Proceedings

Proceedings

Protected

To access this content, please enter the password you have received from IDC.





Proceedings

Proceedings

Protected

To access this content, please enter the password you have received from IDC.





Knowledge Hub / Camunda

Partner Spotlight

Camunda

Partner Spotlight

From AI Pilots to Enterprise-Scale Autonomy

The question enterprises are asking has changed. It’s no longer whether to deploy AI agents — it’s why so few deployments ever move beyond the pilot stage. IDC projects that the number of actively deployed AI agents will exceed 1 billion worldwide by 2029 — 40 times more than in 2025.
  
Yet according to Camunda’s own research, 71% of organizations are already using AI agents, but only 11% of those use cases reached production last year. The gap between ambition and outcomes is widening. The root cause isn’t the technology — it’s the absence of a structured path forward.

 

How IT Leaders Can Move from Pilots to Production

Scaling agentic AI requires more than deploying more agents. It requires building the operating model that makes agents trustworthy, governable, and reusable across the enterprise. Here’s how to get there:
  
Start where agents create the most value. Focus first on processes that strain deterministic automation and look for unstructured inputs, incomplete data, and high exception rates (e.g. claims intake, KYC checks, customer onboarding, and email correspondence handling). These are the areas where agents have the highest impact and where the business case is easiest to demonstrate.
  
Build for reuse, not repetition. Treat agents, connectors, and process templates as shared enterprise assets. A central library of reusable components prevents pilots from splintering into disconnected projects and accelerates deployment across teams.
  
Establish governance before you scale. Define confidence thresholds, escalation paths, and human review triggers from day one. Wrap every agentic action in audit trails so compliance and risk teams have full visibility — before deployment, not after.
  
Connect agents inside business processes, not alongside them. The turning point comes when agents operate within orchestrated, end-to-end business processes. Deterministic logic handles predictable steps; agents handle ambiguity and exceptions. The result is a process that is stateful, fault-tolerant, and auditable at every stage.
  
Shift from pilots to platforms. Formalize the operating model once early use cases prove out. Establish a central team to standardize process design patterns, onboarding templates, and success metrics — so new agentic processes can be built without reinventing the foundation each time.
  
Measure outcomes and expand autonomy incrementally. Track cycle time, exception rates, cost per case, and compliance accuracy. Use those feedback loops to refine agent behavior and increase autonomy gradually — starting with classification and data enrichment before moving into fully autonomous decision-making.

 

The right operating model

Agentic orchestration is what makes all of this possible at enterprise scale. It brings deterministic process logic and dynamic AI decision-making together: rules handle what’s predictable, agents handle what isn’t, and the business retains full visibility and control throughout. The leaders who will define this era aren’t those running the most experiments – they’re the ones who have built the orchestration infrastructure to make AI deliver, at scale, with governance built in from the start.

Knowledge Hub / Box | Netpoleon

Partner Spotlight

Box | Netpoleon

Partner Spotlight

Your Content Is the Missing Piece in Your AI Strategy

Every CIO has a version of the same story. The AI pilot worked. The proof of concept impressed the board. And then — somewhere between the demo and enterprise-wide rollout — things stalled. The culprit is rarely the AI model. More often, it is the content. According to IDC, unstructured data accounts for roughly 90% of all enterprise data globally, and APAC organisations are generating it faster than anywhere else. Yet most of it sits ungoverned, siloed, and invisible to the very AI systems designed to act on it. The challenge keeping CIOs awake is not whether AI is capable enough — it is whether the data foundations beneath it are ready.

 

From Storage Problem to Strategic Asset

The shift required is a fundamental rethinking. Leading enterprises are treating content not as a storage problem but as a strategic asset — classified, governed, and connected to the workflows and people that need it in real time. For CISOs, the stakes are equally high: as AI agents act autonomously on enterprise content — summarising, routing, deciding — ungoverned data is no longer just an operational inefficiency. It is an expanding attack surface. Content that cannot be classified cannot be protected.
  
This urgency is compounded by ASEAN’s regulatory landscape. MAS Technology Risk Management guidelines in Singapore, OJK frameworks in Indonesia, and emerging data protection regimes across Thailand and the Philippines all require demonstrable governance over how data is accessed — including by AI. Content governance is not a best practice. It is a compliance obligation.

 

The Questions CIOs Should Be Asking Now

Organisations pulling ahead treat content governance and AI readiness as one initiative, not two — asking: Do we know where our sensitive data lives? Can AI agents operate within our compliance boundaries without us choosing between capability and control? Consider a regional bank deploying AI on loan documents spanning a decade of applications and amendments — ungoverned, scattered, inaccessible. The AI cannot safely act on what it cannot reliably see. The bottleneck is not intelligence. It is content readiness. This is the reality facing enterprises across ASEAN today.
 
For CIOs and CISOs across ASEAN, the first question is not “which AI model should we deploy?” — it is “is our content ready for AI to act on?” A content readiness audit is the practical first step. The window to get these foundations right is now.

Knowledge Hub / eG Innovations

Partner Spotlight

eG Innovations

Partner Spotlight

When All Dashboards Report Green During a Production Outage

A retail ERP system underwent a vertical scaling operation to support growth from 3,000 to 10,000 stores on AWS. Immediately following the cutover, users experienced widespread HTTP 503 (“Service Unavailable”) errors and checkout failures. Yet, standard performance dashboards indicated a healthy environment.

 

During the incident response, each team reviewed their respective telemetry, which indicated normal operation:

 

Database Team: “Query latency is flat at sub-millisecond levels. The database is executing requests instantly.” 
Application Team: “JVM threads are in a WAIT state on sun.nio.ch.SocketDispatcher.read. The code is blocked, waiting for database responses.” 
Infrastructure Team: “CPU is at 9%, storage IOPS is at 8%, and bandwidth is within SLA. We have substantial headroom.”

 

While component-level metrics appeared healthy, system-wide transactions were failing.

 

Case Study: Non-Linear Failure at 3X Scale

To understand why this happens, we have to look outside standard telemetry. This article breaks down a real production incident where the root cause was an invisible bottleneck: the EC2 instance had hit a hard packets-per-second (PPS) ceiling, not a bandwidth limit.
 
The system looked perfectly healthy at 9% CPU and under 10% storage IOPS. It wasn’t; it was silently discarding traffic. TCP retransmissions had climbed past 20% at peak (with spikes to 50%), database insert latency jumped from 1ms to 150ms, and connection time to the SQL service ballooned to 3 seconds.
 
The standard monitoring stack saw none of it.

 

This postmortem documents how cross-layer correlation—specifically overlaying synthetic connection probes, network stack metrics, and application thread states on a single timeline—exposed what siloed monitoring missed, and exactly what SRE teams must instrument to catch it early.

 

(Note: This article summarizes a 15-page forensic postmortem. Download the full technical case study (PDF) for the complete timeline, configuration diffs, and TCP tuning parameters.)

On-demand

By submitting the form, you will get access to all available content on this site.
Data Privacy

This content is provided in cooperation between IDC and the Partners, all acting as independent controllers. You may find more information about how each of them processes your personal data in their privacy policy: IDC Privacy Policy and the Partners’ privacy policies are available in the Partners section of the event website.

IDC and the Partners would like to keep in touch with you, using the contact details you have provided in this form, and inform you about their products and services they think you may find interesting. If you do not want to receive such information from IDC and/or the Partners as a follow up to this submission, you may let them know by following the instructions in any such communication or: (i) for IDC, by clicking here; and (ii) for the Partners, by clicking here.

Please note that providing your work phone number is optional. If you decide to provide your phone number, you agree that it may be used by IDC to contact you about IDC products and services.

All fields not labeled “required” are optional.

Redefiniendo la confianza digital en Europa: de la convergencia de la identidad a la garantía continua e inteligente

18 Jun 2026

Por confirmar

Redefiniendo la confianza digital en Europa: de la convergencia de la identidad a la garantía continua e inteligente

Register Now
Redefiniendo la confianza digital en Europa: de la convergencia de la identidad a la garantía continua e inteligente

Patrocinado por

Logo

Sobre el evento

IDC y Signaturit tienen el placer de invitarle al almuerzo ejecutivo: “Firma e identidad en 2026: cómo construir confianza digital en un mundo impulsado por la IA” ,que se celebrará el 18 de junio a las 13:00 en el prestigioso restaurante de (por confirmar).

 

Según investigaciones de IDC, la integración de soluciones avanzadas de firma electrónica con sólidos marcos de identidad digital está agilizando el cumplimiento normativo y mejorando la experiencia de usuario, especialmente a medida que regulaciones como la Cartera Europea de Identidad Digital transforman el panorama.

No obstante, la digitalización de los procesos de confianza también ha provocado un aumento de tácticas de fraude cada vez más sofisticadas. IDC observa un incremento significativo de los deepfakes, el robo de identidad y la manipulación de documentos, con atacantes que aprovechan la IA generativa para eludir los métodos tradicionales de verificación. La proliferación de identidades sintéticas y credenciales manipuladas está obligando a las organizaciones a replantearse su enfoque de la garantía digital, situando la prevención del fraude como una prioridad clave para los responsables de seguridad y cumplimiento normativo.

La automatización impulsada por IA se sitúa hoy en el centro de esta evolución, tanto como vector de riesgo como potente herramienta de defensa. El 82,7 % de las organizaciones ya está utilizando IA generativa en entornos de producción para la gestión de identidades y riesgos (un 42,2 % de ellas integrándola en la mayor parte de la organización). Esta doble naturaleza exige tecnologías adaptativas y clave, capaces no solo de automatizar las verificaciones evidentes, sino también de identificar y mitigar dinámicamente nuevos vectores de ataque en tiempo real.

En última instancia, la convergencia entre firma digital e identidad tiene como objetivo posibilitar negocios seguros y sin fricciones a gran escala. Tal y como demuestra la investigación de IDC, estas tendencias están redefiniendo los fundamentos de la confianza digital, permitiendo a las organizaciones optimizar operaciones, reforzar el cumplimiento normativo y defenderse de forma proactiva frente a amenazas en constante evolución en un mundo cada vez más conectado

 

Por qué asistir

Únete a Signaturit e IDC para explorar cómo la convergencia de la identidad digital, la firma electrónica y la automatización inteligente está redefiniendo la confianza digital en Europa, y descubre qué necesita tu organización para prosperar en la era de eIDAS 2.0, la Cartera Europea de Identidad Digital y la garantía continua de la confianza:

Obtener conocimientos prácticos sobre cómo construir ecosistemas de identidad interoperables y centrados en la privacidad que permitan interacciones transfronterizas fluidas y seguras.

Conocer cómo la IA y la automatización están transformando la verificación en tiempo real, el cumplimiento normativo y la experiencia del usuario a lo largo de todo el recorrido del cliente.

Descubrir cómo las soluciones avanzadas de firma electrónica están acelerando la automatización de flujos de trabajo, las iniciativas de sostenibilidad y el cumplimiento regulatorio.

Explorar el impacto de la facturación electrónica en la eficiencia operativa, la auditabilidad y la confianza en las transacciones B2B y B2C.

Comprender los cambios regulatorios, tecnológicos y operativos que están configurando el mercado EMEA.

Posiciona a tu organización a la vanguardia de la transformación de la confianza digital, preparada para ofrecer experiencias digitales seguras, escalables y adaptativas en un entorno cada vez más conectado y regulado.

Agenda

Ponentes

Ignacio Martínez De Lizarrondo

Ignacio Martínez De Lizarrondo

Data & Analytics Manager

IDC

Read Bio

Partners

Patrocinado por

Restaurante Paco Roncero

Paco Roncero Restaurante se asoma a la ciudad que le inspira desde hace más de tres décadas. Lo que comenzó en 1990 como La Terraza del Casino es hoy mucho más que un restaurante: es el reflejo vivo de un chef que ha sabido hacer de Madrid su inspiración. 

Paco Roncero Restaurante cuenta con 2 Estrellas MICHELIN, 3 Soles Repsol y forma parte de la prestigiosa guía internacional 50 Best Discovery de The World’s 50 Best Restaurants. Por su parte, Paco Roncero también es una de las figuras más destacadas en el circuito gastronómico, siendo uno de los noventa y siete cocineros del mundo con tres cuchillos, según la lista internacional The Best Chef Awards.

C. Alcalá, 15, Centro, 28014 Madrid

Speakers

Meet Our Speakers

Uncover breakthrough insights from IDC experts and exclusive sessions featuring influential voices transforming technology and leadership today

Meet Our Speakers

Speakers

Dr. Christopher Lee Marshall

Dr. Christopher Lee Marshall

Vice President, Data, Analytics, AI, Sustainability, and Industry Research

IDC

Read Bio

Ranjit Rajan

Ranjit Rajan

Vice President, Research (META)

IDC

Read Bio

Harish Dunakhe

Harish Dunakhe

Senior Research Director, Software & Cloud (META)

IDC

Read Bio

Michael Yeo

Michael Yeo

Associate Research Director, Financial Insights

Asia/Pacific IDC

Read Bio

Be a Part of it!

REGISTER NOW

Knowledge Hub / Johan Nepgen

Partner Spotlight

Johan Nepgen
Principal Sales Engineer
Mimecast

Partner Spotlight

The Human Risk in Cybersecurity: Key Insights from the 2026 Report

Organizations have invested billions in advanced cybersecurity tools like firewalls, SIEM platforms, and zero-trust architectures. Yet, breaches persist. The root cause is not a technology gap but a human challenge. Mimecast’s The State of Human Risk 2026 report, based on input from 2,500 IT professionals across nine countries, highlights this stark reality: organizations know their vulnerabilities but aren’t acting quickly enough to address them.

 

The Cost of Inaction

 

The financial stakes are severe. A single insider-driven data exposure event costs organizations $13.1 million on average. With six such incidents per month, organizations face an estimated $943 million in annual losses. These incidents often occur across email inboxes, collaboration platforms, and internal communication channels—highlighting the growing complexity of modern cyber threats.

 

The Recognition-Action Gap

 

A key finding from the report is the gap between awareness and action. While 96% of organizations acknowledge incomplete protection and 91% face compliance challenges, only 28% implement two essential practices: regular security awareness training and continuous monitoring for policy violations. This disconnect creates opportunities for attackers who exploit what organizations fail to act on, rather than what they fail to see.

 

Five Critical Gaps in Cybersecurity

 

The report outlines five interconnected gaps traditional defenses fail to address:

 

1. Attack Surface Explosion
Threats now span email, Slack, Teams, Zoom, and other platforms. Despite 71% of organizations expecting negative business impacts from collaboration tool attacks, 38% still rely solely on inadequate native security controls.

 

2. Insider Risk Crisis
Just 8% of employees account for 80% of security incidents, often due to fatigue or social engineering. Organizations rarely coordinate prevention strategies across negligent, compromised, and malicious insider profiles.

 

3. Integration Paradox
While 65% of organizations struggle with integrating tools, those who succeed report 40% faster threat remediation. Failed integrations, however, lead to tool sprawl and reduced visibility.

 

4. Governance Breakdown
Despite the importance of governance, 59% lack confidence in locating data quickly for compliance needs. Manual processes, still used by 36%, cannot keep up with growing data demands.

 

5. AI Readiness Gap
Although 69% expect AI-driven attacks soon, only 40% have strategies to counter them. This 29-point recognition-readiness gap leaves organizations exposed to AI-enabled phishing and deepfake threats.

 

The Role of AI: Threat and Opportunity

 

AI amplifies the risks outlined above. Attackers leverage AI to craft highly convincing phishing emails, voice deepfakes, and sustained business email compromise attacks. Defensively, AI adoption is growing—over half of organizations now use AI for threat detection—but unevenly. While 48% invest in AI monitoring tools, fewer train employees (44%) or establish AI usage policies (41%). This imbalance leaves people vulnerable to AI-driven exploitation.

 

Moving from Awareness to Execution

 

Mimecast recommends five priorities for addressing human risk: securing all communication channels, managing risk with behavioral analytics, automating compliance, consolidating tools into integrated platforms, and preparing for AI threats with both defensive AI and governance frameworks. These strategies are interconnected, creating a unified, operationally feasible approach to cybersecurity.

 

The Bottom Line

 

With nearly $1 billion in annual insider risk exposure and AI transforming the threat landscape, 2026 must be the year organizations act decisively. The cost of inaction far outweighs the investment required to mitigate human risk. Security leaders face a critical question: will you act before the next incident—or after? Download Mimecast’s report for detailed findings and actionable recommendations. https://www.mimecast.com/resources/ebooks/state-of-human-risk/

Agenda

Agenda

UAE Financial Services Congress

One Day Event

8:00 am

Registration & Networking

9:00 am

IDC Welcome Address

9:05 am

IDC Keynote

Michael Yeo

Michael Yeo

Associate Research Director, Financial Insights, Asia/Pacific IDC

9:25 am

Host Partner

9:45 am

Strategic Partner 1

10:00 am

Strategic Partner 2

10:15 am

Strategic Partner 3

10:30 am

Tea & Coffee Break

10:55 am

Platinum Tracks

Platinum Track A

10:55 am – 11:05 am

Platinum Partner 1

11:05 am – 11:15 am

Platinum Partner 2

11:15 am – 11:25 am

Platinum Partner 3

11:25 am – 11:35 am

Platinum Partner 4

11:35 am – 11:45 am

Platinum Partner 5

11:45 am – 12:25 pm

End User Panel Discussion: From Legacy to Agile: Lessons from CIOs & CTOs

Platinum Track B

10:55 am – 11:05 am

Platinum Partner 6

11:05 am – 11:15 am

Platinum Partner 7

11:15 am – 11:25 am

Platinum Partner 8

11:25 am – 11:35 am

Platinum Partner 9

11:35 am – 11:45 am

Platinum Partner 10

11:45 am – 12:25 pm

End User Panel Discussion: Balancing Growth, Risk & Compliance at the Board Level

12:25 pm

Gold Tracks

Gold Track A

12:25 pm – 12:35 pm

Gold Partner 1

12:35 pm – 12:45 pm

Gold Partner 2

12:45 pm – 12:55 pm

Gold Partner 3

12:55 pm – 1:05 pm

Gold Partner 4

Gold Track B

12:25 pm – 12:35 pm

Gold Partner 5

12:35 pm – 12:45 pm

Gold Partner 6

12:45 pm – 12:55 pm

Gold Partner 7

12:55 pm – 1:05 pm

Gold Partner 8

1:05 pm

Lunch & Networking

2:00 pm

IDC Workshop

2:50 pm

Announcement of Workshop Winners

Stay tuned for exciting news about this event

Register Now