Most organizations believe power sits in titles, hierarchies, and approval structures. In reality, power operates somewhere else entirely—inside access, information flow, and the people who can actually move work forward. In this episode, Mirko Peters breaks down why the biggest organizational bottlenecks are not caused by people, but by structural misalignment between authority, access, and execution. Using real-world patterns from Microsoft 365 environments and AI readiness initiatives, this episode reveals how hidden power structures shape decision-making, slow transformation, and determine whether tools like Copilot succeed or fail. If you want to understand how your organization truly operates—not how it’s supposed to—this episode gives you the lens. 🔑 Key Insights 1. The Permission Problem Is Structural
- Repeated friction is rarely about personalities—it’s a system outcome
- Organizations misdiagnose structural issues as “people problems”
- Work flows through access and context, not org charts
- Authority = formal accountability (titles, roles)
- Power = ability to move work (access, context, trust)
- Decisions happen where context exists—not where authority sits
- Permissions, ownership, and workflows accumulate history
- Governance reflects intent, but systems reflect reality
- “Temporary fixes” become permanent operating models
- Certain individuals become invisible infrastructure
- Work routes through them because they hold:
- Context
- Access
- Trust
- This creates bottlenecks, burnout, and fragility
- Time delays show where dependency exists
- Most delays are not approvals—they’re waiting for context
- Where work slows down = where power actually sits
- Effective access ≠ intended governance
- Misalignment leads to:
- Weak accountability
- Hidden gatekeeping
- False confidence in control
- Power sits with people who:
- Bridge teams
- Translate context
- Appear in every critical conversation
- These are your informal decision brokers
- Control of SharePoint = control of truth
- If leaders can’t access trusted content:
- Their authority becomes symbolic
- Information gaps slow decisions more than approvals
- Not rebellion—compensation for broken systems
- People bypass governance to restore speed and clarity
- Shadow behavior highlights unmet operational needs
- AI doesn’t fix your organization—it reveals and scales it
- Bad permissions → faster exposure
- Missing context → faster bad decisions
- Copilot success depends on structural alignment
- Not a technology problem
- A permission and access problem
- Symptoms:
- Uneven results between users
- Lack of trust in outputs
- Increased dependency on human gatekeepers
- Too much access → confusion & weak accountability
- Visibility without ownership → poor decisions
- Too little access → bottlenecks & slow execution
- Control without flow → shadow systems emerge
- Responsibility ≠ Access
- Authority ≠ Execution
- Governance ≠ Reality
- Track time from request → usable decision
- Identify where work waits and why
- Compare:
- Who is accountable
- Who actually has access
- Look for:
- Stale permissions
- Hidden exceptions
- Missing access for decision-makers
- Identify single points of failure
- Add redundancy:
- Content ownership
- Workflow control
- Context knowledge
- Design systems that don’t rely on heroics
- Treat permissions as strategy
- Align access with accountability
- Build redundancy into systems
- Ensure the environment deserves to be accelerated
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.
If this clashes with how you’ve seen it play out, I’m always curious. I use LinkedIn for the back-and-forth.
🚀 Want to be part of m365.fm?
Then stop just listening… and start showing up.
👉 Connect with me on LinkedIn and let’s make something happen:
- 🎙️ Be a podcast guest and share your story
- 🎧 Host your own episode (yes, seriously)
- 💡 Pitch topics the community actually wants to hear
- 🌍 Build your personal brand in the Microsoft 365 space
This isn’t just a podcast — it’s a platform for people who take action.
🔥 Most people wait. The best ones don’t.
👉 Connect with me on LinkedIn and send me a message:
"I want in"
Let’s build something awesome 👊
00:00:00,000 --> 00:00:06,000
Hello, my name is Mirko Peters and I translate how technology actually shapes business reality.
2
00:00:06,000 --> 00:00:11,480
Most organizations believe power lives in titles, approval levels and the formal org chart.
3
00:00:11,480 --> 00:00:15,280
But when you look at how work actually moves, power sits somewhere else entirely.
4
00:00:15,280 --> 00:00:19,640
It lives in access and information and in the specific people who sit inside the flow
5
00:00:19,640 --> 00:00:20,720
of decisions.
6
00:00:20,720 --> 00:00:25,160
In this episode, I want to show you how to read power where it really exists across permissions,
7
00:00:25,160 --> 00:00:26,840
conversations, content and AI.
8
00:00:26,840 --> 00:00:31,760
If this lens helps you audit your own organization more clearly, subscribe to the podcast so
9
00:00:31,760 --> 00:00:34,000
we can keep mapping these systems together.
10
00:00:34,000 --> 00:00:37,080
Let me take one step back and explain why this matters.
11
00:00:37,080 --> 00:00:39,240
The permission problem is not a people problem.
12
00:00:39,240 --> 00:00:42,600
When leaders talk about power problems, they usually focus on personalities and office
13
00:00:42,600 --> 00:00:43,600
politics.
14
00:00:43,600 --> 00:00:47,600
They talk about difficult stakeholders or territorial behavior and they point to weak culture,
15
00:00:47,600 --> 00:00:50,800
pro communication or a general lack of trust.
16
00:00:50,800 --> 00:00:54,600
While those things are certainly real, they are often just symptoms of a deeper structural
17
00:00:54,600 --> 00:00:55,600
issue.
18
00:00:55,600 --> 00:00:59,480
The same friction shows up again and again across different teams and leadership changes.
19
00:00:59,480 --> 00:01:01,880
We are usually not looking at the people problem at all.
20
00:01:01,880 --> 00:01:03,400
We are looking at a system outcome.
21
00:01:03,400 --> 00:01:07,440
That distinction matters because it changes how we diagnose the organization and how we try
22
00:01:07,440 --> 00:01:08,640
to fix it.
23
00:01:08,640 --> 00:01:13,080
If the default explanation is personal behavior, then the response is always going to be personal.
24
00:01:13,080 --> 00:01:17,040
You might coach a specific person, replace a manager or run another alignment meeting to
25
00:01:17,040 --> 00:01:18,640
clarify expectations.
26
00:01:18,640 --> 00:01:22,040
Sometimes that helps for a few weeks, but often nothing structural changes because the underlying
27
00:01:22,040 --> 00:01:23,600
machinery is still broken.
28
00:01:23,600 --> 00:01:27,960
The delays remain, the same names keep showing up in escalations and the work gets stuck in
29
00:01:27,960 --> 00:01:30,760
the same places even if the people in those seats have changed.
30
00:01:30,760 --> 00:01:31,760
And why is that?
31
00:01:31,760 --> 00:01:35,800
Formal hierarchy explains accountability on paper telling us who is meant to approve a
32
00:01:35,800 --> 00:01:38,880
request or who owns the budget when things go wrong.
33
00:01:38,880 --> 00:01:41,840
But actual execution follows a completely different map.
34
00:01:41,840 --> 00:01:46,160
It follows access paths and information availability which means the person who can move the work
35
00:01:46,160 --> 00:01:50,240
is the one who can see the file, edit the record or grant the permission.
36
00:01:50,240 --> 00:01:54,760
The real operating model is defined by who can interpret the context and move the conversation
37
00:01:54,760 --> 00:01:57,600
forward without waiting for three other people to wake up.
38
00:01:57,600 --> 00:02:01,720
In most organizations, that model is only partly visible to the people running it.
39
00:02:01,720 --> 00:02:07,560
I've seen this repeatedly in Microsoft 365 environments that look mature from the outside
40
00:02:07,560 --> 00:02:11,080
because the governance is documented and the roles are defined.
41
00:02:11,080 --> 00:02:14,640
There are committees, steering groups and approval workflows that make everything look
42
00:02:14,640 --> 00:02:16,480
controlled and professional.
43
00:02:16,480 --> 00:02:19,840
But then you watch one important decision move through the organization and suddenly that
44
00:02:19,840 --> 00:02:22,720
formal structure starts to blur into something else.
45
00:02:22,720 --> 00:02:26,400
The person with the title is rarely the person with the context and the person with the
46
00:02:26,400 --> 00:02:29,800
accountability often lacks the access they need to actually lead.
47
00:02:29,800 --> 00:02:33,880
The leader expected to decide is usually waiting on someone else to find a document, interpret
48
00:02:33,880 --> 00:02:37,880
the history or unlock a workflow just to confirm what is actually true.
49
00:02:37,880 --> 00:02:41,000
Because of this gap, the decision does not happen where authority sits.
50
00:02:41,000 --> 00:02:44,560
It happens where enough context exists to move, that is the permission problem.
51
00:02:44,560 --> 00:02:48,040
I'm not talking about permission in the narrow IT sense of clicking a checkbox.
52
00:02:48,040 --> 00:02:51,600
I'm talking about permission as an operating condition for the entire business.
53
00:02:51,600 --> 00:02:52,840
Can you see what matters?
54
00:02:52,840 --> 00:02:54,160
Can you reach the data you need?
55
00:02:54,160 --> 00:02:55,960
Can you change the things that are broken?
56
00:02:55,960 --> 00:02:59,560
If you can't move the work without going through an informal gatekeeper, then the org chart
57
00:02:59,560 --> 00:03:03,120
might be accurate in theory, but it is completely weak in practice.
58
00:03:03,120 --> 00:03:05,160
This is where many organizations get trapped.
59
00:03:05,160 --> 00:03:08,960
They think they have a leadership problem when they really have a distribution problem.
60
00:03:08,960 --> 00:03:12,320
Control is distributed one way, responsibility is distributed another and information is
61
00:03:12,320 --> 00:03:14,360
scattered somewhere else entirely.
62
00:03:14,360 --> 00:03:19,000
This is often the result of years of historical accidents and quick fixes that nobody would
63
00:03:19,000 --> 00:03:20,720
ever design from scratch today.
64
00:03:20,720 --> 00:03:23,720
The people inside the system eventually learn to compensate for these gaps.
65
00:03:23,720 --> 00:03:28,280
They create side channels, forward files to personal accounts and start private chats
66
00:03:28,280 --> 00:03:29,560
just to get a straight answer.
67
00:03:29,560 --> 00:03:33,280
They build local trackers and use tools that were never meant to become critical infrastructure
68
00:03:33,280 --> 00:03:36,440
because the formal path does not move at the speed of the business.
69
00:03:36,440 --> 00:03:40,560
Once this compensation becomes normal, it gets misread as a culture problem.
70
00:03:40,560 --> 00:03:45,480
People start saying a specific team is political or a certain department always blocks progress.
71
00:03:45,480 --> 00:03:49,080
Maybe that's true, but very often the system is doing exactly what it was set up to do.
72
00:03:49,080 --> 00:03:53,360
It roots work through access bottlenecks and concentrates context in two few places, which
73
00:03:53,360 --> 00:03:57,320
creates invisible dependencies that only become obvious when things get stressful.
74
00:03:57,320 --> 00:04:00,440
From a system perspective that's not just inefficient, it's fragile.
75
00:04:00,440 --> 00:04:05,520
A system that depends on a few hidden people to keep work moving is a system with low structural
76
00:04:05,520 --> 00:04:06,520
resilience.
77
00:04:06,520 --> 00:04:10,200
That fragility stays hidden during normal operations when everyone is just trying to
78
00:04:10,200 --> 00:04:11,600
get through the day.
79
00:04:11,600 --> 00:04:15,320
Then a transformation starts like a merger or a co-pilot pilot and suddenly the mismatch
80
00:04:15,320 --> 00:04:17,240
becomes visible to everyone.
81
00:04:17,240 --> 00:04:20,960
Transformation puts pressure on flow and it asks the organization to move faster and
82
00:04:20,960 --> 00:04:22,960
trust data across boundaries.
83
00:04:22,960 --> 00:04:25,360
That's when the real power map starts to show itself.
84
00:04:25,360 --> 00:04:29,320
It isn't found in titles but in access, in dependency and in the hidden architecture of
85
00:04:29,320 --> 00:04:32,560
who the organization actually needs in order to function.
86
00:04:32,560 --> 00:04:35,000
The difference between authority and power.
87
00:04:35,000 --> 00:04:38,480
Once we recognize that these organizational hurdles are structural, we need to draw
88
00:04:38,480 --> 00:04:42,960
a much cleaner distinction between two things that often get blurred together.
89
00:04:42,960 --> 00:04:44,400
Authority and power are not the same thing.
90
00:04:44,400 --> 00:04:49,240
In most companies, authority is the formal side of the equation and it arrives with a title,
91
00:04:49,240 --> 00:04:52,560
a mandate, a specific budget and clear reporting lines.
92
00:04:52,560 --> 00:04:56,760
It represents the official map the organization points to when it needs to explain who is legally
93
00:04:56,760 --> 00:04:59,040
or professionally responsible for a result.
94
00:04:59,040 --> 00:05:01,240
That structure matters and I'm not dismissing it.
95
00:05:01,240 --> 00:05:05,080
Formal authority is the primary tool organizations use to create order.
96
00:05:05,080 --> 00:05:09,240
Because without it, you end up with total ambiguity around ownership and consequences.
97
00:05:09,240 --> 00:05:13,960
You need a specific person who has the right to say yes, the standing to say no and the shoulders
98
00:05:13,960 --> 00:05:16,160
to carry the weight of a final decision.
99
00:05:16,160 --> 00:05:19,080
But power operates on an entirely different frequency.
100
00:05:19,080 --> 00:05:20,360
Power is operational.
101
00:05:20,360 --> 00:05:25,320
It doesn't come from a badge or a line on an org chart but instead flows from access, timing,
102
00:05:25,320 --> 00:05:26,320
context and trust.
103
00:05:26,320 --> 00:05:29,760
It belongs to the person who is close enough to the actual work that their personal
104
00:05:29,760 --> 00:05:33,440
involvement fundamentally changes what happens next and why is that?
105
00:05:33,440 --> 00:05:37,320
The reason is that work does not move through titles alone but rather through a constant
106
00:05:37,320 --> 00:05:39,640
combination of information and permission.
107
00:05:39,640 --> 00:05:43,680
If you have all the authority in the world but no visibility into the daily grind, your
108
00:05:43,680 --> 00:05:45,720
decisions will be slow and disconnected.
109
00:05:45,720 --> 00:05:50,560
If you hold the mandate but lack direct access to the systems, your ability to execute depends
110
00:05:50,560 --> 00:05:52,760
entirely on someone else's schedule.
111
00:05:52,760 --> 00:05:56,640
When there is a weak trust between the person with the title and the people doing the work,
112
00:05:56,640 --> 00:06:00,320
those decisions might be formally correct yet they remain operationally weak.
113
00:06:00,320 --> 00:06:02,160
Now let's look at the other side of that coin.
114
00:06:02,160 --> 00:06:05,960
We've all seen someone who has very little formal authority but still holds enormous power
115
00:06:05,960 --> 00:06:10,160
inside the system and usually it's not because they're playing politics and they hold that
116
00:06:10,160 --> 00:06:13,280
power because they sit directly in the path of execution.
117
00:06:13,280 --> 00:06:17,800
They are the ones who know where the real file is hidden, which version is actually current
118
00:06:17,800 --> 00:06:21,400
and why the entire workflow tends to fail every Thursday afternoon.
119
00:06:21,400 --> 00:06:25,200
They understand which team truly owns the data regardless of what the documentation says
120
00:06:25,200 --> 00:06:29,760
and they know exactly who needs to be consulted before a decision can move forward without
121
00:06:29,760 --> 00:06:31,520
hitting a wall of resistance.
122
00:06:31,520 --> 00:06:33,280
So what happens in that environment?
123
00:06:33,280 --> 00:06:35,920
Everyone eventually starts routing their work through them.
124
00:06:35,920 --> 00:06:39,840
The moment that shift happens their actual position becomes much bigger than their job title
125
00:06:39,840 --> 00:06:40,840
suggests.
126
00:06:40,840 --> 00:06:44,880
I've sat in rooms with senior leaders who had clear authority but couldn't move a single
127
00:06:44,880 --> 00:06:49,880
project without a coordinator or a long tenured lead translating the technical reality underneath
128
00:06:49,880 --> 00:06:50,880
them.
129
00:06:50,880 --> 00:06:55,280
That isn't a story about personality or charisma, it's a design signal.
130
00:06:55,280 --> 00:06:58,760
Decisions naturally gravitate toward the place where enough context exists to make them
131
00:06:58,760 --> 00:07:02,240
real and that is the fundamental difference we have to understand.
132
00:07:02,240 --> 00:07:05,840
Authorities says this person is meant to decide but power says this person can actually change
133
00:07:05,840 --> 00:07:06,840
the outcome.
134
00:07:06,840 --> 00:07:10,560
Sometimes those two forces live in the same person and when they do the organization feels
135
00:07:10,560 --> 00:07:14,480
clean because responsibility, access and information are all aligned.
136
00:07:14,480 --> 00:07:18,200
The person who is accountable can also see, understand and move the levers that matter
137
00:07:18,200 --> 00:07:19,200
most.
138
00:07:19,200 --> 00:07:22,480
But in most modern workplaces those elements start to drift apart.
139
00:07:22,480 --> 00:07:26,320
The director might own the final outcome but the project lead holds the current context
140
00:07:26,320 --> 00:07:30,920
while the platform admin controls the access and the sharepoint owner manages the documents.
141
00:07:30,920 --> 00:07:34,720
Meanwhile, the person sitting in the active team's thread is the only one who knows what
142
00:07:34,720 --> 00:07:38,840
the staff is actually worried about yet the executive sponsor shows up at the very end
143
00:07:38,840 --> 00:07:42,240
expecting a lightning fast answer.
144
00:07:42,240 --> 00:07:45,480
From the outside this looks like a slow bureaucratic organization.
145
00:07:45,480 --> 00:07:47,560
From the inside it's a fragmented power model.
146
00:07:47,560 --> 00:07:51,960
This is exactly why org charts can be factually true and completely useless at the same time.
147
00:07:51,960 --> 00:07:56,080
As they only show vertical accountability, they fail to show who can unblock a critical
148
00:07:56,080 --> 00:08:01,000
workflow, who can grant or remove visibility or who the team actually trusts for the real
149
00:08:01,000 --> 00:08:02,560
version of events.
150
00:08:02,560 --> 00:08:03,760
That is where the power lives.
151
00:08:03,760 --> 00:08:07,160
Once you separate power from authority, a lot of confusing behavior starts to make sense
152
00:08:07,160 --> 00:08:12,800
like why an individual contributor has outsized influence because they control a key dependency.
153
00:08:12,800 --> 00:08:16,760
You start to see why a mid-level manager feels weaker than their role suggests, often because
154
00:08:16,760 --> 00:08:20,240
they've been made responsible for results without being structurally equipped to deliver
155
00:08:20,240 --> 00:08:21,240
them.
156
00:08:21,240 --> 00:08:25,000
This also explains why the real decisions happen inside conversations before the formal
157
00:08:25,000 --> 00:08:26,320
meeting ever starts.
158
00:08:26,320 --> 00:08:30,000
The true decision point is where the context converges, not necessarily where the calendar
159
00:08:30,000 --> 00:08:31,960
invites says the meeting should be.
160
00:08:31,960 --> 00:08:36,160
This realization changes how we read leadership friction because what looks like in decision
161
00:08:36,160 --> 00:08:40,160
is often just a hidden dependency, what looks like office politics is usually just an
162
00:08:40,160 --> 00:08:44,560
access imbalance and what looks like weak execution is almost always a mismatch between formal
163
00:08:44,560 --> 00:08:46,880
authority and operational power.
164
00:08:46,880 --> 00:08:50,760
If we ignore this distinction, we will always misdiagnose the organization.
165
00:08:50,760 --> 00:08:54,800
We'll keep redesigning reporting lines and moving boxes on a chart while the real
166
00:08:54,800 --> 00:08:59,520
leverage remains buried in permissions, information flows and hidden dependencies.
167
00:08:59,520 --> 00:09:00,880
Which brings me to the next point.
168
00:09:00,880 --> 00:09:05,080
Once we separate authority from power, the org chart stops looking like the organization
169
00:09:05,080 --> 00:09:09,000
itself and starts looking like just one thin layer of a much deeper system.
170
00:09:09,000 --> 00:09:11,840
Why organizations drift away from their org chart?
171
00:09:11,840 --> 00:09:16,040
If the org chart is only one layer of the reality, we have to ask the obvious question,
172
00:09:16,040 --> 00:09:20,400
why do organizations drift so far away from their original design in the first place?
173
00:09:20,400 --> 00:09:23,120
It's rarely because of one catastrophic mistake.
174
00:09:23,120 --> 00:09:24,320
Drift is cumulative.
175
00:09:24,320 --> 00:09:28,400
It happens the same way most operational risks develop quietly and incrementally under
176
00:09:28,400 --> 00:09:30,640
the pressure of reasonable daily demands.
177
00:09:30,640 --> 00:09:34,400
A company grows or adds a new business unit, then a merger brings in another tenant and
178
00:09:34,400 --> 00:09:38,160
a different way of naming ownership and suddenly the original model is stretched.
179
00:09:38,160 --> 00:09:42,480
A few key people leave, a new transformation starts before the last one finished and an
180
00:09:42,480 --> 00:09:46,840
urgent deadline forces a shortcut that everyone promises is only temporary.
181
00:09:46,840 --> 00:09:49,240
Individually none of those moments feel like a crisis.
182
00:09:49,240 --> 00:09:53,400
But structurally every single one of those changes shifts the relationship between authority
183
00:09:53,400 --> 00:09:55,400
access and the ability to execute.
184
00:09:55,400 --> 00:10:00,080
This is where a tool like Microsoft 365 becomes a very honest mirror for the business.
185
00:10:00,080 --> 00:10:04,120
Every time the organization adapts faster than its governance model can keep up, the digital
186
00:10:04,120 --> 00:10:07,000
estate records that adaptation in real time.
187
00:10:07,000 --> 00:10:10,720
Permissions get added much faster than they ever get reviewed and teams are created for
188
00:10:10,720 --> 00:10:15,400
a quick project only to become permanent operating spaces that nobody manages.
189
00:10:15,400 --> 00:10:19,200
SharePoint sites often inherit ownership assumptions from years ago, even though the underlying
190
00:10:19,200 --> 00:10:23,080
responsibility for that data has shifted three times since then.
191
00:10:23,080 --> 00:10:27,280
Several automated flows are built to solve a local headache and they keep running long after
192
00:10:27,280 --> 00:10:30,320
the original logic or the person who built them has moved on.
193
00:10:30,320 --> 00:10:33,600
The system starts carrying history instead of business reality.
194
00:10:33,600 --> 00:10:35,240
That distinction is vital.
195
00:10:35,240 --> 00:10:38,400
When you open a policy document everything might still look perfectly clean because the
196
00:10:38,400 --> 00:10:42,480
roles are defined and the security principles are documented on paper.
197
00:10:42,480 --> 00:10:46,480
But when you actually inspect the effective environment, you find a completely different
198
00:10:46,480 --> 00:10:48,880
organization layered underneath the official one.
199
00:10:48,880 --> 00:10:53,760
This shadow organization formed through exceptions, handovers and urgent workarounds.
200
00:10:53,760 --> 00:10:54,760
And why is that?
201
00:10:54,760 --> 00:10:58,680
The reason is that governance usually moves in slow-review cycles while business pressure
202
00:10:58,680 --> 00:10:59,920
moves in real time.
203
00:10:59,920 --> 00:11:04,040
A business cannot wait three months for a governance committee to meet when a client
204
00:11:04,040 --> 00:11:06,600
issue or a compliance deadline is landing this Friday.
205
00:11:06,600 --> 00:11:09,640
So the people inside the system do what they have to do to survive.
206
00:11:09,640 --> 00:11:10,640
They compensate.
207
00:11:10,640 --> 00:11:12,960
They grant access directly to get a job done.
208
00:11:12,960 --> 00:11:17,800
They add someone temporarily to a group and they keep a former owner on the list because
209
00:11:17,800 --> 00:11:21,000
removing them feels like a risk they don't have time to manage.
210
00:11:21,000 --> 00:11:24,400
They root work through the person who actually knows the process instead of the person who
211
00:11:24,400 --> 00:11:26,240
is supposed to own it on paper.
212
00:11:26,240 --> 00:11:29,880
Once that workaround proves it can get the job done, it stops feeling temporary and starts
213
00:11:29,880 --> 00:11:31,680
becoming the actual operating model.
214
00:11:31,680 --> 00:11:33,360
That is how drift hardens into place.
215
00:11:33,360 --> 00:11:37,520
It doesn't happen through rebellion but through the simple repetition of what works.
216
00:11:37,520 --> 00:11:41,720
This is also why leaders are so frequently blindsided when they finally look under the hood.
217
00:11:41,720 --> 00:11:45,240
As they assume the organization they approved is the one that actually exists.
218
00:11:45,240 --> 00:11:50,040
What really exists is a negotiated structure that sits somewhere between the formal design
219
00:11:50,040 --> 00:11:52,200
and the daily operational necessity.
220
00:11:52,200 --> 00:11:56,760
The org chart describes the intent but the environment records the adaptation.
221
00:11:56,760 --> 00:12:00,280
Adaptation isn't always a bad thing and organizations actually need a certain amount
222
00:12:00,280 --> 00:12:02,760
of local flexibility and room for human judgment.
223
00:12:02,760 --> 00:12:06,880
The problem only starts when that adaptation accumulates for years without any kind of structural
224
00:12:06,880 --> 00:12:07,880
review.
225
00:12:07,880 --> 00:12:10,560
Eventually the organization begins to root around itself.
226
00:12:10,560 --> 00:12:14,120
Old access remains active while new dependencies emerge.
227
00:12:14,120 --> 00:12:18,120
And even when the person with the title changes, the real control point stays with whoever
228
00:12:18,120 --> 00:12:20,320
holds the context or the trust network.
229
00:12:20,320 --> 00:12:24,080
You end up with a business that looks centralized in a PowerPoint deck but behaves like a messy
230
00:12:24,080 --> 00:12:25,360
patchwork in practice.
231
00:12:25,360 --> 00:12:29,120
That patchwork creates three very predictable and very dangerous effects.
232
00:12:29,120 --> 00:12:33,640
First, the paths to making a decision become much longer than they appear on the surface.
233
00:12:33,640 --> 00:12:37,760
Second, accountability becomes almost impossible to enforce because the person held responsible
234
00:12:37,760 --> 00:12:39,640
isn't structurally equipped to lead.
235
00:12:39,640 --> 00:12:43,760
Third, hidden operators gain far more influence over the speed of the business than the formal
236
00:12:43,760 --> 00:12:45,160
leaders ever expected.
237
00:12:45,160 --> 00:12:48,080
This is why drift is the silent killer of transformation.
238
00:12:48,080 --> 00:12:52,120
During steady state operations people can survive a surprising amount of structural misalignment
239
00:12:52,120 --> 00:12:55,160
because they've learned who to call and where the files really live.
240
00:12:55,160 --> 00:13:00,320
But when you try to scale or integrate a new system or introduce AI, those informal human
241
00:13:00,320 --> 00:13:03,200
corrections are no longer enough to bridge the gap.
242
00:13:03,200 --> 00:13:07,760
The distance between the official structure and the real one becomes incredibly expensive.
243
00:13:07,760 --> 00:13:12,680
You start seeing duplicated work, conflicting answers and approval loops that serve no purpose,
244
00:13:12,680 --> 00:13:16,000
all while the same few names sit in the middle of every bottleneck.
245
00:13:16,000 --> 00:13:19,920
This drift is easiest to see in an organization that believes it is well governed and ready
246
00:13:19,920 --> 00:13:26,000
for the future, when in reality it is held together by a system it no longer fully understands.
247
00:13:26,000 --> 00:13:28,520
The invisible gatekeeper organization set up.
248
00:13:28,520 --> 00:13:29,520
Let's make this concrete.
249
00:13:29,520 --> 00:13:33,920
I want to use a composite organization here, not because one specific company is uniquely
250
00:13:33,920 --> 00:13:38,320
broken but because this pattern is so common that once you see it, you start recognizing
251
00:13:38,320 --> 00:13:39,320
it everywhere.
252
00:13:39,320 --> 00:13:42,480
Picture a mid-sized enterprise in the middle of a growth spurt.
253
00:13:42,480 --> 00:13:46,000
They have expanded through a mix of internal scaling and a few acquisitions which has led
254
00:13:46,000 --> 00:13:48,200
to a steady increase in cross-functional work.
255
00:13:48,200 --> 00:13:51,680
From the outside, the whole thing looks disciplined and the executive team truly believes
256
00:13:51,680 --> 00:13:53,640
the organization is governed well.
257
00:13:53,640 --> 00:13:57,560
They have clear leadership layers, steering groups and architecture reviews and the language
258
00:13:57,560 --> 00:14:01,600
of control is baked into every approval board for risk or investment.
259
00:14:01,600 --> 00:14:03,400
On paper, the structure makes perfect sense.
260
00:14:03,400 --> 00:14:07,960
Sales owns the customer decisions while operations handles delivery and IT manages the
261
00:14:07,960 --> 00:14:10,400
platforms while security dictates policy.
262
00:14:10,400 --> 00:14:15,040
HR owns the people processes and finance maintains the investment controls, meaning every
263
00:14:15,040 --> 00:14:17,480
box has a leader with a specific mandate.
264
00:14:17,480 --> 00:14:20,960
Each of those mandates connects to a reporting structure that feels mature enough to support
265
00:14:20,960 --> 00:14:21,960
real scale.
266
00:14:21,960 --> 00:14:23,560
Now look at the technology estate.
267
00:14:23,560 --> 00:14:28,400
Microsoft 365 has been the foundation for years, enter ID structured and teams serves
268
00:14:28,400 --> 00:14:30,880
as the default communication layer for everyone.
269
00:14:30,880 --> 00:14:34,520
SharePoint holds the bulk of their operational content and the power platform has grown in
270
00:14:34,520 --> 00:14:37,880
the usual way, partly governed, partly local and partly invisible.
271
00:14:37,880 --> 00:14:42,280
There are naming conventions and site lifecycle rules in place and the documentation libraries
272
00:14:42,280 --> 00:14:45,520
are full of architecture principles and governance intent.
273
00:14:45,520 --> 00:14:49,520
If you asked leadership whether control exists, they would say yes without hesitation.
274
00:14:49,520 --> 00:14:53,640
If you asked whether decision rights are clearly defined, the answer would also be yes,
275
00:14:53,640 --> 00:14:55,920
and this is exactly where the case gets interesting.
276
00:14:55,920 --> 00:14:59,400
The organization isn't chaotic, it is governed just enough to feel safe.
277
00:14:59,400 --> 00:15:03,640
That matters because the most revealing permission problems don't show up in broken environments,
278
00:15:03,640 --> 00:15:07,800
but rather in places that look stable and mature enough to trust their own design.
279
00:15:07,800 --> 00:15:10,600
This organization had that exact confidence.
280
00:15:10,600 --> 00:15:15,160
Leadership believed authority was clear, platform teams thought access was under control and
281
00:15:15,160 --> 00:15:17,920
business functions believed they knew who owned what.
282
00:15:17,920 --> 00:15:21,920
The people inside the system had learned how to work around the rough edges so well that
283
00:15:21,920 --> 00:15:24,680
those gaps stopped looking like structural issues.
284
00:15:24,680 --> 00:15:28,640
When people compensate successfully, leaders often stop seeing the compensation entirely because
285
00:15:28,640 --> 00:15:30,600
they only see the work getting done.
286
00:15:30,600 --> 00:15:33,960
Underneath that smooth surface, a different pattern had already formed.
287
00:15:33,960 --> 00:15:37,960
Some decisions moved quickly and others did not for reasons that were hard to explain, and
288
00:15:37,960 --> 00:15:42,720
while a formal approver might sign off, the real movement usually happened earlier in a private
289
00:15:42,720 --> 00:15:43,720
team's thread.
290
00:15:43,720 --> 00:15:47,720
A department head would technically own an outcome, but a long tenured coordinator would
291
00:15:47,720 --> 00:15:51,160
quietly determine if the information was complete enough to act on.
292
00:15:51,160 --> 00:15:54,800
The platform team would claim a process was standardized, yet everyone involved knew
293
00:15:54,800 --> 00:16:00,200
that if one specific person was unavailable, the entire workflow slowed down immediately.
294
00:16:00,200 --> 00:16:01,960
Nothing here looked dramatic in isolation.
295
00:16:01,960 --> 00:16:06,400
It looked like normal organizational life with a bit of friction, a few known dependencies,
296
00:16:06,400 --> 00:16:09,440
and some useful people who knew how things really worked.
297
00:16:09,440 --> 00:16:13,880
But when an organization starts depending on useful people in the same spots over and over,
298
00:16:13,880 --> 00:16:15,760
those people are no longer just helpful.
299
00:16:15,760 --> 00:16:17,240
They are infrastructure.
300
00:16:17,240 --> 00:16:20,920
In this case, that infrastructure was mostly invisible to formal leadership because the
301
00:16:20,920 --> 00:16:25,160
official model still looked credible enough that no one felt the urgency to test the reality
302
00:16:25,160 --> 00:16:26,160
beneath it.
303
00:16:26,160 --> 00:16:28,480
There were early signals if you knew where to look.
304
00:16:28,480 --> 00:16:32,640
Scientists needed too many follow-ups before decisions finally landed and teams often did duplicate
305
00:16:32,640 --> 00:16:36,680
work because they were acting on different versions of the same information.
306
00:16:36,680 --> 00:16:39,840
Informal escalations happened long before they ever appeared in the official governance
307
00:16:39,840 --> 00:16:43,920
path and you'd constantly hear people say things like "Just ask her, she'll know" or
308
00:16:43,920 --> 00:16:46,080
"We'll wait until she's back before we move."
309
00:16:46,080 --> 00:16:48,960
Those phrases sound harmless, but let me be more precise.
310
00:16:48,960 --> 00:16:51,680
They sound efficient, that is exactly why they are dangerous.
311
00:16:51,680 --> 00:16:55,720
A dependency only feels like a risk once the person is overloaded or unavailable, but
312
00:16:55,720 --> 00:16:58,000
until then it just feels like competence.
313
00:16:58,000 --> 00:17:02,200
This organization had built a lot of hidden confidence around competence, concentrated in a few
314
00:17:02,200 --> 00:17:03,320
specific places.
315
00:17:03,320 --> 00:17:06,760
From the top, the business looked structured and from the middle it looked manageable, but
316
00:17:06,760 --> 00:17:12,440
from inside the daily flow, work was already rooting itself through invisible gatekeepers.
317
00:17:12,440 --> 00:17:15,320
Then the organization decided it was ready for the next stage.
318
00:17:15,320 --> 00:17:20,080
They wanted faster execution, stronger data use and a serious push into AI readiness,
319
00:17:20,080 --> 00:17:24,400
and that is when the visible organization and the real one finally started to separate.
320
00:17:24,400 --> 00:17:27,440
Trigger event, transformation exposes the real power map.
321
00:17:27,440 --> 00:17:29,800
The trigger for this shift was not a crisis.
322
00:17:29,800 --> 00:17:34,320
There was no data breach, no public failure, and no dramatic collapse of the business.
323
00:17:34,320 --> 00:17:38,880
Instead the organization simply chose to move by launching an AI readiness and co-pilot
324
00:17:38,880 --> 00:17:43,680
initiative because leadership wanted faster decisions and less friction across functions.
325
00:17:43,680 --> 00:17:47,840
On the surface, this is a reasonable goal and if your Microsoft 365 Estate already looks
326
00:17:47,840 --> 00:17:51,120
mature, AI feels like the next logical layer to add.
327
00:17:51,120 --> 00:17:55,000
The executive expectation was simple, we have the data, we have the tools and we have
328
00:17:55,000 --> 00:17:57,800
the governance, so AI should help us move faster.
329
00:17:57,800 --> 00:18:01,600
But the moment the organization started asking practical questions about co-pilot readiness,
330
00:18:01,600 --> 00:18:03,760
the answers became strangely inconsistent.
331
00:18:03,760 --> 00:18:07,600
When asked who owned a specific content set, there was silence and when asked who should
332
00:18:07,600 --> 00:18:11,360
have access to a certain area, the answer depended entirely on who you asked.
333
00:18:11,360 --> 00:18:15,320
Nobody knew why one group could see material while the accountable team could not, or why
334
00:18:15,320 --> 00:18:19,440
a sharepoint space was still owned by someone who changed roles two years ago.
335
00:18:19,440 --> 00:18:23,480
They couldn't explain why a workflow relied on one person to validate what the system
336
00:18:23,480 --> 00:18:27,680
was supposed to know already, other than saying that's just how it had always worked.
337
00:18:27,680 --> 00:18:31,640
Just like that, the AI initiative stopped being a productivity conversation and became
338
00:18:31,640 --> 00:18:33,080
an organizational x-ray.
339
00:18:33,080 --> 00:18:37,560
AI does not care about the story your governance model tells because it runs strictly on what
340
00:18:37,560 --> 00:18:39,480
the environment actually allows.
341
00:18:39,480 --> 00:18:43,040
It looks at permissions, access and signal quality, and that's it.
342
00:18:43,040 --> 00:18:46,880
When the organization tried to prepare for co-pilot, it was forced to inspect the underlying
343
00:18:46,880 --> 00:18:52,560
conditions more closely than it had in years, and that inspection exposed something uncomfortable.
344
00:18:52,560 --> 00:18:56,280
The business was not operating on the clean authority model leadership believed in, but
345
00:18:56,280 --> 00:18:59,920
on a patchwork of historical access and informal trust.
346
00:18:59,920 --> 00:19:01,320
Transformation didn't create that condition.
347
00:19:01,320 --> 00:19:02,560
It revealed it.
348
00:19:02,560 --> 00:19:06,440
This distinction matters because leaders often blame the new initiative when things start
349
00:19:06,440 --> 00:19:10,760
to wobble, claiming the AI rollout caused the confusion or the uncertainty.
350
00:19:10,760 --> 00:19:14,760
Usually that isn't the case, the initiative simply surfaced friction that was already there,
351
00:19:14,760 --> 00:19:17,640
which is one of the most useful things about transformation pressure.
352
00:19:17,640 --> 00:19:21,120
It removes the organization's ability to hide behind routine.
353
00:19:21,120 --> 00:19:26,120
Under normal conditions, people fill gaps manually and root around bottlenecks to patch weak
354
00:19:26,120 --> 00:19:27,600
ownership with human effort.
355
00:19:27,600 --> 00:19:32,120
When you ask the organization to scale that behavior or automate around it, the compensation
356
00:19:32,120 --> 00:19:35,760
becomes visible because the question is no longer whether a good person can keep things
357
00:19:35,760 --> 00:19:36,760
moving.
358
00:19:36,760 --> 00:19:39,760
The question becomes whether the system is structurally reliable, and in this case the answer
359
00:19:39,760 --> 00:19:41,000
was often no.
360
00:19:41,000 --> 00:19:45,360
The AI readiness work kept uncovering contradictions, like content that was technically available
361
00:19:45,360 --> 00:19:49,640
but not trusted or information that was trusted but not broadly accessible.
362
00:19:49,640 --> 00:19:53,560
They found decision makers who were formally accountable but lacked the context to act,
363
00:19:53,560 --> 00:19:57,960
and people with modest roles who suddenly became critical because they sat at the intersection
364
00:19:57,960 --> 00:20:00,360
of access and historical knowledge.
365
00:20:00,360 --> 00:20:03,480
Leadership wanted acceleration, but what they discovered was decision drag.
366
00:20:03,480 --> 00:20:07,600
They wanted scalable knowledge, but what they found was concentrated interpretive power
367
00:20:07,600 --> 00:20:09,040
held by a few individuals.
368
00:20:09,040 --> 00:20:13,280
They wanted AI to reduce friction only to find that the friction had already been encoded
369
00:20:13,280 --> 00:20:15,080
into the environment itself.
370
00:20:15,080 --> 00:20:18,600
This is where the permission problem becomes executive relevant very fast.
371
00:20:18,600 --> 00:20:24,880
Once AI enters the picture, misalignment stops being a local annoyance and becomes an amplifier.
372
00:20:24,880 --> 00:20:30,320
If the wrong people have too much access, AI makes that data easier to find and use, and
373
00:20:30,320 --> 00:20:34,320
if the right people are missing context, AI makes that absence more expensive.
374
00:20:34,320 --> 00:20:38,800
If ownership is stale and real decisions depend on hidden gatekeepers, AI does not fix
375
00:20:38,800 --> 00:20:40,040
the organization.
376
00:20:40,040 --> 00:20:43,080
It just speeds up the consequences of the existing design.
377
00:20:43,080 --> 00:20:47,040
The organization eventually did something smart by moving past the technology project and
378
00:20:47,040 --> 00:20:49,200
asking where work actually moves today.
379
00:20:49,200 --> 00:20:52,440
They stopped looking at where the process said it should move and started looking for the
380
00:20:52,440 --> 00:20:56,040
people who get pulled in every time something important needs to happen.
381
00:20:56,040 --> 00:20:59,560
They looked for who could see enough to unblock the next step and who controlled the spaces
382
00:20:59,560 --> 00:21:01,320
that shaped what others could know.
383
00:21:01,320 --> 00:21:04,760
That shift changed everything because once they started treating this as a power mapping
384
00:21:04,760 --> 00:21:09,440
exercise, the hidden structure finally came into view, and the first signal they found
385
00:21:09,440 --> 00:21:10,760
wasn't culture language.
386
00:21:10,760 --> 00:21:13,280
It was decision latency.
387
00:21:13,280 --> 00:21:14,280
Signal one.
388
00:21:14,280 --> 00:21:16,440
Decision latency starts telling the truth.
389
00:21:16,440 --> 00:21:20,480
Once the organization began tracing how work actually moved through the system, the clearest
390
00:21:20,480 --> 00:21:23,640
signal didn't come from permissions or communication patterns.
391
00:21:23,640 --> 00:21:24,640
It was time.
392
00:21:24,640 --> 00:21:26,800
Specifically I'm talking about decision latency.
393
00:21:26,800 --> 00:21:29,920
The gap between a request entering the system and a decision becoming real.
394
00:21:29,920 --> 00:21:34,120
I don't mean approved in theory or discussed in a meeting but actually moved into production.
395
00:21:34,120 --> 00:21:38,520
This is where many leaders get uncomfortable because latency sounds like a dry process metric,
396
00:21:38,520 --> 00:21:43,320
but if you look closely it is a clear indicator of where power really sits because in any system
397
00:21:43,320 --> 00:21:45,640
time accumulates where dependency lives.
398
00:21:45,640 --> 00:21:49,520
To test this, the organization picked a few cross-functional decision paths that touched
399
00:21:49,520 --> 00:21:51,120
multiple teams and tools.
400
00:21:51,120 --> 00:21:55,280
They looked at access requests for sensitive workspaces, changes to shared content and workflow
401
00:21:55,280 --> 00:21:57,800
adjustments that affected several business units.
402
00:21:57,800 --> 00:21:59,480
These weren't exotic edge cases.
403
00:21:59,480 --> 00:22:02,960
They were the kind of everyday operational decisions that show you how a business actually
404
00:22:02,960 --> 00:22:03,960
functions.
405
00:22:03,960 --> 00:22:05,640
The pattern showed up almost immediately.
406
00:22:05,640 --> 00:22:09,720
The formal decision maker was rarely the slowest part of the chain, which surprised leadership
407
00:22:09,720 --> 00:22:13,320
because they assumed delays happened because senior people were too busy.
408
00:22:13,320 --> 00:22:17,720
They thought approval forums met too infrequently or that too many signatures were required,
409
00:22:17,720 --> 00:22:20,280
and while that was true in some spots it wasn't the main story.
410
00:22:20,280 --> 00:22:21,680
The real story was waiting.
411
00:22:21,680 --> 00:22:25,280
People were waiting for someone to confirm a document version, waiting for someone to explain
412
00:22:25,280 --> 00:22:30,040
if a sharepoint site was still active or waiting for a specific person to clarify who controlled
413
00:22:30,040 --> 00:22:31,440
access.
414
00:22:31,440 --> 00:22:35,760
They were stuck waiting for the one person who really knows how this works, to come back
415
00:22:35,760 --> 00:22:39,760
from holiday or answer a message buried in a thread that isn't slow leadership.
416
00:22:39,760 --> 00:22:41,640
It's concentrated operational power.
417
00:22:41,640 --> 00:22:42,640
And why is that?
418
00:22:42,640 --> 00:22:47,760
It's because an accountable person cannot decide cleanly if the surrounding context is fragmented,
419
00:22:47,760 --> 00:22:52,360
meaning the system has made that decision dependent on hidden verification steps.
420
00:22:52,360 --> 00:22:56,440
What looks like a delayed approval is actually a delayed reconstruction of reality, and that
421
00:22:56,440 --> 00:22:59,120
changes how we have to read organizational speed.
422
00:22:59,120 --> 00:23:01,560
A fast organization isn't one with fewer meetings.
423
00:23:01,560 --> 00:23:05,280
It's one where the person expected to decide can access trusted contexts without rooting
424
00:23:05,280 --> 00:23:06,800
through informal infrastructure.
425
00:23:06,800 --> 00:23:11,080
In this organization, decision parts kept bending around the same few people, and they weren't
426
00:23:11,080 --> 00:23:12,840
always senior leaders.
427
00:23:12,840 --> 00:23:16,720
Often it was a site owner, an operations coordinator, or a platform specialist with years
428
00:23:16,720 --> 00:23:18,200
of historical knowledge.
429
00:23:18,200 --> 00:23:22,000
These individuals had just enough access and pattern memory to make the next step possible,
430
00:23:22,000 --> 00:23:26,160
and once that became visible, the business implication was impossible to ignore.
431
00:23:26,160 --> 00:23:28,520
Decision latency wasn't just random variation.
432
00:23:28,520 --> 00:23:32,840
It was evidence that formal authority and actual movement had separated.
433
00:23:32,840 --> 00:23:36,480
Leaders often need a reframing here because they hear the word bottleneck and immediately
434
00:23:36,480 --> 00:23:38,120
think about a performance issue.
435
00:23:38,120 --> 00:23:41,240
But structurally, a bottleneck is usually not a weak person.
436
00:23:41,240 --> 00:23:43,680
It is a strong person placed in the wrong position.
437
00:23:43,680 --> 00:23:47,340
The system has made them too important by turning them into a translation layer between
438
00:23:47,340 --> 00:23:49,800
formal process and operational reality.
439
00:23:49,800 --> 00:23:53,560
That person might be competent and admired, but from a system perspective, they are still
440
00:23:53,560 --> 00:23:55,440
a single point of failure.
441
00:23:55,440 --> 00:23:59,040
Once the organization measured these parts and to end, they saw the same shape repeating
442
00:23:59,040 --> 00:24:02,600
where requests entered formally, but progress happened informally.
443
00:24:02,600 --> 00:24:06,440
Official approval usually landed long after the real decision had been negotiated in private
444
00:24:06,440 --> 00:24:07,920
chats and side calls.
445
00:24:07,920 --> 00:24:11,080
Meaning the official timeline only told a fraction of the story.
446
00:24:11,080 --> 00:24:14,880
The real time cost was hidden in the work required to reconstruct context.
447
00:24:14,880 --> 00:24:19,640
That's why decision latency tells the truth before anything else because time exposes
448
00:24:19,640 --> 00:24:23,400
dependency in a way that policy documents simply cannot hide.
449
00:24:23,400 --> 00:24:27,720
If work repeatedly slows down around a few specific individuals, you aren't looking at
450
00:24:27,720 --> 00:24:29,160
isolated friction.
451
00:24:29,160 --> 00:24:31,200
You are looking at power concentration.
452
00:24:31,200 --> 00:24:35,760
Now map that to identity and access, and the picture becomes even clearer.
453
00:24:35,760 --> 00:24:38,040
Article 2, "entra-effective permissions."
454
00:24:38,040 --> 00:24:39,400
Tell a different story.
455
00:24:39,400 --> 00:24:43,880
When you map those time patterns to identity and access, the next layer of the system becomes
456
00:24:43,880 --> 00:24:45,600
visible very quickly.
457
00:24:45,600 --> 00:24:49,720
Once the organization stopped asking who should have control and started looking at who
458
00:24:49,720 --> 00:24:52,800
actually had it, entra told a very different story.
459
00:24:52,800 --> 00:24:56,720
This is the point where the org chart and the permission model separate in a way that
460
00:24:56,720 --> 00:24:58,400
leaders can no longer ignore.
461
00:24:58,400 --> 00:25:00,720
On paper, responsibility looked clear enough.
462
00:25:00,720 --> 00:25:01,720
Business owners were named.
463
00:25:01,720 --> 00:25:03,320
Platform roles were assigned.
464
00:25:03,320 --> 00:25:06,440
They assumed that access broadly reflected those structures.
465
00:25:06,440 --> 00:25:10,280
But when the team looked at effective permissions for critical areas, they didn't find a clean
466
00:25:10,280 --> 00:25:11,680
chain of responsibility.
467
00:25:11,680 --> 00:25:12,680
They found history.
468
00:25:12,680 --> 00:25:16,600
They found old group memberships, direct grants that were never removed, and inherited
469
00:25:16,600 --> 00:25:19,440
access through structures that hadn't been reviewed in years.
470
00:25:19,440 --> 00:25:22,920
There were admin rights held by people whose roles had changed long ago.
471
00:25:22,920 --> 00:25:25,600
And temporary exceptions that had quietly become permanent.
472
00:25:25,600 --> 00:25:28,400
None of this looks dangerous when you inspect one item at a time.
473
00:25:28,400 --> 00:25:32,120
Each piece has a logical story like someone needing access during a migration or covering
474
00:25:32,120 --> 00:25:33,640
for a teammate on leave.
475
00:25:33,640 --> 00:25:36,200
So it feels reasonable in isolation.
476
00:25:36,200 --> 00:25:40,160
Collectively, however, these exceptions create a second organization living inside the tenant
477
00:25:40,160 --> 00:25:42,240
that leaders rarely see.
478
00:25:42,240 --> 00:25:46,520
While the formal hierarchy tells you who is accountable for a function, effective permissions
479
00:25:46,520 --> 00:25:50,120
tell you who can actually see, change, or influence what happens.
480
00:25:50,120 --> 00:25:51,400
Those are not the same thing.
481
00:25:51,400 --> 00:25:55,320
The moment you inspect that gap, operational power becomes much easier to read.
482
00:25:55,320 --> 00:25:59,680
In this case, some formally accountable leaders had less practical control than they expected.
483
00:25:59,680 --> 00:26:03,680
They owned the outcomes, but they were structurally dependent on others to surface information
484
00:26:03,680 --> 00:26:06,800
or make changes in the spaces where the work actually lived.
485
00:26:06,800 --> 00:26:10,600
At the same time, people with modest titles held far more influence than anyone had named
486
00:26:10,600 --> 00:26:11,600
explicitly.
487
00:26:11,600 --> 00:26:15,080
They weren't senior, but they were structurally close to the control points.
488
00:26:15,080 --> 00:26:19,080
They could access the right content, add people to the right groups, and validate what was
489
00:26:19,080 --> 00:26:23,000
real, which allowed them to unblock work simply by seeing more than others could.
490
00:26:23,000 --> 00:26:26,680
That is operational power, and it's why Entra is more than just a security layer.
491
00:26:26,680 --> 00:26:27,680
It's a map of influence.
492
00:26:27,680 --> 00:26:32,560
If your environment says one person is responsible, but three other people hold the access needed
493
00:26:32,560 --> 00:26:36,480
to make that responsibility actionable the system has already redistributed power.
494
00:26:36,480 --> 00:26:38,240
That has three major consequences.
495
00:26:38,240 --> 00:26:41,920
First, it weakens accountability because you can't hold someone responsible for an outcome
496
00:26:41,920 --> 00:26:44,880
if they are structurally dependent on people outside their control.
497
00:26:44,880 --> 00:26:49,080
Second, it creates hidden gatekeeping where a few people begin to shape the pace of decisions
498
00:26:49,080 --> 00:26:52,080
by interpreting or unlocking visibility for others.
499
00:26:52,080 --> 00:26:56,120
Third, it creates false confidence where leadership believes control exists simply because
500
00:26:56,120 --> 00:26:57,600
a role exists on a chart.
501
00:26:57,600 --> 00:27:01,480
This is exactly why AI creates so much pressure in the modern workplace.
502
00:27:01,480 --> 00:27:04,040
AI doesn't care about your intended governance model.
