January 19, 2026
IAM isn't a security project anymore. It's the operating system for how work actually happens.
We've spent years in identity and access management leading multi-year programs across government, universities, and enterprise, managing identity lifecycles for environments with 450,000+ users. The conversation has fundamentally shifted.
For a long time, IAM was treated as a security platform. Something you implemented to tick a compliance box or stop the wrong people getting into the wrong systems. It lived in IT security's world, and most of the organisation didn't think about it unless something broke.
That framing is outdated.
IAM isn't about logging in. It's about who can act, what they can touch, and how control is maintained across every system, partner, cloud service, and AI-driven process in your environment.
If you can't clearly answer:
then you don't have digital control. You have accumulated risk.
IAM is the control point for the entire organisation.
The traditional security perimeter is gone. People work remotely. Systems live in the cloud. Third-party platforms are embedded into core operations.
What remains constant is identity.
Every transaction, every permission, every audit trail flows through who or what is allowed to act. IAM defines accountability, security, and scale.
I see organisations treat identity as an afterthought, and the patterns are always the same: inconsistent access controls, manual joiner/mover/leaver processes, privilege creep, unmonitored admin access, and expensive audits full of gaps.
The issue is rarely the technology. Most organisations have access to decent IAM platforms. The problem is the operating model: how identity is managed day-to-day, who owns it, and how governance works in practice.
I've watched IAM programs stall or get shut down more times than I can count. The failure modes are predictable.
Over-engineering from day one. Designing for every edge case instead of adopting proven standards. They rebuild access models from legacy systems rather than starting with what already works.
IAM sits alongside ERP and HCM as one of the hardest transformations to deliver. That is exactly why phased, outcome-driven approaches matter.
The result is familiar: long timelines, slow adoption, and systems that never become the single source of truth. Or worse, programs that are shut down before they deliver any value at all.
The next phase of IAM isn't more users or applications. It's more non-human actors.
AI agents, automation platforms, service accounts, certificates, integrations are already operational participants. They act independently, request access, and move data at machine speed. Recent reports (CyberArk 2025) show machine identities already outnumber humans 82:1 on average - and AI adoption is turbocharging that growth.
This introduces a new class of risk: identity sprawl without ownership, unclear accountability for automated actions, and privileges that outlive their purpose.
IAM must evolve from "user access management" into identity governance across humans, systems, and agents.
Organisations that don't adapt won't fail because of a breach. They will fail because they can't confidently demonstrate how work happens inside their digital environment. When regulators, auditors, or executives ask the hard questions, the gaps will be obvious.
The high-performing IAM programs I've worked with share three characteristics:
This is not about finding the "best" IAM tool. It's about designing the right operating model around identity.
IAM directly affects things executives care about:
I see this most clearly during structural change: acquisitions, new business units, government restructures. Strong IAM enables rapid integration instead of months of manual access provisioning.
Organisations that don't get this right discover that complexity always compounds. By the time the impact is visible, they are deep in technical debt and fixing it feels overwhelming.
How well you govern it determines how ready you are for what comes next.
Is your IAM helping you scale or quietly becoming your biggest risk?
We've built a short Identity & Access Management Health Check that shows where your organisation sits across governance, security, automation, and readiness for what's already happening.
It takes less than 3 minutes and gives you: