This Whisper Report investigates What’s the next gaming tech that will change how we play? Drawing on signals from the gaming floor, the analysis hints at emerging technologies quietly reshaping production, interaction, and player intelligence. Cited experts: Justin Cosnett (Continent 8 Technologies), Will Shuckburgh (eCOGRA), Chris Chuang (Relay), Wanor Franca (CCT), Erik Regan (Plotline), Matt DeLaura (Seon), Phil Simpson (fullstory).
This Whisper Report investigates What Fintech problems are you solving in 2026? Drawing insight from on-the-ground conversations at Fintech Meetup 2026, it surfaces the pressures shaping next‑gen financial platforms and the bets leaders are quietly making. It previews how scale, trust, and automation collide before outcomes are obvious. Cited experts: Peter Daunton (Sokin), Kunal Datta (Unit21.ai), Jack Chawla (interface.ai), Liam Reaume (Sardine).
This Whisper Report investigates the question, “What’s your biggest access control challenge?” Researched at ISC West in Las Vegas, the report analyzes challenges driven by fragmented systems, persistent legacy technologies, and incomplete integrations. It finds that access control risk increasingly stems from interoperability gaps and response readiness rather than tool availability alone. Insights are drawn from Ed Hendricks of Keri Systems, Joshua Hartman of Hartman, and Peter Evans of Xtract One.
This Whisper Report investigates what jobsite tech boosts output most today? At CONEXPO‑CON/AGG, practitioners surface where productivity truly moves—beyond hype—highlighting overlooked levers shaping cycle time, safety, and uptime this year. Read on for the signals that matter now. Cited experts: Nate Jones (Weir–Esco Division), Christopher Sommer (MOBA Automation), Joel Honeyman (Doosan Bobcat), Nicolas Legrand (John Deere).
“This Whisper Report investigates how Gen AI will reshape enterprise finance operations. Researched on‑site at Money 20/20 USA 2025 in Las Vegas, it examines how financial operations are evolving under accelerating automation and intelligence. The report highlights perspectives from AutoRek’s Nicholas Botha, Veratad’s Thomas Canfarotta, Globant’s Erin StillWell, Oracle’s James Calise, Zoominfo’s Brandon Tucker, localpayment’s Ezequiel Israel, and IPQS’ Shea Craft.”
Published to clients: February 24, 2026 ID: TBW2115
Published to Whisper Club: February 24, 2026
Analyst(s): Dr. Doreen Galli
Photojournalist(s): Dr. Doreen Galli
Abstract:
“This Whisper Report investigates how will AI change warehouse architecture. Researched at the Retail, Supply Chain and Logistics Expo in Las Vegas, it highlights how AI boosts worker guidance, accelerates operations, improves predictive decisions, and reshapes automation across physical and digital systems. It also stresses fragmented tech stacks and future robot‑centric warehouse design. Quoted: Steve Harris (Warehouse Craft), Priya Katyal (PGS360), Petros Dertsakyan (oloround), Rodrigo Hernandez (Bazarup), Sean Elmurib (Backops AI), Naushad Ahmed (MetaOption), Ingo Pietruska (Lufthansa).”
Published to clients: February 17, 2026 ID: TBW2086
Published to Whisper Club: February 17, 2026
Analyst(s): Dr. Doreen Galli
Abstract:
“This Whisper Report investigates how AI and behavioral analytics enhances identity security. It highlights how organizations manage identity scale and emerging threats using behavioral baselines, anomaly detection, and contextual risk scoring. Researched at Identiverse held in Las Vegas, it incorporates quoted insights from Lumos’ Janani Nagarajan, GitGuardian’s Dwayne McDaniel, CyberSolve’s Ankush Kappor, Oasis’ Guy Feinberg, Simeio’s Octabio Lopez, Clarity Security’s James Davidson, Cubeless’ Treb Ryan, Apono’s Ofir Stein, Keeper Security’s Craig Lurey, Imprivata’s Diron Chain, and Panini’s Jim Harris.”
Published to clients: February 2, 2026 ID: TBW2135
Published to Whisper Club: February 2, 2026
Whisper Email Release:
Analyst(s): Dr. Doreen Galli
Photojournalist(s): Dr. Doreen Galli
Abstract:
“This Whisper Report investigates what IoT innovation will redefine smart living in 2026. Researched on‑site at CES 2026, it explores how emerging technologies are reshaping home experiences in ways that blend intelligence, responsiveness, and new forms of interaction. Designed to spark curiosity, the report brings forward perspectives from Perfect Corp.’s Dr. Wayne Liu, X‑Origin’s Szeyu Wong, RiseLink’s Dr. Pengfei Zhang, and LG Electronics’ Chris DeMaria.”
“This Whisper Report investigates the next data breach our industry isn’t ready to handle. It captures urgent insights from Put Data First revealing how emerging threats are reshaping risk landscapes. These include AI pipeline compromises, indirect prompt injections, company chat exfiltration, and deep fake-driven social engineering. Expert perspectives explain why traditional defenses fail. The report urges proactive strategies to secure data integrity across every stage of AI-driven operations before vulnerabilities escalate.”
Target Audience Titles:
Chief Executive Officer, Chief Information Officer, Chief Technology Officer, Chief Data Officer, Chief Security Officer, Head of Data Strategy, Head of Information Security
Director of Cybersecurity, Director of AI Operations, Director of Risk Management, Director Data Governance Manager, Enterprise Architect
Data Scientist, Machine Learning Engineer, Cybersecurity Analyst, AI Operations Specialist, Risk Analyst, Cloud Security Engineer, Threat Intelligence Analyst
Key Takeaways:
AI pipelines are vulnerable at every stage, requiring continuous protection of training data and outputs.
Indirect prompt injections can manipulate AI agents through unvalidated web content, creating hidden security risks.
Company AI chat data is a high-value target for exfiltration, exposing sensitive organizational insights.
Deep fakes amplify social engineering attacks, eroding trust and enabling data breaches through deception.
We took the most frequently asked and most urgent technology questions straight to the data and AI experts gathering at the Put Data First’s Inaugural event held at Planet Hollywood in Las Vegas. This Whisper Report addresses the question regarding the biggest AI risk no one in your organization is talking about as depicted in Figure 1.
Figure 1. Prepare NOW for these Four Data Breaches
Our first area to defend, was suggested by SafeBreach’s Hudney Piquant. “The AI pipeline I like to call it. It’s the pipeline of the data that you are the training data that you have and then your prompting that you’re doing and then the output like those three things I believe that that’s going to be the biggest breach that the adversaries will be looking at because if you’re able to really manipulate those things it’s going to affect the pipeline from a scalability perspective.” Hudney raises an important point that data needs to be always protected, every step of the way on its journey. For more research on how to protect data during execution see Industry Whispers: Public is Private -Confidential Computing in the Cloud.
The next attack vector, brought by Mend.io’s Amit Chita, is subtle and exploits GenAI. “Indirect prompt injections. All the web contains websites. We take AI agents, we connect them to get information from these websites, but we don’t validate that it that this website doesn’t contain prompt injections within them. and they can manipulate our agents as they surf through the web. I think this is going to be one of the major issues that we’re going to deal with in the next coming weeks.” One may want to be careful where you let your agents roam!
Our third attack vector is an insider and SaaS risk with significant exposure potential, highlighted by AnswerRocket’s Shanti Greene. “Exfiltrating company AI chats. So, the organizers like Open AI have done a good job of giving you a sandbox for your company to work within and they’re not training on your data. But being able to exfiltrate a company’s specific use and see what they’re prompting with could be interesting. There’s probably some interesting gold in that data.”
Our final area of concern may not be a direct data breach but rather is a tool frequently leveraged to breach data and trust and is brought to us by The Agentic Manager’s Neil W. Smith. “The implications of deep fakes. We’re already used to AI being used for fishing expeditions, for extracting information from our databases. But what we don’t realize as humans is that we trust other humans to play by the rules more often than not. However, with deep fakes, both voice fakes, visual fakes, and context fakes, I think more and more humans are going to be fooled by the efficacy of deep fakes.” And the more humans that are fooled, the more systems can be compromised. Despite how widely discussed this topic is, deep fakes remain underestimated for their use in fraud and as a social engineering threat.
Published to clients: December 30, 2025 ID: TBW2114
Published to Readers: December 31, 2025
Whisper Email Release:
Public/Video Release:
Analyst(s): Dr. Doreen Galli
Photojournalist(s): Dr. Doreen Galli
Abstract
“This Whisper Report investigates the biggest supply chain risk CIOs ignore. It captures urgent insights from Retail, Supply Chain, and Logistics Expo revealing how external shocks, demand disconnects, and fragmented systems quietly erode resilience. Industry leaders share candid perspectives on tariffs, inventory pitfalls, and costly tech missteps—issues that can derail growth overnight. If you think your supply chain strategy is future-proof, this report may challenge everything you assume about stability.”