In reality, it is an economic and operational system that governs identity, collaboration, security, automation, and enterprise data flows. When this system is not architected intentionally, it begins to leak value silently through inefficiencies, security gaps, and governance failures.
In this episode of the M365 FM Podcast, we explore the seven architectural mistakes that quietly cost organizations millions in invisible inefficiency—and how enterprise architects can prevent them.
The core message is simple: Microsoft 365 success is not determined by licenses or features, but by how the tenant is architected as a control plane for the enterprise.

In Microsoft Enterprise Architecture, the "seven deadly sins" represent critical architectural mistakes that can hinder your success. These sins are especially relevant in Microsoft 365 environments where digital transformation is a priority. Failing to address these pitfalls can lead to inefficiencies, security risks, and increased costs. For instance, companies burdened with architectural debt spend 23% more on IT operations while delivering 31% fewer business features. By recognizing and avoiding these common traps, you can implement strategic planning and governance to enhance your organization's value and innovation.
Key Takeaways
- Recognize the seven deadly sins of Microsoft 365 architecture to avoid costly mistakes.
- Establish a clear strategic vision to align IT initiatives with business goals for better outcomes.
- Engage stakeholders early to gather diverse insights and ensure solutions meet user needs.
- Simplify solutions to enhance usability and reduce support costs, avoiding unnecessary complexity.
- Maintain thorough documentation and governance to prevent errors and improve communication.
- Implement effective change management strategies to prepare teams and reduce resistance.
- Embrace flexibility and continuous improvement to adapt to market changes and enhance performance.
- Provide ongoing training and support to empower users and maximize the value of Microsoft 365.
The seven deadly sins of Microsoft 365 architecture
In the realm of Microsoft 365 architecture, the seven deadly sins represent common pitfalls that can derail your digital transformation efforts. These sins are not just isolated issues; they reflect systemic challenges that can hinder your enterprise's success. Recognizing these challenges is crucial for fostering a modern digital business that thrives on innovation and customer value.
Here are the seven deadly sins you should be aware of:
- Lack of standardized authentication and authorization: Without a consistent approach, you risk security vulnerabilities and user frustration.
- Ineffective file storage and duplication: This leads to wasted resources and confusion among team members.
- Insufficient search capabilities: When users struggle to find information, productivity suffers.
- Manual and inconsistent onboarding/offboarding processes: These processes can create security gaps and operational inefficiencies.
- Poorly designed Role Based Access Control (RBAC): Inadequate RBAC can result in excessive access rights, increasing security risks.
- Inadequate backup and disaster recovery testing: This oversight can leave your organization vulnerable to data loss.
- Fragmented infrastructure management: Frequent deviations from best practices can lead to performance degradation and operational reliability issues.
These systemic architectural challenges create complexities in configuration management. As configurations drift from best practices, security vulnerabilities arise, impacting your overall security posture. Operational reliability issues can hinder your ability to innovate and respond to changing business needs.
To avoid these deadly sins, you must adopt a proactive mindset. Focus on integrating solutions that streamline processes and enhance collaboration. Emphasizing governance and lifecycle management will help you maintain a strong security posture. By addressing these challenges head-on, you can unlock the full potential of your Microsoft 365 environment and drive meaningful digital transformation.
Ultimately, recognizing and avoiding the seven deadly sins of Microsoft 365 architecture will empower you to create a cohesive and efficient enterprise. This approach not only reduces costs but also maximizes the value of your investments in digital solutions.
Sin 1: Lack of vision

A clear strategic vision is essential for successful Microsoft 365 architecture. Without it, you risk misalignment between your IT initiatives and overall business goals. This disconnect can lead to project failures and wasted resources.
Strategic vision
Aligning IT and business
To achieve alignment, you must ensure that your IT strategy supports your business objectives. When you set clear goals, you create a roadmap for your projects. This roadmap helps you avoid common pitfalls, such as scope creep. Scope creep occurs when projects expand beyond their original plans due to unclear objectives.
Consider these points:
- A lack of alignment between project goals and business objectives can lead to poor goal setting.
- Low user adoption rates often stem from insufficient understanding of the project's importance.
- Ultimately, these issues contribute to low return on investment, as projects fail to deliver the expected benefits.
By focusing on alignment, you can enhance the value of your digital transformation efforts.
Long-term planning
Long-term planning is crucial for maximizing the benefits of Microsoft 365. Without a clear vision, you may struggle to maintain user engagement and adoption. Low adoption is the number one ROI killer. A platform that employees do not use generates zero return. Digital transformation is as much about behavior change as it is about technology.
To define a strategic vision, consider implementing the following frameworks:
- Hub Site Design: Use SharePoint hub sites to create a logical structure.
- Metadata and Taxonomy: Implement consistent metadata for improved searchability.
- Simplified Permission Management: Standardize permission levels to reduce complexity.
- Lifecycle Governance: Define rules for content management.
- User-Centric Navigation: Design navigation based on user journeys.
Additionally, adopting a model like Success by Design can help you identify risks early in your projects. This model fosters a critical understanding of potential challenges that might otherwise go unnoticed.
By establishing a strategic vision and aligning your IT initiatives with business goals, you can create a cohesive framework for your Microsoft 365 architecture. This approach not only enhances user adoption but also drives successful digital transformation.
Sin 2: Ignoring stakeholder needs

Ignoring stakeholder needs can derail your Microsoft 365 architecture efforts. Engaging stakeholders is crucial for ensuring that your digital transformation aligns with business goals. When you overlook their input, you risk creating solutions that do not meet user expectations. This can lead to low adoption rates and wasted resources.
Stakeholder engagement
Effective stakeholder engagement involves identifying key individuals and gathering their requirements. You must recognize that stakeholders include not only IT staff but also representatives from various departments. Their insights can help you validate schedules and align budgets effectively.
Identifying stakeholders
Start by mapping out who your stakeholders are. Consider the following groups:
- IT Team: They provide technical insights and feasibility assessments.
- Department Heads: They understand the specific needs of their teams.
- End Users: They will ultimately use the solutions you implement.
By identifying these groups, you can ensure that you gather diverse perspectives. This approach fosters a more comprehensive understanding of the requirements.
Gathering requirements
Once you identify stakeholders, focus on gathering their requirements. This process should be structured and inclusive. Here are some effective strategies:
- Conduct interviews and surveys to collect feedback.
- Organize workshops to brainstorm ideas and solutions.
- Create a feedback loop to keep stakeholders informed and engaged.
A well-structured stakeholder engagement plan enhances trust and transparency. You can measure its effectiveness through key performance indicators (KPIs) such as stakeholder feedback scores, participation rates, and response times. These metrics help you assess how well you are meeting stakeholder needs.
Tip: Ensure your stakeholder management plan includes methods to monitor, evaluate, and report on communication effectiveness. This will help you adjust your strategy as needed.
The table below summarizes the phases of stakeholder engagement and their importance:
| Phase | Description |
|---|---|
| 1 | Engage IT and department representatives to validate schedules and align budgets. |
| 2 | Achieve sign-off from higher authorities to ensure agreement on priorities, timelines, and resource implications. |
| 3 | Develop a roadmap that requires buy-in across the organization, emphasizing user adoption and training. |
By actively engaging stakeholders, you can create a Microsoft 365 architecture that delivers real value. This engagement leads to better alignment with business objectives and enhances the overall success of your digital transformation efforts.
Sin 3: Overcomplicating solutions
Overcomplicating solutions in Microsoft 365 can lead to significant challenges. When you create complex systems, you increase the risk of usability issues and higher costs. Striking a balance between functionality and simplicity is crucial for effective digital transformation.
Complexity risks
Usability impact
Complex solutions can frustrate users. When you introduce too many features or options, employees may struggle to navigate the system. This confusion can lead to decreased productivity and low adoption rates. For example, creating too many Teams channels or SharePoint sites without a clear structure can result in chaos. Users may resort to 'shadow IT' solutions, turning to external tools that they find easier to use. A well-planned information architecture helps employees find what they need quickly, keeping projects on track.
Cost increase
Increased complexity often correlates with higher support and maintenance costs. As your organization grows, you may face several financial challenges:
| Cost Factor | Description |
|---|---|
| Integration Costs | Complex integrations with existing systems can lead to significant expenses and resource allocation. |
| Upgrades and Additional Modules | The need for additional features and modules can incur recurring costs as organizations expand. |
| Training and Support Costs | Ongoing training and support are essential for user adoption, often exceeding initial budget estimates. |
To assess complexity risks, consider tracking various metrics. These include service health metrics, user activity metrics, and license usage metrics. Monitoring these indicators helps you identify potential issues before they escalate.
Tip: Simplifying your solutions can enhance user experience and reduce costs. Focus on essential features that align with your business strategy.
By avoiding overcomplication, you can create a more efficient Microsoft 365 environment. This approach not only improves usability but also supports your overall digital transformation efforts.
Sin 4: Poor documentation and governance
Documentation role
Clarity and communication
Clear documentation plays a vital role in successful Microsoft 365 deployments. When you define your goals in the context of your organization and user groups, you create a solid foundation for your digital transformation. Documenting the current state in detail helps you understand user assignments and application access. This clarity prevents confusion and supports smooth integration across your business systems.
You should also inventory all client endpoint devices, including their configurations and security measures. This comprehensive documentation improves communication between teams and reduces errors during integration. Without it, you risk creating gaps that slow down your transformation efforts and increase operational risks.
Tip: Keep your documentation up to date and accessible. This practice ensures everyone understands the environment and can act quickly when changes occur.
Tactical governance failures
Permission sprawl
Permission sprawl happens when users accumulate excessive access rights over time. This issue often results from poor governance and lack of clear ownership. When you allow unchecked permission growth, you increase security risks and complicate management. Attackers can exploit these weaknesses to gain unauthorized access, leading to data breaches and compliance failures.
Many security vulnerabilities in Microsoft 365 environments arise from misconfigurations and human error rather than flaws in the platform itself. Administrators sometimes neglect to modify default settings or enforce strict controls. This oversight creates openings that attackers can easily exploit.
Access boundaries
Setting clear access boundaries is essential to protect your digital assets. Tactical governance failures often stem from organizational design problems, not technical limitations. You might face automation chaos or overly restrictive security measures that frustrate users and slow down business processes.
Governance debt builds up when you lack clear ownership, lifecycle management, and continuous monitoring. This debt becomes more visible as you adopt AI tools and advanced integrations. Without proper governance, your Microsoft 365 environment can become fragmented, making it difficult to maintain security and support your digital transformation goals.
Note: Establish clear roles and responsibilities for managing access. Regularly review permissions and automate lifecycle processes to keep your environment secure and efficient.
By improving documentation and governance, you strengthen your business’s ability to integrate Microsoft 365 solutions effectively. This effort reduces failures and supports a smoother digital transformation that aligns with your business objectives.
Sin 5: Neglecting change management
Change management is a critical aspect of successful Microsoft 365 implementations. Neglecting this area can lead to resistance, confusion, and ultimately, project failure. You must actively manage change to ensure a smooth transition and maximize the benefits of your digital transformation.
Managing change
Preparing teams
To prepare your teams for change, you should assess your organization's readiness. Evaluate the current state, culture, and stakeholder readiness before rolling out Microsoft 365. This assessment helps you identify potential risks and areas that need attention. Key deliverables include readiness assessments, stakeholder mapping, and risk logs.
Next, design and develop a tailored change management strategy. This strategy should align with your business goals and include communication and training plans. Establishing a champion network can also help drive adoption. Champions are enthusiastic users who can support their peers during the transition.
Overcoming resistance
Resistance to change is common in any organization. To overcome this resistance, create a change communications plan. Clearly outline what is changing, why it matters, and who is impacted. This transparency fosters understanding among employees and reduces uncertainty.
Investing in training and development programs is essential. Equip your employees with the necessary skills and confidence to adopt new tools. This investment not only reduces resistance but also enhances overall user satisfaction. Regular pulse surveys can help you gauge user sentiment and address frustrations before they escalate.
You can also reinforce and recognize adoption by celebrating milestones. Acknowledging achievements sustains engagement and encourages peer learning. Establishing feedback loops allows you to continuously gather and act on employee input, showing that their opinions matter.
Tip: Identify and address behavioral or emotional resistance proactively. Utilizing analytics and feedback mechanisms enables you to detect resistance patterns early, allowing for timely interventions.
By effectively managing change, you can embed Microsoft 365 usage into your business processes. This integration ensures that your organization continues to benefit from the platform long after the initial rollout.
Summary of Best Practices for Change Management
- Assess Readiness: Evaluate your organization's current state and stakeholder readiness.
- Design & Develop: Create a tailored change management strategy aligned with business goals.
- Implement & Manage Adoption: Execute communication campaigns and training sessions to drive adoption.
- Sustain & Reinforce: Embed Microsoft 365 usage into daily processes through recognition programs and continuous improvement plans.
By following these best practices, you can navigate the complexities of change management and enhance the success of your Microsoft 365 initiatives.
Sin 6: Failing to adapt to transformation
In today's fast-paced digital landscape, failing to adapt to transformation can severely hinder your Microsoft 365 architecture. Flexibility is essential for responding to market changes and ensuring continuous improvement. Organizations that embrace adaptability can thrive, while those that resist change often struggle.
Flexibility need
Market responsiveness
You must prioritize market responsiveness to stay competitive. The ability to quickly adjust your strategies and solutions allows you to meet evolving customer needs. Microsoft 365 offers features that support this flexibility:
| Feature | Description |
|---|---|
| Seamless Integration | Easy integration with other Microsoft solutions and third-party applications allows tailored workflows. |
| Low-Code/No-Code Development | Enables non-technical users to develop apps and automate processes using tools like Power Apps. |
| Pre-Built Solutions | Access to pre-built solutions in the AppSource marketplace reduces the need for custom development. |
By leveraging these features, you can create a responsive architecture that adapts to changing demands. Organizations that prioritize adaptability outperform those that do not. They benefit from enhanced security and compliance through ongoing governance programs. This approach includes automation, active integration with security tools, and continuous monitoring, leading to superior performance in adapting to threats and regulatory changes.
Continuous improvement
Continuous improvement is vital for maintaining an effective Microsoft 365 architecture. You should regularly assess your systems and processes to identify areas for enhancement. Implementing a culture of continuous improvement fosters innovation and efficiency. Here are some strategies to consider:
| Strategy Type | Evidence |
|---|---|
| Technology | Consistent deployment is achieved via pipeline tooling. |
| Technology | Widespread use of scripted configuration checks for common faults and scripted remediations. |
| Governance | Role Based Access Control is well implemented with a 'least-privilege' approach. |
| Governance | Conditional access is fully adopted with a 'break-glass' access process. |
| Process | Dedicated teams prioritize infrastructure project needs in alignment with business initiatives. |
| Process | Changes are proactively planned and automated to minimize disruption. |
By adopting these strategies, you can ensure that your Microsoft 365 architecture remains relevant and effective. Continuous improvement not only enhances your operational efficiency but also supports your overall digital transformation efforts.
Tip: Regularly review your architecture and processes. This practice helps you identify potential improvements and adapt to new challenges effectively.
Embracing flexibility and continuous improvement will empower you to navigate the complexities of digital transformation. By doing so, you can maximize the value of your Microsoft 365 investment and drive meaningful change within your organization.
Sin 7: Inadequate training and support
Training importance
Inadequate training and support can significantly impact your Microsoft 365 environment. When you fail to provide proper training, you risk losing user productivity and satisfaction. Users may struggle to navigate the platform, leading to frustration and inefficiencies.
User empowerment
Empowering users through effective training is essential. Comprehensive training programs enhance user competence and confidence. They address challenges related to user readiness and platform complexities. When users feel confident, they are more likely to adopt Microsoft 365 features effectively. This adoption is crucial for maximizing your investment in the platform.
Consider these key benefits of comprehensive training:
- Higher adoption rates of Microsoft 365 features.
- Improved user competence and confidence.
- Enhanced ability to navigate platform complexities.
Ongoing support
Ongoing support is vital for ensuring long-term success with Microsoft 365. You must structure your support to adapt to user needs and platform updates. Continuous oversight helps prevent environments from becoming outdated.
Here are some aspects to consider for effective ongoing support:
| Aspect of Support | Description |
|---|---|
| User Adoption, Training, and Change Management | Adoption requires tailored training and strategies for effective tool use. |
| Managed Services and Ongoing Support | Continuous oversight keeps up with new features and updates. |
| Continuous Improvement Roadmaps | Regular monitoring allows for recommendations on new features and improvements. |
Inadequate training and support can lead to significant issues. Users can experience a productivity loss of 25-30% due to insufficient training. Additionally, support tickets may increase by 300-400% in the first year after deployment. This escalation leads to higher costs and can result in strategic initiative failures if users do not adopt necessary capabilities.
To combat these challenges, consider implementing effective training methods. Here are some recommended approaches:
| Training Method | Description | Best Practices |
|---|---|---|
| Hands-On Training | Builds user competence through targeted sessions for different roles. | Record all sessions for continuous access. |
| Educational Materials | Reinforces learning and provides quick reference support. | Include microlearning playlists and printable cheat sheets. |
| Measure Adoption Metrics | Evaluates user adoption of M365 tools using analytics and feedback. | Create quarterly adoption reviews for executives. |
By prioritizing training and support, you empower your users and enhance the overall success of your Microsoft 365 initiatives. This focus not only improves user satisfaction but also drives productivity and efficiency across your organization.
In summary, the seven deadly sins of Microsoft 365 architecture can significantly impact your digital transformation efforts. By recognizing these pitfalls, you can adopt a proactive mindset that emphasizes governance and continuous adaptation.
Consider these benefits of avoiding these sins:
- Effective governance aligns your Microsoft 365 environment with business objectives.
- It mitigates cyber threats and ensures compliance, reducing risks associated with data security.
- Proactive planning leads to increased productivity and minimizes downtime.
By focusing on these strategies, you can maximize the value of your Microsoft 365 investments. Embrace a mindset that prioritizes clarity and adaptability to drive your success in the digital landscape.
FAQ
What are the seven deadly sins of Microsoft 365 architecture?
The seven deadly sins include lack of vision, ignoring stakeholder needs, overcomplicating solutions, poor documentation and governance, neglecting change management, failing to adapt to transformation, and inadequate training and support.
How can I avoid these architectural sins?
You can avoid these sins by establishing a clear strategic vision, engaging stakeholders, simplifying solutions, maintaining thorough documentation, managing change effectively, adapting to market needs, and providing ongoing training and support.
Why is stakeholder engagement important?
Engaging stakeholders ensures that your solutions meet user needs. Their insights help align your digital transformation efforts with business goals, leading to higher adoption rates and better outcomes.
What role does documentation play in Microsoft 365 architecture?
Documentation provides clarity and communication across teams. It helps define goals, track configurations, and prevent errors, ultimately supporting smoother integration and reducing operational risks.
How does change management impact digital transformation?
Effective change management prepares teams for new tools and processes. It reduces resistance, enhances user adoption, and ensures that your organization maximizes the benefits of Microsoft 365.
What are the consequences of inadequate training?
Inadequate training can lead to decreased productivity and user frustration. Users may struggle to navigate the platform, resulting in low adoption rates and increased support requests.
How can I measure the success of my Microsoft 365 initiatives?
You can measure success through key performance indicators (KPIs) such as user adoption rates, stakeholder feedback, and overall project alignment with business objectives. Regular assessments help identify areas for improvement.
Why is flexibility important in Microsoft 365 architecture?
Flexibility allows your organization to respond quickly to market changes and evolving customer needs. An adaptable architecture supports continuous improvement and enhances overall operational efficiency.
1
00:00:00,000 --> 00:00:04,280
Most organizations treat Microsoft 365 as a collection of features to be purchased.
2
00:00:04,280 --> 00:00:05,280
They are wrong.
3
00:00:05,280 --> 00:00:07,880
What they're actually operating is an economic system.
4
00:00:07,880 --> 00:00:10,640
And like all systems, it leaks, not dramatically.
5
00:00:10,640 --> 00:00:12,160
Silently.
6
00:00:12,160 --> 00:00:14,800
Let me walk you through the seven patterns I see over and over.
7
00:00:14,800 --> 00:00:16,960
Each one individually looks manageable.
8
00:00:16,960 --> 00:00:20,040
Together they compound into what I call architectural entropy,
9
00:00:20,040 --> 00:00:23,400
the slow, invisible decay of value in your Microsoft tenant iter.
10
00:00:23,400 --> 00:00:26,440
Sin 1, the myth of procurement as strategy,
11
00:00:26,440 --> 00:00:27,680
the lie sound simple.
12
00:00:27,680 --> 00:00:30,040
Buy the right license, get the right outcome.
13
00:00:30,040 --> 00:00:34,360
Most organizations believe that purchasing e5 licenses equals digital transformation.
14
00:00:34,360 --> 00:00:36,560
They tell their CFO, they are modernizing.
15
00:00:36,560 --> 00:00:38,120
They renew annually.
16
00:00:38,120 --> 00:00:42,040
Nobody questions whether the capability they bought is actually creating value.
17
00:00:42,040 --> 00:00:43,160
Here's what happens instead.
18
00:00:43,160 --> 00:00:47,240
A global engineering firm with 5,000 seats decides to go digital.
19
00:00:47,240 --> 00:00:49,200
They land on e5 as the standard.
20
00:00:49,200 --> 00:00:52,040
90% adoption across the knowledge worker base.
21
00:00:52,040 --> 00:00:53,440
On paper, perfect.
22
00:00:53,440 --> 00:00:56,840
In reality, only a fraction of users ever touched the premium connectors.
23
00:00:56,840 --> 00:01:00,720
Co-pilot set unused, defender features were never operationalized.
24
00:01:00,720 --> 00:01:04,520
After 18 months, a rationalization audit revealed the truth.
25
00:01:04,520 --> 00:01:08,760
56% of those licenses were either inactive, underutilized,
26
00:01:08,760 --> 00:01:11,400
or completely misaligned with actual work patterns.
27
00:01:11,400 --> 00:01:13,960
Buy roll, buy region, buy function.
28
00:01:13,960 --> 00:01:15,240
The economic leakage?
29
00:01:15,240 --> 00:01:17,600
$1.6 million annually.
30
00:01:17,600 --> 00:01:20,720
They were financing architectural erosion without knowing it.
31
00:01:20,720 --> 00:01:23,320
This is what I mean by procurement masquerading as strategy.
32
00:01:23,320 --> 00:01:24,440
You bought a feature bundle.
33
00:01:24,440 --> 00:01:26,200
You mistook it for an operating model.
34
00:01:26,200 --> 00:01:28,360
The control plane fix is brutally simple.
35
00:01:28,360 --> 00:01:31,920
If you cannot map telemetry to quarterly value realization,
36
00:01:31,920 --> 00:01:34,680
if you cannot prove that the premium capabilities you paid for
37
00:01:34,680 --> 00:01:38,600
are actively driving business outcomes, then you don't have architecture.
38
00:01:38,600 --> 00:01:39,960
You have procurement.
39
00:01:39,960 --> 00:01:44,640
And procurement by definition has no accountability for the money after the check clears.
40
00:01:44,640 --> 00:01:46,680
Sin 2, permission sprawl.
41
00:01:46,680 --> 00:01:49,080
The authorization compiler nobody built.
42
00:01:49,080 --> 00:01:53,160
The next pattern is permission creep, and it's more dangerous than most organizations realize.
43
00:01:53,160 --> 00:01:57,040
In Entra ID, there's a default culture I call ad-only.
44
00:01:57,040 --> 00:01:58,040
Permissions get granted.
45
00:01:58,040 --> 00:01:59,680
They rarely get revoked.
46
00:01:59,680 --> 00:02:00,680
That's not in competence.
47
00:02:00,680 --> 00:02:01,680
That's design inertia.
48
00:02:01,680 --> 00:02:02,880
No one owns the life cycle.
49
00:02:02,880 --> 00:02:03,880
No one reviews it.
50
00:02:03,880 --> 00:02:04,880
So it accumulates.
51
00:02:04,880 --> 00:02:07,440
I audited a financial services firm last year.
52
00:02:07,440 --> 00:02:11,600
They discovered 847, often app registrations.
53
00:02:11,600 --> 00:02:15,640
Applications that were granted permissions three years ago for a pilot project that was abandoned.
54
00:02:15,640 --> 00:02:17,320
The permissions were never removed.
55
00:02:17,320 --> 00:02:22,440
The service principles still held Microsoft GraphRides to access tenant data, user information,
56
00:02:22,440 --> 00:02:23,720
mailbox contents.
57
00:02:23,720 --> 00:02:27,560
54% of IT leaders report complex identity and privilege sprawl.
58
00:02:27,560 --> 00:02:32,280
In large tenants, it's normal to have 200, 300, sometimes 400 privileged applications running
59
00:02:32,280 --> 00:02:35,000
with permissions that nobody can fully account for.
60
00:02:35,000 --> 00:02:36,600
Here's the economic consequence.
61
00:02:36,600 --> 00:02:37,600
Audit friction.
62
00:02:37,600 --> 00:02:38,920
Breach exposure.
63
00:02:38,920 --> 00:02:40,120
Operational paralysis.
64
00:02:40,120 --> 00:02:42,720
When a compliance team asks who has access to what?
65
00:02:42,720 --> 00:02:44,520
The answer takes weeks to assemble.
66
00:02:44,520 --> 00:02:45,640
And in a breach, you're blind.
67
00:02:45,640 --> 00:02:48,640
You don't know what was exposed because you don't know what permissions existed.
68
00:02:48,640 --> 00:02:53,160
The control plane fixes this treat permissions as entropy generators, not rewards.
69
00:02:53,160 --> 00:02:56,040
Design expiration into every access ground from the start.
70
00:02:56,040 --> 00:02:57,680
Enforced life cycle ownership.
71
00:02:57,680 --> 00:03:01,360
If an application's purpose has expired, its permissions expire with it.
72
00:03:01,360 --> 00:03:02,840
Automatically, this is not optional.
73
00:03:02,840 --> 00:03:04,360
This is architectural law.
74
00:03:04,360 --> 00:03:05,360
Sin, three.
75
00:03:05,360 --> 00:03:06,760
Tactical governance.
76
00:03:06,760 --> 00:03:08,480
The theater of compliance.
77
00:03:08,480 --> 00:03:10,920
Most organizations claim they have governance.
78
00:03:10,920 --> 00:03:12,360
What they actually have is theater.
79
00:03:12,360 --> 00:03:16,160
I walked into a healthcare organization with 72 teams governance policies.
80
00:03:16,160 --> 00:03:17,320
All of them documented.
81
00:03:17,320 --> 00:03:18,400
None of them automated.
82
00:03:18,400 --> 00:03:20,040
They relied on manual approvals.
83
00:03:20,040 --> 00:03:21,360
On reactive policing.
84
00:03:21,360 --> 00:03:22,600
On human bottlenecks.
85
00:03:22,600 --> 00:03:24,400
On inconsistent enforcement.
86
00:03:24,400 --> 00:03:26,720
How many manual hours went into that every year?
87
00:03:26,720 --> 00:03:27,720
4,000.
88
00:03:27,720 --> 00:03:28,720
Minimum.
89
00:03:28,720 --> 00:03:31,480
Someone's job was refreshing spreadsheets and sending escalation emails.
90
00:03:31,480 --> 00:03:36,360
72% of organizations cannot enforce full governance policies at scale.
91
00:03:36,360 --> 00:03:37,600
And the reason is always the same.
92
00:03:37,600 --> 00:03:41,120
They build governance as a control function instead of a system's layer.
93
00:03:41,120 --> 00:03:43,680
The economic consequence is hidden but substantial.
94
00:03:43,680 --> 00:03:46,240
4,000 hours annually per organization.
95
00:03:46,240 --> 00:03:49,120
It's two full-time employees just maintaining compliance theater.
96
00:03:49,120 --> 00:03:50,120
And it's fragile.
97
00:03:50,120 --> 00:03:51,160
One person leaves.
98
00:03:51,160 --> 00:03:52,160
The policies drift.
99
00:03:52,160 --> 00:03:53,520
The system decays.
100
00:03:53,520 --> 00:03:55,000
The fix is existential.
101
00:03:55,000 --> 00:03:57,600
Governance that isn't code is just a suggestion.
102
00:03:57,600 --> 00:04:02,080
If you're still relying on PDF policies and SharePoint checklists and email approvals,
103
00:04:02,080 --> 00:04:04,520
you have compliance theater, not compliance.
104
00:04:04,520 --> 00:04:05,520
Automated.
105
00:04:05,520 --> 00:04:06,520
Make it part of the system.
106
00:04:06,520 --> 00:04:07,520
Make violations impossible.
107
00:04:07,520 --> 00:04:08,520
Not just monitored.
108
00:04:08,520 --> 00:04:10,920
If you cannot automate it, you don't actually have governance.
109
00:04:10,920 --> 00:04:11,920
You have hope.
110
00:04:11,920 --> 00:04:12,920
Sin 4.
111
00:04:12,920 --> 00:04:13,920
Appworship.
112
00:04:13,920 --> 00:04:14,920
Confusing output.
113
00:04:14,920 --> 00:04:17,680
Enterprises celebrate app proliferation.
114
00:04:17,680 --> 00:04:19,720
We shipped 50 power apps this year.
115
00:04:19,720 --> 00:04:21,280
Citizen developers are empowered.
116
00:04:21,280 --> 00:04:22,760
Feature velocity is accelerating.
117
00:04:22,760 --> 00:04:24,040
But here's what actually happened.
118
00:04:24,040 --> 00:04:26,200
You created 50 new maintenance liabilities.
119
00:04:26,200 --> 00:04:28,040
50 new surface area multipliers.
120
00:04:28,040 --> 00:04:30,680
Every app is another piece of code someone has to support.
121
00:04:30,680 --> 00:04:32,240
Another integration that can fail.
122
00:04:32,240 --> 00:04:33,520
Another attack surface to defend.
123
00:04:33,520 --> 00:04:37,200
A mid-market organization had 340 power apps in their tenant.
124
00:04:37,200 --> 00:04:39,760
127 of them had never been used.
125
00:04:39,760 --> 00:04:40,760
Nobody owned them.
126
00:04:40,760 --> 00:04:41,760
Nobody maintained them.
127
00:04:41,760 --> 00:04:42,960
They were digital craft.
128
00:04:42,960 --> 00:04:46,560
Systemic causes structural builders get rewarded for creation.
129
00:04:46,560 --> 00:04:47,560
Architects are invisible.
130
00:04:47,560 --> 00:04:52,120
So the tenant fills up with applications that looked good in isolation, but create a technical
131
00:04:52,120 --> 00:04:53,120
debt at scale.
132
00:04:53,120 --> 00:04:55,880
The economic consequence is support overhead.
133
00:04:55,880 --> 00:04:56,880
Compliance risk.
134
00:04:56,880 --> 00:04:57,880
Vendorsprone.
135
00:04:57,880 --> 00:05:02,120
When you have 340 applications, the complexity of governance becomes overwhelming.
136
00:05:02,120 --> 00:05:03,880
Entitlements multiply.
137
00:05:03,880 --> 00:05:05,080
Integrations tangle.
138
00:05:05,080 --> 00:05:06,680
Security becomes impossible to manage.
139
00:05:06,680 --> 00:05:08,760
The control plane fixes architectural zoning.
140
00:05:08,760 --> 00:05:10,080
Stop counting apps.
141
00:05:10,080 --> 00:05:12,160
Start counting technical debt surface area.
142
00:05:12,160 --> 00:05:13,960
Enforce life cycle ownership.
143
00:05:13,960 --> 00:05:17,960
Decommission anything that doesn't have a clear owner and a business justification.
144
00:05:17,960 --> 00:05:21,000
Treat app portfolios the way you treat real estate.
145
00:05:21,000 --> 00:05:23,560
Not every building belongs in your district.
146
00:05:23,560 --> 00:05:24,560
Sin 5.
147
00:05:24,560 --> 00:05:25,560
AI chaos.
148
00:05:25,560 --> 00:05:26,920
Agents without boundaries.
149
00:05:26,920 --> 00:05:28,240
This one is still forming.
150
00:05:28,240 --> 00:05:29,920
Most organizations don't see it yet.
151
00:05:29,920 --> 00:05:31,480
That's the danger.
152
00:05:31,480 --> 00:05:35,040
Organizations are deploying co-pilot onto flat, unclassified data structures.
153
00:05:35,040 --> 00:05:38,680
They're standing up co-pilot studio agents without defining what data those agents can
154
00:05:38,680 --> 00:05:39,680
access.
155
00:05:39,680 --> 00:05:42,920
Accelerating AI adoption while data governance lags behind.
156
00:05:42,920 --> 00:05:43,920
Here's what I mean.
157
00:05:43,920 --> 00:05:48,760
An enterprise co-pilot pilot, six weeks in, discovered that custom agents were accessing
158
00:05:48,760 --> 00:05:52,000
personally identifiable information without classification.
159
00:05:52,000 --> 00:05:55,560
They were reading payroll data, benefit information, address records.
160
00:05:55,560 --> 00:06:00,240
All available because the data was unclassified and the agent permissions were unrestricted,
161
00:06:00,240 --> 00:06:02,760
the economic consequence is immediate and expensive.
162
00:06:02,760 --> 00:06:04,080
Security retrofits.
163
00:06:04,080 --> 00:06:06,880
Co-pilot studio credits burning through the budget.
164
00:06:06,880 --> 00:06:11,840
Every exposure, compliance re-ordered, all because someone deployed AI without architectural
165
00:06:11,840 --> 00:06:12,840
zoning.
166
00:06:12,840 --> 00:06:16,120
49% of AI programs stole due to unclear value.
167
00:06:16,120 --> 00:06:19,560
80% of Fortune 500 use agents without formal governance.
168
00:06:19,560 --> 00:06:24,560
The pattern is familiar, speed first, architecture second, then disaster.
169
00:06:24,560 --> 00:06:26,520
The fix is non-negotiable.
170
00:06:26,520 --> 00:06:29,440
Define data boundaries before deploying agents.
171
00:06:29,440 --> 00:06:33,920
Classified data, tier agents by risk, enforce data access via identity and policy.
172
00:06:33,920 --> 00:06:38,600
Meet AI not as a feature to ship, but as a governance layer that has to sit on top of solid
173
00:06:38,600 --> 00:06:39,840
data architecture.
174
00:06:39,840 --> 00:06:42,840
If your data foundation is weak, AI amplifies the weakness.
175
00:06:42,840 --> 00:06:44,160
It doesn't fix it.
176
00:06:44,160 --> 00:06:47,000
Since six, builder bias, the architect vacuum.
177
00:06:47,000 --> 00:06:49,480
Here's a pattern that explains everything else.
178
00:06:49,480 --> 00:06:51,400
Enterprises promote the person who knows the buttons.
179
00:06:51,400 --> 00:06:54,680
They re-roared builders, they celebrate features shipped.
180
00:06:54,680 --> 00:06:58,960
An architect, the people thinking about system resilience, about decay, about integration
181
00:06:58,960 --> 00:06:59,960
costs.
182
00:06:59,960 --> 00:07:01,120
Those people are invisible.
183
00:07:01,120 --> 00:07:06,040
An IT director recently hired a power platform expert and fired the identity architect.
184
00:07:06,040 --> 00:07:07,640
The reasoning was straightforward.
185
00:07:07,640 --> 00:07:09,120
We need builders right now.
186
00:07:09,120 --> 00:07:11,360
Strategy can wait.
187
00:07:11,360 --> 00:07:13,000
What actually happened was structural.
188
00:07:13,000 --> 00:07:16,800
Without architects enforcing design constraints, the platform started accumulating entropy
189
00:07:16,800 --> 00:07:17,800
faster.
190
00:07:17,800 --> 00:07:21,520
Features shipped, systems decayed, technical debt compounded.
191
00:07:21,520 --> 00:07:25,200
The economic consequence is an 18 month productivity wall.
192
00:07:25,200 --> 00:07:28,960
Initial gains from rapid development flatten, then performance degrades, then your managing
193
00:07:28,960 --> 00:07:31,320
technical debt instead of shipping features.
194
00:07:31,320 --> 00:07:33,400
The systemic problem is organizational.
195
00:07:33,400 --> 00:07:38,640
Only 23% of organizations have formal AI agent identity strategy.
196
00:07:38,640 --> 00:07:39,880
Ownership is fragmented.
197
00:07:39,880 --> 00:07:41,600
Seasows, see security risks.
198
00:07:41,600 --> 00:07:42,600
Builders see opportunity.
199
00:07:42,600 --> 00:07:43,600
Finance sees cost.
200
00:07:43,600 --> 00:07:45,440
Nobody is looking at the system as a whole.
201
00:07:45,440 --> 00:07:47,840
The control plane fix requires a mindset shift.
202
00:07:47,840 --> 00:07:50,040
Treat architects as leverage engineers.
203
00:07:50,040 --> 00:07:51,520
Not cost centers.
204
00:07:51,520 --> 00:07:55,160
Measure them by system health, by entropy reduction, by the number of future problems they
205
00:07:55,160 --> 00:07:56,400
prevent.
206
00:07:56,400 --> 00:07:58,120
Builders create visible value.
207
00:07:58,120 --> 00:07:59,600
Builders create invisible value.
208
00:07:59,600 --> 00:08:00,760
Invisible value is just as real.
209
00:08:00,760 --> 00:08:02,480
It's just harder to see.
210
00:08:02,480 --> 00:08:03,480
Sin 7.
211
00:08:03,480 --> 00:08:04,480
Licensing blindness.
212
00:08:04,480 --> 00:08:05,680
Capacity is strategy.
213
00:08:05,680 --> 00:08:09,200
The final sin is the most expensive because it's the most normalized.
214
00:08:09,200 --> 00:08:12,120
Organizations renew E5 because it's what we do.
215
00:08:12,120 --> 00:08:14,560
Not because they've mapped capability to value.
216
00:08:14,560 --> 00:08:17,560
Not because they've assessed whether users actually need premium features.
217
00:08:17,560 --> 00:08:21,200
Not because they've measured adoption of the capabilities they're already paying for.
218
00:08:21,200 --> 00:08:23,320
Meanwhile, shadow IT thrives.
219
00:08:23,320 --> 00:08:26,040
Users on basic skews accomplish the same roles.
220
00:08:26,040 --> 00:08:27,400
Premium features sit idle.
221
00:08:27,400 --> 00:08:31,560
The licensing strategy becomes a budget line item, not an architectural lever.
222
00:08:31,560 --> 00:08:32,560
Real numbers.
223
00:08:32,560 --> 00:08:37,160
An enterprise paying $2.1 million annually for E5 across the board.
224
00:08:37,160 --> 00:08:41,840
A rationalization audit found that 34% of those users could perform their exact same
225
00:08:41,840 --> 00:08:43,080
role on business standard.
226
00:08:43,080 --> 00:08:45,240
They had no need for the premium connector library.
227
00:08:45,240 --> 00:08:46,440
They didn't use co-pilot.
228
00:08:46,440 --> 00:08:49,560
They didn't need advanced threat protection beyond what business standard includes.
229
00:08:49,560 --> 00:08:53,120
The economic consequence is orthogonal to what most organizations see.
230
00:08:53,120 --> 00:08:55,440
It's not just the cost of unused licenses.
231
00:08:55,440 --> 00:08:59,080
It's the cost of not using licensing as a behavioral incentive.
232
00:08:59,080 --> 00:09:03,120
If your licensing skew is aligned to roles and capabilities, then it drives adoption.
233
00:09:03,120 --> 00:09:06,040
It forces you to make decisions about what's actually needed.
234
00:09:06,040 --> 00:09:09,320
The control plane fix is this licensing skew is a behavioral lever.
235
00:09:09,320 --> 00:09:10,320
Use it.
236
00:09:10,320 --> 00:09:13,800
If you're paying for E5 across the board, you've removed the constraint that forces architectural
237
00:09:13,800 --> 00:09:14,800
discipline.
238
00:09:14,800 --> 00:09:17,360
You've said effectively that everyone gets access to everything.
239
00:09:17,360 --> 00:09:18,360
That's not strategy.
240
00:09:18,360 --> 00:09:20,000
That's capitulation.
241
00:09:20,000 --> 00:09:22,440
These seven sins are patterns, not anomalies.
242
00:09:22,440 --> 00:09:23,760
They compound.
243
00:09:23,760 --> 00:09:25,400
Permission sprawl feeds abs sprawl.
244
00:09:25,400 --> 00:09:28,280
Conconcing blindness enables governance theatre.
245
00:09:28,280 --> 00:09:30,880
Procurement strategy masks the absence of architecture.
246
00:09:30,880 --> 00:09:33,280
Together they create what I call the leakage model.
247
00:09:33,280 --> 00:09:37,160
Millions of dollars in invisible inefficiency that nobody's measuring because nobody owns
248
00:09:37,160 --> 00:09:38,160
the outcome.
249
00:09:38,160 --> 00:09:39,160
That's the diagnosis.
250
00:09:39,160 --> 00:09:41,160
That's what we're actually operating here.
251
00:09:41,160 --> 00:09:43,160
The umbrella sin control plane neglect.
252
00:09:43,160 --> 00:09:45,120
These seven sins don't exist in isolation.
253
00:09:45,120 --> 00:09:46,440
They're not random failures.
254
00:09:46,440 --> 00:09:49,200
They're all symptoms of one structural absence.
255
00:09:49,200 --> 00:09:51,600
That absence is what I want to talk about now.
256
00:09:51,600 --> 00:09:55,360
Operating without a system's layer means entropy becomes your default operating system.
257
00:09:55,360 --> 00:09:56,360
You don't have governance.
258
00:09:56,360 --> 00:09:58,680
You have chaos with policies written on top of it.
259
00:09:58,680 --> 00:09:59,680
You don't have architecture.
260
00:09:59,680 --> 00:10:01,680
You have a platform which is something else entirely.
261
00:10:01,680 --> 00:10:03,080
Here is how it manifests.
262
00:10:03,080 --> 00:10:07,720
A 10,000 seat organization I worked with had EntraID governed by one team.
263
00:10:07,720 --> 00:10:09,080
Intune handled by another.
264
00:10:09,080 --> 00:10:11,080
Microsoft Defender managed separately.
265
00:10:11,080 --> 00:10:12,080
Per view.
266
00:10:12,080 --> 00:10:14,320
Data governance owned by compliance.
267
00:10:14,320 --> 00:10:17,280
Teams and SharePoint loosely monitored by service adoption.
268
00:10:17,280 --> 00:10:19,760
Nobody was looking at identity to app orchestration.
269
00:10:19,760 --> 00:10:23,360
Nobody was enforcing zoning and tearing across the entire system.
270
00:10:23,360 --> 00:10:24,880
Every service had its own policies.
271
00:10:24,880 --> 00:10:26,240
Its own approval workflows.
272
00:10:26,240 --> 00:10:27,960
Its own definitions of security baseline.
273
00:10:27,960 --> 00:10:30,920
What that organization actually had wasn't a security posture.
274
00:10:30,920 --> 00:10:34,240
It was security theater orchestrated across five different teams.
275
00:10:34,240 --> 00:10:35,640
The systemic causes this.
276
00:10:35,640 --> 00:10:39,960
Most organizations treat Microsoft Cloud as a collection of disconnected services.
277
00:10:39,960 --> 00:10:41,120
Identity over here.
278
00:10:41,120 --> 00:10:42,720
Data governance over there.
279
00:10:42,720 --> 00:10:44,120
Application somewhere else.
280
00:10:44,120 --> 00:10:45,280
Compliance in a separate silo.
281
00:10:45,280 --> 00:10:47,680
This creates what I call policy fragmentation.
282
00:10:47,680 --> 00:10:49,840
Each domain solves its own problems locally.
283
00:10:49,840 --> 00:10:53,800
But there's no layer that decides how those domains interact, how data flows from one
284
00:10:53,800 --> 00:10:55,040
system to another.
285
00:10:55,040 --> 00:10:59,400
How a user's access in EntraID connects to what they can do in SharePoint, what they can
286
00:10:59,400 --> 00:11:01,080
see in a co-pilot agent.
287
00:11:01,080 --> 00:11:02,800
That connecting layer, that's the control plane.
288
00:11:02,800 --> 00:11:04,320
And most organizations don't have one.
289
00:11:04,320 --> 00:11:07,760
The economic consequence of operating without it is staggering.
290
00:11:07,760 --> 00:11:12,400
That 10,000 seat organization, 3.2 million in unrealized productivity benefits over three
291
00:11:12,400 --> 00:11:13,400
years.
292
00:11:13,400 --> 00:11:14,520
Not because they lacked features.
293
00:11:14,520 --> 00:11:16,760
They had every Microsoft feature available.
294
00:11:16,760 --> 00:11:21,520
But because those features weren't integrated into a system, users couldn't find information.
295
00:11:21,520 --> 00:11:23,320
Admins couldn't trust their governance.
296
00:11:23,320 --> 00:11:25,800
They had no way to enforce decisions at scale.
297
00:11:25,800 --> 00:11:28,880
Control plane absence also means security debt accumulates.
298
00:11:28,880 --> 00:11:31,080
When EntraID policies drift, you don't know it.
299
00:11:31,080 --> 00:11:34,120
When SharePoint permissions exceed your threshold, there's nobody watching.
300
00:11:34,120 --> 00:11:38,240
When a co-pilot agent is accessing data you never approved, the policy layer doesn't catch
301
00:11:38,240 --> 00:11:39,240
it.
302
00:11:39,240 --> 00:11:40,240
Each service does its best.
303
00:11:40,240 --> 00:11:43,920
But there's no circuit breaker, no orchestration, no central place where someone says,
304
00:11:43,920 --> 00:11:46,440
no, that violates our architecture.
305
00:11:46,440 --> 00:11:48,920
The control plane fix requires a foundational shift.
306
00:11:48,920 --> 00:11:51,600
You have to build a unified policy compilation layer.
307
00:11:51,600 --> 00:11:55,200
Create Identity, EntraID as the control plane backbone.
308
00:11:55,200 --> 00:11:58,880
Make it the place where you define not just who can access what, but what that access means
309
00:11:58,880 --> 00:12:00,240
across your entire system.
310
00:12:00,240 --> 00:12:03,480
A user is an employee, a contractor, a vendor, a guest.
311
00:12:03,480 --> 00:12:07,960
Once you make that decision in Identity, every other system, Defender, PerView, Teams, SharePoint
312
00:12:07,960 --> 00:12:09,560
should inherit that context.
313
00:12:09,560 --> 00:12:11,240
Not ask for it separately.
314
00:12:11,240 --> 00:12:13,960
Inherited, then enforce cross-platform orchestration.
315
00:12:13,960 --> 00:12:17,840
If a user's EntraID role says they're in finance that determines their default access
316
00:12:17,840 --> 00:12:20,000
to financial data in SharePoint.
317
00:12:20,000 --> 00:12:23,040
If they're classified as guest, that determines what they see in Teams.
318
00:12:23,040 --> 00:12:27,240
If a co-pilot agent is tagged as accessing customer data, its identity and permissions
319
00:12:27,240 --> 00:12:29,120
flow from a single source of truth.
320
00:12:29,120 --> 00:12:30,480
Let me define this precisely.
321
00:12:30,480 --> 00:12:34,880
A control plane is the system that makes decisions about how other systems behave.
322
00:12:34,880 --> 00:12:36,400
It's the layer above execution.
323
00:12:36,400 --> 00:12:38,600
It's where intent is translated into policy.
324
00:12:38,600 --> 00:12:42,720
Without it, you have a platform, individual services, operating independently.
325
00:12:42,720 --> 00:12:43,880
With it, you have architecture.
326
00:12:43,880 --> 00:12:45,120
You have a system.
327
00:12:45,120 --> 00:12:46,640
Most organizations have the first.
328
00:12:46,640 --> 00:12:48,080
Almost none have the second.
329
00:12:48,080 --> 00:12:52,080
And that distinction is the difference between leaking millions invisibly and knowing exactly
330
00:12:52,080 --> 00:12:53,560
where your money is going.
331
00:12:53,560 --> 00:12:57,440
That distinction is the difference between a security posture and security theater.
332
00:12:57,440 --> 00:13:00,480
That distinction is the difference between governance that works and governance that's
333
00:13:00,480 --> 00:13:01,800
just a suggestion.
334
00:13:01,800 --> 00:13:03,800
People ignore when it inconveniences them.
335
00:13:03,800 --> 00:13:05,880
This is what makes the seven sins actually dangerous.
336
00:13:05,880 --> 00:13:07,560
It's not that they exist independently.
337
00:13:07,560 --> 00:13:11,280
It's that they compound because there's no central control layer catching them, measuring
338
00:13:11,280 --> 00:13:13,480
them, stopping them from spiraling.
339
00:13:13,480 --> 00:13:16,080
Without control plane architecture, you're not managing a system.
340
00:13:16,080 --> 00:13:18,640
You're managing a collection of problems.
341
00:13:18,640 --> 00:13:19,640
Sin 2.
342
00:13:19,640 --> 00:13:20,640
Permission sprawl.
343
00:13:20,640 --> 00:13:22,080
The authorization compiler nobody built.
344
00:13:22,080 --> 00:13:24,440
The next pattern I see constantly is permission creep.
345
00:13:24,440 --> 00:13:28,680
And it's more dangerous than most organizations realize because it operates silently, compounding
346
00:13:28,680 --> 00:13:30,440
over years while nobody's watching.
347
00:13:30,440 --> 00:13:32,960
In EntraID, there's a default culture I call ad-only.
348
00:13:32,960 --> 00:13:34,280
And permissions get granted.
349
00:13:34,280 --> 00:13:35,760
They rarely get revoked.
350
00:13:35,760 --> 00:13:36,760
That's not incompetence.
351
00:13:36,760 --> 00:13:38,560
That's architectural inertia.
352
00:13:38,560 --> 00:13:39,880
No life cycle ownership.
353
00:13:39,880 --> 00:13:41,320
No systematic review.
354
00:13:41,320 --> 00:13:43,680
No exploration mechanism built into the systems.
355
00:13:43,680 --> 00:13:45,400
So it accumulates.
356
00:13:45,400 --> 00:13:46,400
Here's how it works.
357
00:13:46,400 --> 00:13:49,680
A developer needs access to a specific Microsoft Graph endpoint.
358
00:13:49,680 --> 00:13:51,080
An application gets registered.
359
00:13:51,080 --> 00:13:52,080
It receives permissions.
360
00:13:52,080 --> 00:13:53,080
The project succeeds.
361
00:13:53,080 --> 00:13:54,480
The developer moves on.
362
00:13:54,480 --> 00:13:58,560
And the application registration sits there still holding permissions because nobody owned
363
00:13:58,560 --> 00:14:00,040
the task of sunsetting it.
364
00:14:00,040 --> 00:14:02,360
I audited a financial services firm last year.
365
00:14:02,360 --> 00:14:07,520
They discovered 847, often app registrations.
366
00:14:07,520 --> 00:14:10,800
Applications that were granted permissions three, four, sometimes five years ago for pilots
367
00:14:10,800 --> 00:14:12,040
that were abandoned.
368
00:14:12,040 --> 00:14:13,520
The permissions were never removed.
369
00:14:13,520 --> 00:14:18,120
The service principle still held Microsoft GraphRites to access tenant data, user information,
370
00:14:18,120 --> 00:14:19,480
mailbox contents.
371
00:14:19,480 --> 00:14:22,200
Some of them had credentials that hadn't been rotated in years.
372
00:14:22,200 --> 00:14:26,960
54% of IT leaders report complex identity and privilege sprawl in their environments.
373
00:14:26,960 --> 00:14:31,760
In a large tenant, it's normal to have 200, 300, sometimes 400 privileged applications running
374
00:14:31,760 --> 00:14:35,800
simultaneously with permissions that nobody can fully account for.
375
00:14:35,800 --> 00:14:41,000
Add in the growth of automation, AI agents and custom integrations, and that number explodes.
376
00:14:41,000 --> 00:14:45,320
125 or more apps holding elevator drives is no longer anomalous.
377
00:14:45,320 --> 00:14:46,320
It's expected.
378
00:14:46,320 --> 00:14:47,560
And here's what makes it dangerous.
379
00:14:47,560 --> 00:14:51,560
Each of these applications is a potential entry point, not just for attackers, for compliance
380
00:14:51,560 --> 00:14:54,760
violations, for uncontrolled data access.
381
00:14:54,760 --> 00:14:58,160
For mission creep, where an application that was designed to do one thing gradually gets
382
00:14:58,160 --> 00:15:01,560
permissions to do five other things because convenience wins over governance.
383
00:15:01,560 --> 00:15:04,320
The economic consequence manifests in multiple ways.
384
00:15:04,320 --> 00:15:05,600
First, audit friction.
385
00:15:05,600 --> 00:15:09,640
When a compliance team asks who has access to what in your tenant the answer takes weeks
386
00:15:09,640 --> 00:15:10,640
to assemble.
387
00:15:10,640 --> 00:15:12,040
Clearing app registrations.
388
00:15:12,040 --> 00:15:13,600
You're tracking credential history.
389
00:15:13,600 --> 00:15:16,640
You're cross referencing permissions against actual usage.
390
00:15:16,640 --> 00:15:19,280
And half the time you find permissions that shouldn't exist.
391
00:15:19,280 --> 00:15:22,560
And then you have to decide whether removing them will break something nobody remembers
392
00:15:22,560 --> 00:15:23,720
depending on.
393
00:15:23,720 --> 00:15:24,920
Second, breach exposure.
394
00:15:24,920 --> 00:15:28,640
In a breach scenario, you don't know what was exposed because you don't know what permissions
395
00:15:28,640 --> 00:15:29,640
actually existed.
396
00:15:29,640 --> 00:15:33,600
You assume an attacker who compromised the service principle can access customer data,
397
00:15:33,600 --> 00:15:35,600
financial records, employee information.
398
00:15:35,600 --> 00:15:36,960
But do they have graph permissions?
399
00:15:36,960 --> 00:15:38,480
Do they have mail delegation?
400
00:15:38,480 --> 00:15:39,720
Can they reset passwords?
401
00:15:39,720 --> 00:15:40,720
No guessing.
402
00:15:40,720 --> 00:15:42,520
And guessing in a breach is expensive.
403
00:15:42,520 --> 00:15:43,720
Third, operational paralysis.
404
00:15:43,720 --> 00:15:48,040
You can't move forward with security hardening because you don't understand the dependency graph.
405
00:15:48,040 --> 00:15:52,120
You can't enforce conditional access because it might break an integration nobody documented.
406
00:15:52,120 --> 00:15:55,200
You can't implement least privilege because the permission landscape is too sprawling
407
00:15:55,200 --> 00:15:56,200
to untangle.
408
00:15:56,200 --> 00:15:58,000
The systemic cause is architectural.
409
00:15:58,000 --> 00:16:01,200
Most organizations lack entitlement management discipline.
410
00:16:01,200 --> 00:16:03,280
There's no design lifecycle for applications.
411
00:16:03,280 --> 00:16:04,520
No automatic expiration.
412
00:16:04,520 --> 00:16:06,520
No regular access reviews that have teeth.
413
00:16:06,520 --> 00:16:10,520
No mechanism that says if you don't explicitly renew this permission every six months it gets
414
00:16:10,520 --> 00:16:11,520
revoked.
415
00:16:11,520 --> 00:16:13,200
The control plane fixes this.
416
00:16:13,200 --> 00:16:15,960
Treat permissions as entropy generators, not rewards.
417
00:16:15,960 --> 00:16:19,000
Every time you grant access, you're adding entropy to the system.
418
00:16:19,000 --> 00:16:21,520
Design expiration into every access grant from the start.
419
00:16:21,520 --> 00:16:22,520
Make it automatic.
420
00:16:22,520 --> 00:16:26,720
If an application's purpose has been fulfilled or abandoned, its permissions expire with it.
421
00:16:26,720 --> 00:16:30,600
Don't require a manual cleanup process that depends on someone remembering.
422
00:16:30,600 --> 00:16:31,920
Make it architectural law.
423
00:16:31,920 --> 00:16:35,920
This means implementing entitlement management that's not just an audit tool but a governance
424
00:16:35,920 --> 00:16:36,920
engine.
425
00:16:36,920 --> 00:16:41,040
Life cycle workflows that automatically remove permissions based on defined criteria, access
426
00:16:41,040 --> 00:16:42,680
packages that expire.
427
00:16:42,680 --> 00:16:45,520
Service principles with credential rotation enforced.
428
00:16:45,520 --> 00:16:49,080
Regular access reviews that don't just report on sprawl, they remediate it.
429
00:16:49,080 --> 00:16:51,920
And critically it means assigning life cycle ownership.
430
00:16:51,920 --> 00:16:55,720
Someone has to be accountable for whether an application still serves a business purpose.
431
00:16:55,720 --> 00:16:57,600
If the answer is no, the permissions go.
432
00:16:57,600 --> 00:16:59,520
Not eventually, immediately.
433
00:16:59,520 --> 00:17:01,520
Permission sprawl is the invisible attack surface.
434
00:17:01,520 --> 00:17:03,120
But the real problem is deeper.
435
00:17:03,120 --> 00:17:05,040
Its governance that isn't automated.
436
00:17:05,040 --> 00:17:08,880
One three, tactical governance, the theatre of compliance.
437
00:17:08,880 --> 00:17:11,400
Most organizations claim they have governance.
438
00:17:11,400 --> 00:17:12,640
What they actually have is theatre.
439
00:17:12,640 --> 00:17:16,800
I walked into a healthcare organization last year with 72 teams governance policies.
440
00:17:16,800 --> 00:17:20,080
All of them documented, beautifully written, signed off by compliance leadership, none
441
00:17:20,080 --> 00:17:21,880
of them automated zero.
442
00:17:21,880 --> 00:17:23,200
What did they rely on instead?
443
00:17:23,200 --> 00:17:24,200
Manual approvals.
444
00:17:24,200 --> 00:17:28,120
Someone had to review new teams requests and decide whether they met policy criteria,
445
00:17:28,120 --> 00:17:29,120
reactive policing.
446
00:17:29,120 --> 00:17:32,440
When someone created a team's channel without classification, someone else had to send
447
00:17:32,440 --> 00:17:34,360
them an email asking them to fix it.
448
00:17:34,360 --> 00:17:35,600
Human bottlenecks everywhere.
449
00:17:35,600 --> 00:17:36,920
An inconsistent enforcement.
450
00:17:36,920 --> 00:17:38,000
Some teams got corrected.
451
00:17:38,000 --> 00:17:39,000
Others didn't.
452
00:17:39,000 --> 00:17:40,680
It depended on who noticed and how busy they were.
453
00:17:40,680 --> 00:17:43,400
The real measure of governance isn't policy documents.
454
00:17:43,400 --> 00:17:44,560
It's enforcement.
455
00:17:44,560 --> 00:17:46,720
And this organization had no enforcement mechanism.
456
00:17:46,720 --> 00:17:47,720
They had hope.
457
00:17:47,720 --> 00:17:49,400
Here's how it manifests in practice.
458
00:17:49,400 --> 00:17:52,040
A business unit wants to create a new team's workspace.
459
00:17:52,040 --> 00:17:53,040
They fill out a form.
460
00:17:53,040 --> 00:17:54,760
It goes into an approval queue.
461
00:17:54,760 --> 00:17:57,920
Someone reviews it against 72 governance policies.
462
00:17:57,920 --> 00:18:00,880
Manually comparing what they're proposing against written criteria.
463
00:18:00,880 --> 00:18:01,880
This takes time.
464
00:18:01,880 --> 00:18:04,120
The request doesn't clearly violate a policy.
465
00:18:04,120 --> 00:18:05,120
It gets approved.
466
00:18:05,120 --> 00:18:06,800
If it's ambiguous, it gets escalated.
467
00:18:06,800 --> 00:18:10,480
If the escalation path is blocked, it gets approved by default because nobody wants to
468
00:18:10,480 --> 00:18:12,880
be the person blocking business velocity.
469
00:18:12,880 --> 00:18:14,480
Then someone creates the team.
470
00:18:14,480 --> 00:18:17,200
And then someone else has to verify that it was set up correctly.
471
00:18:17,200 --> 00:18:18,920
Check the sensitivity label.
472
00:18:18,920 --> 00:18:20,440
Verify the membership controls.
473
00:18:20,440 --> 00:18:21,600
Confirm the sharing settings.
474
00:18:21,600 --> 00:18:22,600
All manual.
475
00:18:22,600 --> 00:18:24,160
All dependent on discipline and memory.
476
00:18:24,160 --> 00:18:28,880
How many manual hours did that organization spend every year maintaining compliance theater?
477
00:18:28,880 --> 00:18:29,880
4,000.
478
00:18:29,880 --> 00:18:34,160
That's two full-time employees whose entire job was spreadsheets and escalation emails
479
00:18:34,160 --> 00:18:36,560
and follow-up conversations about policy drift.
480
00:18:36,560 --> 00:18:40,520
And it was fragile when the person maintaining the governance process left the organization
481
00:18:40,520 --> 00:18:42,200
knowledge walked out the door.
482
00:18:42,200 --> 00:18:43,200
Policies drifted.
483
00:18:43,200 --> 00:18:46,840
New teams started getting created without the controls that were supposed to exist.
484
00:18:46,840 --> 00:18:47,840
The system decayed.
485
00:18:47,840 --> 00:18:49,520
This is the fundamental disconnect.
486
00:18:49,520 --> 00:18:54,080
72% of organizations cannot enforce full governance policies at scale.
487
00:18:54,080 --> 00:18:55,360
And the reason is always the same.
488
00:18:55,360 --> 00:18:57,680
They built governance as a control function.
489
00:18:57,680 --> 00:19:00,240
And you do after the fact react to violations.
490
00:19:00,240 --> 00:19:01,240
Remind people to comply.
491
00:19:01,240 --> 00:19:05,040
Instead of building it as a system's layer, the systemic cause is structural.
492
00:19:05,040 --> 00:19:07,120
Governance is treated as a necessary evil.
493
00:19:07,120 --> 00:19:08,120
Compliance is seen as friction.
494
00:19:08,120 --> 00:19:10,280
So organizations minimize the investment.
495
00:19:10,280 --> 00:19:11,280
They write policies.
496
00:19:11,280 --> 00:19:12,280
They create processes.
497
00:19:12,280 --> 00:19:13,280
They hope people follow them.
498
00:19:13,280 --> 00:19:17,000
And then they're shocked when the system breaks under the weight of actual organizational
499
00:19:17,000 --> 00:19:18,000
scale.
500
00:19:18,000 --> 00:19:20,120
The economic consequence is hidden, but substantial.
501
00:19:20,120 --> 00:19:22,120
4,000 hours annually per organization.
502
00:19:22,120 --> 00:19:25,400
That's two full-time people just maintaining governance theater.
503
00:19:25,400 --> 00:19:26,400
And it's fragile.
504
00:19:26,400 --> 00:19:30,280
And it leaves priorities shift the governance system decays because it was never actually
505
00:19:30,280 --> 00:19:31,480
part of the architecture.
506
00:19:31,480 --> 00:19:35,280
It was bolted on top, dependent on sustained discipline and attention that eventually
507
00:19:35,280 --> 00:19:36,280
withers.
508
00:19:36,280 --> 00:19:39,480
The control plain fix is existential.
509
00:19:39,480 --> 00:19:42,880
Governance that isn't code is just a suggestion.
510
00:19:42,880 --> 00:19:46,720
If you're still relying on PDF policies and SharePoint checklists and email approvals,
511
00:19:46,720 --> 00:19:47,880
you have compliance theater.
512
00:19:47,880 --> 00:19:48,880
You don't have governance.
513
00:19:48,880 --> 00:19:49,880
And here's why it matters.
514
00:19:49,880 --> 00:19:51,280
Theater scales poorly.
515
00:19:51,280 --> 00:19:53,080
It breaks when you need it most.
516
00:19:53,080 --> 00:19:56,840
It depends on heroic individual effort and it never actually prevents violations.
517
00:19:56,840 --> 00:19:59,040
It just documents them after they happen.
518
00:19:59,040 --> 00:20:00,600
Real governance works differently.
519
00:20:00,600 --> 00:20:04,280
When someone creates a team's workspace, the system automatically applies the correct
520
00:20:04,280 --> 00:20:05,280
sensitivity label.
521
00:20:05,280 --> 00:20:06,560
The access controls are set.
522
00:20:06,560 --> 00:20:08,520
The membership restrictions are enforced.
523
00:20:08,520 --> 00:20:11,600
The data classification is inherited from the policy layer.
524
00:20:11,600 --> 00:20:15,480
No approval queue, no human review, no gap between intent and execution.
525
00:20:15,480 --> 00:20:16,640
That requires automation.
526
00:20:16,640 --> 00:20:17,640
It requires code.
527
00:20:17,640 --> 00:20:21,360
It requires treating governance as part of the system architecture, not as an external
528
00:20:21,360 --> 00:20:22,360
control function.
529
00:20:22,360 --> 00:20:25,440
If you cannot automate your governance, you don't actually have governance.
530
00:20:25,440 --> 00:20:26,440
You have hope.
531
00:20:26,440 --> 00:20:27,960
And hope is not a control.
532
00:20:27,960 --> 00:20:33,320
Sin 4, app worship, confusing output with architecture, enterprises celebrate app proliferation.
533
00:20:33,320 --> 00:20:34,880
We shipped 50 power apps this year.
534
00:20:34,880 --> 00:20:36,480
Citizen developers are empowered.
535
00:20:36,480 --> 00:20:37,880
Feature velocities accelerating.
536
00:20:37,880 --> 00:20:39,120
The business is moving faster.
537
00:20:39,120 --> 00:20:40,120
We're transforming.
538
00:20:40,120 --> 00:20:41,640
But here's what actually happened.
539
00:20:41,640 --> 00:20:45,560
You created 15 new maintenance liabilities, 15 new surface area multipliers.
540
00:20:45,560 --> 00:20:47,520
Every application is another piece of code.
541
00:20:47,520 --> 00:20:50,160
Someone has to support another integration that can fail.
542
00:20:50,160 --> 00:20:52,240
Another attack surface to defend.
543
00:20:52,240 --> 00:20:53,880
Another permission boundary to govern.
544
00:20:53,880 --> 00:20:57,560
This is where the builder bias I mentioned earlier collides with architectural reality.
545
00:20:57,560 --> 00:20:59,080
Builders get rewarded for shipping.
546
00:20:59,080 --> 00:21:00,520
The organization sees features.
547
00:21:00,520 --> 00:21:02,520
The business celebrates velocity.
548
00:21:02,520 --> 00:21:05,000
And nobody's counting the cost in technical debt.
549
00:21:05,000 --> 00:21:09,760
A mid market organization I worked with had 340 power apps in their tenant.
550
00:21:09,760 --> 00:21:12,400
340, I asked them how many were actively used.
551
00:21:12,400 --> 00:21:13,400
They didn't know.
552
00:21:13,400 --> 00:21:14,400
So we audited it.
553
00:21:14,400 --> 00:21:16,760
127 of them had never been used.
554
00:21:16,760 --> 00:21:17,760
Not once.
555
00:21:17,760 --> 00:21:19,640
Nobody ever registered a successful run.
556
00:21:19,640 --> 00:21:21,760
Some of them had been created three years ago.
557
00:21:21,760 --> 00:21:25,360
The original builder had long since moved on or left the organization.
558
00:21:25,360 --> 00:21:26,360
Nobody owned them.
559
00:21:26,360 --> 00:21:27,360
Nobody maintained them.
560
00:21:27,360 --> 00:21:28,680
They were digital craft.
561
00:21:28,680 --> 00:21:32,680
Sitting in the environment, creating governance complexity and compliance risk.
562
00:21:32,680 --> 00:21:37,120
Of the remaining 213 apps that were actually used fewer than half had documented business
563
00:21:37,120 --> 00:21:38,120
owners.
564
00:21:38,120 --> 00:21:40,520
The ones that did, the owners often didn't realize they owned them.
565
00:21:40,520 --> 00:21:43,720
They inherited the responsibility when they took over a team.
566
00:21:43,720 --> 00:21:46,840
Or the original creator had left it assigned to them without ever asking.
567
00:21:46,840 --> 00:21:48,680
The systemic causes structural.
568
00:21:48,680 --> 00:21:50,880
Builders get promotions for shipping features.
569
00:21:50,880 --> 00:21:54,360
The apps are invisible so the tenant fills up with applications that looked good in isolation
570
00:21:54,360 --> 00:21:56,000
but created technical debt at scale.
571
00:21:56,000 --> 00:21:57,440
There was no gating function.
572
00:21:57,440 --> 00:22:00,640
No architectural review that asked is this app necessary?
573
00:22:00,640 --> 00:22:02,720
Does it duplicate existing capability?
574
00:22:02,720 --> 00:22:03,720
Who owns it?
575
00:22:03,720 --> 00:22:04,720
What happens when the builder leaves?
576
00:22:04,720 --> 00:22:08,120
Instead, the organization operated on optimistic assumptions.
577
00:22:08,120 --> 00:22:09,400
Power apps are low-code.
578
00:22:09,400 --> 00:22:10,400
Citizens can build them.
579
00:22:10,400 --> 00:22:11,400
That's empowerment.
580
00:22:11,400 --> 00:22:12,400
That's agility.
581
00:22:12,400 --> 00:22:13,400
And it is.
582
00:22:13,400 --> 00:22:17,600
Until you wake up one day with 340 applications and no idea what most of them do.
583
00:22:17,600 --> 00:22:20,000
Economic consequence is operational paralysis.
584
00:22:20,000 --> 00:22:21,480
Support overhead explodes.
585
00:22:21,480 --> 00:22:23,520
When an application breaks, who fixes it?
586
00:22:23,520 --> 00:22:26,200
If the original builder is gone, nobody knows the code.
587
00:22:26,200 --> 00:22:30,320
So you either let it stay broken or you spend engineering time reverse engineering something
588
00:22:30,320 --> 00:22:32,360
that was never properly documented.
589
00:22:32,360 --> 00:22:33,720
Compliance risk multiplies.
590
00:22:33,720 --> 00:22:38,040
When an auditor asks how many applications access customer data you can't answer confidently.
591
00:22:38,040 --> 00:22:39,640
Vendors Brawl increases.
592
00:22:39,640 --> 00:22:42,560
Every app might integrate with external SaaS systems.
593
00:22:42,560 --> 00:22:46,680
Every integration is another contract, another permission boundary, another security surface.
594
00:22:46,680 --> 00:22:48,840
And here's the thing nobody talks about.
595
00:22:48,840 --> 00:22:51,640
Applications Brawl mirrors the sprawl you see in teams and SharePoint.
596
00:22:51,640 --> 00:22:54,160
It's the same root cause, default permissive settings.
597
00:22:54,160 --> 00:22:56,880
No life cycle governance, no exploration mechanism.
598
00:22:56,880 --> 00:23:01,240
No architecture that says if this application has no owner, it gets decommissioned.
599
00:23:01,240 --> 00:23:03,640
The control plane fix requires a mindset shift.
600
00:23:03,640 --> 00:23:04,640
Stop counting apps.
601
00:23:04,640 --> 00:23:05,640
That's the wrong metric.
602
00:23:05,640 --> 00:23:07,840
Start counting technical debt surface area.
603
00:23:07,840 --> 00:23:10,320
The real question isn't how many power apps do we have.
604
00:23:10,320 --> 00:23:14,600
It's what is the total complexity and maintenance burden we've accumulated and is it justified
605
00:23:14,600 --> 00:23:15,840
by business value?
606
00:23:15,840 --> 00:23:17,440
And for zoning laws.
607
00:23:17,440 --> 00:23:19,720
Not every application belongs in the environment.
608
00:23:19,720 --> 00:23:24,040
Some should be built as power platform solutions, governed as infrastructure.
609
00:23:24,040 --> 00:23:26,400
Others should be SaaS products, not custom builds.
610
00:23:26,400 --> 00:23:29,440
Some should be enterprise applications with formal governance.
611
00:23:29,440 --> 00:23:32,840
Some should be a femoral tools that disappear after they solve the problem they were meant
612
00:23:32,840 --> 00:23:33,840
to solve.
613
00:23:33,840 --> 00:23:37,280
And a sign, life cycle ownership, make it architectural law.
614
00:23:37,280 --> 00:23:41,120
An application without an identified accountable owner gets decommissioned.
615
00:23:41,120 --> 00:23:43,920
Not eventually, immediately, that forces discipline.
616
00:23:43,920 --> 00:23:47,760
That forces the organization to ask, do we actually need this instead of accumulating
617
00:23:47,760 --> 00:23:48,760
forever?
618
00:23:48,760 --> 00:23:52,680
This brings us to the most dangerous sin because it's one thing to have 340 applications
619
00:23:52,680 --> 00:23:54,600
creating support overhead.
620
00:23:54,600 --> 00:23:58,960
It's another entirely when you deploy AI onto that chaotic sprawling application landscape
621
00:23:58,960 --> 00:24:00,920
without architectural zoning.
622
00:24:00,920 --> 00:24:01,920
Sin 5.
623
00:24:01,920 --> 00:24:02,920
AI chaos.
624
00:24:02,920 --> 00:24:04,280
Agents without boundaries.
625
00:24:04,280 --> 00:24:05,520
This one is still forming.
626
00:24:05,520 --> 00:24:07,120
Most organizations don't see it yet.
627
00:24:07,120 --> 00:24:08,120
That's the danger.
628
00:24:08,120 --> 00:24:11,880
Organizations are deploying co-pilot onto flat, unclassified data structures.
629
00:24:11,880 --> 00:24:17,480
They're standing up co-pilot studio agents without defining what data those agents can access.
630
00:24:17,480 --> 00:24:20,720
They're accelerating AI adoption while data governance lags behind.
631
00:24:20,720 --> 00:24:22,000
And here's the architectural truth.
632
00:24:22,000 --> 00:24:23,840
AI doesn't solve your data problem.
633
00:24:23,840 --> 00:24:25,320
It broadcasts it at scale.
634
00:24:25,320 --> 00:24:26,320
Let me tell you what I mean.
635
00:24:26,320 --> 00:24:29,480
An enterprise co-pilot pilot six weeks in, they were excited.
636
00:24:29,480 --> 00:24:31,280
Initial adoption metrics looked strong.
637
00:24:31,280 --> 00:24:35,360
Users were asking the agent questions about products, customers, internal processes.
638
00:24:35,360 --> 00:24:37,840
And then someone asked it a question about compensation.
639
00:24:37,840 --> 00:24:40,800
The agent answered, it told them salary data benefits information.
640
00:24:40,800 --> 00:24:44,680
payroll details from the HR system, all available because the data was unclassified
641
00:24:44,680 --> 00:24:46,760
and the agent permissions were unrestricted.
642
00:24:46,760 --> 00:24:49,120
Here's what actually happened architecturally.
643
00:24:49,120 --> 00:24:52,560
The organization deployed co-pilot before they classified their data.
644
00:24:52,560 --> 00:24:56,840
Before they defined what co-pilot agents could access, before they implemented data boundaries.
645
00:24:56,840 --> 00:25:01,120
They treated AI as a feature to ship, not as a governance layer that has to sit on top
646
00:25:01,120 --> 00:25:02,520
of solid data architecture.
647
00:25:02,520 --> 00:25:04,000
The systemic cause is predictable.
648
00:25:04,000 --> 00:25:05,000
AI feels urgent.
649
00:25:05,000 --> 00:25:06,320
Everyone's talking about it.
650
00:25:06,320 --> 00:25:07,320
Competitors are moving.
651
00:25:07,320 --> 00:25:08,640
So organizations rush.
652
00:25:08,640 --> 00:25:10,240
They want to show value quickly.
653
00:25:10,240 --> 00:25:12,280
co-pilot adoption metrics.
654
00:25:12,280 --> 00:25:13,800
Agent deployment numbers.
655
00:25:13,800 --> 00:25:17,880
Proof of concept turned pilot turned production all before the foundational architecture is
656
00:25:17,880 --> 00:25:18,880
in place.
657
00:25:18,880 --> 00:25:22,280
But here's what happens when you deploy AI without data architecture.
658
00:25:22,280 --> 00:25:25,200
An agent gets access to everything it needs to do its job.
659
00:25:25,200 --> 00:25:26,200
That's reasonable.
660
00:25:26,200 --> 00:25:27,440
But everything it needs expands.
661
00:25:27,440 --> 00:25:28,760
It integrates with SharePoint.
662
00:25:28,760 --> 00:25:30,480
Now it's reading all documents.
663
00:25:30,480 --> 00:25:32,400
It connects to the mailbox system.
664
00:25:32,400 --> 00:25:33,680
Now it's processing email.
665
00:25:33,680 --> 00:25:35,240
It links to customer data.
666
00:25:35,240 --> 00:25:37,400
Now it's handling sensitive information.
667
00:25:37,400 --> 00:25:39,320
Each integration makes sense in isolation.
668
00:25:39,320 --> 00:25:43,960
Collectively, they create an unrestricted data access pattern that violates your compliance
669
00:25:43,960 --> 00:25:45,960
requirements and your common sense.
670
00:25:45,960 --> 00:25:48,960
The economic consequence is immediate and expensive.
671
00:25:48,960 --> 00:25:49,960
Security retrofits.
672
00:25:49,960 --> 00:25:50,960
You deployed co-pilot.
673
00:25:50,960 --> 00:25:55,480
Now you're scrambling to classify data retroactively, define boundaries, restrict agent
674
00:25:55,480 --> 00:25:56,480
access.
675
00:25:56,480 --> 00:25:57,480
That's rework.
676
00:25:57,480 --> 00:25:58,480
That's budget you didn't plan for.
677
00:25:58,480 --> 00:26:00,400
Co-pilot studio credits burning through.
678
00:26:00,400 --> 00:26:02,600
Every agent interaction consumes credits.
679
00:26:02,600 --> 00:26:08,480
At $200 per 25,000 messages at scale, this becomes a line item nobody forecasted.
680
00:26:08,480 --> 00:26:14,600
You're processing payroll data, customer information, health records through an AI system
681
00:26:14,600 --> 00:26:16,720
that wasn't designed with compliance in mind.
682
00:26:16,720 --> 00:26:20,680
Auditor's notice, regulators notice, and then you're explaining why you deployed AI faster
683
00:26:20,680 --> 00:26:22,640
than you implemented governance.
684
00:26:22,640 --> 00:26:23,640
Real numbers.
685
00:26:23,640 --> 00:26:27,000
49% of AI programs stall due to unclear value.
686
00:26:27,000 --> 00:26:30,840
80% of Fortune 500 use agents without formal governance.
687
00:26:30,840 --> 00:26:32,480
The pattern is universal.
688
00:26:32,480 --> 00:26:36,920
Speed first, architecture second, then disaster.
689
00:26:36,920 --> 00:26:39,880
The control plane fix is non-negotiable.
690
00:26:39,880 --> 00:26:42,800
Define data boundaries before deploying agents.
691
00:26:42,800 --> 00:26:43,880
Not after, before.
692
00:26:43,880 --> 00:26:45,520
This means classifying your data.
693
00:26:45,520 --> 00:26:46,720
Tearing agents by risk.
694
00:26:46,720 --> 00:26:51,320
An agent that answers FAQ questions has different access requirements than an agent that
695
00:26:51,320 --> 00:26:53,280
processes financial transactions.
696
00:26:53,280 --> 00:26:57,040
An agent that reads public documents has different boundaries than an agent that accesses
697
00:26:57,040 --> 00:26:58,520
customer records.
698
00:26:58,520 --> 00:27:01,600
Then enforce data access via identity and policy.
699
00:27:01,600 --> 00:27:03,520
Use agent 365 as a governance layer.
700
00:27:03,520 --> 00:27:06,800
When you deploy an agent, its permissions flow from Entra ID.
701
00:27:06,800 --> 00:27:08,120
It has a defined identity.
702
00:27:08,120 --> 00:27:10,840
It can access only the data it's authorized to access.
703
00:27:10,840 --> 00:27:12,280
Its interactions are audited.
704
00:27:12,280 --> 00:27:14,240
It can be revoked if it's misused.
705
00:27:14,240 --> 00:27:15,840
This requires architectural discipline.
706
00:27:15,840 --> 00:27:17,320
It requires saying no to speed.
707
00:27:17,320 --> 00:27:21,360
It requires doing the unglamorous work of data classification and boundary definition
708
00:27:21,360 --> 00:27:23,160
before you ship the next agent.
709
00:27:23,160 --> 00:27:25,400
But without it, AI doesn't solve your data problems.
710
00:27:25,400 --> 00:27:26,400
It creates new ones.
711
00:27:26,400 --> 00:27:30,320
It takes the sprawl and the governance gaps you already have and amplifies them at scale.
712
00:27:30,320 --> 00:27:32,840
It turns hidden risks into active liabilities.
713
00:27:32,840 --> 00:27:34,040
And here's the uncomfortable truth.
714
00:27:34,040 --> 00:27:39,720
If your organization has 340 power apps without owners, if you have 700 orphaned app registrations
715
00:27:39,720 --> 00:27:44,160
in Entra ID, if you have governance policies that nobody enforces, then you're not ready
716
00:27:44,160 --> 00:27:46,000
to deploy AI agents.
717
00:27:46,000 --> 00:27:47,440
Because AI will make all of that worst.
718
00:27:47,440 --> 00:27:51,480
It will inherit all of that chaos and it will operate at a speed that your manual governance
719
00:27:51,480 --> 00:27:53,440
processes can't keep up with.
720
00:27:53,440 --> 00:27:54,880
This brings us to the root cause.
721
00:27:54,880 --> 00:27:57,040
All these sins don't exist independently.
722
00:27:57,040 --> 00:27:59,840
They exist because of one structural absence.
723
00:27:59,840 --> 00:28:03,120
Sin 6, Builder Bias, the architect vacuum.
724
00:28:03,120 --> 00:28:05,200
Here's a pattern that explains everything else.
725
00:28:05,200 --> 00:28:09,800
And its organizational, not technical, enterprises promote the person who knows the buttons.
726
00:28:09,800 --> 00:28:13,760
The person who shipped the feature, the person who delivered on deadline, they reward builders,
727
00:28:13,760 --> 00:28:17,920
they celebrate features shipped, they measure velocity, and architects, the people thinking
728
00:28:17,920 --> 00:28:21,560
about system resilience, about decay, about integration costs, about what happens five
729
00:28:21,560 --> 00:28:24,240
years from now, those people are invisible.
730
00:28:24,240 --> 00:28:27,120
An IT director I worked with recently made a telling decision.
731
00:28:27,120 --> 00:28:30,560
They hired a power platform expert and they fired the identity architect.
732
00:28:30,560 --> 00:28:32,360
The reasoning was straight forward.
733
00:28:32,360 --> 00:28:33,560
We need builders right now.
734
00:28:33,560 --> 00:28:35,080
We need people who can ship.
735
00:28:35,080 --> 00:28:36,080
Strategy can wait.
736
00:28:36,080 --> 00:28:37,080
Modernization can wait.
737
00:28:37,080 --> 00:28:38,960
We need features and we need them fast.
738
00:28:38,960 --> 00:28:40,560
What actually happened was structural.
739
00:28:40,560 --> 00:28:44,400
Without architects enforcing design constraints, without someone saying no, we can't do it that
740
00:28:44,400 --> 00:28:45,400
way.
741
00:28:45,400 --> 00:28:47,800
The platform started accumulating entropy faster.
742
00:28:47,800 --> 00:28:49,720
Features shipped, systems decayed.
743
00:28:49,720 --> 00:28:50,720
Technical debt compounded.
744
00:28:50,720 --> 00:28:55,280
18 months later, the organization hit what I called the productivity wall.
745
00:28:55,280 --> 00:28:57,520
Initial gains from rapid development flattened.
746
00:28:57,520 --> 00:28:58,520
Performance degraded.
747
00:28:58,520 --> 00:29:00,600
Infrastructure complexity made change harder.
748
00:29:00,600 --> 00:29:03,800
The organization was managing technical debt instead of shipping features.
749
00:29:03,800 --> 00:29:07,160
They'd moved fast initially, but they were moving slowly now because nobody had been thinking
750
00:29:07,160 --> 00:29:08,160
about sustainability.
751
00:29:08,160 --> 00:29:09,480
Here's how it manifests.
752
00:29:09,480 --> 00:29:14,200
A builder comes to you and says, "I need to integrate with this new SaaS system."
753
00:29:14,200 --> 00:29:16,480
And builders are great at solving immediate problems.
754
00:29:16,480 --> 00:29:17,760
So they build an integration.
755
00:29:17,760 --> 00:29:18,760
It works.
756
00:29:18,760 --> 00:29:19,760
The business is happy.
757
00:29:19,760 --> 00:29:22,600
But the builder didn't think about or wasn't asked to think about what happens when
758
00:29:22,600 --> 00:29:26,720
that SaaS systems API changes, what happens when the password for the service account needs
759
00:29:26,720 --> 00:29:30,560
to be rotated, what happens when you need to audit, who accessed, what?
760
00:29:30,560 --> 00:29:35,000
Who that integration, what happens when three other builders independently build integrations
761
00:29:35,000 --> 00:29:36,000
to the same system?
762
00:29:36,000 --> 00:29:39,200
And now you have three different approaches, three different failure modes, three times
763
00:29:39,200 --> 00:29:40,680
the maintenance burden.
764
00:29:40,680 --> 00:29:44,240
The systemic causes organizational structure, builders create visible value.
765
00:29:44,240 --> 00:29:45,880
They ship, they deliver.
766
00:29:45,880 --> 00:29:47,600
Organizations see progress.
767
00:29:47,600 --> 00:29:49,280
Architects prevent invisible failures.
768
00:29:49,280 --> 00:29:50,280
They say no.
769
00:29:50,280 --> 00:29:51,600
They require documentation.
770
00:29:51,600 --> 00:29:54,160
They ask hard questions about sustainability.
771
00:29:54,160 --> 00:29:56,960
And their value is invisible until something breaks.
772
00:29:56,960 --> 00:30:00,840
By which time the organization has learned the hard way that architecture matters.
773
00:30:00,840 --> 00:30:03,400
The real consequence is fragmented ownership.
774
00:30:03,400 --> 00:30:07,680
Only 23% of organizations have a formal AI agent identity strategy.
775
00:30:07,680 --> 00:30:08,680
Think about that.
776
00:30:08,680 --> 00:30:10,520
AI agents are proliferating.
777
00:30:10,520 --> 00:30:12,560
Most organizations don't have governance for them.
778
00:30:12,560 --> 00:30:13,560
Why?
779
00:30:13,560 --> 00:30:14,960
Because ownership is fragmented.
780
00:30:14,960 --> 00:30:16,280
Security thinks it's I'd's problem.
781
00:30:16,280 --> 00:30:17,760
It thinks it's the business's problem.
782
00:30:17,760 --> 00:30:19,640
The business thinks it's securities problem.
783
00:30:19,640 --> 00:30:23,680
And builders are shipping agents without anyone owning the architectural decision of whether
784
00:30:23,680 --> 00:30:25,920
they should exist or what their boundaries are.
785
00:30:25,920 --> 00:30:28,360
The economic consequence is substantial and usually lagged.
786
00:30:28,360 --> 00:30:29,800
You don't see it for 18 months.
787
00:30:29,800 --> 00:30:31,640
But when you do it's expensive.
788
00:30:31,640 --> 00:30:32,640
Technical debt compounds.
789
00:30:32,640 --> 00:30:33,640
Support costs rise.
790
00:30:33,640 --> 00:30:35,040
Security risks accumulate.
791
00:30:35,040 --> 00:30:36,400
Compliance becomes harder.
792
00:30:36,400 --> 00:30:38,880
And the organization realizes it needs architects.
793
00:30:38,880 --> 00:30:40,840
But architects are expensive to retrofit.
794
00:30:40,840 --> 00:30:44,720
You can't just hire one and expect them to untangle 18 months of architectural decisions
795
00:30:44,720 --> 00:30:46,000
made without their input.
796
00:30:46,000 --> 00:30:48,720
The control plane fix requires a mindset shift.
797
00:30:48,720 --> 00:30:51,760
Reframed architects as leverage engineers not cost centers.
798
00:30:51,760 --> 00:30:54,080
A builder can increase velocity on one project.
799
00:30:54,080 --> 00:30:58,000
An architect can increase velocity across the entire system by making good structural
800
00:30:58,000 --> 00:31:00,360
decisions that everyone benefits from.
801
00:31:00,360 --> 00:31:04,560
An architect can prevent the entire organization from making the same mistake in five different
802
00:31:04,560 --> 00:31:05,560
places.
803
00:31:05,560 --> 00:31:06,960
Measure architects by system health.
804
00:31:06,960 --> 00:31:08,120
By entropy reduction.
805
00:31:08,120 --> 00:31:10,400
By the number of future problems they prevent.
806
00:31:10,400 --> 00:31:12,600
By whether integration patterns are consistent.
807
00:31:12,600 --> 00:31:14,360
By whether governance is enforceable.
808
00:31:14,360 --> 00:31:17,960
By whether new builders inherit a platform that's easy to build on or swamp they have to
809
00:31:17,960 --> 00:31:18,960
wait through.
810
00:31:18,960 --> 00:31:20,840
Builders create visible value.
811
00:31:20,840 --> 00:31:22,720
Architects create invisible value.
812
00:31:22,720 --> 00:31:24,160
Local value is just as real.
813
00:31:24,160 --> 00:31:25,360
It's just harder to see.
814
00:31:25,360 --> 00:31:29,000
And organizations that don't see it are the ones that end up with sprawl with chaos with
815
00:31:29,000 --> 00:31:31,880
technical debt that becomes impossible to manage.
816
00:31:31,880 --> 00:31:33,640
This brings us to the final sin.
817
00:31:33,640 --> 00:31:37,760
Because even good architects fail if the foundational decisions about resources and investment
818
00:31:37,760 --> 00:31:38,760
are wrong.
819
00:31:38,760 --> 00:31:41,480
And that decision is usually made in procurement.
820
00:31:41,480 --> 00:31:43,000
Scene 7.
821
00:31:43,000 --> 00:31:44,000
Licensing blindness.
822
00:31:44,000 --> 00:31:45,480
Capacity as strategy.
823
00:31:45,480 --> 00:31:49,560
The final sin is the most expensive because it's the most normalized.
824
00:31:49,560 --> 00:31:52,680
Organizations renew E5 because it's what we do.
825
00:31:52,680 --> 00:31:55,000
Not because they've mapped capability to value.
826
00:31:55,000 --> 00:31:58,360
Not because they've assessed whether users actually need premium features.
827
00:31:58,360 --> 00:32:01,600
Not because they've measured adoption of the premium connectors they're already paying
828
00:32:01,600 --> 00:32:02,600
for.
829
00:32:02,600 --> 00:32:04,440
They renew because the license was good last year.
830
00:32:04,440 --> 00:32:05,440
So it's good this year.
831
00:32:05,440 --> 00:32:07,120
And the year after that no one questions it.
832
00:32:07,120 --> 00:32:09,440
Meanwhile shadow IT thrives.
833
00:32:09,440 --> 00:32:13,640
Users on basic skews accomplish the same roles as E5 users.
834
00:32:13,640 --> 00:32:15,120
Premium features sit idle.
835
00:32:15,120 --> 00:32:16,480
Copilot remains unused.
836
00:32:16,480 --> 00:32:20,240
The advanced threat protection that comes with E5 never gets operationalized.
837
00:32:20,240 --> 00:32:21,800
Feature parity is ignored.
838
00:32:21,800 --> 00:32:26,280
What is tracking whether the premium capabilities you paid for are actually driving outcomes.
839
00:32:26,280 --> 00:32:27,520
Here's a real example.
840
00:32:27,520 --> 00:32:33,160
An enterprise paying 2.1 million dollars annually for E5 across their knowledge worker base.
841
00:32:33,160 --> 00:32:34,760
They'd standardised on it years ago.
842
00:32:34,760 --> 00:32:35,760
E5 for finance.
843
00:32:35,760 --> 00:32:36,760
E5 for engineering.
844
00:32:36,760 --> 00:32:38,240
E5 for operations.
845
00:32:38,240 --> 00:32:39,720
Everyone gets the same license.
846
00:32:39,720 --> 00:32:41,040
In order to reveal the truth.
847
00:32:41,040 --> 00:32:46,760
34% of those users, roughly a third, could perform their exact same role on business standard.
848
00:32:46,760 --> 00:32:48,760
They had no need for the premium connector library.
849
00:32:48,760 --> 00:32:49,960
They didn't use copilot.
850
00:32:49,960 --> 00:32:53,280
They didn't need advanced threat protection beyond what business standard includes.
851
00:32:53,280 --> 00:32:55,280
They needed email teams, a document platform.
852
00:32:55,280 --> 00:32:56,280
That's it.
853
00:32:56,280 --> 00:32:57,800
They were paying for capabilities they would never touch.
854
00:32:57,800 --> 00:33:01,280
The economic consequences are orthogonal to what most organisations see.
855
00:33:01,280 --> 00:33:03,640
It's not just the cost of unused licenses.
856
00:33:03,640 --> 00:33:04,640
That's obvious.
857
00:33:04,640 --> 00:33:08,280
The real consequence is the cost of not using licensing as a behavioural incentive.
858
00:33:08,280 --> 00:33:12,560
If your licensing skews are aligned to roles and capabilities then it drives adoption.
859
00:33:12,560 --> 00:33:14,280
It forces architectural decisions.
860
00:33:14,280 --> 00:33:16,320
It makes you think about what people actually need.
861
00:33:16,320 --> 00:33:20,920
When you standardise on E5 across the board you've removed the constraint that forces architectural
862
00:33:20,920 --> 00:33:21,920
discipline.
863
00:33:21,920 --> 00:33:24,400
You've said effectively that everyone gets access to everything.
864
00:33:24,400 --> 00:33:25,400
That's not strategy.
865
00:33:25,400 --> 00:33:26,400
That's capitulation.
866
00:33:26,400 --> 00:33:27,400
It's budget capitulation.
867
00:33:27,400 --> 00:33:29,240
It's architectural capitulation.
868
00:33:29,240 --> 00:33:30,640
And it's expensive.
869
00:33:30,640 --> 00:33:33,040
The 2026 price hikes compound this mistake.
870
00:33:33,040 --> 00:33:38,600
Microsoft is implementing increases ranging from 9 to 33% effective July 1st.
871
00:33:38,600 --> 00:33:41,840
F1 plans jumping from $2.25 to $3.00.
872
00:33:41,840 --> 00:33:45,520
E3 rising from $36.39 per user per month.
873
00:33:45,520 --> 00:33:47,760
That organisation paying 2.1 million?
874
00:33:47,760 --> 00:33:48,760
Next renewal?
875
00:33:48,760 --> 00:33:50,360
That's closer to 2.4 million.
876
00:33:50,360 --> 00:33:55,200
If they'd rationalised licensing earlier they could have cut that by 20-30% but they didn't.
877
00:33:55,200 --> 00:33:57,520
And now they're paying twice for the same mistake.
878
00:33:57,520 --> 00:34:00,440
Here's what happens when you finally audit your licensing landscape.
879
00:34:00,440 --> 00:34:02,560
You discover premium connectors nobody's using.
880
00:34:02,560 --> 00:34:06,480
You find copated licenses assigned to roles that have no integration points.
881
00:34:06,480 --> 00:34:10,280
You realise that your premium security features are redundant with network based controls
882
00:34:10,280 --> 00:34:11,960
you already paid for elsewhere.
883
00:34:11,960 --> 00:34:17,000
You uncover the fact that 34% of your e5 investment could be recovered if you had the discipline
884
00:34:17,000 --> 00:34:20,600
to match licensing to actual capability requirements.
885
00:34:20,600 --> 00:34:22,320
The control plane fixes this.
886
00:34:22,320 --> 00:34:24,240
Licensing skyu is a behavioural lever.
887
00:34:24,240 --> 00:34:25,240
Use it.
888
00:34:25,240 --> 00:34:28,880
If you're paying for e5 across the board you've removed the mechanism that forces you to
889
00:34:28,880 --> 00:34:30,440
make architectural decisions.
890
00:34:30,440 --> 00:34:34,720
You've optimised for everyone gets everything instead of everyone gets what they need.
891
00:34:34,720 --> 00:34:37,080
Real architecture means saying no to simplicity.
892
00:34:37,080 --> 00:34:38,800
It means matching licensing to roles.
893
00:34:38,800 --> 00:34:44,120
e5 for roles that actually need premium connectors, threat intelligence or advanced governance.
894
00:34:44,120 --> 00:34:48,240
e3 for users who need collaboration and productivity but not advanced security.
895
00:34:48,240 --> 00:34:53,000
Business standard for roles that only need core email and team's functionality.
896
00:34:53,000 --> 00:34:56,040
And making those decisions forces you to understand your user base.
897
00:34:56,040 --> 00:34:59,320
It forces you to ask why does this person need this capability?
898
00:34:59,320 --> 00:35:02,160
And if you can't answer that question they don't get that licence.
899
00:35:02,160 --> 00:35:05,680
This is where the abstraction becomes concrete because when you force licensing alignment
900
00:35:05,680 --> 00:35:06,880
you also force governance.
901
00:35:06,880 --> 00:35:08,400
You have to know who's in what role.
902
00:35:08,400 --> 00:35:10,040
You have to enforce role definitions.
903
00:35:10,040 --> 00:35:13,880
You have to make sure the business is actually using the features you're paying for.
904
00:35:13,880 --> 00:35:16,520
And that discipline cascades into everything else.
905
00:35:16,520 --> 00:35:20,760
Better identity governance, better data classification, better understanding of what your
906
00:35:20,760 --> 00:35:22,680
system is actually supposed to do.
907
00:35:22,680 --> 00:35:24,760
All 7Sints point to one diagnosis.
908
00:35:24,760 --> 00:35:26,280
The absence of a control plane.
909
00:35:26,280 --> 00:35:28,400
The umbrella sin control plane neglect.
910
00:35:28,400 --> 00:35:30,400
These 7Sints don't exist in isolation.
911
00:35:30,400 --> 00:35:31,920
They're not random failures.
912
00:35:31,920 --> 00:35:35,240
They're not separate problems that happen to accumulate in the same tenant.
913
00:35:35,240 --> 00:35:37,320
They're all symptoms of one structural absence.
914
00:35:37,320 --> 00:35:41,520
And that absence is what binds them together into a single architectural failure.
915
00:35:41,520 --> 00:35:44,840
Operating without a system's layer means entropy becomes your default operating system.
916
00:35:44,840 --> 00:35:45,920
You don't have governance.
917
00:35:45,920 --> 00:35:48,480
You have chaos with policies written on top of it.
918
00:35:48,480 --> 00:35:52,200
Trying to contain something that was never architecturally constrained in the first place.
919
00:35:52,200 --> 00:35:53,320
You don't have architecture.
920
00:35:53,320 --> 00:35:54,320
You have a platform.
921
00:35:54,320 --> 00:35:55,920
And a platform is something else entirely.
922
00:35:55,920 --> 00:35:58,080
A platform is a collection of services.
923
00:35:58,080 --> 00:35:59,520
An architecture is a system.
924
00:35:59,520 --> 00:36:01,040
Here's how it manifests in practice.
925
00:36:01,040 --> 00:36:05,600
A 10,000 seed organisation I worked with had EntraID governed by one team.
926
00:36:05,600 --> 00:36:09,240
They handled identity provisioning conditional access role definitions.
927
00:36:09,240 --> 00:36:10,240
Solid work.
928
00:36:10,240 --> 00:36:11,680
Intune was managed by a separate team.
929
00:36:11,680 --> 00:36:15,240
They owned device management and point security compliance baselines.
930
00:36:15,240 --> 00:36:16,240
Also good.
931
00:36:16,240 --> 00:36:18,000
Microsoft defender handled by another team.
932
00:36:18,000 --> 00:36:21,240
They owned threat detection, incident response, security monitoring.
933
00:36:21,240 --> 00:36:26,600
Yet another team owned purview, data governance, sensitivity labels, retention policies.
934
00:36:26,600 --> 00:36:29,880
And teams in SharePoint were loosely monitored by the service adoption team.
935
00:36:29,880 --> 00:36:32,760
They tracked usage metrics and provided training.
936
00:36:32,760 --> 00:36:35,040
Nobody was looking at identity to app orchestration.
937
00:36:35,040 --> 00:36:38,000
Nobody was enforcing zoning and tearing across the entire system.
938
00:36:38,000 --> 00:36:41,560
Every service had its own policies, its own approval workflows, its own definitions of
939
00:36:41,560 --> 00:36:43,080
what security baseline meant.
940
00:36:43,080 --> 00:36:45,360
Each domain solved its own problems locally.
941
00:36:45,360 --> 00:36:49,560
But there was no layer that decided how those domains actually interacted, how data flowed
942
00:36:49,560 --> 00:36:53,800
from one system to another, how users access decisions in EntraID connected to what they
943
00:36:53,800 --> 00:36:57,840
could do in SharePoint, how that related to what they could see in a co-pilot agent,
944
00:36:57,840 --> 00:37:00,520
what that organisation actually had wasn't a security posture.
945
00:37:00,520 --> 00:37:04,800
It was security theatre orchestrated across five different teams, each performing their
946
00:37:04,800 --> 00:37:06,640
part with no conductor.
947
00:37:06,640 --> 00:37:08,320
The systemic cause is this.
948
00:37:08,320 --> 00:37:12,560
Most organisations treat Microsoft Cloud as a collection of disconnected services.
949
00:37:12,560 --> 00:37:16,240
Identity over here, data governance over there, applications somewhere else, compliance
950
00:37:16,240 --> 00:37:17,520
in a separate silo.
951
00:37:17,520 --> 00:37:19,720
This creates what I call policy fragmentation.
952
00:37:19,720 --> 00:37:21,960
Each domain solves its own problems locally.
953
00:37:21,960 --> 00:37:24,560
But there's no layer that ensures consistency.
954
00:37:24,560 --> 00:37:29,000
No place that says, when we make an identity decision, what does that mean for data access,
955
00:37:29,000 --> 00:37:32,240
for app permissions, for compliance boundaries?
956
00:37:32,240 --> 00:37:36,320
That connecting layer is the control plane, and most organisations don't have one.
957
00:37:36,320 --> 00:37:37,320
They think they do.
958
00:37:37,320 --> 00:37:40,680
They point to their EntraID governance, they show you their defender dashboards.
959
00:37:40,680 --> 00:37:43,160
They talk about their purview compliance framework.
960
00:37:43,160 --> 00:37:46,680
But those are individual services responding to local constraints.
961
00:37:46,680 --> 00:37:49,280
Not a unified system making coordinated decisions.
962
00:37:49,280 --> 00:37:52,120
The economic consequence of operating without it is massive.
963
00:37:52,120 --> 00:37:57,600
That 10,000 seat organisation, 3.2 million in unrealised productivity benefits over three
964
00:37:57,600 --> 00:37:58,600
years.
965
00:37:58,600 --> 00:38:01,600
Not because they lacked features, they had every Microsoft feature available.
966
00:38:01,600 --> 00:38:05,080
Because those features weren't integrated into a system.
967
00:38:05,080 --> 00:38:09,360
Users couldn't find information because it was classified inconsistently across SharePoint.
968
00:38:09,360 --> 00:38:13,280
Admins couldn't trust their governance because policies drifted when one team made changes
969
00:38:13,280 --> 00:38:15,840
without checking impact on other teams.
970
00:38:15,840 --> 00:38:20,000
Architects had no way to enforce decisions at scale because there was no mechanism to translate
971
00:38:20,000 --> 00:38:22,240
intent into system-wide behaviour.
972
00:38:22,240 --> 00:38:25,600
Control plane absence also means security debt accumulates invisibly.
973
00:38:25,600 --> 00:38:27,880
When EntraID policies drift, nobody knows it.
974
00:38:27,880 --> 00:38:31,000
When SharePoint permissions exceed your threshold, there's nobody watching.
975
00:38:31,000 --> 00:38:35,480
When a co-pilot agent is accessing data you never approved, the policy layer doesn't catch
976
00:38:35,480 --> 00:38:36,480
it.
977
00:38:36,480 --> 00:38:37,480
Each service does its best.
978
00:38:37,480 --> 00:38:38,480
But there's no circuit breaker.
979
00:38:38,480 --> 00:38:43,400
No orchestration, no central place where someone says no, that violates our architecture.
980
00:38:43,400 --> 00:38:45,520
Real security data backs this up.
981
00:38:45,520 --> 00:38:50,560
63% of M365 tenants face configuration tampering in identity and device management.
982
00:38:50,560 --> 00:38:52,200
And here's the architectural gap.
983
00:38:52,200 --> 00:38:54,960
Microsoft doesn't natively back up tenant configurations.
984
00:38:54,960 --> 00:38:56,320
You deploy defender policies.
985
00:38:56,320 --> 00:38:57,600
You configure EntraID.
986
00:38:57,600 --> 00:38:59,000
You set up purview rules.
987
00:38:59,000 --> 00:39:03,160
If something goes catastrophically wrong if an attacker modifies your policies, if someone
988
00:39:03,160 --> 00:39:07,760
accidentally deletes your conditional access rules, you don't have a native recovery mechanism.
989
00:39:07,760 --> 00:39:10,640
You're relying on change logs and manual reconstruction.
990
00:39:10,640 --> 00:39:13,560
The control plane fix requires foundational architecture.
991
00:39:13,560 --> 00:39:17,720
You have to build a unified policy compilation layer, a single source of truth where architectural
992
00:39:17,720 --> 00:39:20,800
intent gets translated into system-wide policy.
993
00:39:20,800 --> 00:39:23,840
Treat identity EntraID as the control plane backbone.
994
00:39:23,840 --> 00:39:27,840
Make it the place where you define not just who can access what, but what that access means
995
00:39:27,840 --> 00:39:29,160
across your entire system.
996
00:39:29,160 --> 00:39:32,560
A user is an employee, a contractor, a vendor, a guest.
997
00:39:32,560 --> 00:39:36,760
Once you make that decision in identity, every other system should inherit that context.
998
00:39:36,760 --> 00:39:38,200
Not ask for it separately.
999
00:39:38,200 --> 00:39:39,200
Inherited.
1000
00:39:39,200 --> 00:39:41,160
Then enforce cross-platform orchestration.
1001
00:39:41,160 --> 00:39:45,880
If a user's EntraID role says finance, that determines their default access to financial
1002
00:39:45,880 --> 00:39:47,320
data in SharePoint.
1003
00:39:47,320 --> 00:39:50,320
If they are classified as guest, that determines what they see in teams.
1004
00:39:50,320 --> 00:39:54,400
If a copilot agent is accessing customer data, its identity and permissions flow from a single
1005
00:39:54,400 --> 00:39:55,400
source of truth.
1006
00:39:55,400 --> 00:39:56,400
Let me define this precisely.
1007
00:39:56,400 --> 00:40:00,560
A control plane is the system that makes decisions about how other systems behave.
1008
00:40:00,560 --> 00:40:02,160
It's the layer above execution.
1009
00:40:02,160 --> 00:40:04,760
It's where intent gets translated into policy.
1010
00:40:04,760 --> 00:40:08,480
Without it, you have a platform, individual services operating independently.
1011
00:40:08,480 --> 00:40:10,960
With it, you have architecture, you have a system.
1012
00:40:10,960 --> 00:40:12,720
Most organizations have the first.
1013
00:40:12,720 --> 00:40:14,240
Almost none have the second.
1014
00:40:14,240 --> 00:40:15,600
The leakage model.
1015
00:40:15,600 --> 00:40:17,960
How to calculate your invisible waste.
1016
00:40:17,960 --> 00:40:19,960
Let me walk you through a calculation.
1017
00:40:19,960 --> 00:40:20,960
And I want you to follow along.
1018
00:40:20,960 --> 00:40:23,240
If you have a notebook nearby, now's the time to grab it.
1019
00:40:23,240 --> 00:40:24,320
This isn't complicated math.
1020
00:40:24,320 --> 00:40:26,800
And it's the math most organizations never actually do.
1021
00:40:26,800 --> 00:40:30,480
So they never see how much money is actually flowing out of their tenant invisibly.
1022
00:40:30,480 --> 00:40:31,880
Start with your total seat count.
1023
00:40:31,880 --> 00:40:33,800
Let's say you're a mid-sized organization.
1024
00:40:33,800 --> 00:40:36,720
5,000 employees, round number, easy to think about.
1025
00:40:36,720 --> 00:40:41,480
Now assume that roughly 20 to 30% of the advanced Microsoft capabilities you've paid for
1026
00:40:41,480 --> 00:40:42,960
are not operationalized.
1027
00:40:42,960 --> 00:40:43,960
Not used.
1028
00:40:43,960 --> 00:40:44,960
Just available.
1029
00:40:44,960 --> 00:40:45,960
This isn't cynicism.
1030
00:40:45,960 --> 00:40:46,960
This is empirical.
1031
00:40:46,960 --> 00:40:48,120
I've ordered a dozens of tenants.
1032
00:40:48,120 --> 00:40:49,120
It's consistent.
1033
00:40:49,120 --> 00:40:51,200
One in three advanced features sits idle.
1034
00:40:51,200 --> 00:40:56,960
For a 5,000 seat organization on e5, the delta between e5 and e3 is roughly $12 per user per
1035
00:40:56,960 --> 00:40:58,440
month, $12.
1036
00:40:58,440 --> 00:41:04,060
Times 5,000 seats, times 12 months, that's $720,000 annually that you're spending on features
1037
00:41:04,060 --> 00:41:05,160
you're not using.
1038
00:41:05,160 --> 00:41:06,520
But that's just the beginning.
1039
00:41:06,520 --> 00:41:08,680
Now add the inactive license premium.
1040
00:41:08,680 --> 00:41:13,120
Roughly 10 to 15% of licenses are assigned to accounts that haven't logged in in 30 days
1041
00:41:13,120 --> 00:41:14,120
or longer.
1042
00:41:14,120 --> 00:41:15,120
Dormant.
1043
00:41:15,120 --> 00:41:16,120
Forgotten.
1044
00:41:16,120 --> 00:41:17,120
Still being built.
1045
00:41:17,120 --> 00:41:21,920
$26 per user for e5 and 15% of your licenses are inactive.
1046
00:41:21,920 --> 00:41:24,560
That's another $250,000.
1047
00:41:24,560 --> 00:41:25,560
Gone.
1048
00:41:25,560 --> 00:41:26,560
Just evaporated.
1049
00:41:26,560 --> 00:41:27,560
That's nearly a million right there.
1050
00:41:27,560 --> 00:41:28,560
Now add co-pilot.
1051
00:41:28,560 --> 00:41:31,640
The base cost of co-pilot is $30 per user per month.
1052
00:41:31,640 --> 00:41:32,920
But that's not the real cost.
1053
00:41:32,920 --> 00:41:34,080
That's the headline number.
1054
00:41:34,080 --> 00:41:39,640
The real cost includes co-pilot studio credits burning through $200 per 25,000 messages.
1055
00:41:39,640 --> 00:41:44,520
For a tenant of 5,000 employees, if even half of them use co-pilot occasionally, you're
1056
00:41:44,520 --> 00:41:46,160
burning through credits fast.
1057
00:41:46,160 --> 00:41:49,400
You're going to get a $250,000 annually for a mid-size deployment.
1058
00:41:49,400 --> 00:41:50,880
Then add the security retrofits.
1059
00:41:50,880 --> 00:41:55,040
When you deploy co-pilot without data boundaries, you have to go back and classify data, define
1060
00:41:55,040 --> 00:41:57,080
agent access, implement DLP policies.
1061
00:41:57,080 --> 00:41:58,080
That's not a feature.
1062
00:41:58,080 --> 00:41:59,080
That's remediation.
1063
00:41:59,080 --> 00:42:01,280
Call it $50,000 in unplanned spending.
1064
00:42:01,280 --> 00:42:04,920
So co-pilot alone is consuming $200,000 plus and that's conservative.
1065
00:42:04,920 --> 00:42:06,320
And then there's governance labor.
1066
00:42:06,320 --> 00:42:08,000
The hours spend managing sprawl.
1067
00:42:08,000 --> 00:42:09,000
The manual cleanup.
1068
00:42:09,000 --> 00:42:10,000
The spreadsheets.
1069
00:42:10,000 --> 00:42:11,000
The escalation emails.
1070
00:42:11,000 --> 00:42:15,320
For a 5,000 seat tenant, that's roughly two full-time employees' worth of effort.
1071
00:42:15,320 --> 00:42:21,040
$150,000 annually minimum added up 720,000 in unused feature capacity.
1072
00:42:21,040 --> 00:42:23,840
$250,000 in inactive licenses.
1073
00:42:23,840 --> 00:42:27,240
$200,000 in co-pilot costs and security retrofits.
1074
00:42:27,240 --> 00:42:29,480
$150,000 in governance labor.
1075
00:42:29,480 --> 00:42:33,280
That's $1.3 million annually in a mid-sized organization.
1076
00:42:33,280 --> 00:42:35,320
And here's what the breakdown actually looks like.
1077
00:42:35,320 --> 00:42:36,320
License waste.
1078
00:42:36,320 --> 00:42:38,000
Features you paid for but don't use.
1079
00:42:38,000 --> 00:42:40,200
Accounts for about 40%.
1080
00:42:40,200 --> 00:42:43,040
Unoptimized connectors and shadow IT, another 20%.
1081
00:42:43,040 --> 00:42:45,120
AI sprawl, 15%.
1082
00:42:45,120 --> 00:42:48,480
Accounts labor that doesn't actually prevent anything 25%.
1083
00:42:48,480 --> 00:42:53,640
Real organizations implementing software asset management best practices can cut spending
1084
00:42:53,640 --> 00:42:55,880
by 30% in year one.
1085
00:42:55,880 --> 00:42:59,480
30% of 1.3 million is nearly $400,000.
1086
00:42:59,480 --> 00:43:00,480
Recovered.
1087
00:43:00,480 --> 00:43:01,480
Just by paying attention.
1088
00:43:01,480 --> 00:43:02,480
That's the leakage model.
1089
00:43:02,480 --> 00:43:05,200
That's what most organizations are bleeding without knowing it.
1090
00:43:05,200 --> 00:43:09,560
And that's before the July 2026 price increases hit when they do that leak gets worse.
1091
00:43:09,560 --> 00:43:10,560
Not better.
1092
00:43:10,560 --> 00:43:11,640
But these numbers are symptoms.
1093
00:43:11,640 --> 00:43:13,320
The disease is systemic.
1094
00:43:13,320 --> 00:43:14,320
It causes analysis.
1095
00:43:14,320 --> 00:43:15,440
Why this happens?
1096
00:43:15,440 --> 00:43:16,880
The leakage isn't random.
1097
00:43:16,880 --> 00:43:18,560
The seven sins aren't coincidences.
1098
00:43:18,560 --> 00:43:21,840
They're not separate failures that happen to occur in the same organization.
1099
00:43:21,840 --> 00:43:26,200
Their structural outcomes of how enterprises make decisions about Microsoft Cloud.
1100
00:43:26,200 --> 00:43:29,160
And if you understand the structure, you understand why this keeps happening.
1101
00:43:29,160 --> 00:43:31,200
The core problem is an operating model failure.
1102
00:43:31,200 --> 00:43:32,280
Not a technical one.
1103
00:43:32,280 --> 00:43:33,960
An organizational one.
1104
00:43:33,960 --> 00:43:38,600
Architectural decisions about Microsoft 365 are made by procurement, not by architects.
1105
00:43:38,600 --> 00:43:40,120
Let me say that again because it matters.
1106
00:43:40,120 --> 00:43:44,600
The decision about what you're going to buy, which SKU, how many licenses, what feature
1107
00:43:44,600 --> 00:43:47,240
set, that decision gets made at the procurement level.
1108
00:43:47,240 --> 00:43:52,040
It gets made by someone looking at a spreadsheet comparing price per user across different vendors.
1109
00:43:52,040 --> 00:43:55,160
It gets made by someone asking, what's the industry standard?
1110
00:43:55,160 --> 00:43:56,320
And then buying that.
1111
00:43:56,320 --> 00:44:00,360
It gets made by someone who's never been inside an enter ID policy or a conditional access
1112
00:44:00,360 --> 00:44:01,360
rule.
1113
00:44:01,360 --> 00:44:04,400
And then that procurement decision gets treated as an architectural decision.
1114
00:44:04,400 --> 00:44:05,400
We bought E5.
1115
00:44:05,400 --> 00:44:06,960
So E5 is our architecture.
1116
00:44:06,960 --> 00:44:10,160
We standardized on teams, so teams governance is solved.
1117
00:44:10,160 --> 00:44:12,400
We licensed co-pilot, so we have an AI strategy.
1118
00:44:12,400 --> 00:44:13,880
That's not how architecture works.
1119
00:44:13,880 --> 00:44:16,600
That's how you end up with a shopping cart instead of a system.
1120
00:44:16,600 --> 00:44:19,320
The second structural problem is an accountability vacuum.
1121
00:44:19,320 --> 00:44:21,000
Nobody owns the economic outcome.
1122
00:44:21,000 --> 00:44:22,000
Budgets get siloed.
1123
00:44:22,000 --> 00:44:24,200
Finance owns the Microsoft licensing budget.
1124
00:44:24,200 --> 00:44:26,680
IT owns the infrastructure operations budget.
1125
00:44:26,680 --> 00:44:31,120
The business owns their departmental software spending, procurement owns vendor contracts.
1126
00:44:31,120 --> 00:44:32,920
And nobody's looking at the tenant as a whole.
1127
00:44:32,920 --> 00:44:35,120
Nobody's asking, are we getting value from this?
1128
00:44:35,120 --> 00:44:38,400
Is the money we spent on E5 actually driving business outcomes?
1129
00:44:38,400 --> 00:44:40,880
If the co-pilot pilot stalls, who's accountable?
1130
00:44:40,880 --> 00:44:43,080
Not the executive who approved the spending.
1131
00:44:43,080 --> 00:44:44,920
Not the business unit who didn't adopt it.
1132
00:44:44,920 --> 00:44:47,720
It gets blamed on poor change management or lack of training.
1133
00:44:47,720 --> 00:44:50,680
Nobody says we spent 200,000 on this and got nothing.
1134
00:44:50,680 --> 00:44:51,920
Who owns that failure?
1135
00:44:51,920 --> 00:44:53,160
This leads to the third problem.
1136
00:44:53,160 --> 00:44:55,840
Finance is completely absent from architecture decisions.
1137
00:44:55,840 --> 00:44:57,480
The CFO sees the spend line.
1138
00:44:57,480 --> 00:44:59,000
The CIO sees the features.
1139
00:44:59,000 --> 00:45:00,080
They never reconcile.
1140
00:45:00,080 --> 00:45:02,560
The CFO doesn't know what the premium connectors cost.
1141
00:45:02,560 --> 00:45:05,200
The CIO doesn't know how many of them are actually used.
1142
00:45:05,200 --> 00:45:07,880
They're operating in different universes with different success metrics.
1143
00:45:07,880 --> 00:45:09,520
The CFO wants to reduce cost.
1144
00:45:09,520 --> 00:45:11,280
The CIO wants to increase adoption.
1145
00:45:11,280 --> 00:45:12,280
Those aren't aligned.
1146
00:45:12,280 --> 00:45:13,280
They're at odds.
1147
00:45:13,280 --> 00:45:14,880
And when they're at odds neither gets what they want.
1148
00:45:14,880 --> 00:45:18,800
You end up with expensive features that nobody uses and cheap tools that everybody
1149
00:45:18,800 --> 00:45:20,400
re-impliments with Shadow IT.
1150
00:45:20,400 --> 00:45:23,400
This is what I call the procurement lead transformation trap.
1151
00:45:23,400 --> 00:45:25,320
The organization buys the right tools.
1152
00:45:25,320 --> 00:45:27,120
The tools are technically sound.
1153
00:45:27,120 --> 00:45:28,880
Microsoft 365 is a good platform.
1154
00:45:28,880 --> 00:45:31,040
But then procurement declares victory.
1155
00:45:31,040 --> 00:45:32,200
We bought the right tools.
1156
00:45:32,200 --> 00:45:34,000
We have the right strategy.
1157
00:45:34,000 --> 00:45:36,280
Success is now inevitable, except it's not.
1158
00:45:36,280 --> 00:45:40,120
85% of organizations increased AI investments in the past 12 months.
1159
00:45:40,120 --> 00:45:43,920
Only 5% are what Gardner calls future build leaders.
1160
00:45:43,920 --> 00:45:46,880
Organizations that are actually getting multiplier effects from their AI spending.
1161
00:45:46,880 --> 00:45:48,680
The other 80% bought the tools.
1162
00:45:48,680 --> 00:45:50,160
They didn't build the architecture.
1163
00:45:50,160 --> 00:45:51,160
Here's a real story.
1164
00:45:51,160 --> 00:45:55,360
An enterprise spent $4.2 million on Microsoft 365 modernization.
1165
00:45:55,360 --> 00:45:56,360
That's not a small bet.
1166
00:45:56,360 --> 00:45:57,920
That's organizational commitment.
1167
00:45:57,920 --> 00:46:00,120
And they measured success by adoption percentage.
1168
00:46:00,120 --> 00:46:01,120
Did people use teams?
1169
00:46:01,120 --> 00:46:02,120
Yes.
1170
00:46:02,120 --> 00:46:03,120
Did usage go up?
1171
00:46:03,120 --> 00:46:04,120
Absolutely.
1172
00:46:04,120 --> 00:46:06,880
But did those tools drive business outcomes?
1173
00:46:06,880 --> 00:46:08,040
Nobody measured that.
1174
00:46:08,040 --> 00:46:11,040
Did the premium capabilities actually reduce support tickets?
1175
00:46:11,040 --> 00:46:12,040
Nobody tracked it?
1176
00:46:12,040 --> 00:46:13,840
Did automation save labor hours?
1177
00:46:13,840 --> 00:46:14,840
Nobody quantified it.
1178
00:46:14,840 --> 00:46:16,000
The only metric was adoption.
1179
00:46:16,000 --> 00:46:17,000
An adoption looked good.
1180
00:46:17,000 --> 00:46:18,600
But adoption isn't architecture.
1181
00:46:18,600 --> 00:46:20,080
Adoption is visibility.
1182
00:46:20,080 --> 00:46:22,800
Someone using a tool doesn't mean the tool is solving a problem.
1183
00:46:22,800 --> 00:46:24,120
It just means they're using it.
1184
00:46:24,120 --> 00:46:25,720
And here's the final structural problem.
1185
00:46:25,720 --> 00:46:28,080
This is the one most organizations don't want to hear.
1186
00:46:28,080 --> 00:46:29,960
Microsoft doesn't enforce governance.
1187
00:46:29,960 --> 00:46:31,800
It enables chaos by default.
1188
00:46:31,800 --> 00:46:35,280
Microsoft 365 assumes you want to be permissive.
1189
00:46:35,280 --> 00:46:36,600
Everyone can create teams.
1190
00:46:36,600 --> 00:46:38,120
Everyone can register apps.
1191
00:46:38,120 --> 00:46:39,640
Everyone can consent to permissions.
1192
00:46:39,640 --> 00:46:40,920
Everyone can share data widely.
1193
00:46:40,920 --> 00:46:41,920
That's not a bug.
1194
00:46:41,920 --> 00:46:42,920
That's a feature.
1195
00:46:42,920 --> 00:46:44,320
It makes the product more accessible.
1196
00:46:44,320 --> 00:46:48,080
But that permissiveness cascades into sprawl without intentional architecture to constrain
1197
00:46:48,080 --> 00:46:49,080
it.
1198
00:46:49,080 --> 00:46:50,560
Microsoft doesn't force you to classify data.
1199
00:46:50,560 --> 00:46:52,800
It doesn't require approval for co-pilot agents.
1200
00:46:52,800 --> 00:46:54,720
It doesn't mandate permission life cycles.
1201
00:46:54,720 --> 00:46:56,600
Those are architectural decisions you have to make.
1202
00:46:56,600 --> 00:46:58,120
And most organizations don't make them.
1203
00:46:58,120 --> 00:46:59,560
So they get the default behavior.
1204
00:46:59,560 --> 00:47:00,560
Which is chaos.
1205
00:47:00,560 --> 00:47:01,600
This is not Microsoft's failure.
1206
00:47:01,600 --> 00:47:02,600
It's yours.
1207
00:47:02,600 --> 00:47:03,600
And it's fixable.
1208
00:47:03,600 --> 00:47:06,040
But fixing it requires a different operating model.
1209
00:47:06,040 --> 00:47:09,840
The compliance wall, CMMC 2.0 and the architects trap.
1210
00:47:09,840 --> 00:47:13,080
Here's what happens when you don't architect for tomorrow's requirements.
1211
00:47:13,080 --> 00:47:15,160
Tomorrow's requirements architect you instead.
1212
00:47:15,160 --> 00:47:19,400
CMMC 2.0 enforcement became mandatory on November 10, 2025.
1213
00:47:19,400 --> 00:47:20,880
That date has already passed.
1214
00:47:20,880 --> 00:47:23,440
And it caught a lot of organizations flat-footed.
1215
00:47:23,440 --> 00:47:26,600
CMMC is the cybersecurity maturity model certification.
1216
00:47:26,600 --> 00:47:29,840
It's the Department of Defense's way of saying that if you want to work with us, if you
1217
00:47:29,840 --> 00:47:33,520
want a government contract, if you want to touch controlled, unclassified information,
1218
00:47:33,520 --> 00:47:38,640
which is what the DOD call CUI, then your security infrastructure has to meet specific standards,
1219
00:47:38,640 --> 00:47:40,240
not guidelines, standards.
1220
00:47:40,240 --> 00:47:43,160
110 controls from NIST SP 871.
1221
00:47:43,160 --> 00:47:44,880
Level 2 compliance is non-negotiable.
1222
00:47:44,880 --> 00:47:47,080
And here's the architectural detail that matters.
1223
00:47:47,080 --> 00:47:50,840
Microsoft 365 commercial cannot be used for CMMC level 2.
1224
00:47:50,840 --> 00:47:51,840
Full stop.
1225
00:47:51,840 --> 00:47:53,320
The commercial cloud is multi-tenant.
1226
00:47:53,320 --> 00:47:56,560
Data from your organization sits alongside data from other organizations.
1227
00:47:56,560 --> 00:47:58,320
The DOD doesn't accept that risk boundary.
1228
00:47:58,320 --> 00:48:02,680
So if you're a defense contractor and you've been using Microsoft 365 commercial, which
1229
00:48:02,680 --> 00:48:06,520
is what most organizations do because it's cheaper and simpler, you cannot use it for
1230
00:48:06,520 --> 00:48:07,520
CUI anymore.
1231
00:48:07,520 --> 00:48:09,280
You have to migrate to GCC High.
1232
00:48:09,280 --> 00:48:13,560
Government community cloud, a separate isolated cloud environment, different infrastructure,
1233
00:48:13,560 --> 00:48:17,360
different data centers, different governance, it's not a checkbox upgrade.
1234
00:48:17,360 --> 00:48:20,920
It's a retennanting, it's an architectural pivot, how it manifests in practice.
1235
00:48:20,920 --> 00:48:24,240
A defense contractor, 2000 seats, running in commercial.
1236
00:48:24,240 --> 00:48:29,000
They're already using Teams, Exchange, SharePoint, everything's deployed, integrated working,
1237
00:48:29,000 --> 00:48:30,840
then CMMC enforcement happens.
1238
00:48:30,840 --> 00:48:34,720
And suddenly they learn, usually from their compliance officer or their government customer
1239
00:48:34,720 --> 00:48:38,680
that they need to be in GCC High by a specific date or they lose their contract.
1240
00:48:38,680 --> 00:48:39,680
Now they're scrambling.
1241
00:48:39,680 --> 00:48:44,240
They have to migrate 2000 users and all their data to a completely different cloud environment.
1242
00:48:44,240 --> 00:48:47,840
They have to revalidate their conditional access policies because GCC High has different
1243
00:48:47,840 --> 00:48:48,840
feature availability.
1244
00:48:48,840 --> 00:48:52,840
They have to retest integrations because third party connectors behave differently in
1245
00:48:52,840 --> 00:48:54,000
government clouds.
1246
00:48:54,000 --> 00:48:58,480
They have to re-architect their governance because the audit logging in GCC High works differently
1247
00:48:58,480 --> 00:48:59,640
than in commercial.
1248
00:48:59,640 --> 00:49:01,600
The systemic cause is straightforward.
1249
00:49:01,600 --> 00:49:04,320
Compliance requirements were not baked into the initial tenant design.
1250
00:49:04,320 --> 00:49:07,440
The organization chose commercial because it was the standard choice.
1251
00:49:07,440 --> 00:49:11,720
Nobody asked if we were a defense contractor what are our long term compliance requirements.
1252
00:49:11,720 --> 00:49:14,560
Nobody mapped that requirement to an architectural decision.
1253
00:49:14,560 --> 00:49:19,080
Nobody said we should build this in GCC High from day one, even though it's more expensive
1254
00:49:19,080 --> 00:49:21,320
because our business model requires it.
1255
00:49:21,320 --> 00:49:25,520
We had the organization built for cost and simplicity and then when compliance requirements
1256
00:49:25,520 --> 00:49:29,160
arrived they had to re-tenant, which is expensive.
1257
00:49:29,160 --> 00:49:33,600
Real numbers, a defense contractor re-tenanting 2000 users to GCC High.
1258
00:49:33,600 --> 00:49:38,080
Professional services alone, the migration effort, the testing, the validation runs north
1259
00:49:38,080 --> 00:49:39,680
of $500,000.
1260
00:49:39,680 --> 00:49:42,560
Then there's the period of operational disruption.
1261
00:49:42,560 --> 00:49:45,560
Users relearning systems that work slightly differently.
1262
00:49:45,560 --> 00:49:47,600
Integrations that broke and had to be rebuilt.
1263
00:49:47,600 --> 00:49:50,720
Training for the new environment, audits that have to be repeated.
1264
00:49:50,720 --> 00:49:54,160
In the extended timeline, what should have been a two week migration stretch to three months
1265
00:49:54,160 --> 00:49:55,960
because the architecture wasn't built for it?
1266
00:49:55,960 --> 00:49:59,040
The economic consequence is layered, the direct cost of migration.
1267
00:49:59,040 --> 00:50:03,120
The opportunity cost of the engineering team's time diverted to crisis mode.
1268
00:50:03,120 --> 00:50:07,440
The risk of incomplete migration where some data or configurations get missed, discovered
1269
00:50:07,440 --> 00:50:08,520
later in an audit.
1270
00:50:08,520 --> 00:50:13,000
And the ongoing cost, GCC High licensing is more expensive than commercial and you can't
1271
00:50:13,000 --> 00:50:14,320
easily move back.
1272
00:50:14,320 --> 00:50:16,680
The control plane fix is ruthlessly simple.
1273
00:50:16,680 --> 00:50:19,360
Design your tenant for your compliance requirements from day one.
1274
00:50:19,360 --> 00:50:20,360
Not eventually.
1275
00:50:20,360 --> 00:50:23,720
If you're a defense contractor, you build in GCC High.
1276
00:50:23,720 --> 00:50:27,440
You accept the higher cost and complexity upfront because your business model requires
1277
00:50:27,440 --> 00:50:28,440
it.
1278
00:50:28,440 --> 00:50:31,400
If you're in healthcare, you might need HIPAA compliance, which affects data residency
1279
00:50:31,400 --> 00:50:32,720
and audit logging.
1280
00:50:32,720 --> 00:50:36,960
If you're in financial services, you might need SoC2, which affects who can access what
1281
00:50:36,960 --> 00:50:38,280
these aren't nice to have.
1282
00:50:38,280 --> 00:50:39,840
These are architectural constraints.
1283
00:50:39,840 --> 00:50:41,880
And here's the lesson that applies beyond CMMC.
1284
00:50:41,880 --> 00:50:44,680
The window for architectural decisions closes early.
1285
00:50:44,680 --> 00:50:48,560
You make the decision about which cloud to use, about how to classify data, about where
1286
00:50:48,560 --> 00:50:49,800
to store information.
1287
00:50:49,800 --> 00:50:52,760
And then that decision constrains everything that comes after.
1288
00:50:52,760 --> 00:50:56,480
If you make the wrong decision early because you didn't anticipate compliance requirements,
1289
00:50:56,480 --> 00:50:57,720
you're rebuilding later.
1290
00:50:57,720 --> 00:50:58,720
That's expensive.
1291
00:50:58,720 --> 00:51:02,440
If you don't architect for tomorrow's requirements, tomorrow's requirements will architect
1292
00:51:02,440 --> 00:51:03,440
you.
1293
00:51:03,440 --> 00:51:05,760
And by then you're already operating at a cost disadvantage.
1294
00:51:05,760 --> 00:51:08,080
The recovery path from decay to design.
1295
00:51:08,080 --> 00:51:09,600
Here's the thing about architecture.
1296
00:51:09,600 --> 00:51:10,800
You can't fix it all at once.
1297
00:51:10,800 --> 00:51:14,400
You have to fix it deliberately in phases with clear outcomes at each step.
1298
00:51:14,400 --> 00:51:18,640
Otherwise you'll just be throwing money at problems without solving the structural issues
1299
00:51:18,640 --> 00:51:19,960
that created them.
1300
00:51:19,960 --> 00:51:21,960
Recovery from 10NTK follows a pattern.
1301
00:51:21,960 --> 00:51:22,960
And the pattern works.
1302
00:51:22,960 --> 00:51:24,320
I've seen it work dozens of times.
1303
00:51:24,320 --> 00:51:28,280
It takes 90 days to get to a place where you can actually claim you have architecture instead
1304
00:51:28,280 --> 00:51:30,160
of just a platform running unsupervised.
1305
00:51:30,160 --> 00:51:31,560
Phase one is 30 days.
1306
00:51:31,560 --> 00:51:32,560
Audit and inventory.
1307
00:51:32,560 --> 00:51:35,760
You have to see what you've actually got before you can change anything.
1308
00:51:35,760 --> 00:51:40,240
This means discovering inactive licenses, running reports on user log in history.
1309
00:51:40,240 --> 00:51:43,400
Finding accounts that haven't authenticated in 30 days or longer.
1310
00:51:43,400 --> 00:51:44,400
These are your easy wins.
1311
00:51:44,400 --> 00:51:46,040
You reclaim them immediately.
1312
00:51:46,040 --> 00:51:47,720
You also discover often apps.
1313
00:51:47,720 --> 00:51:49,320
The 340 power apps.
1314
00:51:49,320 --> 00:51:52,000
The 847 app registrations.
1315
00:51:52,000 --> 00:51:54,680
The automation flows that nobody remembers creating.
1316
00:51:54,680 --> 00:51:55,680
You don't delete them yet.
1317
00:51:55,680 --> 00:51:56,960
You just inventory them.
1318
00:51:56,960 --> 00:51:57,960
Who owns this?
1319
00:51:57,960 --> 00:51:58,960
Has it been used?
1320
00:51:58,960 --> 00:52:00,160
Is there a business case for keeping it?
1321
00:52:00,160 --> 00:52:01,600
You also do a permission audit.
1322
00:52:01,600 --> 00:52:02,880
You look at entry-d roles.
1323
00:52:02,880 --> 00:52:04,840
You find the accounts with excessive privilege.
1324
00:52:04,840 --> 00:52:08,480
You find the service principles with credentials that haven't been rotated.
1325
00:52:08,480 --> 00:52:12,040
You find application permissions that exceed what the application actually needs.
1326
00:52:12,040 --> 00:52:13,680
None of this gets fixed in phase one.
1327
00:52:13,680 --> 00:52:15,840
You just establish what the baseline looks like.
1328
00:52:15,840 --> 00:52:17,640
By the end of 30 days you have clarity.
1329
00:52:17,640 --> 00:52:19,160
You know how much leakage exists.
1330
00:52:19,160 --> 00:52:20,880
You know how many licenses are wasted.
1331
00:52:20,880 --> 00:52:23,640
You know how many often applications are sitting in your environment.
1332
00:52:23,640 --> 00:52:24,640
You have a number.
1333
00:52:24,640 --> 00:52:26,880
And that number becomes your benchmark for recovery.
1334
00:52:26,880 --> 00:52:28,560
Phase two is 60 days.
1335
00:52:28,560 --> 00:52:29,560
Automate governance.
1336
00:52:29,560 --> 00:52:32,440
Now that you know what you have, you start building the systems that will prevent decay
1337
00:52:32,440 --> 00:52:33,600
from happening again.
1338
00:52:33,600 --> 00:52:36,160
You deploy life cycle workflows in Entra ID.
1339
00:52:36,160 --> 00:52:39,400
When a user joins, their access gets provisioned automatically.
1340
00:52:39,400 --> 00:52:42,600
When they leave, their access gets deprovisioned automatically.
1341
00:52:42,600 --> 00:52:43,600
No manual process.
1342
00:52:43,600 --> 00:52:44,600
No spreadsheets.
1343
00:52:44,600 --> 00:52:46,760
No emails asking someone to remember to offboard this person.
1344
00:52:46,760 --> 00:52:47,760
The system does it.
1345
00:52:47,760 --> 00:52:49,080
You implement entitlement management.
1346
00:52:49,080 --> 00:52:52,720
You create access packages that bundle related permissions.
1347
00:52:52,720 --> 00:52:53,960
Employee joins the finance team.
1348
00:52:53,960 --> 00:52:58,080
They automatically get access to the finance shared mailbox, the finance share point side,
1349
00:52:58,080 --> 00:52:59,480
the finance team's channel.
1350
00:52:59,480 --> 00:53:01,560
All through a single approval workflow.
1351
00:53:01,560 --> 00:53:03,560
Not separate requests to different people.
1352
00:53:03,560 --> 00:53:07,560
Not finding out three weeks later that someone didn't get access to something they needed.
1353
00:53:07,560 --> 00:53:11,040
You enforce sensitivity labels and data loss prevention at scale.
1354
00:53:11,040 --> 00:53:13,040
Every document in SharePoint gets classified.
1355
00:53:13,040 --> 00:53:14,040
Not manually.
1356
00:53:14,040 --> 00:53:15,040
Automatically.
1357
00:53:15,040 --> 00:53:17,000
Content analysis based on metadata.
1358
00:53:17,000 --> 00:53:21,720
If a document contains sensitive financial information, it gets the finance label automatically.
1359
00:53:21,720 --> 00:53:25,760
And once it's labeled, DLP policies automatically restrict how it can be shared.
1360
00:53:25,760 --> 00:53:28,480
You can't email a sensitive financial document externally.
1361
00:53:28,480 --> 00:53:29,480
The policy blocks it.
1362
00:53:29,480 --> 00:53:30,880
Phase three is 90 days.
1363
00:53:30,880 --> 00:53:31,880
Build the control plane.
1364
00:53:31,880 --> 00:53:33,160
This is where you architect.
1365
00:53:33,160 --> 00:53:35,000
You define a policy compilation layer.
1366
00:53:35,000 --> 00:53:40,080
A single system of truth where organizational intent gets translated into platform policy.
1367
00:53:40,080 --> 00:53:42,760
You establish Entra ID as the orchestration backbone.
1368
00:53:42,760 --> 00:53:46,640
Every other system in your tenant inherits authorization decisions from identity.
1369
00:53:46,640 --> 00:53:50,920
A user's role in Entra ID determines their access to data in SharePoint, their visibility
1370
00:53:50,920 --> 00:53:53,720
in teams, their permissions in co-pilot agents.
1371
00:53:53,720 --> 00:53:55,720
You implement cross-platform governance.
1372
00:53:55,720 --> 00:53:58,360
When you make a decision in one place, it cascades everywhere.
1373
00:53:58,360 --> 00:53:59,360
It doesn't break systems.
1374
00:53:59,360 --> 00:54:00,640
It doesn't create exceptions.
1375
00:54:00,640 --> 00:54:02,400
It creates consistency.
1376
00:54:02,400 --> 00:54:05,040
A global firm I worked with followed this path.
1377
00:54:05,040 --> 00:54:06,160
Five thousand seats.
1378
00:54:06,160 --> 00:54:10,280
They recovered $1.2 million in year one through systematic rationalization.
1379
00:54:10,280 --> 00:54:14,800
They reclaimed $130,000 in unused licenses in month one.
1380
00:54:14,800 --> 00:54:17,960
They decommissioned 78 orphaned power apps in month two.
1381
00:54:17,960 --> 00:54:22,880
By month three, they'd reduced their password reset volume by 86% through automated entitlement
1382
00:54:22,880 --> 00:54:23,880
management.
1383
00:54:23,880 --> 00:54:24,880
The research is consistent.
1384
00:54:24,880 --> 00:54:30,400
The break-even point for technology investment in M365 is 54 minutes of time savings per employee
1385
00:54:30,400 --> 00:54:31,400
per month.
1386
00:54:31,400 --> 00:54:34,720
This organization achieved that in the first 30 days.
1387
00:54:34,720 --> 00:54:36,600
Everything after that was pure recovery.
1388
00:54:36,600 --> 00:54:40,480
All outcomes matter.
1389
00:54:40,480 --> 00:54:43,640
Help desk tickets for access requests basically disappeared.
1390
00:54:43,640 --> 00:54:45,960
Compliance audits became routine instead of crisis.
1391
00:54:45,960 --> 00:54:49,800
They could prove they had governance because governance was built into the platform, but
1392
00:54:49,800 --> 00:54:53,160
recovery requires something else beyond process.
1393
00:54:53,160 --> 00:54:54,400
The mindset shift.
1394
00:54:54,400 --> 00:54:58,600
From procurement to architecture, recovery requires a mindset shift.
1395
00:54:58,600 --> 00:55:02,800
And mindset shifts are harder than process changes because they require executives to change
1396
00:55:02,800 --> 00:55:04,760
how they think about what they're doing.
1397
00:55:04,760 --> 00:55:08,280
The shift sounds simple when you say it, but it reshapes everything.
1398
00:55:08,280 --> 00:55:10,280
Stop asking what tools should we buy?
1399
00:55:10,280 --> 00:55:12,120
Start asking what system do we need?
1400
00:55:12,120 --> 00:55:13,720
This is the fundamental reframe.
1401
00:55:13,720 --> 00:55:16,880
Most organizations approach Microsoft 365 like they're shopping.
1402
00:55:16,880 --> 00:55:17,880
What features do we need?
1403
00:55:17,880 --> 00:55:19,160
What's the industry standard?
1404
00:55:19,160 --> 00:55:20,560
What are competitors using?
1405
00:55:20,560 --> 00:55:21,760
What's the price per user?
1406
00:55:21,760 --> 00:55:22,760
And then they buy?
1407
00:55:22,760 --> 00:55:25,320
They've solved the problem by acquiring the product.
1408
00:55:25,320 --> 00:55:27,000
But tools and systems are different things.
1409
00:55:27,000 --> 00:55:28,760
A tool is something you buy and deploy.
1410
00:55:28,760 --> 00:55:30,400
A system is something you architect.
1411
00:55:30,400 --> 00:55:32,080
A tool solves isolated problems.
1412
00:55:32,080 --> 00:55:33,800
A system solves interconnected problems.
1413
00:55:33,800 --> 00:55:34,800
You can buy a co-pilot.
1414
00:55:34,800 --> 00:55:37,280
That's a tool, but you can't buy a co-pilot system.
1415
00:55:37,280 --> 00:55:38,280
You have to architect it.
1416
00:55:38,280 --> 00:55:40,120
You have to decide what data it accesses.
1417
00:55:40,120 --> 00:55:41,480
You have to define its boundaries.
1418
00:55:41,480 --> 00:55:43,880
You have to think about how it integrates with governance.
1419
00:55:43,880 --> 00:55:45,600
You have to measure what it actually delivers.
1420
00:55:45,600 --> 00:55:50,240
The shift from tools to systems changes everything because now the question isn't, how do we buy
1421
00:55:50,240 --> 00:55:51,240
this faster?
1422
00:55:51,240 --> 00:55:53,480
It's, what are we trying to accomplish?
1423
00:55:53,480 --> 00:55:56,480
And how does this tool fit into the larger system we need?
1424
00:55:56,480 --> 00:55:58,320
Stop measuring by adoption percentage.
1425
00:55:58,320 --> 00:56:00,280
Start measuring by economic realization.
1426
00:56:00,280 --> 00:56:02,680
Most organizations track adoption because it's visible.
1427
00:56:02,680 --> 00:56:04,360
How many users logged into co-pilot?
1428
00:56:04,360 --> 00:56:05,920
How many teams channels got created?
1429
00:56:05,920 --> 00:56:07,320
How many people attended training?
1430
00:56:07,320 --> 00:56:10,120
These metrics feel like success because they're easy to see.
1431
00:56:10,120 --> 00:56:11,120
And they're useless.
1432
00:56:11,120 --> 00:56:13,480
A user logged into co-pilot once and never returned.
1433
00:56:13,480 --> 00:56:14,480
Is that adoption?
1434
00:56:14,480 --> 00:56:15,480
Technically yes.
1435
00:56:15,480 --> 00:56:17,120
But economically, it's a failure.
1436
00:56:17,120 --> 00:56:20,520
You spend $30 a month on a license that delivered zero value.
1437
00:56:20,520 --> 00:56:21,520
That's not adoption.
1438
00:56:21,520 --> 00:56:22,840
That's waste measured in percentages.
1439
00:56:22,840 --> 00:56:23,920
Real metrics are different.
1440
00:56:23,920 --> 00:56:26,640
Did co-pilot reduce the time it takes to write a report?
1441
00:56:26,640 --> 00:56:28,240
By how much can you quantify that?
1442
00:56:28,240 --> 00:56:30,080
Did it reduce password reset calls?
1443
00:56:30,080 --> 00:56:31,560
How many fewer calls per month?
1444
00:56:31,560 --> 00:56:33,440
Did it accelerate on boarding by how long?
1445
00:56:33,440 --> 00:56:34,440
These are economic metrics.
1446
00:56:34,440 --> 00:56:36,600
They connect tool usage to business outcome.
1447
00:56:36,600 --> 00:56:37,920
And they're much harder to achieve.
1448
00:56:37,920 --> 00:56:39,680
So organizations don't measure them.
1449
00:56:39,680 --> 00:56:41,360
They measure adoption instead.
1450
00:56:41,360 --> 00:56:43,360
Stop treating architects as cost centers.
1451
00:56:43,360 --> 00:56:45,080
Start treating them as leverage multipliers.
1452
00:56:45,080 --> 00:56:49,000
This is the hardest mindset shift because it requires the organization to value something
1453
00:56:49,000 --> 00:56:50,960
that's invisible until something breaks.
1454
00:56:50,960 --> 00:56:52,520
A builder creates a feature.
1455
00:56:52,520 --> 00:56:53,520
Everyone sees it.
1456
00:56:53,520 --> 00:56:54,880
The business sees value immediately.
1457
00:56:54,880 --> 00:56:58,480
An architect prevents a problem that would have cost millions to fix later.
1458
00:56:58,480 --> 00:57:00,720
Nobody sees it because the problem never happened.
1459
00:57:00,720 --> 00:57:02,160
But invisibility is dangerous.
1460
00:57:02,160 --> 00:57:05,000
It gets architects fired and builders promoted.
1461
00:57:05,000 --> 00:57:06,360
But here's the arithmetic.
1462
00:57:06,360 --> 00:57:09,640
One architect can set standards that affect hundreds of builders.
1463
00:57:09,640 --> 00:57:13,680
One architectural decision about how to handle data boundaries can prevent thousands of hours
1464
00:57:13,680 --> 00:57:14,840
of rework later.
1465
00:57:14,840 --> 00:57:19,160
One governance framework that automates entitlement management can reclaim hundreds of thousands
1466
00:57:19,160 --> 00:57:21,160
of dollars in license waste and labor.
1467
00:57:21,160 --> 00:57:22,160
That's leverage.
1468
00:57:22,160 --> 00:57:25,280
Stop treating licensing as a budget line item.
1469
00:57:25,280 --> 00:57:27,400
Start treating it as a behavioral incentive.
1470
00:57:27,400 --> 00:57:28,800
Licensing SKU drives behavior.
1471
00:57:28,800 --> 00:57:32,400
If you assign everyone E5, you're saying everyone gets access to everything that removes
1472
00:57:32,400 --> 00:57:33,400
all constraints.
1473
00:57:33,400 --> 00:57:34,560
It removes all discipline.
1474
00:57:34,560 --> 00:57:38,640
It removes the mechanism that forces you to make hard architectural decisions about what
1475
00:57:38,640 --> 00:57:39,840
people actually need.
1476
00:57:39,840 --> 00:57:44,120
But if you intentionally align licensing to roles, then the organization has to know what
1477
00:57:44,120 --> 00:57:45,120
roles are.
1478
00:57:45,120 --> 00:57:46,320
It has to enforce role definitions.
1479
00:57:46,320 --> 00:57:49,920
It has to ask why does this person need this capability?
1480
00:57:49,920 --> 00:57:53,520
And in asking that question, it starts building architecture instead of buying features.
1481
00:57:53,520 --> 00:57:56,200
A CIO I worked with made this shift explicitly.
1482
00:57:56,200 --> 00:57:58,520
They'd been trying to drive co-pilot adoption.
1483
00:57:58,520 --> 00:58:03,680
Doing it out to everyone, measuring usage metrics, adoption wasn't happening, usage was low,
1484
00:58:03,680 --> 00:58:05,400
value was unclear.
1485
00:58:05,400 --> 00:58:06,840
So they reframed it.
1486
00:58:06,840 --> 00:58:11,940
Instead of co-pilot is a productivity tool, they said co-pilot is a data governance accelerator.
1487
00:58:11,940 --> 00:58:13,440
And they changed who got licenses.
1488
00:58:13,440 --> 00:58:18,480
Not everyone, teams that had high data governance maturity, teams that had classified their data,
1489
00:58:18,480 --> 00:58:20,600
teams that understood their compliance requirements.
1490
00:58:20,600 --> 00:58:25,120
Suddenly, co-pilot became an incentive for doing the unglomerious work of data classification
1491
00:58:25,120 --> 00:58:26,120
first.
1492
00:58:26,120 --> 00:58:31,000
But reframing looks like in practice, not different tools, different intent, different alignment,
1493
00:58:31,000 --> 00:58:32,200
different outcomes.
1494
00:58:32,200 --> 00:58:33,320
And here's the final refram.
1495
00:58:33,320 --> 00:58:35,880
Your Microsoft tenant is not a collection of applications.
1496
00:58:35,880 --> 00:58:37,840
It is not a set of services you subscribe to.
1497
00:58:37,840 --> 00:58:39,080
It is an economic system.
1498
00:58:39,080 --> 00:58:41,080
Every decision has an economic consequence.
1499
00:58:41,080 --> 00:58:43,120
Every sprawl you tolerate costs money.
1500
00:58:43,120 --> 00:58:45,620
Every governance gap you ignore compounds into debt.
1501
00:58:45,620 --> 00:58:48,400
The question isn't, do we have Microsoft 365?
1502
00:58:48,400 --> 00:58:50,960
The question is, are we managing it as a system?
1503
00:58:50,960 --> 00:58:53,840
The governance operating model, how to sustain it?
1504
00:58:53,840 --> 00:58:55,280
Recovery is the easy part.
1505
00:58:55,280 --> 00:58:57,600
Making it is where most organizations fail.
1506
00:58:57,600 --> 00:58:59,440
You'll go through the 90 day recovery.
1507
00:58:59,440 --> 00:59:00,680
You'll reclaim licenses.
1508
00:59:00,680 --> 00:59:02,640
You'll decommission orfant applications.
1509
00:59:02,640 --> 00:59:04,120
You'll implement automation.
1510
00:59:04,120 --> 00:59:06,840
And for about six months, the organization will feel good about it.
1511
00:59:06,840 --> 00:59:07,840
We fixed it.
1512
00:59:07,840 --> 00:59:08,840
We're more efficient.
1513
00:59:08,840 --> 00:59:09,840
We have governance.
1514
00:59:09,840 --> 00:59:11,600
Then slowly entropy returns.
1515
00:59:11,600 --> 00:59:16,240
A new business unit wants to deploy a co-pilot agent without following the approval workflow.
1516
00:59:16,240 --> 00:59:19,960
Someone creates a teams channel for a project and assigns permissions to broadly.
1517
00:59:19,960 --> 00:59:24,440
A new integration gets built because the standard integration points are documented poorly.
1518
00:59:24,440 --> 00:59:26,200
And the builder doesn't know they exist.
1519
00:59:26,200 --> 00:59:28,000
The control plane drifts.
1520
00:59:28,000 --> 00:59:29,600
Policies become suggestions again.
1521
00:59:29,600 --> 00:59:32,040
This is why governance requires an operating model.
1522
00:59:32,040 --> 00:59:35,280
Not a one time intervention, not a checklist you complete and then ignore.
1523
00:59:35,280 --> 00:59:39,000
An ongoing system that sustains architectural discipline.
1524
00:59:39,000 --> 00:59:40,880
Governance operating models have three components.
1525
00:59:40,880 --> 00:59:44,440
Ownership, decision rights, cadence.
1526
00:59:44,440 --> 00:59:45,440
First ownership.
1527
00:59:45,440 --> 00:59:46,720
Somebody has to own the control plane.
1528
00:59:46,720 --> 00:59:47,720
Not everyone.
1529
00:59:47,720 --> 00:59:51,800
Not a committee that meets quarterly, one accountable person or a small office that
1530
00:59:51,800 --> 00:59:55,440
owns architectural intent and policy, consistency.
1531
00:59:55,440 --> 00:59:58,120
At many organizations, this gets assigned to the CIO.
1532
00:59:58,120 --> 01:00:02,920
But if your CIO is spread across a hundred initiatives, ownership becomes meaningless.
1533
01:00:02,920 --> 01:00:05,160
Effective models establish a distinct role.
1534
01:00:05,160 --> 01:00:08,480
Chief architect or office of architecture or governance council lead.
1535
01:00:08,480 --> 01:00:13,320
Someone whose primary responsibility, not secondary, not among other things, is ensuring
1536
01:00:13,320 --> 01:00:15,320
the control plane stays intact.
1537
01:00:15,320 --> 01:00:16,520
This ownership is active.
1538
01:00:16,520 --> 01:00:17,920
It's not theoretical.
1539
01:00:17,920 --> 01:00:21,760
It's weekly staff meetings where the architecture team reviews what's being requested.
1540
01:00:21,760 --> 01:00:26,960
New applications, new integrations, new data classifications, new governance exceptions.
1541
01:00:26,960 --> 01:00:28,960
Every request flows through this office.
1542
01:00:28,960 --> 01:00:33,080
And the office has the authority to say no, not to obstruct, to enforce standards.
1543
01:00:33,080 --> 01:00:34,960
Second, decision rights.
1544
01:00:34,960 --> 01:00:36,600
Define explicitly who decides what.
1545
01:00:36,600 --> 01:00:39,360
This prevents the diffusion of responsibility that kills governance.
1546
01:00:39,360 --> 01:00:41,800
Who approves new applications, not the business.
1547
01:00:41,800 --> 01:00:43,760
Specifically, the application review board.
1548
01:00:43,760 --> 01:00:47,240
Who has authority to create co-pilot agents, the AI governance council.
1549
01:00:47,240 --> 01:00:50,560
Who decides data classifications, the data owner with IT validation.
1550
01:00:50,560 --> 01:00:53,640
Who can request exceptions to conditional access policies.
1551
01:00:53,640 --> 01:00:57,840
The executive sponsor with the CISO sign off, write these down, make them clear.
1552
01:00:57,840 --> 01:00:59,640
And then enforce them without exception.
1553
01:00:59,640 --> 01:01:01,640
Real exceptions happen, legitimate ones.
1554
01:01:01,640 --> 01:01:06,680
But if you grant exceptions without requiring explicit approval and documented business justification,
1555
01:01:06,680 --> 01:01:07,760
exceptions become the rule.
1556
01:01:07,760 --> 01:01:09,080
And rules become irrelevant.
1557
01:01:09,080 --> 01:01:10,680
Third, cadence.
1558
01:01:10,680 --> 01:01:13,400
Governance that operates only in crisis mode isn't governance.
1559
01:01:13,400 --> 01:01:14,880
It's damage control.
1560
01:01:14,880 --> 01:01:16,320
Establish three levels of rhythm.
1561
01:01:16,320 --> 01:01:17,320
Weekly operational.
1562
01:01:17,320 --> 01:01:22,080
The governance team meeting to review requests, approve standard decisions, identify anomalies.
1563
01:01:22,080 --> 01:01:23,600
Not long meetings, 30 minutes.
1564
01:01:23,600 --> 01:01:24,600
What came in this week?
1565
01:01:24,600 --> 01:01:25,600
Are we seeing drift?
1566
01:01:25,600 --> 01:01:26,920
Do we need to escalate anything?
1567
01:01:26,920 --> 01:01:27,920
Monthly tactical.
1568
01:01:27,920 --> 01:01:28,920
This is the broader review.
1569
01:01:28,920 --> 01:01:30,240
How are policies performing?
1570
01:01:30,240 --> 01:01:31,440
What did automation catch?
1571
01:01:31,440 --> 01:01:33,040
What required manual intervention?
1572
01:01:33,040 --> 01:01:34,520
Are there patterns we should address?
1573
01:01:34,520 --> 01:01:36,960
Are there new threats we need to govern against?
1574
01:01:36,960 --> 01:01:37,960
Quaternary strategic.
1575
01:01:37,960 --> 01:01:39,800
This is alignment with business outcomes.
1576
01:01:39,800 --> 01:01:42,480
Are our governance decisions supporting business goals?
1577
01:01:42,480 --> 01:01:44,920
Are we over-controlling and blocking innovation?
1578
01:01:44,920 --> 01:01:46,640
Are we under-controlling and exposing risk?
1579
01:01:46,640 --> 01:01:49,320
Do we need to adjust policies based on what we've learned?
1580
01:01:49,320 --> 01:01:51,960
This is the meeting that connects governance to business impact.
1581
01:01:51,960 --> 01:01:54,120
Tide this to outcomes.
1582
01:01:54,120 --> 01:01:59,000
Organizations with formal governance operating models achieve 130% or higher ROI in year
1583
01:01:59,000 --> 01:02:00,000
one.
1584
01:02:00,000 --> 01:02:04,000
Not through cost savings alone, through the compounding effect of consistent decision making,
1585
01:02:04,000 --> 01:02:08,160
of reduced rework, of architects preventing problems instead of engineers fixing them
1586
01:02:08,160 --> 01:02:09,160
after the fact.
1587
01:02:09,160 --> 01:02:12,840
A global enterprise established an architecture council.
1588
01:02:12,840 --> 01:02:16,520
Representatives from IT, finance, security, business, met quarterly.
1589
01:02:16,520 --> 01:02:20,040
And all new initiatives evaluated them against architectural standards.
1590
01:02:20,040 --> 01:02:21,240
Court problems early.
1591
01:02:21,240 --> 01:02:25,560
Within two years, they had reduced infrastructure change failures by 70%.
1592
01:02:25,560 --> 01:02:28,800
Because architectural intent was clear and decisions were coordinated.
1593
01:02:28,800 --> 01:02:29,880
Track metrics that matter.
1594
01:02:29,880 --> 01:02:33,000
Not adoption, cost per seat, feature utilization percentage.
1595
01:02:33,000 --> 01:02:35,280
Audit readiness score, breach risk score.
1596
01:02:35,280 --> 01:02:37,360
These connect governance to business reality.
1597
01:02:37,360 --> 01:02:39,040
Is your co-pilot adoption tracking?
1598
01:02:39,040 --> 01:02:41,360
Measure actual time saved, not just login events.
1599
01:02:41,360 --> 01:02:43,000
Are your license cost predictable?
1600
01:02:43,000 --> 01:02:44,760
Track cost per user by role?
1601
01:02:44,760 --> 01:02:46,840
Is your security post your hardening?
1602
01:02:46,840 --> 01:02:51,360
Measure your conditional access coverage, your MFA adoption rate, your unmanaged device exposure?
1603
01:02:51,360 --> 01:02:53,120
These metrics create accountability.
1604
01:02:53,120 --> 01:02:54,600
The governance team owns them.
1605
01:02:54,600 --> 01:02:56,000
They report quarterly.
1606
01:02:56,000 --> 01:02:59,840
When metrics drift, someone has to explain why and what they're doing to fix it.
1607
01:02:59,840 --> 01:03:01,040
This is not optional.
1608
01:03:01,040 --> 01:03:02,960
This is foundational.
1609
01:03:02,960 --> 01:03:06,160
Without an operating model to sustain it, your recovery becomes temporary.
1610
01:03:06,160 --> 01:03:08,640
Within 18 months, your back where you started.
1611
01:03:08,640 --> 01:03:11,720
Slightly more expensive, but fundamentally unchanged.
1612
01:03:11,720 --> 01:03:14,280
With it, governance becomes a permanent capability.
1613
01:03:14,280 --> 01:03:17,840
Having the organization does not something it periodically attempts.
1614
01:03:17,840 --> 01:03:20,720
The executive prescription, what leadership must do.
1615
01:03:20,720 --> 01:03:22,120
Here is what needs to happen.
1616
01:03:22,120 --> 01:03:23,120
Not eventually.
1617
01:03:23,120 --> 01:03:27,360
Before your next renewal, before the July 2026 price increases, force your hand.
1618
01:03:27,360 --> 01:03:30,080
Demand an architecture audit before your next license renewal.
1619
01:03:30,080 --> 01:03:31,080
Not a vendor assessment.
1620
01:03:31,080 --> 01:03:32,400
Not a feature comparison.
1621
01:03:32,400 --> 01:03:33,560
An actual audit.
1622
01:03:33,560 --> 01:03:37,360
Someone independent, not your infrastructure team, they have incentive to minimize problems.
1623
01:03:37,360 --> 01:03:38,880
Comes in and maps your tenant.
1624
01:03:38,880 --> 01:03:39,880
What's actually running?
1625
01:03:39,880 --> 01:03:40,880
What's being used?
1626
01:03:40,880 --> 01:03:41,880
What's decaying?
1627
01:03:41,880 --> 01:03:42,880
What's the compliance posture?
1628
01:03:42,880 --> 01:03:44,240
What's the governance maturity?
1629
01:03:44,240 --> 01:03:45,240
What's the secondary?
1630
01:03:45,240 --> 01:03:46,800
Truth is primary.
1631
01:03:46,800 --> 01:03:50,240
This audit produces three artifacts, first a baseline of where you are.
1632
01:03:50,240 --> 01:03:51,360
What's the current leakage?
1633
01:03:51,360 --> 01:03:52,880
How much license waste exists?
1634
01:03:52,880 --> 01:03:53,880
What's your security debt?
1635
01:03:53,880 --> 01:03:55,040
Second, a gap analysis.
1636
01:03:55,040 --> 01:03:59,640
If you want to achieve a specific level of governance maturity, what do you need to change?
1637
01:03:59,640 --> 01:04:01,280
Third, a recovery roadmap.
1638
01:04:01,280 --> 01:04:02,280
90 days.
1639
01:04:02,280 --> 01:04:03,280
Minimum.
1640
01:04:03,280 --> 01:04:04,280
Clear milestones.
1641
01:04:04,280 --> 01:04:05,280
Economic outcomes measured.
1642
01:04:05,280 --> 01:04:06,600
This audit is not free.
1643
01:04:06,600 --> 01:04:09,960
Plan for 50,000 to 150,000 depending on size.
1644
01:04:09,960 --> 01:04:10,960
That's not an expense.
1645
01:04:10,960 --> 01:04:14,960
Insurance.
1646
01:04:14,960 --> 01:04:17,560
Your assumptions are wrong.
1647
01:04:17,560 --> 01:04:19,160
Everyone's assumptions are wrong.
1648
01:04:19,160 --> 01:04:23,000
Require a quarterly economic outcome reporting tied to your Microsoft spend.
1649
01:04:23,000 --> 01:04:28,480
Your CFO shouldn't see a line item that says Microsoft 365 3.2 million dollars.
1650
01:04:28,480 --> 01:04:31,880
Your CFO should see Microsoft 365 3.2 million.
1651
01:04:31,880 --> 01:04:33,280
ROI outcomes.
1652
01:04:33,280 --> 01:04:36,040
Reduce time to onboard by 25%.
1653
01:04:36,040 --> 01:04:40,280
Automated 86% of access requests prevented four compliance failures.
1654
01:04:40,280 --> 01:04:41,280
That's a conversation.
1655
01:04:41,280 --> 01:04:42,280
That's governance.
1656
01:04:42,280 --> 01:04:44,440
Establish a control plane governance model with clear ownership.
1657
01:04:44,440 --> 01:04:45,920
Assign someone.
1658
01:04:45,920 --> 01:04:46,920
Explicitly.
1659
01:04:46,920 --> 01:04:49,000
Not a committee, not a part-time responsibilities.
1660
01:04:49,000 --> 01:04:52,600
Someone whose primary job is ensuring architectural intent gets enforced.
1661
01:04:52,600 --> 01:04:55,120
Give them authority to approve or reject requests.
1662
01:04:55,120 --> 01:04:56,120
Give them budget.
1663
01:04:56,120 --> 01:04:57,440
Measure them by system health.
1664
01:04:57,440 --> 01:04:59,080
Not by features shipped.
1665
01:04:59,080 --> 01:05:02,120
Map licensing SKU to organizational roles and capabilities.
1666
01:05:02,120 --> 01:05:04,360
This is unglamorous work, but it's mandatory.
1667
01:05:04,360 --> 01:05:05,360
You need a matrix.
1668
01:05:05,360 --> 01:05:09,480
Finance roles require E5 because they need advanced threat intelligence and premium
1669
01:05:09,480 --> 01:05:10,880
connectors.
1670
01:05:10,880 --> 01:05:15,360
Engineering roles require E3 because they need collaboration but not premium security.
1671
01:05:15,360 --> 01:05:18,720
Support roles require business standard because they need email and teams and nothing
1672
01:05:18,720 --> 01:05:19,720
else.
1673
01:05:19,720 --> 01:05:20,720
Write this down.
1674
01:05:20,720 --> 01:05:22,840
Make it policy and force it.
1675
01:05:22,840 --> 01:05:25,960
Implement automated compliance monitoring for regulatory requirements.
1676
01:05:25,960 --> 01:05:29,480
If you're a defense contractor, you need to know continuously whether you're maintaining
1677
01:05:29,480 --> 01:05:31,160
CMMC compliance.
1678
01:05:31,160 --> 01:05:32,160
Not at audit time.
1679
01:05:32,160 --> 01:05:33,160
Continuously.
1680
01:05:33,160 --> 01:05:37,160
If you're in health care, you need to know whether your HIPAA controls are intact, automated
1681
01:05:37,160 --> 01:05:38,160
real-time.
1682
01:05:38,160 --> 01:05:39,160
It requires tooling.
1683
01:05:39,160 --> 01:05:40,160
It requires investment.
1684
01:05:40,160 --> 01:05:41,160
It's non-negotiable.
1685
01:05:41,160 --> 01:05:42,160
Real story.
1686
01:05:42,160 --> 01:05:46,680
A CFO at a mid-market organization demanded an ROI model before approving the co-pilot rollout.
1687
01:05:46,680 --> 01:05:47,680
The team pushed back.
1688
01:05:47,680 --> 01:05:48,680
Just let us pilot it.
1689
01:05:48,680 --> 01:05:49,680
See how adoption goes.
1690
01:05:49,680 --> 01:05:50,680
The CFO said no.
1691
01:05:50,680 --> 01:05:51,680
Show me the model.
1692
01:05:51,680 --> 01:05:53,400
Show me what time savings will achieve.
1693
01:05:53,400 --> 01:05:55,400
Show me how that translates to economic value.
1694
01:05:55,400 --> 01:05:58,280
They built the model and they discovered something.
1695
01:05:58,280 --> 01:06:03,240
40% of existing E5 licenses could be downgraded to E3 because users weren't using the premium
1696
01:06:03,240 --> 01:06:05,480
connectors or the advanced security features.
1697
01:06:05,480 --> 01:06:08,200
They were just using the basic collaboration tools.
1698
01:06:08,200 --> 01:06:12,520
40% that's hundreds of thousands of dollars recovered before they spent a dime on co-pilot.
1699
01:06:12,520 --> 01:06:15,560
The CFO's insistence on economic modeling exposed the real problem.
1700
01:06:15,560 --> 01:06:16,880
Here's the conversation starter.
1701
01:06:16,880 --> 01:06:21,640
If you cannot explain your Microsoft strategy in economic terms, you don't have a strategy.
1702
01:06:21,640 --> 01:06:22,640
You have a shopping list.
1703
01:06:22,640 --> 01:06:25,680
A strategy connects technical decisions to business outcomes.
1704
01:06:25,680 --> 01:06:29,840
The strategy says we're implementing this control because it reduces risk.
1705
01:06:29,840 --> 01:06:32,480
Or we're decommissioning that because it's not driving value.
1706
01:06:32,480 --> 01:06:36,360
Or we're investing in governance because the savings from automation exceed the cost
1707
01:06:36,360 --> 01:06:37,600
by 5 to 1.
1708
01:06:37,600 --> 01:06:40,320
If you can't say those things, you don't have a strategy.
1709
01:06:40,320 --> 01:06:41,840
And here's the non-negotiable.
1710
01:06:41,840 --> 01:06:43,640
Procurement is not transformation.
1711
01:06:43,640 --> 01:06:44,640
Architecture is.
1712
01:06:44,640 --> 01:06:45,640
Stop conflating the two.
1713
01:06:45,640 --> 01:06:46,640
Buying tools is easy.
1714
01:06:46,640 --> 01:06:47,640
Building systems is hard.
1715
01:06:47,640 --> 01:06:48,640
One is a transaction.
1716
01:06:48,640 --> 01:06:49,920
The other is a capability.
1717
01:06:49,920 --> 01:06:51,240
One generates a purchase order.
1718
01:06:51,240 --> 01:06:53,080
The other generates economic value.
1719
01:06:53,080 --> 01:06:56,640
Your job as a leader is to demand architecture, not procurement.
1720
01:06:56,640 --> 01:07:00,320
Demand that before you renew, someone explains to you how your Microsoft tenant is actually
1721
01:07:00,320 --> 01:07:04,680
organized, what the control plane looks like, how decisions are enforced, what's working,
1722
01:07:04,680 --> 01:07:07,280
what's decaying, what the economics actually are.
1723
01:07:07,280 --> 01:07:08,280
That's leadership.
1724
01:07:08,280 --> 01:07:09,960
Everything else is just spending money.
1725
01:07:09,960 --> 01:07:10,960
The uncomfortable truth.
1726
01:07:10,960 --> 01:07:12,280
Why this matters now?
1727
01:07:12,280 --> 01:07:13,760
This is not a 2027 problem.
1728
01:07:13,760 --> 01:07:15,080
This is a 26 problem.
1729
01:07:15,080 --> 01:07:16,080
And it's already here.
1730
01:07:16,080 --> 01:07:21,160
Microsoft is increasing prices 9 to 33% effective July 1, 2026.
1731
01:07:21,160 --> 01:07:22,200
That date is approaching.
1732
01:07:22,200 --> 01:07:25,160
For most organizations, that's your next renewal window.
1733
01:07:25,160 --> 01:07:27,320
The question isn't whether prices are going up.
1734
01:07:27,320 --> 01:07:31,320
The question is whether you'll be paying higher prices on a rationalized tenant or a
1735
01:07:31,320 --> 01:07:32,360
decayed one.
1736
01:07:32,360 --> 01:07:36,760
If you rationalize now, before renewal, you recover license waste while you're still paying
1737
01:07:36,760 --> 01:07:37,760
current pricing.
1738
01:07:37,760 --> 01:07:43,040
A 30% cost reduction on your E5 mix locked in at today's rates survives the July increase.
1739
01:07:43,040 --> 01:07:47,440
If you wait until after the increase, you're recovering 30% over higher base.
1740
01:07:47,440 --> 01:07:49,160
You're optimizing at a disadvantage.
1741
01:07:49,160 --> 01:07:52,440
The arithmetic is stock, a global firm delayed rationalization.
1742
01:07:52,440 --> 01:07:54,960
They told themselves they'd address it after their renewal.
1743
01:07:54,960 --> 01:07:57,720
They renewal landed two weeks after the price increase.
1744
01:07:57,720 --> 01:07:59,360
They tried to write size licenses then.
1745
01:07:59,360 --> 01:08:01,800
They recovered 100,000 in quarterly waste.
1746
01:08:01,800 --> 01:08:05,680
But they were recovering it from a base that had already increased by 300,000.
1747
01:08:05,680 --> 01:08:06,680
They optimized too late.
1748
01:08:06,680 --> 01:08:11,200
They're now paying 200,000 more annually than if they had acted before the increase.
1749
01:08:11,200 --> 01:08:12,680
The second pressure is regulatory.
1750
01:08:12,680 --> 01:08:14,840
The compliance landscape is tightening, not loosening.
1751
01:08:14,840 --> 01:08:16,960
CMMC 2.0 enforcement is not optional.
1752
01:08:16,960 --> 01:08:18,600
It's not something to handle eventually.
1753
01:08:18,600 --> 01:08:19,600
It's here.
1754
01:08:19,600 --> 01:08:22,800
And if you're a defense contractor and you're not already in GCC high, you're operating
1755
01:08:22,800 --> 01:08:23,800
on borrowed time.
1756
01:08:23,800 --> 01:08:25,320
The customer will enforce it.
1757
01:08:25,320 --> 01:08:26,720
Your contract depends on it.
1758
01:08:26,720 --> 01:08:28,760
Waiting until you lose the contract is expensive.
1759
01:08:28,760 --> 01:08:32,400
Beyond CMMC, state level AI regulation is accelerating.
1760
01:08:32,400 --> 01:08:36,800
38 US states enacted roughly 100 AI measures in 2025.
1761
01:08:36,800 --> 01:08:39,480
The number is growing and regulations require governance.
1762
01:08:39,480 --> 01:08:41,680
Real governance, not policies written in English.
1763
01:08:41,680 --> 01:08:44,600
Automated enforcement, audit trails, human oversight.
1764
01:08:44,600 --> 01:08:46,320
These are not optional nice to have.
1765
01:08:46,320 --> 01:08:48,960
These are requirements and they're expensive to retrofit.
1766
01:08:48,960 --> 01:08:50,960
The third pressure is threat velocity.
1767
01:08:50,960 --> 01:08:53,320
Tenant level attacks are becoming more sophisticated.
1768
01:08:53,320 --> 01:08:56,840
63% of M365 tenants face configuration tampering.
1769
01:08:56,840 --> 01:08:58,440
And here's the architectural consequence.
1770
01:08:58,440 --> 01:09:01,560
Microsoft doesn't natively back up tenant configurations.
1771
01:09:01,560 --> 01:09:04,560
You deploy a conditional access policy and attacker modifies it.
1772
01:09:04,560 --> 01:09:06,000
You have no recovery point.
1773
01:09:06,000 --> 01:09:07,000
No native rollback.
1774
01:09:07,000 --> 01:09:09,000
You're reconstructing from logs if you're lucky.
1775
01:09:09,000 --> 01:09:10,520
If you're not, you're rebuilding.
1776
01:09:10,520 --> 01:09:11,840
That's not a theoretical risk.
1777
01:09:11,840 --> 01:09:15,920
That's your architecture exposing you to extended downtime with no recovery path.
1778
01:09:15,920 --> 01:09:17,960
The fourth pressure is AI sprawl.
1779
01:09:17,960 --> 01:09:20,200
And this one's moving faster than you can see it.
1780
01:09:20,200 --> 01:09:25,440
80% of Fortune 500 companies are using active AI agents, 80% and most of them have no formal
1781
01:09:25,440 --> 01:09:28,080
strategy for agent identity management.
1782
01:09:28,080 --> 01:09:29,680
No governance, no boundaries.
1783
01:09:29,680 --> 01:09:34,160
Agents are proliferating, consuming credits, accessing data, operating without oversight.
1784
01:09:34,160 --> 01:09:35,920
Co-pilot itself burns tokens fast.
1785
01:09:35,920 --> 01:09:37,440
The cost model isn't linear.
1786
01:09:37,440 --> 01:09:39,280
Popular agents accelerate consumption.
1787
01:09:39,280 --> 01:09:43,240
And without capacity planning, without governance, without boundaries, your co-pilot budget becomes
1788
01:09:43,240 --> 01:09:44,240
unpredictable.
1789
01:09:44,240 --> 01:09:48,040
The tenant debt of unmanaged agents is real and it's compounding faster than cleanup can
1790
01:09:48,040 --> 01:09:49,040
address it.
1791
01:09:49,040 --> 01:09:53,360
Your ties all for pressures together, the window for proactive architecture is closing.
1792
01:09:53,360 --> 01:09:57,920
Every month you delay recovery, your storing up compound problems, more orphaned applications
1793
01:09:57,920 --> 01:10:01,960
accumulate, more permissions drift, more inactive licenses get built, more technical debt
1794
01:10:01,960 --> 01:10:05,440
accrues and every month the cost of fixing it later increases.
1795
01:10:05,440 --> 01:10:08,360
Organizations that act now in the next 90 days have leveraged.
1796
01:10:08,360 --> 01:10:10,760
You can recover licenses before the price increase.
1797
01:10:10,760 --> 01:10:14,520
You can rationalize co-pilot costs before agent sprawl becomes unmanageable.
1798
01:10:14,520 --> 01:10:18,080
You can implement governance frameworks before regulatory audits expose gaps.
1799
01:10:18,080 --> 01:10:22,560
You can build a control plane while you still have the organizational bandwidth to do it.
1800
01:10:22,560 --> 01:10:24,400
Organizations that wait face a different arithmetic.
1801
01:10:24,400 --> 01:10:26,840
They'll pay higher prices on misaligned licenses.
1802
01:10:26,840 --> 01:10:29,440
They'll face compliance fines because governance wasn't in place.
1803
01:10:29,440 --> 01:10:33,200
They'll have security incidents from unmanaged agents and permissions sprawl.
1804
01:10:33,200 --> 01:10:35,800
And they'll pay crisis premiums to fix all of it at once.
1805
01:10:35,800 --> 01:10:36,800
This is not doom.
1806
01:10:36,800 --> 01:10:38,280
This is inevitability.
1807
01:10:38,280 --> 01:10:40,080
This is what happens when debt compounds.
1808
01:10:40,080 --> 01:10:41,840
The question isn't whether it will happen.
1809
01:10:41,840 --> 01:10:45,280
It's whether you'll address it proactively or reactively.
1810
01:10:45,280 --> 01:10:46,640
The final diagnosis.
1811
01:10:46,640 --> 01:10:47,680
Here's what I know.
1812
01:10:47,680 --> 01:10:49,560
Your Microsoft tenant is leaking millions.
1813
01:10:49,560 --> 01:10:51,280
Your financing your own decay.
1814
01:10:51,280 --> 01:10:52,280
And you can stop it.
1815
01:10:52,280 --> 01:10:53,280
The problem is not Microsoft.
1816
01:10:53,280 --> 01:10:56,440
It is the absence of economic ownership in your architecture.
1817
01:10:56,440 --> 01:10:58,160
The solution is not more tools.
1818
01:10:58,160 --> 01:10:59,160
It is a control plane.
1819
01:10:59,160 --> 01:11:00,640
The timeline is not eventually.
1820
01:11:00,640 --> 01:11:01,640
It is now.
1821
01:11:01,640 --> 01:11:02,640
Remember this.
1822
01:11:02,640 --> 01:11:03,640
This is not about tools.
1823
01:11:03,640 --> 01:11:04,640
This is about economic ownership.
1824
01:11:04,640 --> 01:11:05,640
Ordered your tenant.
1825
01:11:05,640 --> 01:11:06,640
Established governance ownership.
1826
01:11:06,640 --> 01:11:07,640
Measure economic outcomes.
1827
01:11:07,640 --> 01:11:09,320
Do it in the next 90 days.
1828
01:11:09,320 --> 01:11:10,360
Your margins depend on it.

Founder of m365.fm, m365.show and m365con.net
Mirko Peters is a Microsoft 365 expert, content creator, and founder of m365.fm, a platform dedicated to sharing practical insights on modern workplace technologies. His work focuses on Microsoft 365 governance, security, collaboration, and real-world implementation strategies.
Through his podcast and written content, Mirko provides hands-on guidance for IT professionals, architects, and business leaders navigating the complexities of Microsoft 365. He is known for translating complex topics into clear, actionable advice, often highlighting common mistakes and overlooked risks in real-world environments.
With a strong emphasis on community contribution and knowledge sharing, Mirko is actively building a platform that connects experts, shares experiences, and helps organizations get the most out of their Microsoft 365 investments.








