral supervisors, and procurement bodies actively shape what is shippable. “Ask forgiveness later” is not an option when obligations are ex ante (e.g., DPIAs, conformity assessments).
  • Procurement cycles are long — with hard gates — Security questionnaires, penetration tests, escrow, SLAs, and data-transfer checks are standard. Lack of artifacts blocks you before pilot.
  • Public infrastructure is mandatory — Peppol for cross-border e‑invoicing, country clearance platforms (Italy’s SdI via AdE, Hungary’s NAV Online Számla), qualified trust services under eIDAS, and cross-border eDelivery — all require stable integrations and change discipline.
  • Accountability beats iteration — Audit trails, explainability, and human oversight are legal requirements in multiple frameworks. Rapid, undocumented change erodes defensibility.

The regulatory reality — what your product must prove to pass

  • GDPR — Privacy by design, data minimization, purpose limitation, lawful basis, DPIAs for high-risk processing, strong vendor DPAs, records of processing, and robust data-subject rights operations. Cross-border transfers must be lawful and documented.
  • EU AI Act — Risk-based obligations. High-risk systems require risk management, high-quality datasets, technical documentation, logging, transparency, human oversight, post-market monitoring, and often third‑party conformity assessment with CE marking.
  • DORA (finance) — Operational resilience for ICT: governance, incident classification and reporting, testing, business continuity, and third‑party risk with contractual clauses for sub‑processors and data location.
  • NIS2 (essential/important entities) — Cyber risk management, vulnerability handling, logging, multifactor auth, incident reporting timelines, and supply‑chain security; applies to your customers and rolls down to you.
  • eIDAS — Trust services and identity: acceptance of qualified electronic signatures/seals, timestamping, and the coming EU Digital Identity Wallet — your product must interoperate, not reinvent.
  • E‑invoicing rails — Peppol BIS for cross-border; national clearance or real‑time reporting (Italy — SdI/AdE, Hungary — NAV Online Számla, Poland — KSeF) with strict schemas, uptime expectations, and change notices.

Culture clash — product habits that routinely fail in Europe

  • “We’ll fix it in prod” deployments — change windows exist, CAB approvals matter, and customers demand rollback plans and versioned API contracts.
  • Underdocumented features — no threat models, no DPIA templates, missing data‑flow diagrams, and no test evidence break security assessments.
  • Cloud-first without residency clarity — inability to prove data location, key control, or transfer mechanisms sinks deals late.
  • AI features without governance — no model cards, bias testing, or human-in-the-loop design blocks high‑risk use cases under the AI Act.
  • “We don’t support that rail” — inability to connect to Peppol, SdI, or NAV means you are not shippable in core workflows.

US “move fast” vs EU “ship responsibly” — what actually changes

Dimension Typical “Move Fast” Approach EU‑Ready Approach
Release cadence Continuous, low ceremony Release trains with CAB approvals and rollback plans
Documentation Minimal, in code DPIA, ROPA, threat models, test evidence, audit logs
Data strategy Collect broadly, analyze later Data minimization, clear purposes, retention, lawful basis
AI features Prototype, iterate with users Risk classification, model cards, human oversight, logging
Infra & tooling Best-effort reliability SLOs, SIEM, tamper‑evident logs, segregation of duties
Integrations Defer until scale Peppol/SdI/NAV, eIDAS trust, eDelivery — built early
Third‑party risk Light vendor checks ISO 27001/SOC attestation, DPAs, sub‑processor governance
Incident handling Ad hoc Playbooks, timelines, regulator/customer notifications

 

Engineering and product practices that win in the EU

  • Design for auditability — Structured logs, immutable event trails, signed releases, and reproducible builds.
  • Model governance by default — Model/data lineage, bias/robustness tests, human‑in‑the‑loop controls, override/appeal UX, and post‑market monitoring.
  • Security and privacy in PRs — Threat modeling as a checklist, privacy impact questions in each change, static analysis gates, SBOMs.
  • Data residency and key control — Regional data stores, customer‑managed keys or split‑key designs, transparent transfer registers.
  • API stability — Versioned contracts, deprecation policies with ≥ 12 months’ notice, and compatibility tests.
  • Operational discipline — CAB approvals, change windows, DR drills, and defined RTO/RPO tied to SLAs.

GovTech and LegalTech integration — what “compliant by design” looks like

  • Peppol — Use a certified Access Point rather than building your own on day one. Validate against Peppol BIS specs, implement end‑to‑end idempotency, and monitor network updates.
  • Italy — SdI (AdE) — Handle XML schemas, transport receipts, and fiscal timelines. Implement resilient retry with backoff and store protocol numbers for audits.
  • Hungary — NAV Online Számla — Real‑time invoice reporting with strict signing/security. Maintain deterministic transformations and detailed rejection handling.
  • eIDAS trust services — Support qualified signatures/seals and timestamps; plan for future EU digital identity wallets, including verification flows and offline fallbacks.

Product‑Led GTM for regulated markets — the adapted playbook

  • Proof via artifacts, not just demos — Security pack, DPIA template, data‑flow diagrams, model cards, and resilience test results.
  • Sandboxable integrations — Public sandbox credentials for Peppol/SdI/NAV flows and prebuilt test scenarios.
  • Compliance‑aware pricing — Tiers that include trust services, access point fees, and audit support; avoid opaque “enterprise add‑ons”.
  • Shorten the security review — One‑pager on data location, encryption, and transfer mechanisms; link to up‑to‑date sub‑processor registry.
  • Buyer enablement — Templates for DPIA, vendor risk, and procurement checklists your champion can reuse internally.

Two short case mini‑studies — what success and failure look like

  • Failure — A fintech shipped AI risk scoring to EU banks without model governance or explainability. Security review demanded bias tests, monitoring, and customer recourse. With no artifacts or human oversight, the pilot died — not for accuracy, but for non‑compliance.
  • Success — An invoicing platform led with Peppol + SdI + NAV integrations, offered a DPIA kit, ISO 27001 certificate, and transparent data‑transfer memo. Procurement closed in one cycle — compliance artifacts reduced risk perception to near zero.

90‑day transformation plan — from breakage to bankable

  1. Days 1–14 — Baseline and gap map
  • Data inventory, data‑flow diagrams, lawful bases, transfer register.
  • Security posture: logging, access, backup, DR, SBOM.
  • AI feature register with risk tiering, model documentation.
  • Days 15–45 — Controls and documentation
  • Ship DPIA templates, threat models, change policy, incident runbooks.
  • Implement audit logging, model monitoring, and CAB workflow.
  • Lock data residency, encryption keys, and sub‑processor disclosures.
  • Days 46–75 — Integration and validation
  • Stand up Peppol via an Access Point; wire SdI/NAV test flows.
  • Run pen test, resilience test, and evidence capture.
  • Publish API versioning and deprecation policy.
  • Days 76–90 — Buyer enablement and launch
  • Security pack, compliance one‑pager, model cards.
  • Pricing for trust/integration costs; publish reliability SLOs.
  • Train sales on “compliance-led value” — faster procurement, lower risk.

The EU‑ready checklist — minimum viable compliance to sell

  • DPIA kit, ROPA, data‑flow diagrams, retention schedule, transfer memo.
  • Versioned APIs, CAB process, rollback plan, change windows.
  • Audit‑grade logs, SIEM integration, tamper‑evident trails.
  • Model cards, bias tests, human oversight, incident/feedback loops.
  • Peppol/SdI/NAV connectivity in sandbox and production paths.
  • ISO 27001 or SOC 2, vendor DPA, sub‑processor registry, security pack.
  • Clear SLAs/SLOs, DR drills with documented RTO/RPO.

Common pitfalls to avoid — small gaps that cause big delays

  • “We’ll add documentation later” — procurement stops until it exists.
  • Mixing telemetry with personal data without minimization — DPIA flags.
  • Hard‑coding tenants and keys — fails segregation and key control audits.
  • Non‑deterministic e‑invoicing transforms — audit drift and rejections.
  • Silent API breaking changes — customers require 12‑month deprecation.

Conclusion — speed still matters, but trust is the feature that sells

The European path rewards teams that treat compliance as a product capability, not a checkbox. Build for auditability, integrate with public rails, and lead with artifacts that reduce buyer risk. You will still ship quickly — but what you ship will pass security review, survive regulator scrutiny, and win the deal.

Key takeaways

  • Compliance and integration are growth levers in the EU — not cost centers.
  • Replace “move fast and break things” with “ship responsibly and scale”.
  • Win procurement with artifacts, stable integrations, and operational discipline.
  • Trust, reliability, and interoperability are the features your buyers pay for.