
Cem Dilmegani
Cem has been the principal analyst at AIMultiple for almost a decade.
Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]
Professional experience & achievements
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.
He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]
Research interests
Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.
Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.
Education
He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.
He holds an MBA degree from Columbia Business School in 2012.
Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.
External publications
- Cem Dilmegani (September 28, 2017). Post-AI Banking: Millions of jobs at risk as banks automate their core functions. International Banker
- Cem Dilmegani, Bengi Korkmaz, and Martin Lundqvist (December 1, 2014).Public-sector digitization: The trillion-dollar challenge.McKinsey & Company
Conference & other event presentations
- Real Estate and Technology, presented by Hofstra University’s Wilbur F. Breslin Center for Real Estate Studies and the Frank G. Zarb School of Business in 2023 and 2024.
- Radar AI session (June 22, 2023): "Increasing Data Science Impact with ChatGPT".
- Generative AI Atlanta meetup (March 10, 2023): Generative AI for Enterprise Technology.
Sources
- Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
- Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
- Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
- Science, Research and Innovation Performance of the EU, European Commission.
- EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
- Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
- We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.
Latest Articles from Cem
A Comprehensive Overview of Top 5 ZTNA Open Source Components
As businesses move towards remote and hybrid work environments, implementing zero trust network access (ZTNA) solutions can support businesses’ cybersecurity efforts. ZTNA open source tools offer a cost-effective way to authorize at each layer to secure remote access to resources.
Prices of Top 5 IT Service Management (ITSM) Software
IT Service Management (ITSM) tools with incident management, problem management, change and knowledge base management capabilities allow various pricing structures: See IT service management pricing details of the top 5 providers and the key factors that affect pricing options: ITSM pricing comparison Note: Pricing information is obtained from vendor websites.
RMM Pricing: 10 Products Analyzed
Understanding RMM software pricing models and factors is important for making informed decisions. Remote monitoring and management products may vary based on the pricing structure. Companies can evaluate product prices based on the number of technicians or endpoints they require. Here, we explore the structures of 10 RMM pricing models of software.
DLP Pricing: Compare top 3 Vendors
A data loss prevention (DLP) software offering similar features to another one can be twice as expensive. We analyzed the pricing & packages of 8 DLP tools. Save on the total cost of ownership by comparing the pricing for some of the top DLP software: Table 1. Price comparison of DLP software Source: Vendor websites.
Top 10 IT Service Management Tools: Features & Pricing
We’ve compared top 10 IT service management tools, along with their key features, pricing and deployment options to help you find the best solutions for your organization’s needs.
6 Network Security Use Cases with Real life Examples
Network security statistics reveal that cyber-attacks affected 350+ million individuals in the U.S. In this article, we explore network security use cases and real-world examples , from detecting insider threats to managing privileged access. For more on network security: 1.
Top 13 Open Source SIEM Tools
Unlike commercial SIEMs such as ManageEngine Log360, open-source SIEM tools commonly lack core SIEM capabilities including event correlation, log analytics, alerting, or require combining with other tools. However, several network defensive tools (e.g., intrusion detection and prevention systems and network monitoring tools) can be used as SIEM tools with fine tuning.
Top 10+ SIEM Systems & How to Choose the Best Solution
SIEM systems have evolved to become more than log aggregation tools. Some vendors developed unified product suites with UEBA, SOAR, and EDR capabilities, claiming they are “next-gen” SIEMs. Others offer products focused on traditional event and log management (e.g., SolarWinds SEM).
AI Network Security: 6 Real-life Use Cases
Network security statistics show that ~90% of organizations have reported at least one cyber incident. AI-driven network security software can support security teams by utilizing strategies such as network segmentation, AI-SPM (AI-security posture management), or data security posture management.
Top 10 Mobile DLP Best Practices & Case Studies
As remote work and mobile device usage continue to increase, protecting sensitive data on mobile platforms has become a top priority for organizations. Mobile devices often present vulnerabilities for DLP software due to their portability, access to cloud systems, and various apps (Figure 1).
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.