Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Education & Training

Three reasons why identity governance projects fail

By John Milburn
Identity governance initiatives at your enterprise
February 26, 2021

Today's organizations understand the need for Identity Governance and Administration (IGA) initiatives — these programs enable businesses to secure data, complete audits and even improve operational agility. Yet, many of these projects don't deliver on their promise, and one of the main challenges is not having the right infrastructure in place to support a successful roll out. With 94% of organizations reporting an identity-related breach at some point, getting a solid IGA strategy off the ground and scaling it is no longer a nice-to-have, but a need-to-have. 

That said, investing in technology and talent and hoping IGA programs stick simply isn't enough. Fortunately, there are some measures security teams can take to ensure a smooth launch and long-term success. It doesn’t necessarily start with the shiny new tool or best-in-class solution, either.

Getting executive and company-wide buy-in from the get-go, setting realistic expectations, and approaching these projects with the user in mind are the most critical components to an effective IGA program. Here’s why: 

  1. Winning executive and company buy-in 

IGA projects require collaboration across an entire organization — think different personnel in different departments with different day-to-day duties and goals in mind. In order to facilitate this, strong executive support is vital to overcoming potential points of friction. While it seems like the benefits of an IGA program are a no-brainer, executives are busy. It’s possible they’re not thoroughly briefed on the importance of the project or what the appropriate timeline should be. Clear communication and pointing to the big picture are two ways to help gain C-level buy-in. Explain how IGA is a key component of your organization’s digital transformation efforts and the potential return on investment: better security and more streamlined processes, are just a few of the potential upsides. 

  1. Setting realistic expectations 

Building off of executive and organizational buy-in, part of selling an IGA project is level-setting. Establishing realistic expectations regarding the timeline, man-power it will take to get this up and running, and the anticipated results is equally important. Afterall, an IGA project isn’t just an IT project, and viewing it as simply a matter of buying and installing software is a recipe for disaster.

In order to work, IGA needs advisory services on top of in-house resources. Application integration costs may get under-counted as well, as project stakeholders fail to grasp the interconnected nature of the IGA process. For example, the IGA solution usually has to link with HR management systems and others within a business. Training costs can be higher than people predict, and finding IGA talent can also take longer and cost more than budgeted for. Be honest about the challenges that may arise and look at the full spectrum of resources needed and the intended results you hope to achieve and map backwards from there. 

  1. Putting the user first 

Your IGA program success hinges on the people using it, so make sure they are comfortable and confident with the solution. Quite simply, learning a new system is just another item to check off a to-do list, and people’s primary goal is getting their jobs done. If navigating a new solution isn’t an effortless part of their workflow, users will find ways around it, ignoring it completely or starting a flurry of inquiries into the helpdesk.

This is a slow burn that can derail an entire IGA project, even with the best intentions. IT leaders should consider IGA solutions that can be easily integrated into existing processes. This will present fewer training and UX issues synonymous with integrating new systems from scratch. By removing the barriers to entry, you can create a smoother adoption process, and thus, more favorable results. 

According to PMI, more than 50% of IT projects fail due to lack of time, resources and funds, among other reasons. More data from the annual Harvey Nash/KPMG CIO Survey found that 46% of CIOs report that one of the main reasons projects fail is weak ownership. These statistics are bleak, but luckily, easily avoidable.

Having clear communication and expectations, company and executive support, and an easy on-boarding process can ensure IGA project success, and that your security efforts aren’t for naught. 

 

KEYWORDS: Chief Information Officer (CIO) enterprise cyber security identity (ID) management identity governance identity security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Milburn is CEO of Clear Skye.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-frame

    If Michael Jordan is zero trust, then identity governance is Scottie Pippen — Why cybersecurity is a team sport

    See More
  • password freepik

    Three reasons why passwords aren't going away any time soon

    See More
  • data-enews

    Effectively evaluating identity governance solutions

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing