Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Do identity security management adapt with better AI adoption and gove...
Cyberattack in Japan brews industry trouble, halts major beer producti...
Industry and technology leaders provide insights on AI trust and deplo...
HOSTWAY gains 73% operational efficiency for private cloud operations ...
Cyber education in schools: The overlooked frontline of national secur...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Fragmented data, fractured trust

      Fragmented data, fractured trust

      Tuesday, September 30, 2025, 3:09 PM Asia/Singapore | Features
    • Featured

      Securing collaboration and data in the agentic workspace

      Securing collaboration and data in the agentic workspace

      Thursday, September 25, 2025, 4:58 PM Asia/Singapore | Features, News, Newsletter, Tips
    • Featured

      Clearing away the shadows of AI

      Clearing away the shadows of AI

      Tuesday, September 23, 2025, 5:33 PM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

Do identity security management adapt with better AI adoption and governance?

By CybersecAsia editors | Friday, October 3, 2025, 7:40 PM Asia/Singapore

Do identity security management adapt with better AI adoption and governance?

Data from a  small international survey highlights respondents’ views on identity-security maturity, AI use, and deployment success in security practices.

Based on a June 2025 survey of 375 decision-makers in information technology, cybersecurity, and risk across parts of the Americas, Europe, and Asia* on identity security, an identity and access management solutions firm that commissioned it has shared some findings on maturity levels and capabilities were shared with the media.

First, 63% of the 375 respondents had indicated that their organizations were in the lowest or second-lowest level of maturity on a five-point scale of identity security management.

Second, respondents from organizations that ranked their own organization higher in identity security maturity had also indication higher adoption of AI-enabled detection capabilities such as identity threat detection and response and privileged account monitoring compared to those with lower identity maturity.

Other findings

Third, respondents from organizations that performed identity data cleanup before migration selected choices indicating 1.6 times higher likelihood of complete success in identity and access management tool deployment. Also:

  • Respondents from organizations in level 3 or higher levels of identity security maturity selected choices indicating 4.5 times higher adoption of cloud data governance capabilities such as unified policy enforcement and real-time data access monitoring
  • 30% of 229 respondents had selected identity and access management as the domain with highest perceived return on investment, compared to 5% for network security, 8% for application security, 10% for cloud security posture management, 12% for governance risk and compliance, 13% for data security, and 22% for endpoint detection and response
  • 4% of respondents indicated their belief that their organizations regressed in identity security maturity in 2025
  • Respondents from organizations in the middle- to higher- levels of identity security selected choices indicating 4 to 8 times higher adoption of real-time identity data synchronization, entity resolution, and automated lifecycle workflows compared to those ranking their organizations lower in the scale
  • 25% of respondents had selected choices indicating their organizations positioned identity and access management as a strategic business enabler, while 57% had selected choices indicating it as a security control or compliance requirement

According to Matt Mills, President, SailPoint, the firm that commissioned the survey: “… Advances in AI, data management, and threat detection” were noted in relation to identity security, alongside mentions of unified visibility, expanded governance, and automated resilience.

*with more than half representing organizations with over 10,000 employees, and the majority from finance, technology, and healthcare sectors. Some responses were from a subset of 229 respondents.  Details on data validation, potential respondent bias, or the appendix referenced for demographics are undisclosed, limiting full assessment of methodological rigor.

Share:

PreviousCyberattack in Japan brews industry trouble, halts major beer production

Related Posts

Geopolitical risk and inflation were voted as top financial services industry risks

Geopolitical risk and inflation were voted as top financial services industry risks

Friday, December 15, 2023

New scams on the block: they prey on human emotions

New scams on the block: they prey on human emotions

Monday, August 16, 2021

How to rein-in AI agents with a privacy-centric data management approach

How to rein-in AI agents with a privacy-centric data management approach

Wednesday, February 12, 2025

Frequent hackings of surveillance cameras are making people queasy

Frequent hackings of surveillance cameras are making people queasy

Tuesday, March 16, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • HOSTWAY gains 73% operational efficiency for private cloud operations  

    HOSTWAY gains 73% operational efficiency for private cloud operations  

    With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more
  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more
  • MoneyMe strengthens fraud prevention and credit decisioning

    MoneyMe strengthens fraud prevention and credit decisioning

    Australian fintech strengthens risk management with SEON to scale lending operations securely and efficiently.Read more
  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.