503
00:27:04,040 --> 00:27:05,720
It only works on effective access.
504
00:27:05,720 --> 00:27:09,640
If your permissions are broad, AI makes that broadness usable through natural language,
505
00:27:09,640 --> 00:27:13,160
and if key people lack context, AI cannot compensate for that absence.
506
00:27:13,160 --> 00:27:16,600
It will simply reflect your existing fragmentation at a much higher speed.
507
00:27:16,600 --> 00:27:21,040
When organizations say they are preparing for co-pilot, they are often actually discovering
508
00:27:21,040 --> 00:27:24,000
whether their permission architecture reflects business reality.
509
00:27:24,000 --> 00:27:25,280
In this case, it didn't.
510
00:27:25,280 --> 00:27:29,360
The review revealed that access had accumulated around urgency and history,
511
00:27:29,360 --> 00:27:33,280
while responsibility had evolved through reorganizations and new mandates.
512
00:27:33,280 --> 00:27:36,520
Those two layers were no longer aligned, so the org chart said one thing while the
513
00:27:36,520 --> 00:27:37,800
permission said another.
514
00:27:37,800 --> 00:27:41,680
Once you see that structural disconnect, the communication patterns in your business
515
00:27:41,680 --> 00:27:43,880
start making a lot more sense.
516
00:27:43,880 --> 00:27:47,560
Signal 3, Team Centrality Reveals Informal Gatekeepers.
517
00:27:47,560 --> 00:27:51,080
Once the permission layer comes into view, the communication layer starts explaining
518
00:27:51,080 --> 00:27:52,680
the human side of the equation.
519
00:27:52,680 --> 00:27:56,720
Power does not only sit with the people who can access information, because it also sits
520
00:27:56,720 --> 00:27:59,800
with the people who stay in the middle of every conversation.
521
00:27:59,800 --> 00:28:03,240
This is where Microsoft Teams becomes surprisingly revealing for a business.
522
00:28:03,240 --> 00:28:07,240
It is not because chat volume equals authority, and it is not because the loudest person in
523
00:28:07,240 --> 00:28:08,800
the channel has the most influence.
524
00:28:08,800 --> 00:28:09,920
Usually they do not.
525
00:28:09,920 --> 00:28:12,000
The more useful signal to look for is centrality.
526
00:28:12,000 --> 00:28:15,000
You want to see who keeps showing up between different teams and who gets looped in the
527
00:28:15,000 --> 00:28:16,480
moment things become unclear.
528
00:28:16,480 --> 00:28:20,720
Think about who translates one function to another, or who turns scattered context into
529
00:28:20,720 --> 00:28:22,960
a decision someone else can finally act on.
530
00:28:22,960 --> 00:28:26,040
That is where informal gatekeepers start to appear in the data.
531
00:28:26,040 --> 00:28:29,880
In the case of this organization, once people began tracing how decisions actually moved,
532
00:28:29,880 --> 00:28:33,160
they kept finding the same communication pattern over and over again.
533
00:28:33,160 --> 00:28:36,160
The formal process would say one thing about how work should flow.
534
00:28:36,160 --> 00:28:40,600
A request goes here, a decision goes there, approval comes from a specific role, an
535
00:28:40,600 --> 00:28:42,400
escalation follows a set path.
536
00:28:42,400 --> 00:28:46,520
But the real movement kept converging in a handful of Teams conversations and around
537
00:28:46,520 --> 00:28:48,040
a handful of specific people.
538
00:28:48,040 --> 00:28:51,560
These were the individuals copied into everything important, though not always at the beginning
539
00:28:51,560 --> 00:28:52,560
of a project.
540
00:28:52,560 --> 00:28:55,720
Usually they appear at the exact moment friction surfaced.
541
00:28:55,720 --> 00:28:59,800
Someone could not find the latest document, or someone needed to know if a team had already
542
00:28:59,800 --> 00:29:01,080
agreed to a change.
543
00:29:01,080 --> 00:29:05,480
Perhaps someone wanted to confirm if a permission change would create a risk somewhere else,
544
00:29:05,480 --> 00:29:09,400
or they needed to understand the history behind a confusing ownership issue.
545
00:29:09,400 --> 00:29:13,000
Whatever the reason, the same names kept appearing in the threads, that pattern matters
546
00:29:13,000 --> 00:29:17,520
because when conversations repeatedly converge around a few individuals, the organization
547
00:29:17,520 --> 00:29:19,360
is telling you something very specific.
548
00:29:19,360 --> 00:29:22,880
Those people are not just participating in the work, they are holding the threads together.
549
00:29:22,880 --> 00:29:26,000
They act as bridges between groups that do not share enough direct context to move
550
00:29:26,000 --> 00:29:27,200
cleanly without them.
551
00:29:27,200 --> 00:29:31,600
From a system perspective, that kind of centrality creates influence even when formal
552
00:29:31,600 --> 00:29:33,080
authority stays low.
553
00:29:33,080 --> 00:29:35,760
The person in the middle shapes the timing of the entire operation.
554
00:29:35,760 --> 00:29:39,720
They decide what gets clarified first, they know which tension matters, and they often frame
555
00:29:39,720 --> 00:29:42,440
the issue before it ever reaches a senior decision maker.
556
00:29:42,440 --> 00:29:46,840
In many cases, they are the only people who understand enough of the full chain to prevent
557
00:29:46,840 --> 00:29:48,000
massive rework.
558
00:29:48,000 --> 00:29:51,920
Even if they never make the formal call, they shape the conditions under which that call
559
00:29:51,920 --> 00:29:52,920
gets made.
560
00:29:52,920 --> 00:29:53,920
That is power.
561
00:29:53,920 --> 00:29:57,960
This is where organizations often misread what they are seeing by saying a person is just
562
00:29:57,960 --> 00:30:00,560
really helpful or calling them a great connector.
563
00:30:00,560 --> 00:30:04,180
While that may be true, if the organization repeatedly depends on one connector to move
564
00:30:04,180 --> 00:30:08,120
work across boundaries, that connector has become operational infrastructure.
565
00:30:08,120 --> 00:30:12,480
The business now carries a communication dependency in the same way it carried an access dependency.
566
00:30:12,480 --> 00:30:16,160
In this case, several of the people who appeared in delayed decisions also appeared at the
567
00:30:16,160 --> 00:30:18,160
center of the communication flow.
568
00:30:18,160 --> 00:30:21,960
That overlap was important because it showed that power was not sitting in one place and
569
00:30:21,960 --> 00:30:26,040
it was accumulating at the intersection of information access, trust from multiple teams
570
00:30:26,040 --> 00:30:29,200
and a strategic position inside the conversation graph.
571
00:30:29,200 --> 00:30:33,360
That combination is hard to see on a standard org chart, but once you understand it, behavior
572
00:30:33,360 --> 00:30:36,120
that looked political starts looking structural.
573
00:30:36,120 --> 00:30:40,180
Side conversations keep deciding the outcome before the meeting because the real alignment
574
00:30:40,180 --> 00:30:42,000
happens where the central nodes are.
575
00:30:42,000 --> 00:30:46,040
A formal workshop feels like a confirmation instead of a decision because the context was already
576
00:30:46,040 --> 00:30:49,920
broken in smaller threads around the people everyone depends on.
577
00:30:49,920 --> 00:30:53,800
Some individuals become exhausted while others feel blocked because one part of the system
578
00:30:53,800 --> 00:30:57,400
is carrying the translation load while the rest of the team is just waiting on it.
579
00:30:57,400 --> 00:31:00,240
This is also where fragility becomes much easier to name.
580
00:31:00,240 --> 00:31:04,160
A person at the center of every meaningful communication path may look like a high performer
581
00:31:04,160 --> 00:31:07,800
and often they are, but structurally they are also a single point of failure.
582
00:31:07,800 --> 00:31:12,240
If they leave, go on holiday or simply become overloaded, the decision speed of the entire
583
00:31:12,240 --> 00:31:13,880
company drops immediately.
584
00:31:13,880 --> 00:31:17,440
This does not happen because the organization lacks leadership, but because the organization
585
00:31:17,440 --> 00:31:21,040
lacks redundancy, once that becomes visible the next question is obvious.
586
00:31:21,040 --> 00:31:23,280
Why do these people matter so much in the first place?
587
00:31:23,280 --> 00:31:27,040
Usually, it is because they are not only in the middle of the conversation, but they are
588
00:31:27,040 --> 00:31:30,280
also close to the content that everyone else depends on.
589
00:31:30,280 --> 00:31:33,240
Signal 4 SharePoint ownership defines information power.
590
00:31:33,240 --> 00:31:37,160
The content layer explains why those central people matter so much to the business.
591
00:31:37,160 --> 00:31:40,920
Once the organization looked beyond conversations and into where critical information actually
592
00:31:40,920 --> 00:31:42,720
lived, another pattern appeared.
593
00:31:42,720 --> 00:31:46,560
The people who controlled SharePoint ownership were often not the same people who carried
594
00:31:46,560 --> 00:31:51,240
formal accountability for the business decision, and that gap had real consequences.
595
00:31:51,240 --> 00:31:55,200
To be clear, this was not always about malicious control or people deliberately withholding
596
00:31:55,200 --> 00:31:56,200
facts.
597
00:31:56,200 --> 00:31:58,440
Most of the time it was much more ordinary than that.
598
00:31:58,440 --> 00:32:02,880
A site had been created for a project two years earlier, a team owner moved roles, or a
599
00:32:02,880 --> 00:32:06,720
library kept its original permission structure because changing it felt risky.
600
00:32:06,720 --> 00:32:11,240
A document set became business critical almost by accident, and over time the operational
601
00:32:11,240 --> 00:32:15,600
center of gravity shifted while the ownership layer underneath it stayed the same.
602
00:32:15,600 --> 00:32:19,000
The organization ended up with content that was technically available somewhere, but it
603
00:32:19,000 --> 00:32:22,320
was not practically available to the people who needed to act on it.
604
00:32:22,320 --> 00:32:26,080
That distinction matters because information power does not come from the abstract existence
605
00:32:26,080 --> 00:32:27,080
of data.
606
00:32:27,080 --> 00:32:31,000
It comes from whether the right people can reliably find it, trust it, and use it in time
607
00:32:31,000 --> 00:32:32,280
to make a decision.
608
00:32:32,280 --> 00:32:36,560
In this case, SharePoint was holding a lot of hidden influence over the daily workflow.
609
00:32:36,560 --> 00:32:40,640
Some of the most important documents set inside sites with stale ownership, while others
610
00:32:40,640 --> 00:32:44,280
were maintained by people who no longer carried any decision responsibility.
611
00:32:44,280 --> 00:32:48,540
Some were visible to broad groups, but not curated well enough to support trust, and others
612
00:32:48,540 --> 00:32:52,760
were tightly controlled by a handful of stewards who had become the real gatekeepers of the
613
00:32:52,760 --> 00:32:54,240
current version.
614
00:32:54,240 --> 00:32:57,800
When leaders asked why decisions slowed down, the answer was not just that people needed
615
00:32:57,800 --> 00:33:01,800
more meetings, they were operating against uneven information control where one group
616
00:33:01,800 --> 00:33:05,800
worked from one version of the truth while another group was stuck waiting for access.
617
00:33:05,800 --> 00:33:09,320
A third group might have had access, but did not trust the structure enough to know what
618
00:33:09,320 --> 00:33:10,320
was current.
619
00:33:10,320 --> 00:33:13,920
In the middle of all that, one or two individuals knew exactly where the right document lived
620
00:33:13,920 --> 00:33:15,360
and which version mattered.
621
00:33:15,360 --> 00:33:18,960
That is information power, not because they held a senior title, but because they controlled
622
00:33:18,960 --> 00:33:21,680
the path between confusion and clarity.
623
00:33:21,680 --> 00:33:23,960
SharePoint ownership is much more than an admin topic.
624
00:33:23,960 --> 00:33:26,000
It is a business reality topic.
625
00:33:26,000 --> 00:33:30,600
The person who can update the policy, restructure the library, or approve access to the site, is
626
00:33:30,600 --> 00:33:34,080
also shaping what the organization can know in practice.
627
00:33:34,080 --> 00:33:36,160
Control of information is control of decisions.
628
00:33:36,160 --> 00:33:39,880
If a procurement lead cannot see the latest commercial position without asking someone
629
00:33:39,880 --> 00:33:41,840
else their authority is weakened.
630
00:33:41,840 --> 00:33:45,520
If a delivery leader owns the outcome, but depends on a site steward to confirm the current
631
00:33:45,520 --> 00:33:48,000
client documentation, the power has already shifted.
632
00:33:48,000 --> 00:33:52,080
When an executive asks for a fast answer and the team spends half their time validating
633
00:33:52,080 --> 00:33:56,160
which content is real, the business is not just suffering from a knowledge gap.
634
00:33:56,160 --> 00:33:58,000
It is suffering from an ownership gap.
635
00:33:58,000 --> 00:34:01,480
In the anchor case, this became obvious during the AI readiness work.
636
00:34:01,480 --> 00:34:05,400
Copilot forced the organization to think harder about what content was discoverable,
637
00:34:05,400 --> 00:34:10,120
what was overshared and what was effectively trapped behind outdated ownership structures.
638
00:34:10,120 --> 00:34:13,440
That created a very uncomfortable realization for the leadership team.
639
00:34:13,440 --> 00:34:17,040
Some people could see too much, some could see too little, and the people who could correct
640
00:34:17,040 --> 00:34:19,640
that imbalance were not always the people in charge.
641
00:34:19,640 --> 00:34:22,920
That is the real issue because when formal content ownership and real content steward
642
00:34:22,920 --> 00:34:27,720
drift apart, decision quality starts depending on whoever still knows how the content layer
643
00:34:27,720 --> 00:34:28,920
actually works.
644
00:34:28,920 --> 00:34:32,800
Those people are not the problem, but the design of the system made them essential.
645
00:34:32,800 --> 00:34:34,880
From a system perspective that is fragile.
646
00:34:34,880 --> 00:34:39,600
The organization is now dependent on a few people for communication, access and truth management.
647
00:34:39,600 --> 00:34:42,880
Every important decision is now quietly asking the same question.
648
00:34:42,880 --> 00:34:45,320
Who controls the information we are about to trust?
649
00:34:45,320 --> 00:34:46,720
Workflow reality.
650
00:34:46,720 --> 00:34:49,240
Process diagrams versus actual execution.
651
00:34:49,240 --> 00:34:53,000
Once the content layer becomes visible, the next thing you need to inspect is the process.
652
00:34:53,000 --> 00:34:56,120
I'm not talking about the process as it's described in your governance decks or those
653
00:34:56,120 --> 00:34:59,160
need-visio diagrams everyone approved three years ago.
654
00:34:59,160 --> 00:35:02,720
I'm talking about the process as work actually happens on the ground.
655
00:35:02,720 --> 00:35:06,560
This is where many organizations discover that their workflows are not neutral because they
656
00:35:06,560 --> 00:35:10,040
carry embedded assumptions about who truly matters.
657
00:35:10,040 --> 00:35:14,320
These systems dictate who gets consulted, who is allowed to intervene, and who has enough
658
00:35:14,320 --> 00:35:18,280
permission to bend the path when reality doesn't fit the model.
659
00:35:18,280 --> 00:35:21,200
On paper, the workflow in this specific organization looked clean.
660
00:35:21,200 --> 00:35:24,800
A request was raised, a manager reviewed it, a business owner approved it, and then a platform
661
00:35:24,800 --> 00:35:28,560
team implemented it before a control step validated the result.
662
00:35:28,560 --> 00:35:32,160
That sequence gave leadership confidence because it created the appearance of orderly
663
00:35:32,160 --> 00:35:36,280
progression where one box led to the next and responsibility looked visible.
664
00:35:36,280 --> 00:35:37,600
But here's what actually happened.
665
00:35:37,600 --> 00:35:40,160
Work almost never moved in that clean line because it jumped.
666
00:35:40,160 --> 00:35:44,760
A request started in one place, then got clarified in teams, while a missing document triggered
667
00:35:44,760 --> 00:35:46,720
a side conversation that nobody tracked.
668
00:35:46,720 --> 00:35:50,120
Approval's paused because someone needed context from a private chat and even when a step
669
00:35:50,120 --> 00:35:54,400
technically completed, everyone knew the real confirmation only came after one specific
670
00:35:54,400 --> 00:35:56,600
person checked the outcome manually.
671
00:35:56,600 --> 00:36:00,480
The documented process described intent, but the actual execution described dependence
672
00:36:00,480 --> 00:36:01,920
that difference is critical.
673
00:36:01,920 --> 00:36:05,560
When leaders read a diagram, they think they are looking at the operating model, but often
674
00:36:05,560 --> 00:36:07,360
they are just looking at an aspiration.
675
00:36:07,360 --> 00:36:12,680
The real operating model lives in exceptions, bypasses, handoffs, and the hidden logic people
676
00:36:12,680 --> 00:36:15,000
build around a lack of trust in the formal path.
677
00:36:15,000 --> 00:36:16,480
And why does that happen?
678
00:36:16,480 --> 00:36:18,560
Processes do not fail only when they are missing.
679
00:36:18,560 --> 00:36:21,880
They also fail when they are too abstract for the messiness of real work.
680
00:36:21,880 --> 00:36:26,360
If the workflow assumes context is already shared when it isn't, people compensate.
681
00:36:26,360 --> 00:36:30,640
If the workflow assumes ownership is clear when it's actually stale, people compensate.
682
00:36:30,640 --> 00:36:34,320
The process keeps running, but underneath it, another system appears.
683
00:36:34,320 --> 00:36:38,640
This hidden layer is made of manual checks, side approvals, and just let me confirm this
684
00:36:38,640 --> 00:36:41,120
message is that determine the actual pace of the business.
685
00:36:41,120 --> 00:36:45,680
In the anchor case, once the organization traced these flows, they saw that the most important
686
00:36:45,680 --> 00:36:49,160
decisions were rarely shaped by the formal sequence alone.
687
00:36:49,160 --> 00:36:52,360
Instead, power was held by whoever controlled the exceptions.
688
00:36:52,360 --> 00:36:57,200
It sat with the people who knew when a documented step was safe to ignore, or who held the practical
689
00:36:57,200 --> 00:37:01,960
authority to say, "Don't wait for the system, do it this way, that is workflow power."
690
00:37:01,960 --> 00:37:05,600
And it often sits with people no one would identify in a strategy meeting.
691
00:37:05,600 --> 00:37:10,400
A flow owner in power automate or a coordinator with edit rights becomes the process itself,
692
00:37:10,400 --> 00:37:14,320
because the system is doing exactly what it was built to do, the humans around it do what
693
00:37:14,320 --> 00:37:15,760
they must to make it usable.
694
00:37:15,760 --> 00:37:20,280
This creates a dangerous illusion where the organization believes the process is standardized
695
00:37:20,280 --> 00:37:22,280
just because the diagram is.
696
00:37:22,280 --> 00:37:26,640
Execution remains person-dependent, which means your ability to scale is strictly limited.
697
00:37:26,640 --> 00:37:29,160
It also means AI will inherit the same distortion.
698
00:37:29,160 --> 00:37:34,080
If you layer co-pilot onto workflows that depend on hidden exceptions, the AI won't remove
699
00:37:34,080 --> 00:37:35,080
that dependency.
700
00:37:35,080 --> 00:37:37,920
It will just accelerate a model that no one fully understands.
701
00:37:37,920 --> 00:37:40,880
The real question is not whether you have a documented workflow.
702
00:37:40,880 --> 00:37:46,000
The real question is, what behavior does that workflow actually require in order to function?
703
00:37:46,000 --> 00:37:51,280
You have to ask, who is forced to interpret it, who has to bypass it, and who is manually
704
00:37:51,280 --> 00:37:54,360
validating what the system cannot hold on its own.
705
00:37:54,360 --> 00:37:58,520
Once you see that, the bottleneck stops looking accidental and starts looking structural.
706
00:37:58,520 --> 00:38:01,920
The gatekeeper pattern, how one person becomes infrastructure.
707
00:38:01,920 --> 00:38:04,200
This is where the bottleneck becomes easiest to name.
708
00:38:04,200 --> 00:38:07,240
It isn't just a delay or a matter of office politics.
709
00:38:07,240 --> 00:38:09,200
It is a matter of concentration.
710
00:38:09,200 --> 00:38:12,920
Once access, communication and workflow exceptions cluster around one person, they stop being
711
00:38:12,920 --> 00:38:15,440
a contributor and start functioning like infrastructure.
712
00:38:15,440 --> 00:38:17,320
I've seen this pattern many times.
713
00:38:17,320 --> 00:38:20,520
There is usually someone everyone trusts who knows the history, the real owners, and
714
00:38:20,520 --> 00:38:22,360
which SharePoint library is actually current.
715
00:38:22,360 --> 00:38:26,320
They know which approval can be safely ignored and which one absolutely cannot, and they
716
00:38:26,320 --> 00:38:30,420
understand exactly how the workflow behaves when it inevitably breaks, because they know
717
00:38:30,420 --> 00:38:34,400
who needs to be warned before a change goes live, people naturally root everything through
718
00:38:34,400 --> 00:38:35,400
them.
719
00:38:35,400 --> 00:38:37,840
At first, this looks efficient and even feels rational to the team.
720
00:38:37,840 --> 00:38:39,080
Why waste time?
721
00:38:39,080 --> 00:38:43,520
Reconstructing context when one person can collapse that uncertainty in five minutes.
722
00:38:43,520 --> 00:38:47,760
Why push through a formal path when one message to the right person gets the answer faster?
723
00:38:47,760 --> 00:38:50,280
This is exactly how the gatekeeper pattern hardens.
724
00:38:50,280 --> 00:38:54,420
Through someone seeking control, but through repeated relief, the organization finds a person
725
00:38:54,420 --> 00:38:58,760
who reduces friction, and instead of fixing the system, they build the entire workflow around
726
00:38:58,760 --> 00:39:00,160
that individual.
727
00:39:00,160 --> 00:39:04,000
More requests flow through them, more teams depend on them, and eventually people stop
728
00:39:04,000 --> 00:39:05,600
asking whether the structure works.
729
00:39:05,600 --> 00:39:07,760
They just ask whether that person is available.
730
00:39:07,760 --> 00:39:11,480
That is the moment a human being becomes a system component, and from a design perspective,
731
00:39:11,480 --> 00:39:12,840
that is a serious failure.
732
00:39:12,840 --> 00:39:16,320
People are not supposed to carry invisible loads at the center of multiple dependencies
733
00:39:16,320 --> 00:39:18,120
with no redundancy around them.
734
00:39:18,120 --> 00:39:20,240
That isn't resilience, it is concentration risk.
735
00:39:20,240 --> 00:39:24,160
In the anchor case, this became unmistakable when the organization compared decision speed
736
00:39:24,160 --> 00:39:27,760
with dependency patterns and saw the same names appearing over and over.
737
00:39:27,760 --> 00:39:31,160
These individuals didn't have the highest titles, but they held the densest combination
738
00:39:31,160 --> 00:39:33,120
of context, trust, and access.
739
00:39:33,120 --> 00:39:38,240
If they joined the conversation, movement resumed, but if they were absent, everything stretched.
740
00:39:38,240 --> 00:39:42,200
That is a single point of failure, and it creates three very predictable costs for the
741
00:39:42,200 --> 00:39:43,200
business.
742
00:39:43,200 --> 00:39:44,200
First, you face delay.
743
00:39:44,200 --> 00:39:48,640
And the most capable people can only absorb so much translation work before a queue begins
744
00:39:48,640 --> 00:39:49,920
to build around them.
745
00:39:49,920 --> 00:39:51,160
Second, you hit burnout.
746
00:39:51,160 --> 00:39:54,720
The work these people do is rarely visible because it doesn't appear as ownership.
747
00:39:54,720 --> 00:39:57,760
It appears as rescue, quiet correction, and constant pings.
748
00:39:57,760 --> 00:39:59,680
Finally, you face fragility.
749
00:39:59,680 --> 00:40:03,520
If that person leaves or changes roles, the organization discovers that what looked like
750
00:40:03,520 --> 00:40:07,520
business knowledge was actually just knowledge concentrated in one node.
751
00:40:07,520 --> 00:40:11,160
This is where leaders often make the wrong call by trying to protect the person.
752
00:40:11,160 --> 00:40:14,640
They praise them, give them more meetings, and grant them broader oversight because they
753
00:40:14,640 --> 00:40:16,040
seem essential.
754
00:40:16,040 --> 00:40:19,880
But if your response to a hidden dependency is to institutionalize it, you aren't solving
755
00:40:19,880 --> 00:40:20,880
the problem.
756
00:40:20,880 --> 00:40:21,880
You are promoting the bottleneck.
757
00:40:21,880 --> 00:40:26,160
The issue isn't that a capable person exists, but that the system made their capability
758
00:40:26,160 --> 00:40:27,240
non-transferable.
759
00:40:27,240 --> 00:40:31,720
The system made context too concentrated and ownership too ambiguous for anyone else to
760
00:40:31,720 --> 00:40:32,720
step in.
761
00:40:32,720 --> 00:40:37,000
The gatekeeper becomes the only bridge between design, intent, and operating reality.
762
00:40:37,000 --> 00:40:39,720
That bridge might be strong, but it is still just one bridge.
763
00:40:39,720 --> 00:40:43,160
And once the organization relies on it, behavior shifts permanently.
764
00:40:43,160 --> 00:40:47,800
People wait rather than decide, and they escalate informally rather than through the process.
765
00:40:47,800 --> 00:40:52,040
They learn that knowing the right person matters more than understanding the formal path.
766
00:40:52,040 --> 00:40:55,960
That is when the permission problem becomes cultural on the surface, even though it is structural
767
00:40:55,960 --> 00:40:56,960
underneath.
768
00:40:56,960 --> 00:41:01,560
What the system is producing is a design that cannot move without concentrated human compensation.
769
00:41:01,560 --> 00:41:06,280
And once that becomes normal, work starts leaving the formal environment altogether.
770
00:41:06,280 --> 00:41:10,240
So I'd and shadow AI as structural compensation.
771
00:41:10,240 --> 00:41:14,400
Once dependency becomes the standard operating procedure, work naturally starts looking for
772
00:41:14,400 --> 00:41:16,320
a different route to the finish line.
773
00:41:16,320 --> 00:41:20,800
This is usually the exact moment leaders start sounding the alarm about shadow IT, unauthorized
774
00:41:20,800 --> 00:41:24,040
apps, and those private spreadsheets everyone keeps on their desktops.
775
00:41:24,040 --> 00:41:26,120
Now we've added shadow AI to that list.
776
00:41:26,120 --> 00:41:29,960
Most organizations frame this as a compliance failure or a simple lack of discipline.
777
00:41:29,960 --> 00:41:34,520
They claim people are bypassing governance just because they want a shortcut or find the
778
00:41:34,520 --> 00:41:36,160
official rules annoying.
779
00:41:36,160 --> 00:41:39,720
Well that might be true in a few cases, looking closer reveals a much more important truth
780
00:41:39,720 --> 00:41:42,640
about how your business actually functions.
781
00:41:42,640 --> 00:41:46,080
Shadow behavior isn't just rebellion, it is structural compensation.
782
00:41:46,080 --> 00:41:49,600
People aren't abandoning the governed path because they have a grudge against the IT
783
00:41:49,600 --> 00:41:50,600
department.
784
00:41:50,600 --> 00:41:53,760
They are leaving because the official system no longer matches the speed or the clarity
785
00:41:53,760 --> 00:41:55,720
they need to actually do their jobs.
786
00:41:55,720 --> 00:41:56,880
That distinction is everything.
787
00:41:56,880 --> 00:42:01,200
When a formal system becomes too slow or relies on too many human gatekeepers, the business
788
00:42:01,200 --> 00:42:02,880
doesn't just stop needing results.
789
00:42:02,880 --> 00:42:05,280
It compensates.
790
00:42:05,280 --> 00:42:08,820
A team will build its own tracker because the official workspace feels like a maze they
791
00:42:08,820 --> 00:42:09,900
can't navigate.
792
00:42:09,900 --> 00:42:14,040
Someone else will export data into a personal spreadsheet because getting a clean view through
793
00:42:14,040 --> 00:42:17,200
the approved process takes three days instead of three minutes.
794
00:42:17,200 --> 00:42:21,040
Even managers get in on it setting up private chat threads because the formal workflow adds
795
00:42:21,040 --> 00:42:23,920
a week of delay without adding a single bit of value.
796
00:42:23,920 --> 00:42:27,920
When a business user starts experimenting with a public AI tool, it's usually because
797
00:42:27,920 --> 00:42:31,840
the sanctioned environment can't answer the question they need solved by five o'clock.
798
00:42:31,840 --> 00:42:35,120
This isn't just a policy violation, it is the organization trying to restore its
799
00:42:35,120 --> 00:42:36,120
own flow.
800
00:42:36,120 --> 00:42:38,600
To be clear, this creates massive structural risk.
801
00:42:38,600 --> 00:42:43,080
Shadow IT increases your attack surface and shadow AI can pull sensitive data into places
802
00:42:43,080 --> 00:42:44,480
it was never meant to go.
803
00:42:44,480 --> 00:42:48,720
These private workarounds weaken your ability to audit what's happening and local automation
804
00:42:48,720 --> 00:42:51,800
can skip right over controls that were put there for a very good reason that I'm not
805
00:42:51,800 --> 00:42:56,000
downplaying those risks but from a system perspective, risky behavior is a loud signal.
806
00:42:56,000 --> 00:42:59,200
That signal is telling you there is an unmet operational need.
807
00:42:59,200 --> 00:43:03,080
When you see shadow behavior popping up repeatedly around the same high friction processes, the
808
00:43:03,080 --> 00:43:06,640
leadership team should stop asking how to shut it down and start asking what gap the formal
809
00:43:06,640 --> 00:43:08,480
environment is failing to bridge.
810
00:43:08,480 --> 00:43:12,440
The reason these tools spread is rarely because the official software is missing.
811
00:43:12,440 --> 00:43:16,320
In most Microsoft 365 environments, the official stack is actually massive.
812
00:43:16,320 --> 00:43:21,400
You have teams, SharePoint, and the Power Platform and Copilot is likely already there or arriving
813
00:43:21,400 --> 00:43:22,400
soon.
814
00:43:22,400 --> 00:43:24,160
Yet people still step outside the fence.
815
00:43:24,160 --> 00:43:27,840
Availability is not the same thing as usability and just because a tool is governed doesn't
816
00:43:27,840 --> 00:43:29,840
mean it's a functional fit for the task at hand.
817
00:43:29,840 --> 00:43:34,320
If people can't get timely access to the content they need to make a move, they will compensate.
818
00:43:34,320 --> 00:43:38,480
If every decision has to wait on one or two overloaded humans, they will compensate.
819
00:43:38,480 --> 00:43:43,160
When official workflows carry too much ambiguity or too many handoffs, the system creates its
820
00:43:43,160 --> 00:43:44,720
own pressure release valve.
821
00:43:44,720 --> 00:43:48,000
In the anchor case I studied, this showed up in all the usual ways.
822
00:43:48,000 --> 00:43:52,800
There were local file copies, parallel trackers, and private teams threads everywhere.
823
00:43:52,800 --> 00:43:56,480
People were using unapproved AI for quick analysis and drafting because they needed the
824
00:43:56,480 --> 00:43:59,640
process to move now, not after three rounds of committee review.
825
00:43:59,640 --> 00:44:03,640
Each of these work around solved a local problem, but together they built a second invisible
826
00:44:03,640 --> 00:44:04,720
operating layer.
827
00:44:04,720 --> 00:44:07,880
This layer had lower visibility and zero formal control.
828
00:44:07,880 --> 00:44:11,240
Yet it often had faster decision speeds than the official environment.
829
00:44:11,240 --> 00:44:13,960
That is the part that makes executives uncomfortable.
830
00:44:13,960 --> 00:44:17,960
Once the unofficial route becomes more responsive than the official one, people stop trusting
831
00:44:17,960 --> 00:44:19,840
the govern system entirely.
832
00:44:19,840 --> 00:44:22,200
Power then shifts away from formal leaders and gatekeepers.
833
00:44:22,200 --> 00:44:25,600
It moves to whoever can create or interpret that unofficial path.
834
00:44:25,600 --> 00:44:28,040
This expands risk in two directions.
835
00:44:28,040 --> 00:44:33,400
Once loses all visibility and the organization reinforces the idea that real work only happens
836
00:44:33,400 --> 00:44:35,520
outside of formal design.
837
00:44:35,520 --> 00:44:40,720
Shadowite and shadow AI are evidence that your current design is underserving the business.
838
00:44:40,720 --> 00:44:44,120
Titer restrictions are usually the wrong response because if the underlying need remains, the
839
00:44:44,120 --> 00:44:45,960
compensation will just pop up somewhere else.
840
00:44:45,960 --> 00:44:49,120
You have to read shadow behavior like a diagnostic report.
841
00:44:49,120 --> 00:44:53,080
Ask yourself where the speed is being blocked and where the context is too concentrated.
842
00:44:53,080 --> 00:44:56,880
If your formal environment is so hard to use that people would rather accept unmanaged
843
00:44:56,880 --> 00:44:58,680
risk than wait for an approval.
844
00:44:58,680 --> 00:45:00,720
You have a design failure, not a people failure.
845
00:45:00,720 --> 00:45:04,000
These questions are even more critical now that AI has entered the room.
846
00:45:04,000 --> 00:45:06,240
The workaround is no longer just a spreadsheet.
847
00:45:06,240 --> 00:45:10,200
It's an entire intelligence layer sitting outside your boundary.
848
00:45:10,200 --> 00:45:12,760
AI does not create power, it amplifies it.
849
00:45:12,760 --> 00:45:16,600
The AI layer is now amplifying every one of these structural gaps.
850
00:45:16,600 --> 00:45:20,480
Many organizations still talk about Copilot as if it arrives with its own built-in map
851
00:45:20,480 --> 00:45:24,200
of the business, but it doesn't actually know who should decide what or which version
852
00:45:24,200 --> 00:45:26,240
of a document is the truth.
853
00:45:26,240 --> 00:45:28,160
AI works on access and available content.
854
00:45:28,160 --> 00:45:31,560
It only knows the context your environment makes reachable.
855
00:45:31,560 --> 00:45:34,600
Because of this, AI doesn't create a new power structure from scratch.
856
00:45:34,600 --> 00:45:37,200
It simply amplifies the one already living in your tenant.
857
00:45:37,200 --> 00:45:41,040
This makes your permission problems more dangerous than they ever were before.
858
00:45:41,040 --> 00:45:44,320
Before AI, bad access design was often protected by friction.
859
00:45:44,320 --> 00:45:47,360
Information might have been overshared, but it was still hard to find like a file buried
860
00:45:47,360 --> 00:45:49,320
10 folders deep with a cryptic name.
861
00:45:49,320 --> 00:45:52,800
A site might have had weak ownership, but the damage was limited by the fact that humans
862
00:45:52,800 --> 00:45:54,480
had to manually search for things.
863
00:45:54,480 --> 00:45:55,760
AI removes that friction.
864
00:45:55,760 --> 00:45:59,080
It takes the effort out of turning latent access into active insight.
865
00:45:59,080 --> 00:46:04,360
If the wrong person can already reach a file, AI makes that reach operationally meaningful.
866
00:46:04,360 --> 00:46:08,760
Conversely, if the right person can't find what they need, AI can't invent that missing
867
00:46:08,760 --> 00:46:09,760
context.
868
00:46:09,760 --> 00:46:12,440
It just generates answers based on incomplete information.
869
00:46:12,440 --> 00:46:14,600
This creates two major forms of distortion.
870
00:46:14,600 --> 00:46:16,280
First you get unintended visibility.
871
00:46:16,280 --> 00:46:20,400
A junior employee might not be looking for bored materials or sensitive payroll data,
872
00:46:20,400 --> 00:46:24,240
but if those files are sitting inside broad permissions, natural language search brings
873
00:46:24,240 --> 00:46:26,000
them right to the surface.
874
00:46:26,000 --> 00:46:29,000
The permission was always there, but AI made it a reality.
875
00:46:29,000 --> 00:46:30,640
Second you get false confidence.
876
00:46:30,640 --> 00:46:35,840
People see a fluent, well-written answer, and assume it reflects the organizational truth.
877
00:46:35,840 --> 00:46:41,240
If the underlying data is fragmented, outdated, or duplicated, the AI output inherits every
878
00:46:41,240 --> 00:46:42,240
one of those flaws.
879
00:46:42,240 --> 00:46:46,160
It sounds coherent, but it's representing a partial or broken reality.
880
00:46:46,160 --> 00:46:49,080
This is incredibly dangerous at the executive level.
881
00:46:49,080 --> 00:46:52,760
Decisions can now move much faster based on information that looks clean, but is structurally
882
00:46:52,760 --> 00:46:53,760
biased.
883
00:46:53,760 --> 00:46:58,280
The organization initially thought of AI as a simple productivity play to help people search
884
00:46:58,280 --> 00:46:59,920
and summarize faster.
885
00:46:59,920 --> 00:47:03,600
That only works if your underlying access model deserves to be accelerated.
886
00:47:03,600 --> 00:47:07,640
Instead, the readiness work showed that some people had massive access due to old project
887
00:47:07,640 --> 00:47:11,480
roles, while the people actually accountable for outcomes were flying blind.
888
00:47:11,480 --> 00:47:15,400
If you drop AI on top of that mess, you don't get mutual intelligence.
889
00:47:15,400 --> 00:47:16,960
You get amplified misalignment.
890
00:47:16,960 --> 00:47:21,240
The wrong people become more powerful because they can discover more data faster than anyone
891
00:47:21,240 --> 00:47:22,240
else.
892
00:47:22,240 --> 00:47:26,560
The right people stay constrained because you cannot prompt missing context into existence.
893
00:47:26,560 --> 00:47:30,000
The people who already sit at the intersection of trust and historical knowledge become
894
00:47:30,000 --> 00:47:34,440
even more of a bottleneck because they are the only ones who can tell what the AI missed.
895
00:47:34,440 --> 00:47:36,360
The hidden structure doesn't go away.
896
00:47:36,360 --> 00:47:37,440
It hardens.
897
00:47:37,440 --> 00:47:41,320
If your information ownership is fragmented or your permissions are stale, AI will simply
898
00:47:41,320 --> 00:47:42,480
scale those problems.
899
00:47:42,480 --> 00:47:45,880
This is why AI readiness isn't a technical tooling question.
900
00:47:45,880 --> 00:47:48,440
It's a question of organizational truth.
901
00:47:48,440 --> 00:47:52,600
When your systems reliably give the right context to the right people at the right time.
902
00:47:52,600 --> 00:47:55,280
If the answer is no, AI won't fail because of a glitch in the code.
903
00:47:55,280 --> 00:47:59,520
It will fail because the environment is feeding the model the wrong story.
904
00:47:59,520 --> 00:48:02,680
AI is not a fix for weak structural design.
905
00:48:02,680 --> 00:48:06,040
It is a force multiplier for whatever design you already have.
906
00:48:06,040 --> 00:48:10,720
Before you ask how quickly you can scale AI, you need to ask what exactly you are scaling.
907
00:48:10,720 --> 00:48:15,240
If you are scaling misaligned access and hidden dependencies, then you aren't making progress.
