Tag: research

  • Whisper Report: How can we ensure compliance with new and evolving Cyber Physical security regulations?

    Whisper Report: How can we ensure compliance with new and evolving Cyber Physical security regulations?

    Published to clients: July 10, 2025                      ID: 2075

    Published to Readers: July 11, 2025

    Email Whispers Release:  TBD

    Public and Video Release: TBD

    Analyst(s): Dr. Doreen Galli

    Abstract:

    Cyber-physical security, like healthcare tech, must carefully manage PII. Experts highlight privacy-preserving biometrics, user-controlled consent, and anonymous face matching. Regulatory compliance, such as GDPR, drives standardization and innovation. As laws vary by region, adaptable and consistent global system architectures are essential for scalable, secure, and compliant operations.

    Analysis only available to clients at this time.

    Related playlists

    1. Industry Whispers: Public is Private – Confidential Computing in the Cloud | TBW ADVISORS
    2. Conference Whispers: Black Hat USA 2019
    3. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 
    4. How can we ensure compliance with new and emerging cyber physical security regulations?
    5. Conference Whispers: ISC West 2025

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: How can we integrate AI-driven customer service solutions with our existing IT infrastructure?

    Whisper Report: How can we integrate AI-driven customer service solutions with our existing IT infrastructure?

    Published to clients: July 3, 2025                                            ID: 2079

    Published to Readers: July 4, 2025

    Email Whispers Released: August 11, 2025 8am

    Public and Video Edition Released: August 11, 2025 11am

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    “Integrating AI customer service with existing IT systems starts by setting clear business goals. AI should enhance, not disrupt, current workflows and streamline real-time support. Every organization has unique systems, so tailored integration is essential. A major challenge is fragmented data—making robust pipelines and clean, synchronized data critical. Accurate timestamps and system compatibility across platforms are key to ensuring effective AI performance and a smooth digital transformation journey.”

    Target Audience Titles:

    • Chief Information Officer, Chief Technology Officer, VP/Director of IT Operations, Enterprise Architects
    • Chief Customer Officer, VP/Director of Customer Services/Success, Contact Center Operation Managers
    • Solution Architects, DevOps & IT Administrators, Customer Support Agents, Data Scientists and ML Engineers

    Key Takeaways

    • Start with clear business goals so AI enhances workflows without causing disruptions.
    • Tailor integration to your unique tech environment to avoid inefficiencies.
    • Reliable, clean, and synchronized data pipelines are essential for effective AI-driven customer service.

    How can we integrate AI-driven customer service solutions with our existing IT infrastructure?

    We took the most frequently asked and most urgent technology questions straight to the technologists gathering at Customer Connect Expo 2025 held at the Las Vegas Convention Center. This Whisper Report addresses the question regarding how can we integrate AI-driven customer service solutions with our existing IT infrastructure? As Ford’s Dr. Kalifa Oliver shared, “first we need to break down our needs and our goals and figure out which pieces of AI actually build efficiencies in our IT systems because right now there are too many systems that are fragmented.” With ALL AI projects, it is best to start with the business goal not the technology. We do not want to spend resources to integrate technology that goes unused. Furthermore, the context of the business goal helps guide engineers when they have design choices to make.

    Customer Service Workflows

    AI in Customer Service is all about optimizing and improving the customer service workflow to lead to maximum customer satisfaction. As Zaon’s Jason Kaufman shared, “using artificial intelligence tools within the organization to actually help drive and make more efficient the processes that go into place in order to support good customer service. For example, leveraging artificial intelligence to actually analyze chats real time community forums real time. Actually monitoring that (the communities) helping to gain insights about what your customers have questions about so that you can leverage the AI to actually generate the knowledge on the fly to actually provide that (information removing confusion) back to them real time as if it’s another person on that community thread.” The nonobvious challenge in achieving this solution is best described by Claritiv’s CEO Sean Gigremoss. “Everybody has workflows. Every company is unique. What tools do they use? What products do they use now?  Do we need to build it?” In other words, every organization has a unique, highly mixed environment with varying degrees of maturity both in the technology itself and the organization’s ability to deploy technology.

    Verse.ai’s Zac Brooksher recommends focusing on complimenting the current workflows and processing. “We can integrate AI driven customer service solutions using full funnel metrics understanding all of the conversations the timestamps the channels the appropriate team members what next steps are all integrating into existing systems and processes just to complement what the current workflows and data processing is today like.” Any technology not realizing it is complimenting an existing process will instead create process interrupts. The distinction really is a big difference.

    The Challenge: Data is everywhere!

    As Claritiv’s Sean Gigremoss shared, data is everywhere! “They make it so easy for us to integrate because in the end that’s important because all the data are in this different .. disparate systems. You need information from Salesforce you need information from zoom you need information from slack you need information from your database you need information from your customer’s database so to be able to do that you need to make sure that you’re using the tools or you’re partnering with companies that help you so that you can focus on what you do best.”

    But the data isn’t just everywhere, it comes from everywhere. The first obvious location was shared by Enthu.ai’s Atul Grover, “we integrate with the telephony at the dialer.” And the rest such as the web and email communications, “we ingest that using an API driven environment.” Diabolocom specializes in capturing all that occurs between the customer and the organization on mobile devices. As Diabolocom’s Benjamin Shakespeare shared, “with our mobile solution that we are about to release

    the market  .. So all field reps anybody who is using a cell phone today with every interaction they have on their phone our AI will then score that call transcribe it and push it directly into the CRM So any lack of compliance that you are seeing today in your organization from people that are not sitting behind a computer that will be no longer.”

    Where the magic happens!

    Now that we understand we are complimenting the existing customer experience workflows for the benefit of the customer experience and that data is everywhere, what can we do?  As Macy’s Siva Kannan Ganensan shared, “you need to make sure your data pipeline is very robust when we talk about all this AI integration data is the core so make sure the data is cleansed and always readily available ready to serve with that we’ll be able to integrate an into your existing architecture or in your organization.”

    workflow pictured above a data fabric with robust data pipelines

    Figure 1. Compliment Workflows & Leverage Robus Data Fabric

    It’s all about the data infrastructure! You need robust data pipelines as part of your data fabric to seamlessly integrate any new AI offering as depicted in Figure 1. AND you must ensure data quality. For example, data quality is paramount when dealing with timestamps of customer communications. What time zone is your organizational standard? Do your IT systems work in that time zone, and do you know what systems provide timestamps in other formats or time zones? Is that true for any and all corporate acquisitions feeding data into the system? Is the system designed to handle the variety of daylight savings time scenarios? Are all the clocks adjusted for daylight savings automatically or manually? Finally, are the timestamp clocks aligned? To the second or to the minute?  It’s valuable to know if you can look at time as fact or approximation in your organization. If your organization is going through any type of digital transformation, it is critical to get the best advice available to ensure your success. Ensure your success by scheduling your inquiry with a TBW Advisors advisor before starting any critical phase of your digital transformation journey. Get the smartest advice available and leverage our firsthand experience to your advantage.

    Related playlists

    1. Whisper Report: How can we integrate AI-driven customer service solutions with our existing IT infrastructure
    2. Conference Whispers: Customer Connect Expo 2025

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: What are the best practices for enhancing cybersecurity in FinTech?

    Whisper Report: What are the best practices for enhancing cybersecurity in FinTech?

    Published to clients: June 26, 2025                                                                         ID: 2066

    Published to Readers: June 27, 2025

    Email Whispers: TBD

    Public with Video Edition: TBD

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    To strengthen cybersecurity in FinTech, experts emphasize a layered approach that combines technology and human awareness. Rising threats like phishing, smishing, and fraud demand not just better tools but also vigilant, well-trained employees. Embedding security scans into software development, analyzing diverse data signals, and adopting a “defense in depth” strategy are all critical. Ultimately, staying curious, asking the right questions, and embracing evolving technologies—especially AI—can help organizations stay ahead of cyber risks.  

    Research available only to clients at this time.

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.  

    TBW Advisors LLC logo

    Related playlists

    1. Conference Whispers: Fintech Meetup 2025
    2. Conference Whispers: Money 20/20 2024
    3. Conference Whispers: Identiverse 2024
    4. Conference Whispers: ISC West 2025
    5. Q1: Fintech Meetup Playlist – How can we ensure Compliance with evolving regulations?
    6. Q2: Fintech Meetup Playlist – What are the best practices for enhancing cybersecurity?

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: What are the best practices for enhancing cybersecurity in healthcare?

    Whisper Report: What are the best practices for enhancing cybersecurity in healthcare?

    Whisper Report: What are the best practices for enhancing cybersecurity in healthcare?

    Published to clients: June 18, 2025                                                  ID: 2063

    Published to Readers: June 19, 2025

    Email Whispers: TBD

    Video Edition: TBD  

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    Cybersecurity in healthcare is responsible for protecting the data that represents the life’s story of patients and infrastructure to enable proper care. Managing and securing the plethora of edge devices and the interoperability of all the technologies is an increasing challenge. There are four steps to take to enhance your healthcare cybersecurity: select a framework, leverage depth in defense, automate where possible, and test your environment.

    Analysis is only available to clients at this time.

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.

    Related playlists

    1. Whisper Report: HIMSS: Question 1: How can AI be effectively integrated into healthcare systems??
    2. Conference Whispers: HIMSS 25

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Published to clients: May 20, 2025                                               ID: 2073

    Published to Readers: May 21, 2025

    Email Whispers: June 13, 2025  

    Video Edition: June 13, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    As cyber and physical security continue to merge, proactive, multi-layered strategies are essential to safeguard critical assets in interconnected environments. Secure data practices, including encryption for data in transit and at rest, during compute, and ensure compliance with high security standards. Architectural resilience is crucial, integrating cybersecurity from the outset rather than retrofitting outdated systems. Correlating physical and cyber events provides valuable context. Finaly, digitizing workflows streamlines response efficiency, minimizing the window of vulnerability during attacks.

    Target Audience Titles:

    • Chief Technology Officer, Chief Security Officer
    • Chief Information and Security Officer, VP of Cybersecurity
    • Director Cyber Physical Security, Security Analyst
    • Cybersecurity Engineer, Incident Response Analyst

    Key Takeaways

    • Data must be encrypted at rest, in transit, and during execution.
    • Cyber Physical security requires a securely designed architecture from the start.
    • Cyber and physical threats must be correlated.
    • Only a digitized workflow can respond with the required speed to cyber physical threats.

    Secure data

    As with all security, cyber physical security must also be concerned with, “ data security and encryption … that’s data in the device, data in transit, data in rest at the servers, and so all of those things we have the highest level standards and we also meet more advanced requirements, “ Bioconnect’s Edsel Shreve. The solution should be flexible enough to enable any data protection requirements that come into play. Edsel Shreve went on to further explain, “for example you need to do certificate rotation for things like TLS encryption So we can do those things not every customer wants them but those are the things that we’ve actually got in our system for the folks that have those higher level requirements so it really is the combination of how do we make sure that they’re cyber secure sitting on the network and then how do we make sure that they’re  physically and the data is secure on the on the readers and devices themselves.” In addition, TBW Advisors LLC recommends confidential computing architectures for protection and privacy during computations. For additional information see Industry Whispers: Public is Private – Confidential Computing in the Cloud.

    Secure Architecture

    Taking a 1968 mustang and updating it to 2025 safety standards would be quite the challenge and likely land up with an ugly beast that is neither safe nor resembling of a mustang. Cyber physical security is no different than safety. It must be thought of and integrated from the very beginning. As LVT’s Steve Lindsey explained, “it starts with architecture if we can rethink our architectures and we can start building for cyber security in mind.” The challenge of physical cyber security is that, “for the longest time in the physical security space we’ve been using on premise systems and as we’ve lifted and shifted those into the cloud ..  what complicates that is as we’re deploying these systems it’ not just cloud to end User, it’s Cloud to IoT (Internet of Things) device which is going through usually public cellular or satellite infrastructure itself and there’s other things that need to be done to address that” Steve Lindsey.


    Correlate Physical Cyber Events

    The real power of cyber physical security is the two areas working together to correlate events. Through correlation, context and a greater understanding is realized. An example shared by Advancis’ Paul Shanks demonstrates this best. “Someone loses their badge and falls out of their pocket and they’re logged into the network from home and their badge is used at the building. Those two  events by themselves are benign but we take that together and create a an alert for the operator to look into whether is it a Cyber attack or is it a physical attack.”

    Digitize Workflow

    As early as 2019 TBW Advisors LLC has been advising clients to automate security responses when possible for the simple fact you must. Ransomware attacks were already taking place within a 35-minute window. In 2025 the cyber physical attack vector also calls for automation or a digitized workflow at the very least. As Advancis’ Paul Shanks communicated, “we can take that and make that workflow digitized so that all they have to do is read click and go. Simple as that.”

    Related playlists

    1. Industry Whispers: Public is Private – Confidential Computing in the Cloud | TBW ADVISO RS
    2. Conference Whispers: Black Hat USA 2019
    3. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 
    4. Conference Whispers: ISC West 2025
    TBW Advisors LLC logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Industry Whispers: AMA with Victoria Essner

    Industry Whispers: AMA with Victoria Essner

    Join us for an inspiring Global Accessibility Day Interview, 

    Celebrate Global Accessibility Awareness Day with an empowering Ask Me Anything (AMA) session featuring international best-selling author and accessibility advocate Victoria Essner.

    With over 30 years of professional experience in assistive technology—and more than 50 years of lived experience navigating the world with vision loss—Victoria’s journey has been one of innovation, advocacy, and empowerment.

    From navigating the early challenges of digital accessibility to becoming a trusted expert, she has helped countless individuals find independence through technology.

    In this heartfelt, one-hour session, she’ll share personal experiences, lessons learned, and how her passion for accessibility has shaped her work. Discover the milestones that led her to write From Tech Frustration to Freedom and why she remains committed to making tech inclusive for all!

    Come be inspired—and bring your questions! Whether you’re new to accessibility or a long-time advocate, you’ll walk away with practical insights, renewed hope, and a reminder that inclusive tech is possible for all!

    Research Code TBW2082

    Cannot make it live? Register and submit your question. The answer will be in the video on TBW Advisors’ YouTube Channel.

    NO AI note takers allowed. Event copyrighted by TBW Advisors LLC All Rights Reserved.

    Victoria Essner is a legally blind assistive technology coach, caregiver advocate, speaker, and international best-selling author. With over 50 years of lived experience and 30+ years of professional expertise, she empowers blind and visually impaired individuals — and the caregivers who support them — through personalized training and compassionate support. Victoria has consulted with Fortune 500 companies, nonprofits, and government agencies on accessibility and inclusion. She hosts the Blessed Thru Blindness podcast and founded AT Made Easier, a membership designed to simplify tech and restore confidence. Her signature message: Breaking Barriers. Building Independence. One Breakthrough at a Time.

    Heather Osborn was most recently Engineering Manager at Zapier, leading the Developer Enablement team focused on incident management, observability, and service catalog. With over 25 years in tech, she’s worked across systems engineering and operations, including a long tenure at Ticketmaster where she helped scale their infrastructure from a handful of gaming desktops to a global, hybrid cloud system handling massive traffic spikes.

    More recently, she’s specialized in cloud-native infrastructure, with an emphasis on AWS, Kubernetes, and enabling developer autonomy through secure, maintainable systems. She’s spoken at Southern California Linux Expo three times, most recently on Turning Incidents into Insights, Not Insults.

    Heather is a longtime advocate for diversity in tech—founding and mentoring in women’s groups, and often being the only woman on her team. She believes accessibility is essential to building inclusive, empowering technology for everyone.

    Outside of tech, she’s a distance runner, live music fan, immersive camping nerd, proud mom, and devoted cat herder.

    Dr. Doreen Galli is the Chief of Research at TBW Advisors LLC. She’s led significant and measurable changes as an executive at IBM, DPWN, Dell, ATT, and most recently Microsoft. Dr Galli was Chief Technology and Chief Privacy Officer in Azure’s MCIGET. Gartner recognized Dr. Galli as an expert in data ingestion, quality, governance, integration, management, and all forms and analytics including sensor data.

  • Whisper Report: How can we ensure compliance with evolving regulations?

    Whisper Report: How can we ensure compliance with evolving regulations?

    Published to clients: May 6, 2025                                                                            ID: 2066

    Published to Readers: May 7, 2025  

    Published to Email Whispers: May 19, 2025

    Public with video edition: May 20, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    To navigate evolving fintech regulations, experts at Fintech Meetup 2025 emphasized three key strategies: staying engaged with the field and regulatory agencies, structuring well architected stable solutions, and leveraging AI or Copilots. Together these proactive approaches help fintech firms stay ahead of regulatory shifts while maintaining security and efficiency.

    Target Audience Titles:

    • Chief Technology Officer, Chief Security Officer, Chief Information and Security Officer, Chief Trust Officer, Chief Compliance Officer, Chief Risk Officer
    • Head of Product, VP of Product, Chief Marking Officer, Data Protection Officer, Director of Data Protection
    • Enterprise Architect, Director of Data Governance, Chief Privacy Officer, Head of IT Audit

    Key Takeaways

    • Today’s security breaches are the source of tomorrow’s regulations.
    • Security cannot be an afterthought; it must be planned from the beginning.
    • Leverage AI and Copilots that are integrated with your processes to aid employees.

    How can we ensure compliance with evolving regulations?

    We took the most frequently asked and most urgent technology questions straight to the Fintech experts gathering at Fintech Meetup 2025. This Whisper Report addresses the question regarding how can we ensure compliance with evolving regulations? As Socure’s Matt Thompson shared, “I don’t think it’s enough in this space to be a passive Observer or responsive or reactionary to regulations, there’s a lot of Evolution right now happening.” Figure 1 shares three actions you can take to conquer evolving regulations.

    Stay Engaged

    One of the best actions an organization can take to stay on top of regulations is to stay engaged and in touch with the real world. First, real world happenings such as hacks define future regulations. As SecurityMetrics Matt Cowart shared, “QSA (Qualified Security Assessor) is really going to help you understand where you’re sitting at and as they are informed with the evolutions of technology and all the advances that are going on having them connected with  real world teams.” Or as Matt Thompson of Socure suggested, “staying engaged with the regulators and the development of the regulations themselves.” If you know what the regulators are working on in draft, you will not be surprised when it becomes law. Keep in mind the reach of the company determines what exact regulators and what specific regulations apply. As OnFido’s Marie Millick shared, “we have a team of subject matter experts that are constantly researching. We also collaborate with the same team that works with interpole around everything around data privacy and identity.”

    Structure Solutions for Stability

    Many suggest the best way to be prepared for evolving scenarios of all types is to start with a robust and secure foundation. As Onbe’s Tony McGee shared, “our company is fully audited, fully solutioned and architected to protect the data.” This architecture doesn’t act alone but is complimented with strong processes. Tony McGee further explained, “ensuring that we build in the processes to make sure that every step of the way is a compliant one.” Together architecture and processes form a robust foundation. This robust foundation enables Onbe to ensure, “that the consumer understands all the fundamentals of the payout.”

    Any clients at this phase should schedule an inquiry to receive guidance. We will set up a plan of inquiries during your journey to give you any guidance we may have or can gather to assist you. The plan should capture milestones including but not limited to strategy reviews, presentation reviews, and even architecture reviews.

    Leverage AI and Copilots

    Today, we are no longer left with antiquated tools. As Thetaray’s Adam Stuart pointed out, “the traditional rule-based systems you have to know what you’re looking for to build that rule but if you don’t know what you’re looking for and you’re looking for these new patterns and behaviors that people are using you can’t do that with the simple rule base which is why cognitive AI is such an important feature to include.” In other words, in addition to keeping up to date and starting with a solid foundation, the tool itself contributes to identification of potentially troubling patterns. Interface.ai’s Connor Tullilus draws us a picture of what this is like in the real world. “To be able in real time have a co-pilot AI assistant sitting behind the scenes to assist them in the day-to-day operations. One in real time being able to update your policies procedures while (two) being able to (use) the AI assistant hooking up with your current knowledge bases your share.”

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.

    Related playlists

    1. Conference Whispers: Fintech Meetup 2025
    2. Conference Whispers: Money 20/20 2024
    3. Conference Whispers: Identiverse 2024
    4. Q1: Fintech Meetup Playlist – How can we ensure Compliance with evolving regulations?

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: What are the biggest challenges of using generative AI in logistics?

    Whisper Report: What are the biggest challenges of using generative AI in logistics?

    Published to clients: April 28, 2025                                                            ID: 2058

    Published to Readers: April 29, 2025

    Published to Email Whispers: May 8, 2025

    Public: May 9, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    The logistics and supply chain sector faces significant challenges with data. Issues include non-existent data, inconsistent formats, manual errors, and lack of historical context. These problems stem from complex processes and resistance to change. Human-machine interaction adds another layer of complexity. Generic AI models struggle due to the unique demands of logistics. Despite these hurdles, there are opportunities for generative AI to enhance efficiency and provide valuable insights. Successful implementation requires accurate, context-rich data and a willingness to transform processes. Embracing AI can lead to improved operations and better decision-making in the logistics industry.

    Target Audience Titles:

    • Chief Supply Chain, Logistics Officer, Procurement, Technology, and Data Officers
    • Supply Chain, Logistics, Procurement, Technology, BI

    and Data Science Directors

    • ERP Specialist, Supply Chain IT, Data Scientists, BI and related managers

    Key Takeaways

    • Inconsistent, incomplete, and manually entered data hinder AI’s effectiveness.
    • Poorly structured processes and a reluctance to adopt AI-driven solutions slow innovation.
    • Onboarding new suppliers and standardizing systems remains difficult.
    • Generic AI models don’t understand logistics-specific challenges.
    Strategy rating 3
Tech depth 1

    Biggest challenge using Generative AI in Logistics??

    We took the most frequently asked and most urgent questions straight to the logistics and supply chain experts in the industry. This Whisper Report addresses the question regarding the biggest challenges using generative AI in supply chain and logistics. The first challenge, however, is not unique to that industry nor is it unique to generative AI. This challenge applies to a all analysis and analytics including all forms of AI – generative or not regardless the size of the models. Put simply, no matter how many ways you state it, when you put garbage data in you will get garbage results.

    Tom Larson with ITS Logistics “bad inputs in = bad outputs.”

    Balaji Gunter with Hoptek, “case of garbage in garbage out.”

    Blake Donaldson with Nutrabolt, “quality of information.”

    Obrie Scarborough with Wolley Digital Innovations, “good in good out.”

    Jacob Hobbs with Cubiscan, “you are only as good as your data.”

    Additional research on technology available to help with getting and cleaning data in supply chain and logistics is available in Conference Whispers: Manifest 2025 and Conference Whispers: Smart Retail Tech Expo.

    Challenges Unique to Logistics and Supply chain?

    Given the dominance of a common answer, this raises the question, is the sector of logistics and supply chain in worse shape versus other industries? More specifically, is the data itself within logistics and supply chain the problem and if so, why? Put simply and as depicted in Figure 1, the challenges go far beyond the data. As Don Addington of Cloud 9 Perception put it, “in logistics space there is a level of complexity that is more complex than others.” These complexities come in for the following reasons.

    Figure 1. Challenges using Generative AI in logistics

    Data doesn’t exist

    There is an ideal digital world which is very different from the physical world. As Owen Nicholson from Slamcore pointed out, “If you are not seeing real world deployments with all the gnarly things that go wrong you are only creating idealized models that don’t work in the real world.” Distribution centers are full of human and robot workers as well as machines from multiple manufacturers. Unlike construction, many of these machines are in the same building they entered at the start of their usefulness as brand new machines long before generative AI term existed. Logistics is not the neat and tidy world of fintech transactions.

    Data is inconsistent

    As Ben Tracy of Vizion pointed out, “(many) skipped a few fundament steps, being useful and being reliable…  They don’t monitor data quality, they don’t have consistency amongst data formats, and their systems are not exportable for the data that is inside of them.” Or what data professionals call it- ‘good old fashioned data quality’. To put it in the simplest terms possible, we all learned early in elementary school you need data in the same units to perform any math over the data. You do not add inches and feet together. You cannot add meters and feet together. You don’t speak globally about time without time zones. But perhaps most important, you cannot create data quality nor can you analyze data you haven’t or cannot export.

    Data is manual and miss-keyed

    If you are wondering how bad that data can be, Dawn Favier of Green Screens provided some hard facts, “its not uncommon to flag 35% of their (customers) data as dirty. Dirty meaning miss-keyed data, something tagged as full truck load when its partial.” Obviously, if one looked at data for a half truck and leveraged for a full truck, the resulting analytics are useless. With 35% of one’s data being dirty, there is work involved before you can even hope for insights.

    Data lacks historical context
    For any AI to be successful, you need massive amounts of data over a very small problem so the mathematics behind the AI can provide useful information. As Atit Shah of Chetu explained, “

    Even if you have the right collection of data, you can generate incorrect forecasting. A lot of people do not have a huge history or the history of the records so they go into the gen AI because everyone is doing it but it doesn’t meet their expectation.“ No matter how powerful the technology, all forms of AI need good data. Furthermore, the data must have context to be useful for any advance form of AI including generative AI.

    Bad Processes
    One obvious reason for messy data is the messy, manual, and imprecise or undefined processes it represents. The biggest challenge as Bill Driegert of Flexport shared, is simply, “not slapping it (generative AI) on bad processes. There needs to be a lot of process engineering required to leverage AI.”  If process re-engineering and establishing a clean data fabric is your organizations Mt. Everest, TBW Advisors LLC offers a lot of first-hand experience and expertise to teams and executive via inquiry. Any clients at this phase should schedule an inquiry to receive guidance. We will set up a plan of inquiries during your journey to give you any guidance we may have or can gather to assist you. The plan will cover milestones including but not limited to strategy reviews, presentation reviews, and architecture reviews. It is not an area to go through without a guide on your side even if the work is outsourced.

    Resistant to change

    It is always important to consider the culture of any organization when executing or desire to execute change management. As Erica Frank of Optimal Dynamics put it, “need to take a healthy assessment, how resistant are we to change, how are we going to challenge this from the top down.”  As with any change management, executive buy-in with a business objective are critical to success. AI for the sake of AI is always a bad idea.

    Perhaps the reason many in this space are resistant to change is the change is constant. As Jason Augustine of WNS put it, “Environment keeps changing every 3-6 months”. Thus discovering opportunities to align and integrate the transformational changes into these already occurring network constant changes is a less tumultuous approach.

    Human Machine Interaction

    Logistics, like manufacturing and construction, has a lot of machines in the loop. Those machines may or may not be intelligent machines. Thus as Dr. Mario Bjelonic of Rivr.ai shared, “the challenge will come up in terms of how the humans and robots will act as a team together.” Optimizing the total solution over this shared space is the true goal. But as one organization is optimized, what about working between each organization?

    As Justin Liu from Alibaba.com stated, “biggest challenge what it can do and what it cannot do

    is the on boarding suppliers cannot be done by AI”. That’s correct. Bringing each and every machine into the system, or each and every supplier and the complex of array of data that that suppliers managed to coalesce together IS ITSELF NOT standardized thus cannot be automated.

    Can’t use Generic Gen AI

    As Balaji Guntur of Hoptek pointed out, “Most of the models are very generalized.” “AI is data hungry, and you need to train it on real data. The biggest challenge Generative AI in logistics is that the generative models don’t know what logistics is doing. This is the main challenge,” Aviv Castro, Sensos. In summary, as best put by Nykaj Nair of Sugere, “you need data highly accurate data that is relative to the companies supply chain.”

    Opportunities for Generative AI in Logistics

    With all the challenges discussed, it may seem discouraging. It is important to realize the significant opportunity awaits thus easily providing business justification for the work to transform – carefully. As Justin Liu of Alibaba.com put it, “we are continuously adopting AI into our workflow into our latest and greatest features and functionalities to do their business more efficiently.” Rye Akervik of Shipsi believes the value is, “in adding it as a first layer to understand the (customer) issue.” Mick Oliver of Dexory shared, “We don’t see it as a challenge we see it as an opportunity and provide insights based on that data.” Rich Krul of Hoplite observed that the intelligent systems are, “way more efficient, people get their answers a little faster and thinks that is a good thing for the industry.” Most importantly as Georgy Melkonyan of Arnata pointed out, “Shouldn’t fear it (AI) is going to take your job, ai will not replace your job. The people that use ai are going to replace your job.”

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.

    Related Research and Playlist

    1. Whisper Report: How can we manage tariff costs in our supply chain?
    2. Whisper Report: What are the biggest challenges of using generative AI in logistics?
    3. Conference Whispers: Smart Retail Logistics Expo
    4. Conference Whispers: Manifest 2025

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: ISC West 2025

    Conference Whispers: ISC West 2025

    Las Vegas, NV March 31-April 4

    Published to clients: April 7, 2025         ID: TBW2069  

    Published to readers: April 8, 2025           

    Published to Email Whispers: July 28, 2025 12pm.

    Publicly Published with video edition: July 28. 2025 2pm.   

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    After capturing almost 50 videos, over 150 minutes of content and countless shorts forthcoming, our coverage of ISC West 2025 closes. Attendees gathered for ISC West 2025 held in Las Vegas March 31-April 4. The event featured innovations in video surveillance, driver-assisted systems, palm vein identity solutions, edge AI, and gunshot detection. Exhibits included AI vision, camera intelligence, and layered security solutions. TBW Advisors was able to capture exclusive content from the live sessions as well as full details on top products at exclusive Press Briefings.

    Cautions

    • ISC West offers the option to print your badge at home. It is important to note that you not only need your badge holder and lanyard on site, but you still must wait in the registration line. Specifically, you must present and verify your ID to get a sticker on your badge for it to be useful. IF you only snag the badge holder, you will land up back at the long registration lines.

    Conference Vibe

    Our coverage of ISC West 2025 includes over 38 videos and over 150 minutes of video content spanning session summaries, product overviews, and answers to three urgent questions. There will be countless shorts forthcoming so save the entire Conference Whispers: ISC West 2025 playlists by clicking on the book mark symbol. Registration was quite interesting for the x attendees as one could print the badge at home but still required face to face registration to get the validation sticker. Held at Venetian, the customary Venetian Café Presse was open as well as the Venetian Food Marketplaces within expo hall if you got hungry. The event seemed to exceptionally crowded as you can feel as all waited for expo* hall to open and was loud enough to trigger a 100db warning on my watch. Upon clearing security, endless exhibits featuring massive amounts of vision AI,  AI video analysis, IoT sensor data, and complex security identity solutions bridging the physical and cyber worlds.

    While at ISC West, we conducted research for three forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging threats?  
    2. Whisper Report: What are the best practices for integrating AI and machine learning into our security systems?
    3. Whisper Report: How can we ensure compliance with new and evolving security regulations?

    Sessions and Press Event

    We are excited to share that we have two exclusive pieces of content where the presenters gave a special overview just for TBW Advisors LLC, our clients, and subscribers. First, we have the session by Intel RealSense. This session focused on the combination the long history in vision and the long history of AI together to successfully create the current generation of facial recognition for the purpose of useful Identity and Access Management via the biometric field of one’s face. Keep in mind, data representing one’s face is PII or personally identifiable information. While not healthcare, the protection of PII requires the same care as all PII data as discussed during our coverage of Conference Whispers: HIMSS 25.

    The second session summary we were also treated to includes a look at when cyber and physical security combine. Operations and IT coordinating to achieve a business function is quite common. As anyone who has been a corporate CIO in an organization with physical buildings knows, security is security. Physical security must interface with IT systems to understand who is permitted to do what. Historically, if physical security fails, IT systems are always at a higher risk due to information being left around or the increased attack surfaces made available via the ability to physically access a network terminal or a server itself depending on the organization. In 2025, the rush to get data from everything connected to survive the pandemic or to rush ahead with AI solutions has increased possible attack surfaces. The confluence of these scenarios together has made the Cyber Physical Security practice space blossom so expect to hear and see a lot more in this space for the foreseeable future.

    Whenever given the chance, we try to bring unique content and details about the companies at the conferences to you. At ISC West we were able to attend a special, press only event held by Taiwan Excellence better known as Taitra. Taitra’s mission is to help spread the word around the world about innovations coming out of Taiwan by featuring some of their companies. The editor in Chief for Security Today Magazine, Ralph Jensen also spoke at this event to kick it off. We were able to capture the full 10-minute presentations for each of the 6 technologies featured!

    The first technology featured is Cyberlink. Cyberlink provides extensive video surveillance capabilities including the ability to successfully track people. In the event of a violent attack or a lost child, finding the desired human being from all the surveillance video available can be quite timely without the right technology. Cyberlink’s people tracking works even if the face is not visible on the video through posture, clothing, or body movement signature.

    Advanced driver-assisted systems (ADAS) are popular in automobiles but for larger vehicles it is still newer due to the complexity and size of semi-trucks. EverFocus gave the press an in-depth overview of their current solution including the company’s success in obtaining many Taiwan and global certifications enabling deployment.

    The third technology presented at the event was Himax with their palm vein identity solution. As this contactless solution works even if a surgeon has scrubbed for surgery and put on their two pairs of surgical gloves, this technology could have easily been featured at HIMSS25 or Identiverse. Himax is not only known for their palm vein identity solution but also for their ultralow power AI processor that runs their solution and is available on the market as WiseEye.

    The fourth and fifth companies presenting both featured edge solutions. Kneron featured a general-purpose secure full stack edge AI solution that support AI services at the edge for a large variety of use cases. One example is combing standard RGB video with thermal camera information for a cohesive image to properly identity living beings or animals in the camera’s view. Likewise, Vivotek specializes in IP Surveillance solutions including network cameras, network video recorders (NVRs) and related software solutions and accessories.

    Exhibits

    The product mix set at ISC West is interesting as it spans AI vision, Camera Intelligence, surveillance, and identity. Let’s start with the best in show new product two-time award winner, Vaidio. Vaidio provides an AI vision platform leveraging their deep AI expertise. Their belief is you should be able to point a camera at anything and make it safer. Safr is a vision AI solution focuses on facial recognition and liveness verification for live video including watchlist alarms. We also had an extensive booth tour by Intel RealSense. As you can see, their solution is quite easy to integrate for developers. Enrolment is quite simple. Their chip/software solution is integrated into many of the products on the floor. They also provided a live demonstration of their solution in action. If you are famous or a high NetWorth  individual and you are not comfortable with your personal identity or other information floating around the web, 360 Privacy was there with their solution.

    Advancis is 30-year-old company that provides a one-stop identity solution that focuses on integrating as many hardware devises as possible. It currently can integrate with over 550 hardware devices on which it can capture and verify credentials. They add support for approximately 30 devices each year. Also playing in the Physical Identity and Access Management (PIAM) space is RightCrowd. RightCrowd specializes in complex scenarios for organizations with many employees, many visitors across many locations. For those seeking a PIAM solution leveraging facial recognition or fingerprints, Bioconnect might be on your radar. Bioconnect integrates with the top 8 IAM platforms in the market. For a layered security approach, dormakaba provided TBW Advisors LLC with an exclusive booth tour walking through their offering and various layers. If any of the biometric or other identity information needs to be put on a secure card with any of the contact and contactless embedded technology, Dascom was on site. Their printer can securely hold up to 200 finished product cards until a batch is completed and retrieved.

    Diving more into the physical security aspects, LVT provides a mobile security unit that is rapidly deployable. LVT’s low power solution leverages cellular connectivity and high scalability for future proofing its deployment. Underneath the surface, LVT leverage the latest in agentic AI capabilities within its solution to provide these advanced capabilities. Another agentic AI solution that

    stops threats without human intervention based on video surveillance, Spot.ai might be on your radar. As an Agentic AI solution, Spot.ai not only detects an issue but can automatically handle the threat in 90% of the cases. Specifically, the solution will automatically be able to execute things like intimidating announcements, spotlights on, and following the potential threat as well as turn on sirens. The solution notifies a humans if the automation determents fail.

    Finally, if safety and security means identification of a gun shot and its source, Databuoy was on hand. With technology funded by DARPA, their solution is just as effective in your closest metropolitan area as it is in a urban combat.

    Next Year’s Conference  

    ISC West 2026 conference will once again be held at the Venetian in Las Vegas, Nevada. The dates are yet to be announced for 2026.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.