• About
  • Subscribe
  • Contact
Tuesday, March 31, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Artificial Intelligence

Only 9% of organisations meet verified trust criteria as AI increases identity risk

by FutureCISO Editors
March 31, 2026
F5 introduces NGINX One to streamline application security and delivery

Photo by Pixabay: https://www.pexels.com/photo/qr-code-on-screengrab-278430/

Share on FacebookShare on Twitter

An independent global study commissioned by an identity security vendor and conducted by International Data Corporation (IDC) has found a substantial gap between how organisations perceive their identity maturity and their actual preparedness for continuous, AI‑driven identity threats.

The research reveals that only 9% of surveyed organisations meet IDC’s criteria for “verified trust” — a model that applies continuous, contextual identity verification across human and machine interactions.

IDC defines verified trust as “a continuous assurance that every digital interaction, whether human or machine/AI agent, is tied to an independently verified identity and remains trusted over time.”

The model uses signals such as zero‑knowledge biometrics with liveness detection, device posture, behavioural intelligence and AI‑aware risk analysis to apply runtime controls to authorisation decisions rather than relying on one‑off authentication events.

The study surveyed 794 organisations worldwide and reported that enterprises meeting the verified trust criteria delivered material advantages versus their peers.

Measured improvements include a 51% higher customer registration conversion rate, 44% stronger compliance readiness, 43% lower fraud losses and 47% faster workforce onboarding time. The research describes these gains as statistically significant across core enterprise metrics.

“In today’s threat landscape, identity can no longer be treated as a single authentication event. In an AI‑mediated enterprise, every authorisation decision must be continuously verified, contextualised, and governed,” said Peter Barker, chief product officer at Ping Identity.

Peter Barker

“This research confirms that organisations embracing continuous, contextual verification reduce risk while unlocking measurable business value. Verified trust is how enterprises close the gap between confidence and control in an AI‑driven world.” Peter Barker

IDC analysts highlighted a mismatch between perception and reality: 51% of organisations believe they lead their peers in establishing trusted digital identity, yet only 9% meet the verified trust threshold.

Related:  83% of supply chains can’t respond to disruptions within 24 hours

The report also contrasts leaders with early‑stage adopters: 69% of leaders verify 75–100% of trust flows compared with 16–19% of early adopters, and 94% of leaders operate at enterprise scale while many others remain in pilot phases.

Leaders were also considerably further ahead on passwordless technologies — biometrics, passkeys and digital wallets — at 80–83% adoption versus below 30% for starters.

“Verified trust is no longer a design choice — it’s the prerequisite for operating at scale in AI driven environments," said Emanuel Figueroa, senior research analyst at IDC. As AI increases autonomy and complexity, identity becomes the mechanism for control, accountability, and confidence.”

The report underscores that, as AI adoption grows, organisations should consider identity as a continuous control plane applying adaptive verification across customers, employees, partners and AI agents to manage risk, maintain compliance and preserve user experience.

Tags: behavioural intelligencebiometricsIDCPing Identityverified trust

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Only 9% of organisations meet verified trust criteria as AI increases identity risk
  • Commvault adds real‑time governance for structured and AI data
  • Synthetic identities and agentic bots drive 8% rise in global fraud
  • Navigating the AI-powered threat landscape
  • GITEX AI ASIA places cybersecurity centre stage with GISEC Asia 2026 tracks

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl