Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Education & Training

Three reasons why identity governance projects fail

By John Milburn
Identity governance initiatives at your enterprise
February 26, 2021

Today's organizations understand the need for Identity Governance and Administration (IGA) initiatives — these programs enable businesses to secure data, complete audits and even improve operational agility. Yet, many of these projects don't deliver on their promise, and one of the main challenges is not having the right infrastructure in place to support a successful roll out. With 94% of organizations reporting an identity-related breach at some point, getting a solid IGA strategy off the ground and scaling it is no longer a nice-to-have, but a need-to-have. 

That said, investing in technology and talent and hoping IGA programs stick simply isn't enough. Fortunately, there are some measures security teams can take to ensure a smooth launch and long-term success. It doesn’t necessarily start with the shiny new tool or best-in-class solution, either.

Getting executive and company-wide buy-in from the get-go, setting realistic expectations, and approaching these projects with the user in mind are the most critical components to an effective IGA program. Here’s why: 

  1. Winning executive and company buy-in 

IGA projects require collaboration across an entire organization — think different personnel in different departments with different day-to-day duties and goals in mind. In order to facilitate this, strong executive support is vital to overcoming potential points of friction. While it seems like the benefits of an IGA program are a no-brainer, executives are busy. It’s possible they’re not thoroughly briefed on the importance of the project or what the appropriate timeline should be. Clear communication and pointing to the big picture are two ways to help gain C-level buy-in. Explain how IGA is a key component of your organization’s digital transformation efforts and the potential return on investment: better security and more streamlined processes, are just a few of the potential upsides. 

  1. Setting realistic expectations 

Building off of executive and organizational buy-in, part of selling an IGA project is level-setting. Establishing realistic expectations regarding the timeline, man-power it will take to get this up and running, and the anticipated results is equally important. Afterall, an IGA project isn’t just an IT project, and viewing it as simply a matter of buying and installing software is a recipe for disaster.

In order to work, IGA needs advisory services on top of in-house resources. Application integration costs may get under-counted as well, as project stakeholders fail to grasp the interconnected nature of the IGA process. For example, the IGA solution usually has to link with HR management systems and others within a business. Training costs can be higher than people predict, and finding IGA talent can also take longer and cost more than budgeted for. Be honest about the challenges that may arise and look at the full spectrum of resources needed and the intended results you hope to achieve and map backwards from there. 

  1. Putting the user first 

Your IGA program success hinges on the people using it, so make sure they are comfortable and confident with the solution. Quite simply, learning a new system is just another item to check off a to-do list, and people’s primary goal is getting their jobs done. If navigating a new solution isn’t an effortless part of their workflow, users will find ways around it, ignoring it completely or starting a flurry of inquiries into the helpdesk.

This is a slow burn that can derail an entire IGA project, even with the best intentions. IT leaders should consider IGA solutions that can be easily integrated into existing processes. This will present fewer training and UX issues synonymous with integrating new systems from scratch. By removing the barriers to entry, you can create a smoother adoption process, and thus, more favorable results. 

According to PMI, more than 50% of IT projects fail due to lack of time, resources and funds, among other reasons. More data from the annual Harvey Nash/KPMG CIO Survey found that 46% of CIOs report that one of the main reasons projects fail is weak ownership. These statistics are bleak, but luckily, easily avoidable.

Having clear communication and expectations, company and executive support, and an easy on-boarding process can ensure IGA project success, and that your security efforts aren’t for naught. 

 

KEYWORDS: Chief Information Officer (CIO) enterprise cyber security identity (ID) management identity governance identity security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Milburn is CEO of Clear Skye.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-frame

    If Michael Jordan is zero trust, then identity governance is Scottie Pippen — Why cybersecurity is a team sport

    See More
  • password freepik

    Three reasons why passwords aren't going away any time soon

    See More
  • data-enews

    Effectively evaluating identity governance solutions

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing