Tag: Microsoft

  • Whisper Report: What’s the biggest cybersecurity myth in 2025?

    Whisper Report: What’s the biggest cybersecurity myth in 2025?

    Whisper Report: What’s the biggest cybersecurity myth in 2025?

    Published to clients: August 19, 2025               ID: TBW2090

    Published to Readers: August 20, 2025

    Whisper Email Release: TBD

    Public and Video Release: TBD

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    This Whisper Report identifies eight persistent cybersecurity myths in 2025, from the belief that threats can be fully stopped to misconceptions about AI’s role in security. Experts from Black Hat USA 2025 clarify that resilience, strategic investment, adaptive training, and human oversight remain essential. AI is powerful but not a plug-and-play solution, nor a replacement for human judgment. Understanding these myths helps organizations build more realistic, effective cybersecurity strategies.  

    What’s the biggest cybersecurity myth in 2025?

    We took the most frequently asked and most urgent technology questions straight to the Cybersecurity professionals gathering at Black Hat USA 2025 held in Las Vegas. This Whisper Report addresses the question regarding what’s the biggest cybersecurity myths in 2025? Figure 1 displays the eight cybersecurity myths we uncovered we will now discuss.

    8 myths of cybersecurity in 2025:
We can stop all threatas.
The more money you Spend, the more protected you are.
Security awareness training is dead.
AI is going to replace humans.
AI is plug and play.
AI generates secure code.
AI will solve everything.
AI will not solve issues in Cybersecurity

    MYTH 1: We can Stop all Threats

    The first myth comes from Trustmi’s Corey Sienko and is that “we can stop every single threat from entering the organization” This may come as a surprise to some executives particularly those outside of cybersecurity but the expression used is always when not if you have an incident. No Need to fret, Trustmi’s Corey Sienko continues. “It’s about how do we respond to those threats and make sure that we protect the organization from losing valuable information and cards.” I believe all appreciate that clarification. Cybersecurity involves defense but it is also a game all about preparation for when and resiliency after. This topic is further discussed in Conference Whispers: Black Hat USA 2025.

    MYTH 2: The more money you spend the more protected!

    Cymulate’s Avihai Ben Yossef brings us myth number two, “The more money you spend on cyber security the more protected you are.” Ben goes on further to explain. “I think in order to really be protected in cyber security from cyber attacks is by actually knowing what you need to do in order to make sure you are protected and when once you know that you don’t need to spend too much money you need to spend you know a very focused amount of money in what matters most.” If you are surprised by this, you really need to book an inquiry with TBW Advisors so we can help you review your cybersecurity strategy. Additional research regarding critical observations on cybersecurity spend can be found in the keynote covered within Conference Whispers: Identiverse 2024.

    MYTH 3: Security awareness training is dead!

    Cybersecurity Myth number three comes to use from Dune Security’s David DellaPelle. “Security awareness training is improving readiness and reducing risk. Security awareness training is dead.” Intrigued? Let’s hear more from David. “Security awareness training as it exists today, meaning legacy security awareness training technologies are not effective at reducing risk and create friction and an adversarial relationship between the security organization and the end users. The problem is if you think about a doctor who is looking to solve a patient’s problem, the first thing they would do is take in a lot of data and run tests to exclude the possibilities. They quantify the risk before they prescribe a medicine or a surgery. And so if there’s a security awareness training solution that doesn’t automatically provide uh user adaptation, it’s uh it’s kind of falling flat on its face. Every piece of security control or adaptation should be relevant to the individual user’s risk profile and that training or that security measure should be applied automatically based on the risk profile.” Training employees only on what that specific employee personally need to get better at? Sounds optimized.

    MYTH 4: AI Is going to replace Humans

    Bringing us cybersecurity Myth 4 is StrikeReady’s Alex Lanstein. “AI is going to replace humans.”  Alex further clarifi:ed, “AI is always going to augment humans. Anybody who’s ever leveraged any AI system, any generative AI system. You see that it makes mistakes. Sometimes those mistakes are obvious, sometimes they’re subtle. And no one is ever going to turn anything over to an AI when it’s making such obvious or subtle mistakes without a human in the loop.”  Or as Elastic Security’s James Spiteri further explained, “we’re thinking about this fully autonomous security operations team. I don’t think that’s going to happen. I don’t think even think it’s the right approach to think about these things. AI and agents are phenomenal, but they are the perfect compliment to humans. They’re not they’re not there to replace humans. They’re there to make humans lives better. eliminate the stuff that humans don’t want to do and let humans do the fun things like make people excited about wanting to work in cyber and that’s what the AI is allowing us to do.”

    MYTH 5: AI is plug and play

    Brian Mehlman and his AI Agent from Cyber Innovate bring us Myth 5.  “I’m actually here with one

    of my agents,  and his name is Ralph. Ralph, can you answer the question as you see it in our world view? What’s the biggest cyber security myth here in 2025? Absolutely, Brian. Happy to jump in here. So, from our perspective, the biggest cyber security myth of 2025 is probably the idea that AI is just a plug-and-play solution, that it’s kind of a one-size fits-all magic bullet.” Ralph and Brian went on to further explain, “In reality, the myth is that AI will handle everything securely on its own. But the truth is it needs a lot of oversight, a lot of transparency, and people often underestimate the complexity inside the machine. So that’s the big myth that AI is just simple and straightforward when really it’s a lot more nuanced. And that’s my take. Uh I would add my answer. I would extend onto yours is I agree, but um I’m used to systems that have access controls, authentication controls, and audit. Uh inside the black box, we don’t have any of them. Once I log in and I authenticate, it’s a wild wild west. That has to change. Immutable logs within the system is probably something that’s going to happen at some point. Uh or some other unique uh solutions to the problem.”

    Interestingly, Ariful Huq from Exaforce observed a similar concern. “Trying to build an LLM wrapper is what I call it without really understanding the data related to the problems that you’re trying to solve. LLMS can only get you so far, right? They are large language models and summarization and contextualization but at the end of the day if you want to solve problems related to say detections  investigations LLMS can only get you so far right you really need to go back to the data go back to the fundamentals and then layer on a large language model on top of it to solve some of the problems that around like you know summarization um you know building agent workflows.” In other words, solutions are custom crafted – NOT plug and play.

    MYTH 6: AI Generates secure code

    Checkmarx’s Jonathan Rende brings us Myth 6, “AI generates secure code.” That myth should grab the attention all organizations leveraging coding agents to quickly advance their product. Jonathon continues, “It doesn’t. It doesn’t. And it will probably get better over time. And will it do a better job than a junior developer in simple mistakes that can cause vulnerabilities? Heck yeah, of course it will. But for the more complex issues, it’s not there yet. AI is not there yet.”

