
Cyber-attacks are on the increase, and are becoming more complicated as technology advances and affecting people as well companies globally. Advanced approaches to mitigating cyber-risk are required. One of the advanced approaches to managing cyber-attacks is the use of Artificial Intelligence (AI) in Identity and Ac-cess Management (IAM). The adoption of AI in IAM is slow as there are various obstacles encountered. This study establishes obstacles a survey using semi-structured questions. 15 participants working in the financial services industry as AI, IAM and cybersecurity experts were interviewed in the survey. Enablers for the adoption of AI in IAM were established from these participants as well. Several of the enablers gath-ered from the interviews are confirmed by literature. A number of interviewees high-lighted high levels of maturity of IAM as a precondition for successful use of AI to support IAM. Furthermore, the interviews confirm organisations’ uncertainty of AI capabilities, fears of job security and lack of AI skills.
Artificial intelligence, Cybersecurity, Identity & Access Management, Adopting Artificial Intelligence, Identity & Access Management
Artificial intelligence, Cybersecurity, Identity & Access Management, Adopting Artificial Intelligence, Identity & Access Management
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
