AI Use Cases for IAM and the Pending Risk Wall

Over the last few months of 2025, I had several conversations with CISOs and Identity teams about AI and IAM use cases. Teams are rapidly trying to support their organizations as they adopt or enable AI in different areas and are struggling with how to secure it, use it to automate Identity tasks, and translate […]
The Next IGA Revolution: How IGA is Going to Change in 2026 to Scale Faster and Easier

You may be looking at your 2026 budget and trying to plan your Identity Governance and Administration (IGA) priorities. If you’re a few years into your IGA deployment, you may be finding it increasingly challenging to keep attention and executive support, while still facing a large backlog of applications that are not covered. Or, you […]
It’s time we had a chat….

It’s funny, whenever I hear that I have flashbacks to someone getting ready to tell me I’m in trouble for something. No, I’m not going to tell you you’re in trouble, but I do feel we’re reaching a point where the pace of new features, technologies, and capabilities is quickly outpacing the ability of IAM […]
My Agentic Journey: The journey to seamless, secure AI / Identity integration
Over the last 3-6 months, I’ve had a ton of conversations around Secrets and Non-Human Identities (NHI), governance, authentication, and authorization with many of them leading to the inevitable AI overlay of the same topic. Now, I say it that way because we’re getting more mature when it comes to building and securing interactive and […]
IAM Program Red Flags and Path Forward

When starting an evaluation of an IAM program, what are some of the common red flags I look for in evaluating the maturity and strength of the IAM capability. See some common pitfalls and solutions to address these common red flags.
Improving IGA Visibility Through New and Modern Tools and Methods

See how changing definition of connected and new tools and methods are helping improve success of IGA deployments
Founders Update – From the CIdO

How do we start rethinking IAM and how it can be better utilized in our organizations. This is my call to arms and why. See why the CIdO, why now, and how we rethink IAM.
IAM Implementations and the Sacred Timeline

How do we realign moving targets into our IAM program without interrupting business? See how you can achieve success purging individual branches back into the IAM timeline.
Identity First Modeling

How do we move Identity beyond just a security tool. Read more to see Identity First vs Identity First Security.
Attesting to Whats Not There: The shifting paradigm of audit and compliance with ZSP / JIT PAM

How do we audit accounts and privileges when they are assigned as needed? This discusses the shifting audit and compliance requirements with ZSP/JIT and PAM.