    MYTH 7: AI will solve Everything

    Let’s hear Myth 7 from Booli’s Joe Schorr, “the biggest cyber security uh myth is that AI is actually going to solve everything.” Joe went on to further explain, “I think if you judiciously apply AI, machine learning and very discreet task and things, it’s fantastic. I think it’s being overblown quite a bit right up at the myth level. I think that if you treat it like we treat it in Booli, we’ve got AI built in, but we don’t publish it all over everything we’ve got, but we treat it kind of like an idiot savant. It’s it does one to ask really well or does a discrete set to ask really well. It may not actually behave well in church, but you can get it to do what you want for something very very specific, which is how we do it. I think the myth is that AI is going to solve everybody’s problems.” Brian Sledge of imPAC also believes that AI will solve everything is a myth. “I think AIis best positioned more like a forcemultiplier, but I don’t think it solvesthe problems, the core problems of cybersecurity today. Um cyber security stillrequires context. It requirespolicy driven control and those thingsstill require human in the loop. And Ithink the best way to leverage AI isn’t so much in solving for cyber security,but it’s more for helping multiply andscale out what humans still need andwe’re required to do. So I don’t think Idon’t think customers should sleep onthe idea that humans still need to be very much engaged as part of cyber security. Because cyber security AIis only as good as the algorithms andthe models and the data it’s getting.” Thus believing in 2025 AI will solve everything is a stretch but will it solve something?

    MYTH 8: AI Will Not Solve Issues in Cyber Security

    Microsoft’s Thomas Roccia brings us Myth 8. “right now I think most people in in the industry in the security industry doesn’t yet believe in this technology (AI) and that’s maybe one of the one of the myths that AI will not really solve issue in cyber security. We have and I think that’s a mistake it’s probably something which is changing the way we are doing and all the past work that we did for the past 20 or 30 years uh is going to be changing and evolving thanks or because to AI so that’s something to consider.” Thus, while it may not solve everything today, it is changing how the industry works and what it is fighting against.    

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    Related playlists and Publications

    1. Conference Whispers: Black Hat USA 2025
    2. Conference Whispers: Identiverse 2024.
    3. Conference Whispers: Identiverse 2025
    4. Whisper Report: What’s the biggest cybersecurity myth in 2025.

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: Black Hat USA 2025

    Conference Whispers: Black Hat USA 2025


    Las Vegas, NV August 2- August 7

    Published to clients: August 11, 2025                                 ID: TBW2089

    Published to readers: August 12, 2025                  

    Published to Email Whispers: TBD

    Public with video edition: TBD

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): D. Doreen Galli

    Abstract:

    After 61 videos including 4 first ever onsite livestreams, 150 minutes of recording including multiple exclusive shots – our coverage of Black Hat USA 2025 closes. Black Hat USA 2025 featured over 100 briefings and 120 sponsored sessions, with coverage spanning keynote presentations, technical sessions, and exhibit hall innovations. Topics ranged from AI-driven threat detection and agentic SOC platforms to identity verification and proactive risk management. Trends in cybersecurity regarding defence, use of AI agents, and focus on resiliency continue to grow.

    The Conference

    • Black Hat USA 2025 featured over one hundred briefings and 120 sponsored sessions. Attendance numbers are forthcoming. 2024’s edition featured over 20,000 in person attendees.

    Cautions

    • Black hat is not a conference to attend without preparation. All of one’s technology should be up to date. One should ensure they are leveraging a VPN and a RDID wallet when intentionally going around black hat. If not using one’s phone, a portable faraday pouch is always beneficial.
    • Friendly reminder: this research provides examples of what was shared with us at the event, not an evaluation, validation, or recommendation of the given technology.

    Conference Vibe

    After 61 videos and related fact checks, over 150 minutes of recording including for the first time ever – four onsite LIVESTREAMS – our coverage of Black Hat USA 2025 closes. Black Hat featured over one hundred briefings and 120 sponsored sessions. Clients may recall the expo hall restrictions during our coverage of HIMSS which treated the entire expo hall like a surgical operating room from a privacy perspective. Guess what? It was even tighter at Black Hat. Nonetheless, we were able to capture the energy as Expo Hall was opening. Not only that, for the first time ever, Informa (who owns Black Hat) gave permission to someone to do a walkabout in Expo Hall prior to its opening for the day. That’s right – enjoy your exclusive look at Black Hat USA 2025 Expo Hall. Not only that, we were able to capture the mouthwatering lunch served on Wednesday. Once again, unlike most events, the What’s To Eat? Video does not include any attendees enabling us to really get a great shot of the food! A first for TBW Advisors LLC – we did four livestreams while on site. One live stream on Tuesday, Wednesday, and Thursday morning. One final livestream went out on Thursday as I requested assistance on your favorite videos for my segment on the August 9th broadcast edition of Computer Talk Radio.

    While at Black Hat USA 2025, we conducted research for three additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: What’s the biggest cybersecurity myth in 2025?
    2. Whisper Report: Can AI defend against AI-powered attacks?
    3. Whisper Report: What’s the next SolarWinds-level breach waiting to happen?

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: Black Hat USA 2025 Playlist in its entirety. Once the video edition is available, the playlist will be sited as a pinned comment on the video edition. It is also easy to locate any previous Conference Whispers playlists through TBW Advisors LLC corporate website. Additional cybersecurity conference research is available via Conference Whispers: Identiverse and Conference Whispers: ISC West.

    Keynotes and Sessions

    Kicking off in dramatic fashion, the conference kicked off with an amazing keynote from non-other than the most famous virus hunters – Mikko Hypponen and father of the Hypponen law of IoT security – one of our favorite coverage spaces. Specifically, Mikko said that if a device is smart, it is vulnerable. It was amazing to hear his story.

    On the bleeding edge of things, we received two session summaries from Microsoft’s Thomas Roccia. The first session was his Black Hat session on NOVA – Prompt Pattern Matching regarding a new type of threat gaining traction. The second session is actually at DEFCON – the sister conference where no one would be ignorant enough to bring in modern technology outside of a faraday cage. Fortunately, we caught Thomas while at Black Hat. IN this talk Thomas shared that they are releasing an AI Agent to track crypto currency’s movements including visualization to combat crypto money laundering. The final Microsoft session itself that we captured is the Unmasking of Cyber Villains. I always love when engineers get a very loud boastful ovation from the audience. This stage featured the heroes of MISTIC and Dart who shared how they leverage each other’s strength. MISTIIC stands for Microsoft Threat Intelligence Center while Dart stands for Microsoft’s Diagnostics and Recovery Toolset. In this session, the Microsoft team emphasized that incidents require empathy, speed, and precision. The Darth team is on the ground delivering the empathy and getting the data to MISTIC. MISTIC in turn, provides the cheat codes to the Darth rescue team to quickly combat the incident.

    On the topic of using AI Agents on a team of humans in wish SOC, James Spiteri from Elastic Security shared a summary of his session. “AI without Borders: Extending analysts capabilities in a modern Soc” dove into details how Agents and humans can successfully interoperate in a SOC. James also covered critical questions you need to think about in order to truly operationalize this type of situation. 

    Exhibits

    As with many events, some exhibits span outside of the formal expo hall. We were invited to the Dune Security Command Center on site where we heard about their solution. Their adaptive training uses a personal credit risk scoring model. It targets each employee’s risky actions and knowledge gaps with customized, targeted, proactive program. The goal is to elevate them to meet corporate standards. This theme of preparation, training, and doing things up-front was definitely a theme. Cumulated shared how their solution focuses on resiliency. Given that the proper way to discuss it is always when and not if, it is wise to ensure a quick recovery when it occurs. This preparation and looking out for the threat aligned with Qualys’s Risk Operations Center. This center is focused on assisting organization proactively identify, prioritize, and finally remediate identified risks. Covering all five personas in a SOC (alerts, vulnerabilities, threat intel, case management and DFIR (digital forensics/incident response )) StrikeReady’s platform integrates with 800 tools and is focused on removing each role’s pain points. Continuous Threat Exposure Management or CTEM is the area addressed most recently by Safe Security. Booli also moves things earlier in the process, in their case identity stitching. Specifically at the very beginning of the process including score carding the identity and providing the information back to the identity service. Ensuring stolen credentials are changed once they have been phished and the criminals attempted to leverage them, Mokn was on site to tell attendees about their solution.

    If your organization would prefer to fix vulnerabilities instead of the common security software composition analysis, Heeler Security was the booth to visit. Feeling overwhelmed, by cloud configurations in your organization? imPac Labs was on site talking about their expertise. Admittedly, given my Microsoft Patent application on Policy Profiles, cloud configurations is a problem space on our radar at TBW Advisors. Speaking of high availability environments, HAProxy Technolog exhibited their platform that brings enterprise security performance and configurability into packaged software.

    An area we have discussed in Conference Whispers: Money 20/20, Conference Whispers: HIMSS 2025, and Conference Whispers: Fintech Meetup 2025 – verifying the hardware device is a valuable defence vector for fighting fraud. At Black Hat USA 2025 we met SmallStep that enables device identity with cryptographic identity ensuring corporate devices are used to perform work. Leveraging device identification to eliminate deepfakes within a corporation, Netarx leverages multiple models to ensure your corporate communications are safe from deep fakes. Elastic Search – an open-source project known for search – found itself building native security and analytics due to popular demand.

    Moving into the agentic side of things, Microsoft’s AI Agent Challenge was a big hit. Their booth had plenty of specialists on site to answer any of your questions. Focusing exclusively on AI Agents for the Red Team, Mindgard’s solution keeps probing to find vulnerabilities, filters through them based on your target and context. Finally, remediation advise is dispensed. Cyata built a built a control plane for Agentic Identity and includes policy enforcement. Addressing the full lifecycle above and beyond triage, Exaforce shared their Agentic SOC Platform. A demo of Exaforce was also captured. Finally, if you are unfamiliar with the current state of agents or have never seen an agent in action, enjoy the video with Ralph. Ralph comes from Cyber Innovate; a think tank focused on stopping threats from AI Agents themselves.

    Next Year’s Conference  

    Black Hat USA 2026 will once again return to Las Vegas and will be held at Mandalay Bay Convention Center in August 2026. The exact dates have yet to be announced at time of publication.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    TBW Advisors Logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whisper: Identiverse 2025

    Conference Whisper: Identiverse 2025

    Published to clients: June 10, 2025                                       ID: TBW2083

    Published to readers: June 11, 2025                      

    Published to Email Whispers: August 18, 2025

    Publicly Published with video edition: August 18, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): D. Doreen Galli

    Abstract:

    Identiverse 2025 welcomed 3,300+ attendees to Mandalay Bay – nearly a 20% gain over 2024. Featuring 250+ sessions and 150 exhibits all on one floor, the event was smooth and accessible. Keynotes and sessions emphasized teamwork, resilience, and collaboration, while exploring AI in identity, decentralized credentials, and zero-trust implementation. Exhibitors showcased innovations from selfie-based authentication to intelligent access control and secrets vault cleanup. The shift from Aria to Mandalay Bay marked a new chapter for the expanding event, which returns to Mandalay Bay in 2026.

    The Conference

    • Identiverse 2025 was held at Mandalay Bay Convention Center, a move from Aria in 2024. It hosted 3300 attendees, 250 sessions and 150 exhibitors.

    Cautions

    • Friendly reminder: this research provides examples of what was shared with us at the event, not an evaluation, validation, or recommendation of the given technology.

    TAGS

    Identiverse 2025, digital identity, identity security, zero trust, AI in cybersecurity, decentralized identity, verifiable credentials, identity governance, privileged access management, IAM, IGA, cybersecurity conference, Mandalay Bay, authentication, biometrics, secrets management, SSO, MFA, ITDR, access control, enterprise security, digital trust, identity trends, identity innovation, conference highlights, tech expo, identity tech, identity solutions, cybersecurity trends, identity keynote, identity management

    Conference Vibe

    After over 53 videos, almost 200 minutes of content only 2 escalator rides, 30,000 steps and over 25 fact checks, our coverage of 2025 Identiverse ends. The event spanned 4 days, had over 250 speakers, 150 exhibits and with over 3300 attendees – 700 more registered over last year. Registration went very smooth with rarely any waiting time. Interestingly, we were informed many registered late. Executives realize that reducing risks and therefore related losses is a viable path to protecting profits in uncertain times. This year’s event took place at Mandalay Bay Convention Center, a change from Aria last year. Most enjoyed the conference taking place all on the same floor. It was great to see the conference grow and expand. Like all changes, there were the old timers yearning for the days when they all packed into too small rooms at Aria. Unfortunately, some of the sessions located physically further from Expo Hall reported some in person attendance challenges from those too tired to walk to the room. The event featured a full collection of meals. We were able to capture the Tuesday Seminar’s Lunch and the lunch on Wednesday in Expo Hall.

    While at Identiverse, we conducted research for three additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: How can organizations implement zero-trust security without disrupting user experience?
    2. Whisper Report: What are the latest advancements in decentralized identity and verifiable credentials?
    3. Whisper Report: How can AI and behavioral analytics enhance identity security?

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: Identiverse Playlist in its entirety. Once the video edition is available, the playlist will be sited as a pinned comment on the video edition. It is also easy to locate any previous Conference Whispers playlists through TBW Advisors Website under Subscribers research/Conference Whispers.

    Keynotes and Sessions

    Identiverse is absolutely one of those events where regardless of the amazing session you choose, you are aware you are also missing an incredible session – or two. Fear of missing out was rampant. Fortunately, we were able to capture 53 videos for our clients and subscribers. The first Keynote featured John Pritchard, CEO of Radiant Logic. Titled, “Identity isn’t a solo Game” it drove home the message that one cannot succeed in identity without collaboration with the professionals around you throughout the organization and with others in the industry.

    Another frequently referred to keynote featured the UK’s Hanna Rutter who is realizing their government digital identity solution. In her talk she spoke about the challenges of such a decentralized digital identity solution and how she is overcoming roadblocks on her path to success. A much in demand topic regarding identity challenges in the realm of AI was presented by Richard Bird. A tech talk held in the expo hall was hosted by Microsoft. Their tech talk covered the hot topic of ITDR, Identity threat detection and response.

    Exhibits

    Identity is a topic found not only in the expo halls of Identiverse, but was also seen in the halls of HIMSS, Fintech Meetup, Money 20/20 and ISC West just to name a few. What is interesting is the different manners of vendors describe their technology. At ISC West, vendors in the expo hall spoke in terms of a solution. They would always emphasize the PII information is not on the badge, rather a hash of the biometric data which enables verification is provided instead. While this was not clarified on the videos at Identiverse, the vendors later disclosed the same technical approach that was taken on the technology captured at Identiverse. If you are seeking a tap-in to sign-in on a shared device for your organization, Imprivata was in the expo hall with their solution. If you would like to verify the customer requesting the high-risk transaction is the same customer who signed up for the account, Panani shared their technology. Keyless offers a solution to authenticate high risk actions with a selfie. If you are an engineer developing a solution and need the capability to onboard customers, no need to start at square one! PropelAuth provides an out of the box identity capability you can add on to your solution to onboard customers! Seeking to manage your remote teams and seeking a cost effective out of the box solution to provide SSO and MFA? Cubeless shared their free and easy SSO and MFA solution made for you. 

    Is managing privileges gotten to be too much for you and your organization? Apono Unified Access Management is an intelligent solution that aims to provide just enough just in time privilege for human and non-human-identities (NHI). Oasis goes one step further in managing AI Agents’ Identity, provisioning, deprovisioning and cleaning up stale accounts. Are your coders overwhelmed trying to identity what secrets vault to use so they land up hardcoding the secret? Is your organization suffering from identity vault sprawl? GitGuardian was on hand with their solution that can assist you in identifying and remediating secrets vault sprawl.

    Expo hall also featured quite a few IGA (identity governance and administration) and PAM (privileged access management) platforms. Omada captured their 25-years’ IGA experience into a free best practice framework. This framework includes use cases and related configuration recommendations for their platform, Omada Identity Cloud. Lumos shared their agentic AI autonomous IGA solution. This solution can even recommend what privileges a new employee should get based on their role and department. If you have a small but complex environment, Clarity Security has an IGA solution targeted at your organization.

    Keeper Security shared their zero-knowledge identity solution for endpoints. Their solution is referred to as zero knowledge as the customer’s data is encrypted on the endpoint with the customers key; meaning, Keeper Security has no access to customer data whatsoever. Bridgesoft shared their complete identity platform that also can adapt and include any components that may already exist in your environment. Specializing at the start of the process, CyberSolve helps organizations commence new identity programs. Looking for IAM services across the portfolio? Simeio was on site there to offer guidance. Clients are reminded to schedule an inquiry to review the current state of your identity program. If you are seeking to expand it or modernize it, we will produce an inquiry plan to guide you along the journey even if you are working with an outsource provider or consultant.

    Next Year’s Conference  

    Identiverse will once again be held at Mandalay Bay Convention Center June 15-18, 2026.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    TBW Advisors LLC Logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Industry Whispers: Public is Private – Confidential Computing in the Cloud

    Industry Whispers: Public is Private – Confidential Computing in the Cloud

    Join us for “Public is Private – Confidential Computing in the Cloud,” featuring Mike Bursell from the Confidential Computing Consortium and Manu Fontaine, founder of Hushmesh. This event will delve into the transformative potential of confidential computing for cloud environments. Aimed at CIOs, CTOs, enterprise architects, solution architects, and technical product managers, the discussion will cover how confidential computing enhances data security and privacy, even during processing. Learn about real-world applications, challenges, and future trends in this critical technology. Don’t miss this opportunity to gain insights from industry leaders and explore how to leverage confidential computing for your organization’s success.

    Research Code TBW2071

    Moderator: Dr. Doreen Galli, TBW Advisors

    Doreen Galli

    Chief of ResearchTBW Advisors LLC

    Dr. Doreen Galli is the Chief of Research at TBW Advisors LLC. She’s led significant and measurable changes as an executive at IBM, DPWN, Dell, ATT, and most recently Microsoft. Dr Galli was Chief Technology and Chief Privacy Officer in Azure’s MCIGET. Gartner recognized Dr. Galli as an expert in data ingestion, quality, governance, integration, management, and all forms and analytics including sensor data.

    Mike Bursell

    Executive DirectorConfidential Computing Consortium

    Mike Bursell is the Executive Director of the Confidential Computing Consortium, having been involved since its foundation in 2019, and Co- chair of the OpenSSF’s Global Cyber Policy working group. He is one of the co-founders of the open source Enarx project and was CEO and co- founder of the start-up Profian. He has previously served on the Governing Boards of the CCC and the Bytecode Alliance and currently holds advisory board roles with various start-ups. Previous companies include Red Hat, Intel and Citrix, with roles in security, virtualisation and networking. He regularly speaks at industry events in Europe, North America and APAC and has a YouTube channel dedicated to cybersecurity education. Professional interests include: Confidential Computing, Cyber Policy, the EU Cybersecurity Resilience Act (CRA), Linux, trust, open source software and community, security, decentralised and distributed systems, Web3, blockchain. Mike has an MA from the University of Cambridge and an MBA from the Open University, and is author of “Trust in Computer Systems and the Cloud”, published by Wiley. He holds over 100 patents and previously served on the Red Hat patent review committee.

    Speaker Profile

    Manu Fontaine

    CEOHushmesh Inc

    Manu Fontaine is the Founder and CEO of Hushmesh, a dual-use Public Benefit cybersecurity startup in the Washington DC area. The company believes that people need safe code and authentic data, just like they need clean water and stable electricity. To deliver this, Hushmesh leverages Confidential Computing to develop and operate “the Mesh”: a global information space, like the Web, but with universal zero trust and global information security built in. Secured by the Universal Name System (UNS) and the Universal Certificate Authority (UCA), the Mesh provides global assurance of provenance, integrity, authenticity, reputation, confidentiality, and privacy for all information within it, at internet scale. Hushmesh is a NATO DIANA Innovator startup.

    Dr. Roy Fune

    Cannot make it live? Register and submit your question. The answer will be in the video on TBW Advisors’ YouTube Channel.

    NO AI note takers allowed. Event copyrighted by TBW Advisors LLC.

  • Conference Whispers: Money 20/20 USA 2024

    Conference Whispers: Money 20/20 USA 2024

    Las Vegas, NV October 27-30

    Published: November 1, 2024                      ID: 2053

    Readers: November 2, 2024

    Analyst: Dr. Doreen Galli

    Photojournalist: Dr. Doreen Galli

    ABSTRACT

    Money 20/20 USA 2024 was held at the Venetian and boasted over 10,000 attendees from over 90 countries with 80% of attendees coming from the USA. The over 400 speakers and 300 exhibits were captured by TBW Advisors with over 340 minutes of video captured and posted. As the place where money does business, the event brings together the ecosystem of money spanning banks payments tech startups, and capital market. AI everywhere, cross bank collaboration and cross geography collaboration along with fighting fraud were the key themes throughout.

    Highlights

    • AI everywhere with particular focus on fight fraud along with cross bank and cross-border collaboration was discussed throughout the keynotes and the exhibits.

    Cautions

    • As with all new AI technology use cases, it is critical to verify the quality of the data used in training the models and identify any inherent biases. The desire is to increase accessibility of the fintech market as opposed to further facilitating biases and disenfranchisement.

    Conference Vibe

    After more than 340 minutes of taping, 29 videos, a few hundred shorts forthcoming, and over 50 fact checks, our coverage of the Money 20/20 USA 2024 closes. Money 20/20 USA had over 10,000 attendees, 400 speakers, and 300 exhibits full of vendors from around the world*. Nonetheless, there were no lines at registration to pick up one’s badge. An exciting note was shared during the press briefing that 47% of speakers were women in 2024 up from 11% in 2023. The conference provided a full breakfast for all attendees as well as some smaller stations with continental breakfast. If that wasn’t enough food, have no fear a full lunch was also available to all attendees right in the exhibit hall as well. Speakers graced one of 6 stages with a fan favorite being the Sentient stage featuring Money 20/20’s custom sentient robot, Aiana-live.

    Focus on the customer!

    No matter where in the world one resides, your life is impacted by fintech. Some experience significant inconveniences such as sending digital money to relatives across the globe only for those relatives to receive physical money. Cross border payments maintaining digital banking convenience was one of the examples shared in the distinguished panel on creating a new language for cross-border payments. This panel featured Ryan Zagone from Wise who presented his company’s solution. Other panelists included leaders from TBD – a block company, Bankaya and Vansary. A key to achieving customer desired functionality is continual modernization of payment platforms beyond migrating to the cloud. This panel included leaders from Wise, Bank of America, Deloitte, and Amazon. A session on Navigating the journey to the cloud featured leaders from Featurespace, AWS and T-Sys. The focus of this session was the need for collaboration amongst partners for the benefit of the customers. One part of the ecosystem cannot go to the cloud if critical components they depend on remain on premise. The migration journey is never truly completed. To ensure your product has solid APIs to easily integrate with the rest of the market, APImatic shared their product on the expo floor. APIMatic increases adoption by leveraging automation to ensure you complete the journey to usable APIs.

    One key ingredient every business requires is customers! The panel, “Small is the next big thing” emphasized the sheer magnitude of opportunity by serving small businesses which make up 44% of the US GDP. This panel featured leaders from Co-created, Penelope, and SMB Franchise Advisors. The emphasis was to encourage the creation of a one-stop shop, a single pane solution for all one’s financial needs for the SMB space. One method to extend the reach to additional customers includes embedded payments and private capital to expand the consumer credit space. A panel on this topic featured leaders from Jeffries, Milken Institute, Citi and Pagaya. The session emphasized the need for new risk rating models for those not currently served by the sector. In this regard, an AI risk decision engine for financial services by Bordo.ai was displayed in the expo hall.

    Once you have your customers, you want them to have an amazing experience. To facilitate a unified view of all customer activities on your platform, Mixpanel was one of the vendors on hand demonstrating their capabilities. This product along with the talk on hyper-personalization in the age of AI reminded us of our coverage of the Adobe Summit. If this is a passion area be sure to review this research as well as enjoy its related playlist.

    Trust

    Expanding on the hyper-personalization to serve customers, a fireside chat featured Fortune reporter Luisa Beltran interviewing PayPal’s Frank Keller. Titled, AI + Trust, the question of when too personalization becomes a creepy user experience was discussed. The one where you have a conversation on the phone then suddenly your computer has an advertisement for such a product. Part of the challenge with the trust question arises because the bad guys are organized, collaborate, and share information but the good guys do not. As discussed in the session “Fighting Fraud in an AI First World’, until the good teams collaborate, the issue will remain. This exciting panel featured leaders from Google, Mostly AI, BNY and Swift. This point was also emphasized in How AI Innovation Influences Trust and Safety panel. This panel featured leaders from JP Morgan, Walmart, Trulioo, and OpenAI. A key takeaway included that AI plus humans is creating new capabilities to try to counterbalance the aggressive progressive of the fraudsters leveraging AI in a coordinated fashion.

    Trust is a two-way street. For financial institutions attempting to establish trust with their customers, they may wish to leverage Inscribe.AI. This platform reviews all documents turned in by customers for signs of fraud leveraging generative AI. Maintaining compliance can also assist with maintaining trust. A highly automated intelligent solution for achieving compliance that is traceable, explainable, and auditable by Trisotech was on exhibit. As anyone who has played with early consumer editions of generative AI knows, true value of generative AI is not just the answer but understanding the why behind the generated answer. If, however, your organization is interested in leveraging behavioural AI to prevent fraud, Futurespace may be one of the products for your organization to evaluate.

    Nothing loses a customer’s trust like compromising their privacy and their data. Sometimes, no matter the steps taken, a company accidently leaves a backdoor open or misconfigures their environment compromising customer trust. Have no fear, Packetlabs and their white hats are here to offer their services. Remember: it is always better to hire white hats to find your security issues instead of finding out on the front page of the news.

    Finally, one of the more critical aspects of trust according to SEC Chair, Glen Gensler is the whistleblower program. This was one of the many topics discussed in this fireside chat.

    Identity

    We had a flashback to our coverage at Identiverse, as one might expect at any conference in a highly regulated space. The expo hall had some identity solutions on display. A true global identity solution can be difficult to find but Shufti shared their solution. Available across 240 countries validating over 10,000 document types with outcomes in over 150 languages, Shufti is based out of London.

    Another identity problem arises in Fintech around the use of credit cards. Is the person using the card really the person we issued the card to? Prove shared their solution that enables you to prove it is really you with only one small line added to the magnetic strip. Prove interestingly leverages the technology within smartphones today to enable the credit card to be a key. With a tap of your credit card to the phone, the phone can let the company know if it is really the card holder holding the official card making the charge.

    AI

    While very little of the conference did not involve AI, a key concern within Fintech involves using public models with their highly regulated data. Glean shared their product that consumes all your internal data to create a customer LLM for your organization. If your emphasis is one producing customer facing content from your own data, then Writer that leverages generative AI over your own data may be something to explore.

    One of the more creative talks on Generative AI was titled, “Killer GENAI Cake”. Emphasizing the parallels to how baking powder created new use cases for baking, GENAI will expedite fintech and related user experiences to the next level. Featuring leaders from Microsoft, iGenius, Growfin and Citizens. Questions addressed by this panel included what use cases could materialize in 2025 and beyond?

    Next Year’s Conference

    Next year’s Money 20/20 USA will be once again held at the Sands Convention Center on October 26-29, 2025.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking , The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • ­­­Conference Whispers: InfoComm 2024

    ­­­Conference Whispers: InfoComm 2024

    Analyst: Dr. Doreen Galli

    Photographer: Dr. Doreen Galli

    ABSTRACT

    IC24, InfoComm 2024, spanned 7 days and welcomed 36,967 registered visitors from 125 countries. It is the premier event for AV professionals (71%) and their customers (29%). Held at Las Vegas Convention Center West and Central Halls in Las Vegas from June 8-14, IC24 had 833 exhibitors. Transparent Micro LED, Kinetic LED and LEDs in all shapes and sizes could be seen along with a highly interactive video boards in the 407,000 net square feet of exhibition space. After over 400 minutes of recording and 9 Vegas Loop rides, and some 35 factchecks, our coverage of IC24 ends.

    Conference Vibe

    One cannot help but notice you are at a true AV conference when attendees stand to geek out over the huge sign in the West Hall discussing how it is or how they would create such an item. Something we had not witnessed prior. IC24 is the premier event for AV professionals (71%) and IT professionals dealing with AV (29%). The 36,967 registered visitors from 125 countries had no significant wait time while registering as registration rarely had a line at all.

    Spanning seven days, IC24 leverages 407,000 square feet of exhibits* in the Las Vegas Convention Center West Hall and Central Hall. The two halls are connected by a connected hallway one could walk or  riding the Vegas Loop. If you chose the walking route – quite a view including one of Sphere can be seen. Due to construction, finding the Vegas Loop from Central Hall required a covered walking through a temporary hallway. A very formal ceremony was held to open Central Hall including a formal ribbon cutting. We also filmed Thursday’s Central Hall opening and tried out timelapse effect in Central Hall for the first time. If you got hungry, the show provided food or you could buy food in the food court in Central Hall or anywhere in West Hall’s food court. Our entire playlist of video research at InfoComm 24 is available at our YouTube Channel. Save the list to capture related shorts when they are released.

    The Latest LED Capabilities

    While CES has a large collection of LED screens, CES is consumer while IC24 is industrial! Thus the AV technology is beyond what one would see in a residential setting such as Samsung’s massive The Wall exhibit that transports you around the world or their transparent MicroLED display. The common theme wasn’t just different but more energy efficient while maintaining brightness such as the exhibit by Nanolumens. For Sony it is about every aspect of sustainability even down to the amount of ink used on the box. Shape is no longer a restriction as can be seen at Pixelflex exhibit. Straight out of Hollywood GCL shared their LED 7680 refresh rate technology as well as their Extended reality screen as used in many Hollywood films.

    One of the more exciting things we came across is the Kinetic LED technology. LG Business had their large Kinetic LED display on the main hall  of West Hall. From the side, you can see why it’s called kinetic.  Another smaller player, PJ-Link shared their Kinetic LED also used to play a game. From an angle, you can still see it operate by standing slightly to the side to appreciate its kinetic capabilities.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    AV Tech

    As one would expect, there is also a lot of AV tech. Blackmagic Design, a favorite of many at NABSHOW shared their latest release, BlackMagic Replay, a new way of creating live action replays. This is sure to save a lot of AV engineers a lot of time. For those attempting to synchronize many devices connected across cables, a main stage in central hall had a demo on leveraging PTP to synchronize time. We received a full tour of the Belkin booth and saw all their offerings from basic power supply, family/team charging cabinets to secure switches. In the Trailblazer zone we came across HighSecLabs who shared their products specialized to secure AV peripherals.

    Interactive displays were a huge hit with many varieties on display. Multitaction shared their technology with built in touch technology called ClearSight Touch involving rear infrared providing amazing possibilities. The interactive, collaborative meeting technology integrated with teams, the trailblazer zone also featured NodesNow. Teams also hosted a keynote on revolutionizing the workspace. Meanwhile, Scott Josephson from Google shared his opinion on how to operate Google Meet at the enterprise level. Diversified also shared their vision for enhancing user experience through intelligent workspace transformations. One of the biggest use cases for all this AV tech is the universities. Jodie Penrod, CIO at Marshall University led a discussion on leveraging AI in the classroom. It was here we first discovered the well loved Catchbox – a toss-able mic that worked amazing except at the booth. It was so much fun that people went out of their way to ask questions. Q-sys led a talk on digital twins and generative AI in AV. If you haven’t gotten started with AI yet, Chi Hang Lo from UCLA shared his 10-point checklist. A deep dive on where to use generative AI in AV was provided by Senior Trainer, Juan Cuellar of Office Pro. If you were left with questions, a follow-up to a keynote was specifically a Q&A session including a discussion on how AI could be regulated.

    Next Year’s Conference

    InfoComm 2025 takes place June 7-13 (exhibits 11-14) at the Orange County Convention Center in Orlando, Florida.

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052                                                    

    ©2019-2024 TBW Advisors LLC. All rights reserved. TBW, Conference Whispers, Industry Whispers, Vendor Whispers, Technical Business Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and Fact-based Research and Advisory are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness, or adequacy of such information. TBW does not provide legal, or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: AI CON 2024

    Conference Whispers: AI CON 2024

    Photojournalist: Dr. Doreen Galli

    AI CON is a TECHWELL Event. Photographed with permission of TECHWELL. TBW Advisors LLC is not related TECHWELL.

    There is no written analysis for this event. Clients should book an inquiry for a discussion on the event.

  • Conference Whispers: Identiverse 2024

    Conference Whispers: Identiverse 2024

    Analyst: Dr. Doreen Galli

    Photographer: Dr. Doreen Galli

    ABSTRACT

    After over 1500 minutes of recording and 14 escalator rides, and some 35 factchecks, our coverage of 2024 Identiverse comes to a close. Identiverse was at Aria Hostel in Las Vegas from May 28-31. It is the premier event for identity professionals. It spans 4 days, 250 speakers on over 100 topics, 150 exhibitors and 3000 onsite attendees. Attendees witnessed endless examples of identity and privacy solutions including many jokes about SAML (it is NOT dead), examples of passwordless as well as talks about the value of identity.

    Conference Vibe

    After over 1500 minutes of recording and 14 escalator rides, and some 35 factchecks, our coverage of 2024 Identiverse comes to a close. Registration for the four-day event kicked off after the long holiday weekend. The event featured 250 speakers on over 100 topics, 150 exhibitors and 3000 onsite attendees. There was so much packed in it was impossible to catch all of the exhibits. They had sessions in the Joshua rooms as well as Marisopa rooms. Opening day was then capped by  a mighty keynote featuring John Whelan, President of the Cyber Risk Alliance and Andre Durand, CEO of Ping Identity and Founder of the Identiverse Conference. The event provided food for the attendees. We were able to capture breakfast Wednesday. The attendees did explicitly find me to let me know they were disappointed with the breakfast due to the lack of protein. I do understand the Microsoft Breakfast did feature sufficient protein.  Many attendees complimented the lunch which was served Wednesday as well as on Thursday. The exhibits* were open on Wednesday after the opening keynote. They were spread between two large rooms across from each other.

    Our entire playlist of video research at Identiverse is available at our YouTube Channel. Save the list to capture related shorts when they are released.

    Digital Identities

    As one might expect, Identiverse is all about identity. Much to my delight, an entire panel was presented on confidential computing. Confidential computing strength lies in multiparty computations among untrusted parties – something that occurs in the identity space quite often. The session immediately following was on digital identity where they pondered how one could achieve such an exchange – unfortunately those panelists did not attend the Confidential session. On the digital ID panel, it was exciting to see that California is live with a digital driver’s license. Many are still trying to get their real id into their wallet! Australian Bank was on stage for a keynote making the case for the Bank ID. Admittedly this talk created a bit of déjà vu to the days in the bid to become primary certificate authorities. There is no shortage of information to make the business case to adopt passwordless for your organization.

    More than Passwords

    Thursday morning’s keynote concluded with the Power of Passwordless sign-on. This session includes a number of guest speakers from the FIDO Alliance, Clarkson University, Bank of America and Amazon. The net result is that companies love it, their customers are more engaged, and the security posture is improved. Numerous examples of passwordless solutions were shown in the exhibits. AllAUthenticate shared their passwordless solution. Bringing blue collar workers who need to punch in and out into this century, Bio-Key displayed their product leveraging MFA Mellon RFID. If you would prefer your identity solution to eliminate any and all standing privileges, SGNL can get you there and help you stay in that security posture. Zluri is available to handle access control for all SaaS solutions. Aserto is an identity service that considers policy and relationship-based access control. If your service accounts are your pain point or you don’t even know how many you have of what – a start-up just out of stealth mode called Anetac may be someone you want to evaluate. If your organization’s problem is more about non-human identity issue, Natoma can assist in provisioning, deprovisioning and maintenance of non-human IDs. The word of the conference was service and non-human IDs is an area exploding with a reported over a dozen just announced at RSA.

    Google hosted an entire detailed workshop on Google Sign-On, Passkey and the use of FedFCM to deal with 3rd party cookies. It was exciting to see they are working to push privacy forward with browser.

    Identity in Practice

    An attention-grabbing keynote Thursday morning alerted to the Darkside of identity. Reminding all that identity is the most common entrance point for the uninvited. Another keynote reminded all attempting to forge a path in identity, that the most important thing is to just get going! Furthermore, pay attention to the point of no return. Identity and security are all about depth of defense, spend the effort when there is a big payout. Do not insist on 100% for each program as the last percentages take resources without improving security posture. It is far better to find a new program that will affect the remaining identities with the remaining resources.

    One often too difficult aspect of identity is customer onboarding. To that end, Strivacity specializes in the end user aspect of identity. If you challenge is too many identity services and you are having difficulty getting a complete picture, TenableOne provides a unified dashboard to see the entire threat attack surface. If your difficulty is all about connecting identity platforms to other sources and targets, Aquera Platform provides identity connector along with automation and governance in their solution. Saviynt provided a demonstration of their identity cloud with a visual display. RSA Shared their Unified Identity platform that is available on prem or in cloud for SAS saps as well as supporting SAML. Radiant Logic also provides an identity middleware heavily focusing on the data and metadata of identity. This point was also shared during John Pritchard of Radiant Logic’s keynote.

    There were options if one is seeking assistance with their identity solutions. AOH offers identity consulting spanning assessment, architecture, execution and maintenance. ProofID offers global managed identity services and are key partners with many of the top identity technology providers such as PING Identity.

    Cisco provided an in-depth workshop on defining and building an identity graph. It was very insightful, and the audience was glued to the screen. What caught our eye was the end when they said, “look at that picture – you know what that means. You know what that means you are supposed to do” Even in 2019 when I was at Gartner, augmented intelligence was present so hearing, “look at the picture” was surprising. More commonly is generative AI incorporated so it suggested actions based upon what is seen. Fortunately, Microsoft was there to bring it all back to 2024. There was an Microsoft Entra deep-dive by Nichole Peterson as well as a Microsoft Entra with Co-pilot demo that allowed attendees to zoom back to 2024.

    Next Year’s Conference

    Next year’s Identiverse is held June 3-6, 205. Furthermore, next year’s conference will be at Mandalay Bay.

     *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.                                

    ©2019-2024 TBW Advisors LLC. All rights reserved. TBW, Conference Whispers, Industry Whispers, Vendor Whispers, Technical Business Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and Fact-based Research and Advisory are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness, or adequacy of such information. TBW does not provide legal, or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: Call & Contact Center Expo Las Vegas 2024

    Conference Whispers: Call & Contact Center Expo Las Vegas 2024

    Analyst: Dr. Doreen Galli

    Photography: Dr. Doreen Galli

    ABSTRACT

    After 2 days of filming, 31 videos and 34 shorts and over 30 factchecks, our coverage of this years’ Call & Contact Center Expo Las Vegas 2024 ends. CCCLV24 was held in Las Vegas from April 24 and 25. The event was held in the Las Vegas Convention Center South Lower Hall. The event featured 4 theaters with each featuring 6 talks each day for a total of 48 keynote sessions. Attendees witnessed endless examples of how generative AI and deep learning are revolutionizing the Call and Contact Center industry.

    Conference Vibe

    After 2 days of filming, 31 videos and ~30 shorts and over 30 factchecks, our coverage of this years’ Call & Contact Center Expo Las Vegas, CCCLV24, ends. With row after row of exhibits*, the event was made whole by the balanced combination of talks and exhibits. Even better, there was 15 minutes in between the talks so one could catch the exhibits. Furthermore, all theaters  schedules were aligned in the event you wanted to switch theaters as well.

    The short two-day event is definitely mighty and packs a punch with 4 keynote theatres each featuring 6 talks a day for a whopping 48 sessions. That said, there were also 2 keynotes who were to bashful to be taped which is a highly unusual occurrence. Nonetheless, we captured quite a lot of great content in this year’s CCCLV24 playlist. In fact we also spun out over 30 shorts which are at the tail end of the playlist – in case you only want to catch the super good parts!. We were also able to capture a video of the food available. Overall, it seems the Las Vegas Convention Center hits the mark as there were just as many bragging about the food and prices as there were complaining. The Global Voice of Customer Experience, Dennis Wakabayashi, was interviewing on site and even shared his wisdom in a keynote. Fascinating to see how leveraging global call center talent can truly impact the world in which we live.

    Getting Ready for Exciting New Technologies

    Sahni Sanjeev’s keynote by eGain appropriately drove home the requirements for corporate data programs to be mature before attempting to dive into deep learning tools and techniques. A second keynote by Uniphone offered up an Enterprise AI blueprint with some very solid advice. Specifically, your knowledge management system should be used so that the data determines your first actions. One must act based on the customer pain points not the cool technology. Of course if you didn’t get to organize it yet, Robot.AI shared their solution on exhibit. Robot.ai is simply feed all your corporate data then provides a gen AI service to answer questions about all of it.

    A keynote reminder was given that one cannot use newest and greatest AI tools without thought to protect your customers. This keynote was provided by Private AI’s co-founder Patricia Thaine. In her talk, she detailed the various scenarios and considerations one must take to not end up on the news for an embarrassing compromise. It was a true sign of industry maturity to see a product such as Private AI on exhibit this year as well.

    Speaking of protection, a vendor we are familiar with, SecureLogix shared their patented solution to stopping call pumping and TDoS attacks and more. Call pumping wastes an incredible amount of money. During my tenure as a telephony strategist, every public 800 number examined suffered from a call pumping compromise. At one point, 85% of all DDOS attacks had concurrent TDOS attacks- meaning your customers cannot find you on the internet or call you regarding the issue. One modern security concern involves deepfakes, to that end Veridas was on hand with their solution to identify and stop vocal deep fakes!

    Conference Whispers: NAB Show 2024 featured translation and transcription services leveraged in editing and broadcast in a keynote as well as in exhibits. Microsoft featured their solution based on Open AI. TRINT featured their text to speech solution adopted across the industry. You may also recall in Conference Whispers: Adobe Summit we covered Transperfect and their 200 languages. For the first time ever, we found the technology that the UN decided to use expanding a ten-minute demonstration into usage for the entire day’s session. Of course, if their presentations was anything like the one at CCCLV24, we understand. Worldwide Tech Connections does text to text, text to speech, speech to text or speech to speech. They build their own grammar and vocabulary models and parse the entire sentence before translating. Of course, if you only needed a bilingual medical back office, Access Salud was there to help.

    Technologies for Agents

    Awaken’s keynote points out that Agent Experience is your Brand’s experience to your customers. To that end, there were many technologies available to improve Agent experience. You may recall FLOWIT from Conference Whispers: CES 2024 that uses Generative AI over employee satisfaction. They were also featured in an Industry Whispers webinar. CCCLV24 had a similar technology by Centrical focused on improving employee experience.  They focus on creating best-in-class employee experience for frontline agents specifically. evaluagent was on exhibit sharing how their technology can execute deep analysis of the conversation and summarize freeing up their agents.

    For organizations seeking to add AI to their agents and leave it to the agent’s discretion when and how they use AI, then Smile.cx was there for you! If you want to capture all the folklore in your organization and make it available to your agents, ScreenSteps exhibited. If you want to avoid handing agents a 200 page searchable PDF files, Drop Cowboy may have an answer for you. In another exhibit, Reddy.IO has AI for your agents and stated a system setup takes 5 minutes. If your agents have heavy accents make calls frustrating for them to communicate, Tomato.ai who was on stage last year, was on exhibit this year. We also featured Tomato.ai in an Industry Whispers earlier this year.

    Big Profiles was on exhibit to provide intelligent customer profiles that predict certain customer propensities such as churn, purchases, cross sales, and collections. Structurely shared their solution to text or call customers including an AI created voice. Observe.AI can digest all conversations with customers to identify moments of interest. If you would appreciate accurate granular sentiment analysis over all those communications, Sestek and their conversational AI and analytics was on exhibit.

    Technology Customers will enjoy

    If you are an individual who’s number is the Do Not Call registry, you will appreciate DNC’s solution. DNC to assist call centers in respecting the list by scrubbing it for numbers that they should not contact. Meera.ai enables a company to stop annoying customers by maintaining contact cadence for the organization. TNS was one of the many vendors present that can add a telephony identifier, ANI, to wireless outbound calls to the ANI of the company represented. For readers who absolutely despise IVR (Interactive Voice Response) systems, Talkr.ai shared their technology ready to make your corporate IVR system obsolete.

    If understanding your agent is critical, you will appreciate it if the agent calling has access to Tomato.ai, especially in the event they have a heavy accent. Likewise, if the company your calling is quite popular, you would appreciate if the company you are calling deployed Omilia – able to handle 6 million concurrent calls. If the company you do business with leverages Drop Cowboy, you may just get a custom voicemail. Drop Cowboy leverages deep learning capabilities to generate a voice to customize mass voicemails. Finally, for those of you that just hate filling out surveys after a speaking with a call center, Miarec has you covered. Miarec leveraged conversational intelligences to automatically score a call eliminating the requirement to survey the caller.

    Next Year’s Conference

    Call & Contact Center Expo comes to Las Vegas every year. The next CCCLV will occur April 16 and 17th, 2025, in Las Vegas, NV at the Las Vegas Convention Center.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052                                                    

    ©2019-2024 TBW Advisors LLC. All rights reserved. TBW, Conference Whispers, Industry Whispers, Vendor Whispers, Technical Business Whispers, Whisper Reports, Whisper Studies, Whisper Ranking and Fact-based Research and Advisory are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness, or adequacy of such information. TBW does not provide legal, or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.