article thumbnail

What a quarter century of digital transformation at PayPal looks like

CIO Business Intelligence

These applications live on innumerable servers, yet some technology is hosted in the public cloud. User data is also housed in this layer, including profile, behavior, transactions, and risk. We’ve been working on this for over a decade, including transformer-based deep learning,” says Shivananda.

article thumbnail

IRM Is Essential for Digital Transformation Success

John Wheeler

Last week, I had the distinct privilege to join my Gartner colleagues from our Risk Management Leadership Council in presenting the Q4 2018 Emerging Risk Report. We hosted more than 500 risk leaders across the globe in our exploration of the most critical risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRM 2020: Market Momentum Continues

John Wheeler

2020 marks Gartner’s fifth year of integrated risk management (IRM) technology coverage and the market continues to grow at a rapid pace. In fact, the spectrum of IRM technology solutions is increasing due to digital transformation efforts in companies of all sizes. billion with projected growth to $9.3

article thumbnail

7 ways an MBA will advance your IT career — and 5 ways it won’t

CIO Business Intelligence

“MBA programs can also help leaders hone their communication and negotiation skills while also improving their understanding of organizational behavior, strategic planning, and risk management through exposure to experienced peers and varied coursework,” Bhargava explains.

IT 123
article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

Dizzion, an innovator in the Managed Desktop as a Service (DaaS) industry, hosts its managed desktop offering on IBM Cloud to help enterprises manage their workforce. “Enterprises need to accelerate digital transformation while giving their workforce the flexibility to work on any device from anywhere in the world.

article thumbnail

7 steps for turning shadow IT into a competitive edge

CIO Business Intelligence

After all, 41% of employees acquire, modify, or create technology outside of IT’s visibility , and 52% of respondents to EY’s Global Third-Party Risk Management Survey had an outage — and 38% reported a data breach — caused by third parties over the past two years.

IT 135
article thumbnail

The next wave of payments modernization: Minimizing complexity to elevate customer experience

IBM Big Data Hub

However the payment is being made, the payment system’s IT architecture needs to securely manage the key functions, including payments processing, clearing and settlement, risk management, integration and connectivity, and analytics and reporting.

Risk 79