Know your gear
Identity Governance is often implemented as a reaction to compliance demands. While important, it is short-sighted to look at governance as merely a means to pass audits. Today's attackers are targeting user credentials as the weak link in security. Reducing that risk requires reducing the attack surface presented by excessive entitlements, in an adaptive way that accounts for today's dynamic business environments.