Proceedings
Protected
To access this content, please enter the password you have received from IDC.
To access this content, please enter the password you have received from IDC.
To access this content, please enter the password you have received from IDC.
Camunda
The question enterprises are asking has changed. It’s no longer whether to deploy AI agents — it’s why so few deployments ever move beyond the pilot stage. IDC projects that the number of actively deployed AI agents will exceed 1 billion worldwide by 2029 — 40 times more than in 2025.
Yet according to Camunda’s own research, 71% of organizations are already using AI agents, but only 11% of those use cases reached production last year. The gap between ambition and outcomes is widening. The root cause isn’t the technology — it’s the absence of a structured path forward.
How IT Leaders Can Move from Pilots to Production
Scaling agentic AI requires more than deploying more agents. It requires building the operating model that makes agents trustworthy, governable, and reusable across the enterprise. Here’s how to get there:
Start where agents create the most value. Focus first on processes that strain deterministic automation and look for unstructured inputs, incomplete data, and high exception rates (e.g. claims intake, KYC checks, customer onboarding, and email correspondence handling). These are the areas where agents have the highest impact and where the business case is easiest to demonstrate.
Build for reuse, not repetition. Treat agents, connectors, and process templates as shared enterprise assets. A central library of reusable components prevents pilots from splintering into disconnected projects and accelerates deployment across teams.
Establish governance before you scale. Define confidence thresholds, escalation paths, and human review triggers from day one. Wrap every agentic action in audit trails so compliance and risk teams have full visibility — before deployment, not after.
Connect agents inside business processes, not alongside them. The turning point comes when agents operate within orchestrated, end-to-end business processes. Deterministic logic handles predictable steps; agents handle ambiguity and exceptions. The result is a process that is stateful, fault-tolerant, and auditable at every stage.
Shift from pilots to platforms. Formalize the operating model once early use cases prove out. Establish a central team to standardize process design patterns, onboarding templates, and success metrics — so new agentic processes can be built without reinventing the foundation each time.
Measure outcomes and expand autonomy incrementally. Track cycle time, exception rates, cost per case, and compliance accuracy. Use those feedback loops to refine agent behavior and increase autonomy gradually — starting with classification and data enrichment before moving into fully autonomous decision-making.
The right operating model
Agentic orchestration is what makes all of this possible at enterprise scale. It brings deterministic process logic and dynamic AI decision-making together: rules handle what’s predictable, agents handle what isn’t, and the business retains full visibility and control throughout. The leaders who will define this era aren’t those running the most experiments – they’re the ones who have built the orchestration infrastructure to make AI deliver, at scale, with governance built in from the start.
Box | Netpoleon
Every CIO has a version of the same story. The AI pilot worked. The proof of concept impressed the board. And then — somewhere between the demo and enterprise-wide rollout — things stalled. The culprit is rarely the AI model. More often, it is the content. According to IDC, unstructured data accounts for roughly 90% of all enterprise data globally, and APAC organisations are generating it faster than anywhere else. Yet most of it sits ungoverned, siloed, and invisible to the very AI systems designed to act on it. The challenge keeping CIOs awake is not whether AI is capable enough — it is whether the data foundations beneath it are ready.
From Storage Problem to Strategic Asset
The shift required is a fundamental rethinking. Leading enterprises are treating content not as a storage problem but as a strategic asset — classified, governed, and connected to the workflows and people that need it in real time. For CISOs, the stakes are equally high: as AI agents act autonomously on enterprise content — summarising, routing, deciding — ungoverned data is no longer just an operational inefficiency. It is an expanding attack surface. Content that cannot be classified cannot be protected.
This urgency is compounded by ASEAN’s regulatory landscape. MAS Technology Risk Management guidelines in Singapore, OJK frameworks in Indonesia, and emerging data protection regimes across Thailand and the Philippines all require demonstrable governance over how data is accessed — including by AI. Content governance is not a best practice. It is a compliance obligation.
The Questions CIOs Should Be Asking Now
Organisations pulling ahead treat content governance and AI readiness as one initiative, not two — asking: Do we know where our sensitive data lives? Can AI agents operate within our compliance boundaries without us choosing between capability and control? Consider a regional bank deploying AI on loan documents spanning a decade of applications and amendments — ungoverned, scattered, inaccessible. The AI cannot safely act on what it cannot reliably see. The bottleneck is not intelligence. It is content readiness. This is the reality facing enterprises across ASEAN today.
For CIOs and CISOs across ASEAN, the first question is not “which AI model should we deploy?” — it is “is our content ready for AI to act on?” A content readiness audit is the practical first step. The window to get these foundations right is now.
eG Innovations
A retail ERP system underwent a vertical scaling operation to support growth from 3,000 to 10,000 stores on AWS. Immediately following the cutover, users experienced widespread HTTP 503 (“Service Unavailable”) errors and checkout failures. Yet, standard performance dashboards indicated a healthy environment.
During the incident response, each team reviewed their respective telemetry, which indicated normal operation:
– Database Team: “Query latency is flat at sub-millisecond levels. The database is executing requests instantly.”
– Application Team: “JVM threads are in a WAIT state on sun.nio.ch.SocketDispatcher.read. The code is blocked, waiting for database responses.”
– Infrastructure Team: “CPU is at 9%, storage IOPS is at 8%, and bandwidth is within SLA. We have substantial headroom.”
While component-level metrics appeared healthy, system-wide transactions were failing.
Case Study: Non-Linear Failure at 3X Scale
To understand why this happens, we have to look outside standard telemetry. This article breaks down a real production incident where the root cause was an invisible bottleneck: the EC2 instance had hit a hard packets-per-second (PPS) ceiling, not a bandwidth limit.
The system looked perfectly healthy at 9% CPU and under 10% storage IOPS. It wasn’t; it was silently discarding traffic. TCP retransmissions had climbed past 20% at peak (with spikes to 50%), database insert latency jumped from 1ms to 150ms, and connection time to the SQL service ballooned to 3 seconds.
The standard monitoring stack saw none of it.
This postmortem documents how cross-layer correlation—specifically overlaying synthetic connection probes, network stack metrics, and application thread states on a single timeline—exposed what siloed monitoring missed, and exactly what SRE teams must instrument to catch it early.
(Note: This article summarizes a 15-page forensic postmortem. Download the full technical case study (PDF) for the complete timeline, configuration diffs, and TCP tuning parameters.)
18 Jun 2026
Por confirmar
Patrocinado por
IDC y Signaturit tienen el placer de invitarle al almuerzo ejecutivo: “Firma e identidad en 2026: cómo construir confianza digital en un mundo impulsado por la IA” ,que se celebrará el 18 de junio a las 13:00 en el prestigioso restaurante de (por confirmar).
Según investigaciones de IDC, la integración de soluciones avanzadas de firma electrónica con sólidos marcos de identidad digital está agilizando el cumplimiento normativo y mejorando la experiencia de usuario, especialmente a medida que regulaciones como la Cartera Europea de Identidad Digital transforman el panorama.
No obstante, la digitalización de los procesos de confianza también ha provocado un aumento de tácticas de fraude cada vez más sofisticadas. IDC observa un incremento significativo de los deepfakes, el robo de identidad y la manipulación de documentos, con atacantes que aprovechan la IA generativa para eludir los métodos tradicionales de verificación. La proliferación de identidades sintéticas y credenciales manipuladas está obligando a las organizaciones a replantearse su enfoque de la garantía digital, situando la prevención del fraude como una prioridad clave para los responsables de seguridad y cumplimiento normativo.
La automatización impulsada por IA se sitúa hoy en el centro de esta evolución, tanto como vector de riesgo como potente herramienta de defensa. El 82,7 % de las organizaciones ya está utilizando IA generativa en entornos de producción para la gestión de identidades y riesgos (un 42,2 % de ellas integrándola en la mayor parte de la organización). Esta doble naturaleza exige tecnologías adaptativas y clave, capaces no solo de automatizar las verificaciones evidentes, sino también de identificar y mitigar dinámicamente nuevos vectores de ataque en tiempo real.
En última instancia, la convergencia entre firma digital e identidad tiene como objetivo posibilitar negocios seguros y sin fricciones a gran escala. Tal y como demuestra la investigación de IDC, estas tendencias están redefiniendo los fundamentos de la confianza digital, permitiendo a las organizaciones optimizar operaciones, reforzar el cumplimiento normativo y defenderse de forma proactiva frente a amenazas en constante evolución en un mundo cada vez más conectado
Únete a Signaturit e IDC para explorar cómo la convergencia de la identidad digital, la firma electrónica y la automatización inteligente está redefiniendo la confianza digital en Europa, y descubre qué necesita tu organización para prosperar en la era de eIDAS 2.0, la Cartera Europea de Identidad Digital y la garantía continua de la confianza:
Obtener conocimientos prácticos sobre cómo construir ecosistemas de identidad interoperables y centrados en la privacidad que permitan interacciones transfronterizas fluidas y seguras.
Conocer cómo la IA y la automatización están transformando la verificación en tiempo real, el cumplimiento normativo y la experiencia del usuario a lo largo de todo el recorrido del cliente.
Descubrir cómo las soluciones avanzadas de firma electrónica están acelerando la automatización de flujos de trabajo, las iniciativas de sostenibilidad y el cumplimiento regulatorio.
Explorar el impacto de la facturación electrónica en la eficiencia operativa, la auditabilidad y la confianza en las transacciones B2B y B2C.
Comprender los cambios regulatorios, tecnológicos y operativos que están configurando el mercado EMEA.
Posiciona a tu organización a la vanguardia de la transformación de la confianza digital, preparada para ofrecer experiencias digitales seguras, escalables y adaptativas en un entorno cada vez más conectado y regulado.
Paco Roncero Restaurante se asoma a la ciudad que le inspira desde hace más de tres décadas. Lo que comenzó en 1990 como La Terraza del Casino es hoy mucho más que un restaurante: es el reflejo vivo de un chef que ha sabido hacer de Madrid su inspiración.
Paco Roncero Restaurante cuenta con 2 Estrellas MICHELIN, 3 Soles Repsol y forma parte de la prestigiosa guía internacional 50 Best Discovery de The World’s 50 Best Restaurants. Por su parte, Paco Roncero también es una de las figuras más destacadas en el circuito gastronómico, siendo uno de los noventa y siete cocineros del mundo con tres cuchillos, según la lista internacional The Best Chef Awards.
Uncover breakthrough insights from IDC experts and exclusive sessions featuring influential voices transforming technology and leadership today
Please fill the form to update
Vice President, Data, Analytics, AI, Sustainability, and Industry Research
IDC
Read Bio
Dr. Chris Marshall is Associate Vice President for IDC Asia Pacific, responsible for the Analytics, Big Data and Artificial Intelligence practice. Dr. Marshall’s core research coverage includes the development of Data Analytics and Machine Learning competencies and their implications – the threats and opportunities facing organizations as they seek to augment and automate their knowledge-based work.
Previously, Chris was a senior executive in IBM Watson Financial Services where he led their AI-enabled risk and analytics practice in Asia. Before joining IBM, he held senior business development and management roles in big data and analytics at KPMG, Oracle and UBS.
Harish Dunakhe leads IDC’s research & advisory practice for the software program in the Middle East, Africa, and Turkey (META) region.
He is responsible for a team of research analysts and manages the delivery of insights in IDC’s software program and syndicated research. Harish and his team have expertise in studying technology trends to provide our clients with thought leadership and actionable insights. He is based in Dubai.
Harish has a strong understanding of leveraging technologies to solve business problems in the public sector, travel & transportation, hospitality, IT, and retail. He has significant knowledge of emerging technologies such as blockchain, RPA, artificial intelligence, and cloud. He works with clients to understand the intricacies, opportunities, and challenges involved in their technology transformation journeys.
Harish brings more than 17 years of experience working with leading system integrators and other technology companies across the Middle East, South Asia, and India. Prior to joining IDC, he held senior roles spanning technology sales strategy, program governance, and large account business planning at Global MNCs such as Wipro, DXC Technology, and Sonata Software.
Michael Yeo is the Associate Research Director for IDC Financial Insights and Retail Insights in the Asia/Pacific region. Mr. Yeo’s core research coverage focuses on payments including the uptake of mobile payments in the Asia/Pacific region, digital banking, and the evolution of joint digital ecosystems involving ecommerce, mcommerce, and payments. Mr. Yeo has also significant experience in advising financial institutions on their fintech management strategies, placing particular emphasis on organizational and technology restructuring within banks to better cope with the demands of current-generation digital customers.
Prior to IDC, Mr. Yeo headed all financial services–related research at KPMG Malaysia. Previously, he served as a project manager at an advisory firm in China, where he advised multiple international clients with their China market entry strategies. Mr. Yeo started his career in an advisory role for financial services at Ernst and Young.
Credentials:
Johan Nepgen
Principal Sales Engineer
Mimecast
Organizations have invested billions in advanced cybersecurity tools like firewalls, SIEM platforms, and zero-trust architectures. Yet, breaches persist. The root cause is not a technology gap but a human challenge. Mimecast’s The State of Human Risk 2026 report, based on input from 2,500 IT professionals across nine countries, highlights this stark reality: organizations know their vulnerabilities but aren’t acting quickly enough to address them.
The Cost of Inaction
The financial stakes are severe. A single insider-driven data exposure event costs organizations $13.1 million on average. With six such incidents per month, organizations face an estimated $943 million in annual losses. These incidents often occur across email inboxes, collaboration platforms, and internal communication channels—highlighting the growing complexity of modern cyber threats.
The Recognition-Action Gap
A key finding from the report is the gap between awareness and action. While 96% of organizations acknowledge incomplete protection and 91% face compliance challenges, only 28% implement two essential practices: regular security awareness training and continuous monitoring for policy violations. This disconnect creates opportunities for attackers who exploit what organizations fail to act on, rather than what they fail to see.
Five Critical Gaps in Cybersecurity
The report outlines five interconnected gaps traditional defenses fail to address:
1. Attack Surface Explosion
Threats now span email, Slack, Teams, Zoom, and other platforms. Despite 71% of organizations expecting negative business impacts from collaboration tool attacks, 38% still rely solely on inadequate native security controls.
2. Insider Risk Crisis
Just 8% of employees account for 80% of security incidents, often due to fatigue or social engineering. Organizations rarely coordinate prevention strategies across negligent, compromised, and malicious insider profiles.
3. Integration Paradox
While 65% of organizations struggle with integrating tools, those who succeed report 40% faster threat remediation. Failed integrations, however, lead to tool sprawl and reduced visibility.
4. Governance Breakdown
Despite the importance of governance, 59% lack confidence in locating data quickly for compliance needs. Manual processes, still used by 36%, cannot keep up with growing data demands.
5. AI Readiness Gap
Although 69% expect AI-driven attacks soon, only 40% have strategies to counter them. This 29-point recognition-readiness gap leaves organizations exposed to AI-enabled phishing and deepfake threats.
The Role of AI: Threat and Opportunity
AI amplifies the risks outlined above. Attackers leverage AI to craft highly convincing phishing emails, voice deepfakes, and sustained business email compromise attacks. Defensively, AI adoption is growing—over half of organizations now use AI for threat detection—but unevenly. While 48% invest in AI monitoring tools, fewer train employees (44%) or establish AI usage policies (41%). This imbalance leaves people vulnerable to AI-driven exploitation.
Moving from Awareness to Execution
Mimecast recommends five priorities for addressing human risk: securing all communication channels, managing risk with behavioral analytics, automating compliance, consolidating tools into integrated platforms, and preparing for AI threats with both defensive AI and governance frameworks. These strategies are interconnected, creating a unified, operationally feasible approach to cybersecurity.
The Bottom Line
With nearly $1 billion in annual insider risk exposure and AI transforming the threat landscape, 2026 must be the year organizations act decisively. The cost of inaction far outweighs the investment required to mitigate human risk. Security leaders face a critical question: will you act before the next incident—or after? Download Mimecast’s report for detailed findings and actionable recommendations. https://www.mimecast.com/resources/ebooks/state-of-human-risk/
Michael Yeo
Associate Research Director, Financial Insights, Asia/Pacific IDC