{"id":551459,"date":"2026-03-12T05:52:40","date_gmt":"2026-03-12T05:52:40","guid":{"rendered":"https:\/\/www.capgemini.com\/au-en\/?post_type=research-and-insight&#038;p=551459"},"modified":"2026-03-13T06:01:53","modified_gmt":"2026-03-13T06:01:53","slug":"the-identity-singularity-2035","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","title":{"rendered":"The identity singularity 2035"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">The identity singularity 2035<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-PoV1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download our PoV<\/span><span class=\"type\">3 MB pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1204655\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1204655\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-zero-trust-as-a-strategic-operating-system-and-architectural-convergence\">Zero Trust as a strategic operating system and architectural convergence<\/h2>\n\n\n\n<p>By 2035, leading enterprises will operationalize Zero Trust as a policy-driven operating model, and not a collection of tools. At the core sits an Identity Fabric that brings together policy, context, signals, and enforcement into a unified control plane.<\/p>\n\n\n\n<p>The competitive differentiator will not be product selection, but the ability to industrialize identity as a measurable security capability. Organizations that succeed will manage outcomes such as privilege exposure time (PET), time-to-access, time-to-revoke, and blast-radius containment with precision and transparency.<\/p>\n\n\n\n<p>This point of view outlines a global, standards-based target state and pragmatic transformation paths for both cloud-native enterprises and legacy or OT-heavy environments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key takeaways<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">Identity is becoming the control plane of modern security, with Zero Trust executed as a measurable operating model.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">An Identity Fabric separates policy definition, decisioning, and enforcement \u2013 enabling consistent, auditable, and scalable access decisions.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">A shared signal layer distributes security context in near real time (risk changes, device posture, session revocation), reducing exposure windows and accelerating containment.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Identity governance and administration (IGA) and Privileged access management (PAM) converge into a single governance-to-execution chain, closing operational enforcement gaps.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Non-human identities (NHIs) now outnumber human identities. Secretless and attestation-based approaches become essential, and AI agents must be governed through bounded delegation and provenance controls.<\/li>\n\n\n\n<li class=\"has-medium-font-size\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">2035 represents a planning horizon that demands two-speed execution:\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\"><strong>Path A<\/strong>: Cloud-native acceleration<\/li>\n\n\n\n<li class=\"has-medium-font-size\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\"><strong>Path B<\/strong>: Legacy and Operational technology (OT) modernization<br>Both require disciplined sequencing and telemetry coverage to enable policy-based authorization models<br><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Discover how to position identity as the foundation of Zero Trust and as a strategic enabler of resilience, agility, and measurable security outcomes.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/03\/Capgemini-Identity-Singularity-2035-PoV1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the PoV<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\" section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Meet our expert<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Thomas-Willner-headshot.jpg\" alt=\"Thomas Willner\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Thomas Willner<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Head of Identity &amp; Access Management, Capgemini Germany<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Thomas Willner is a cybersecurity leader with an Executive MBA and extensive experience in Identity and Access Management. As Head of IAM Germany at Capgemini, he leads enterprise-scale identity transformation programs across cloud, hybrid, and legacy environments. His expertise spans privileged access management, Microsoft Entra ID, and converged IGA\/PAM architectures.\nHe has delivered high-complexity IAM programs for global organizations across automotive, financial services, and critical infrastructure sectors.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Zero trust as a strategic operating system and architectural convergence<\/p>\n","protected":false},"author":33,"featured_media":551460,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":73,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[71],"theme":[73],"brand":[],"service":[],"industry":[],"partners":[],"content-group":[],"class_list":["post-551459","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The identity singularity 2035 - Capgemini Australia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The identity singularity 2035\" \/>\n<meta property=\"og:description\" content=\"Zero trust as a strategic operating system and architectural convergence\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T06:01:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\",\"name\":\"The identity singularity 2035 - Capgemini Australia\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg\",\"datePublished\":\"2026-03-12T05:52:40+00:00\",\"dateModified\":\"2026-03-13T06:01:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg\",\"width\":2881,\"height\":1801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The identity singularity 2035\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/\",\"name\":\"Capgemini Australia\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The identity singularity 2035 - Capgemini Australia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","og_locale":"en_US","og_type":"article","og_title":"The identity singularity 2035","og_description":"Zero trust as a strategic operating system and architectural convergence","og_url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","og_site_name":"Capgemini Australia","article_modified_time":"2026-03-13T06:01:53+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","name":"The identity singularity 2035 - Capgemini Australia","isPartOf":{"@id":"https:\/\/www.capgemini.com\/au-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg","datePublished":"2026-03-12T05:52:40+00:00","dateModified":"2026-03-13T06:01:53+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#primaryimage","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg","width":2881,"height":1801},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/au-en\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/au-en\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"The identity singularity 2035"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/au-en\/#website","url":"https:\/\/www.capgemini.com\/au-en\/","name":"Capgemini Australia","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"theme_term_info":[{"id":73,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"The identity singularity 2035","url":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Australia","logo":""},"keywords":[],"dateCreated":"2026-03-12T05:52:40Z","datePublished":"2026-03-12T05:52:40Z","dateModified":"2026-03-13T06:01:53Z"},"rendered":"<meta name=\"parsely-title\" content=\"The identity singularity 2035\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/research-library\/the-identity-singularity-2035\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-03-12T05:52:40Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Australia","distributor_original_site_url":"https:\/\/www.capgemini.com\/au-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/551459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/users\/33"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/551459\/revisions"}],"predecessor-version":[{"id":551471,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight\/551459\/revisions\/551471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media\/551460"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media?parent=551459"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/tags?post=551459"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/research-and-insight-type?post=551459"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/theme?post=551459"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/brand?post=551459"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/service?post=551459"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/industry?post=551459"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/partners?post=551459"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/content-group?post=551459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}