Contact Us
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
687 Articles
Stay up-to-date on B2B Tech
Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Media, conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

CybersecurityJul 26

Explore Top 10 Privacy Enhancing Technologies in 2026

Though data privacy legislation such as GDPR in the EU and CCPA in California are meant to prevent privacy breaches, consumer’s privacy is frequently invaded by hackers, companies and governments. Data leakages increase as businesses share consumers’ data with third-party companies in order to increase network visibility.

AIJul 26

Manufacturing AI: Top 15 tools & 13 real life use cases ['26]

The industrial manufacturing industry is the top adopter of artificial intelligence, with 93 percent of leaders stating their organizations are at least moderately using AI. Manufacturers are frequently facing different challenges such as unexpected machinery failure or defective product delivery.

AIJul 26

Generative AI Legal Use Cases & Examples in 2026

Generative AI legal applications are set to significantly impact the legal industry, with a survey showing that 95% of over 1,000 UK lawyers anticipate a noticeable effect. Also, Goldman Sachs economists predict AI could automate 44% of legal work (Figure 1), indicating a potential transformation in legal services and professional roles.

Enterprise SoftwareJul 26

Cloud Inference: 3 Powerful Reasons to Use in 2026

Deep learning models achieve high accuracy in tasks like speech recognition and image classification, often surpassing human performance. However, they require large training datasets and significant computational power. Cloud inference provides a scalable solution to handle these demands efficiently. Explore cloud inference, compare it to on-device inference, and highlight its benefits and challenges.

Enterprise SoftwareJul 26

Celonis Process Mining: Products, Features & Competitors

Celonis claims to be the process mining market leader with 60% market share. Its popularity has been increasing over the last 5 years (See Figure 1). However, recent acquisitions from tech giants, such as Myinvenio by IBM and Minit by Microsoft, have created formidable competitors.

CybersecurityJul 25

Top 10 Open Source Micro Segmentation Tools in 2026

Network security statistics show that 85% of responders from large companies with 5,000+ employees said they use microservices. These companies should protect their services across API communications; however, traditional segmentation regulations based on IP addresses and ports will not protect microservices.

CybersecurityJul 25

6 Real-life RBAC Examples in 2026 

Network security statistics show that almost 2/3 of companies have 1,000+ high-value files accessible to each employee. Role-based access control (RBAC) systems (i.e. open source RBAC tools) can help organizations administer access controls to: Discover 6 real-life RBAC examples; their challenges, solutions, and benefits: 6 Real-life RBAC Examples 1.

CybersecurityJul 25

What is Mandatory Access Control (MAC)? in 2026

Mandatory access control (MAC) is a security method that limits individuals’ capacity to grant or deny access to assets in a system. Mandatory access control helps organizations by enforcing strict security policies on access to resources.

CybersecurityJul 25

Top 7 CSPM Use Cases with Real-life Examples in 2026

Cloud security posture management (CSPM) is a set of technologies, procedures, and practices that assist companies in identifying and resolving security risks associated with their cloud posture. Companies typically use cloud security posture management (CSPM) vendors to protect their data assets from malware, network threats, and data exfiltration.

CybersecurityJul 25

Top 10 Cloud Security Posture Management Vendors [2026]

Considering market presence, cloud coverage, compliance support, and usability here are the top 10 CSPM vendors that can help your organization minimize security risks and maintain a secure cloud ecosystem across IaaS, Saas, and PaaS environments: Market presence All vendors except CloudGuard CSPM are cloud-native application protection platforms (CNAPPs) that offer a broader, unified solution