The Customer Identity and Access Management (CIAM) Guide for the Enterprise: Securing Customer Identity in the Customer Journey

Customer experience is never complete without a solid security strategy. Unknown to most enterprises, the linear path of a customer journey necessitates an equal security approach in each interaction to establish trust in the relationship between the brand and the consumer. IBRS explores what solutions an enterprise must invest in to secure each stage of the journey.

The Customer Identity and Access Management (CIAM) Guide for the Enterprise: Securing Customer Identity in the Customer Journey Read More »

consultants

Careless Talk – Why Water Cooler Sessions Are Not Social Events

Water cooler sessions offer opportunities for teams to participate in casual conversations among their fellow employees. Yet, many members of the organisation are less engaged in such discussions. What keeps them from participating, and what can be done to increase attendees’ willingness and sustain their interest?

Careless Talk – Why Water Cooler Sessions Are Not Social Events Read More »

Generative AI for Enterprise Use – An Overview of the State-of-the-Art

With more vendors such as Microsoft, Amazon Web Services (AWS), Google, and SalesForce embedding AI technology into their products for enterprise use, organisations will soon have more tools with AI capabilities. However, more solutions do not always mean producing meaningful outcomes, since most of these products will still fall short of expectations due to the current limitations of language models, and some types of work that still cannot be easily replicated by AI.

Generative AI for Enterprise Use – An Overview of the State-of-the-Art Read More »

assurance

The Collaboration Paradox: Fragmented and Siloed Knowledge

Organisations that employ digital collaboration tools in an uncontrolled manner find that the very tools intended to streamline communications throughout the organisation result in the opposite: increasingly siloed departmental group thinking and, worse, silos of information hidden from the organisation at large. How can enterprises avoid the tsunami of fragmented knowledge?

The Collaboration Paradox: Fragmented and Siloed Knowledge Read More »

Wicked Game: How to Secure Senior Executives’ Cyber Security Buy-In

No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?

Wicked Game: How to Secure Senior Executives’ Cyber Security Buy-In Read More »

Search