908
00:48:15,240 --> 00:48:17,360
You are just increasing your exposure.
909
00:48:17,360 --> 00:48:20,560
Why co-pilot pilots fail in misaligned organizations?
910
00:48:20,560 --> 00:48:25,120
When a co-pilot pilot struggles, the easy explanation is usually the wrong one.
911
00:48:25,120 --> 00:48:30,080
Leaders often claim the tool is immature, while users complain the answers aren't good enough.
912
00:48:30,080 --> 00:48:34,200
Ity suggests adoption just needs more training and security argues that governance is slowing
913
00:48:34,200 --> 00:48:35,200
the rollout.
914
00:48:35,200 --> 00:48:39,040
While each of those points might be partly true, the deeper problem in a misaligned organization
915
00:48:39,040 --> 00:48:40,440
is usually much simpler.
916
00:48:40,440 --> 00:48:44,920
Co-pilot is being asked to perform well inside an environment that does not distribute
917
00:48:44,920 --> 00:48:46,200
context effectively.
918
00:48:46,200 --> 00:48:50,800
This means the pilot gets judged as a failed AI initiative when it is actually exposing a
919
00:48:50,800 --> 00:48:53,280
fundamental problem with the access architecture.
920
00:48:53,280 --> 00:48:56,960
In the anchor case, this reality became visible almost immediately.
921
00:48:56,960 --> 00:49:00,800
Some users were impressed during the first week because co-pilot could surface information
922
00:49:00,800 --> 00:49:03,800
they used to spend hours hunting down manually.
923
00:49:03,800 --> 00:49:08,360
Others felt underwhelmed because the answers felt thin or incomplete and a third group
924
00:49:08,360 --> 00:49:12,560
became cautious because the tool surfaced content that was technically accessible but didn't
925
00:49:12,560 --> 00:49:14,600
feel appropriate or well-governed.
926
00:49:14,600 --> 00:49:16,400
It makes creates a massive trust problem.
927
00:49:16,400 --> 00:49:21,440
It isn't about trust in AI as an abstract concept but rather trust in whether the environment
928
00:49:21,440 --> 00:49:25,760
behind the AI reflects business reality well enough to use the output.
929
00:49:25,760 --> 00:49:30,040
If one person gets a sharp answer because their access footprint is broad, while a colleague
930
00:49:30,040 --> 00:49:34,400
with formal accountability gets a weaker answer due to restricted context, the pilot doesn't
931
00:49:34,400 --> 00:49:35,560
feel reliable.
932
00:49:35,560 --> 00:49:37,360
It feels political.
933
00:49:37,360 --> 00:49:42,080
Once a tool feels politically uneven, adoption drops fast because people do not just evaluate
934
00:49:42,080 --> 00:49:44,800
usefulness, they evaluate their own exposure.
935
00:49:44,800 --> 00:49:48,120
They start wondering if they can trust an answer in front of their peers or if they are seeing
936
00:49:48,120 --> 00:49:49,560
something they shouldn't be seeing.
937
00:49:49,560 --> 00:49:53,400
These are not user experience questions, they are power questions and this is why so many
938
00:49:53,400 --> 00:49:56,920
pilots lose momentum after the initial excitement fades.
939
00:49:56,920 --> 00:50:01,400
The first phase is always about novelty where everyone focuses on how fast the tool summarizes
940
00:50:01,400 --> 00:50:02,400
or drafts.
941
00:50:02,400 --> 00:50:06,600
The second phase is a confrontation with reality where people ask why the AI found a file
942
00:50:06,600 --> 00:50:11,160
for one person but not another or why sensitive material is suddenly one prompt away.
943
00:50:11,160 --> 00:50:15,120
That last part matters more than most leaders expect because when a pilot enters a misaligned
944
00:50:15,120 --> 00:50:18,480
environment, it often increases dependency on informal gatekeepers.
945
00:50:18,480 --> 00:50:22,080
Now people not only need help finding information but they also need help validating whether
946
00:50:22,080 --> 00:50:24,480
what the AI found is actually safe to use.
947
00:50:24,480 --> 00:50:28,360
The same people who already held hidden influence become even more important as they turn into
948
00:50:28,360 --> 00:50:31,600
human trust layers over machine generated convenience.
949
00:50:31,600 --> 00:50:33,440
That isn't a digital transformation.
950
00:50:33,440 --> 00:50:36,520
It is structural compensation with a modern interface.
951
00:50:36,520 --> 00:50:40,320
Leadership expects productivity gains and faster decisions but what the people inside
952
00:50:40,320 --> 00:50:45,480
the system actually experience is governance ambiguity and faster access to uneven context.
953
00:50:45,480 --> 00:50:49,200
Instead of broad adoption people become selective and politically aware in how they use
954
00:50:49,200 --> 00:50:50,200
the tool.
955
00:50:50,200 --> 00:50:53,520
This is why failed pilots are so often misdiagnosed by the organization.
956
00:50:53,520 --> 00:50:58,240
The AI pilot measured the quality of the organization's permission design and trust architecture
957
00:50:58,240 --> 00:51:02,640
more honestly than any previous initiative and the environment simply did not pass the
958
00:51:02,640 --> 00:51:03,800
test.
959
00:51:03,800 --> 00:51:07,360
Training alone rarely fixes this because you can teach prompting all day but none of that
960
00:51:07,360 --> 00:51:10,600
corrects misaligned access or repair stale ownership.
961
00:51:10,600 --> 00:51:14,320
If the pilot stalls the question shouldn't be about how to persuade people to use the
962
00:51:14,320 --> 00:51:15,320
tool more.
963
00:51:15,320 --> 00:51:19,880
The better question is what the pilot is revealing about who can see what and who still controls
964
00:51:19,880 --> 00:51:21,760
what the organization can act on.
965
00:51:21,760 --> 00:51:25,680
When a co-pilot pilot fails it is rarely a simple technology failure.
966
00:51:25,680 --> 00:51:29,240
It is the permission problem finally becoming visible at scale.
967
00:51:29,240 --> 00:51:32,120
Contrast moment one, the over-permissioned organization.
968
00:51:32,120 --> 00:51:36,200
That anchor case matters because it shows how hidden concentration creates bottlenecks
969
00:51:36,200 --> 00:51:39,600
but let me take one step sideways to show you a different failure mode.
970
00:51:39,600 --> 00:51:44,120
This is the organization where too much access creates noise, confusion and false confidence.
971
00:51:44,120 --> 00:51:48,400
On the surface this kind of environment looks modern because it features open collaboration
972
00:51:48,400 --> 00:51:50,520
and very few barriers to information.
973
00:51:50,520 --> 00:51:54,360
Leadership often likes the feel of this setup because it signals trust and agility allowing
974
00:51:54,360 --> 00:51:57,880
people to move quickly without asking for permission every 5 minutes.
975
00:51:57,880 --> 00:52:01,520
For a while that can look like speed but eventually openness scales without ownership and
976
00:52:01,520 --> 00:52:04,840
access everywhere starts to blur responsibility anywhere.
977
00:52:04,840 --> 00:52:09,040
This becomes widely visible while stewardship stays vague and sites remain searchable even
978
00:52:09,040 --> 00:52:12,200
though no one is sure who is maintaining the underlying structure.
979
00:52:12,200 --> 00:52:16,320
Teams get added to other teams and guests remain in digital spaces long after the work has
980
00:52:16,320 --> 00:52:20,680
changed because removing access feels more dangerous than leaving it in place.
981
00:52:20,680 --> 00:52:25,440
The environment becomes permissive by default and ambiguous by habit which creates a very
982
00:52:25,440 --> 00:52:27,360
different kind of power problem.
983
00:52:27,360 --> 00:52:31,960
This isn't about concentrated gatekeeping, it is about diffuse influence with zero accountability.
984
00:52:31,960 --> 00:52:36,440
In one organization like this almost every friction point sounded small on its own like having
985
00:52:36,440 --> 00:52:42,040
too many versions of the same commercial material or policy drafts visible in forgotten spaces.
986
00:52:42,040 --> 00:52:45,480
Decision makers were pulling different numbers from different versions of the truth because
987
00:52:45,480 --> 00:52:50,040
everyone had access to something but no one owned the integrity of the data.
988
00:52:50,040 --> 00:52:52,560
That isn't openness, it is structural overexposure.
989
00:52:52,560 --> 00:52:56,800
When everyone can see too much, signal and authority start collapsing into each other and
990
00:52:56,800 --> 00:52:59,320
people begin to mistake visibility for legitimacy.
991
00:52:59,320 --> 00:53:02,880
They assume that because they found a document it must be current and because they can access
992
00:53:02,880 --> 00:53:04,760
a workspace they are meant to act on it.
993
00:53:04,760 --> 00:53:08,880
They assume that if co-pilot surfaces a result that result reflects something the organization
994
00:53:08,880 --> 00:53:12,360
stands behind but broad access does not equal governed truth.
995
00:53:12,360 --> 00:53:16,000
From a system perspective the issue here is a total lack of boundaries.
996
00:53:16,000 --> 00:53:20,160
The organization can move quickly into the wrong conclusion because the environment does
997
00:53:20,160 --> 00:53:25,000
not clearly separate working material from trusted material or historical access from current
998
00:53:25,000 --> 00:53:26,320
responsibility.
999
00:53:26,320 --> 00:53:30,480
This becomes especially dangerous once AI is involved because co-pilot doesn't need
1000
00:53:30,480 --> 00:53:33,000
to break any rules to create a massive risk.
1001
00:53:33,000 --> 00:53:37,200
If broad permissions remain in place then natural language discovery turns messy exposure
1002
00:53:37,200 --> 00:53:38,200
into practical influence.
1003
00:53:38,200 --> 00:53:41,720
A person with no formal role in a topic may suddenly have enough context to shape the
1004
00:53:41,720 --> 00:53:46,040
conversation or an executive might receive a polished answer built from overshared and
1005
00:53:46,040 --> 00:53:47,920
weakly governed content.
1006
00:53:47,920 --> 00:53:51,840
Teams may act with total confidence on material that was never intended to be the operational
1007
00:53:51,840 --> 00:53:52,920
source of truth.
1008
00:53:52,920 --> 00:53:56,280
In this case, power didn't hide behind a single gatekeeper.
1009
00:53:56,280 --> 00:54:00,440
It scattered into the environment and weakened the quality of every decision made.
1010
00:54:00,440 --> 00:54:04,600
Audit findings increased and ownership questions became harder to answer because too many people
1011
00:54:04,600 --> 00:54:07,720
could touch too many things without a clean stewardship model.
1012
00:54:07,720 --> 00:54:12,760
When leaders asked who was responsible the answer always dissolved into the same pattern.
1013
00:54:12,760 --> 00:54:15,400
Everybody had access but nobody had accountability.
1014
00:54:15,400 --> 00:54:17,280
That is the hidden cost of over-permissioning.
1015
00:54:17,280 --> 00:54:21,040
It feels collaborative but structurally it weakens trust because the business stops knowing
1016
00:54:21,040 --> 00:54:23,000
whether what is visible is also valid.
1017
00:54:23,000 --> 00:54:26,680
This is the case that happens people create their own filters anyway by building local copies
1018
00:54:26,680 --> 00:54:28,600
and relying on unofficial experts.
1019
00:54:28,600 --> 00:54:32,400
Even maximum openness can recreate hidden power just in a different shape because too much
1020
00:54:32,400 --> 00:54:36,040
openness is fragile but the opposite fails too.
1021
00:54:36,040 --> 00:54:38,800
Contrast moment 2 - The Locked Down Organization
1022
00:54:38,800 --> 00:54:40,960
Now let's look at the exact opposite scenario.
1023
00:54:40,960 --> 00:54:45,320
I'm not talking about the open environment where access drift turned into chaos but the
1024
00:54:45,320 --> 00:54:46,320
locked down one.
1025
00:54:46,320 --> 00:54:50,960
This is the organization that believes control is the only path to safety and they define
1026
00:54:50,960 --> 00:54:54,160
safety as restricting everything by default.
1027
00:54:54,160 --> 00:54:58,400
Access is managed with an iron fist, sites are closed until someone proves they need them
1028
00:54:58,400 --> 00:55:02,360
and even simple group changes require a mountain of paperwork.
1029
00:55:02,360 --> 00:55:06,640
Workflow edits are guarded by a tiny circle of admins while content visibility stays limited
1030
00:55:06,640 --> 00:55:10,280
to narrow groups long after the original business context has shifted.
1031
00:55:10,280 --> 00:55:14,440
On paper this looks like a disciplined operation and in a very literal sense it is that there are
1032
00:55:14,440 --> 00:55:19,040
fewer obvious risks of data exposure, fewer people can accidentally stumble onto the wrong
1033
00:55:19,040 --> 00:55:23,600
file and you won't find many uncontrolled digital spaces popping up because of that leadership
1034
00:55:23,600 --> 00:55:25,680
usually feels a sense of relief.
1035
00:55:25,680 --> 00:55:29,200
The tenant looks orderly, the permission model looks serious and the governance language
1036
00:55:29,200 --> 00:55:33,600
sounds like something out of a mature enterprise playbook but here's the thing, from a system
1037
00:55:33,600 --> 00:55:38,480
perspective that environment isn't just controlled, it's brittle because if every meaningful
1038
00:55:38,480 --> 00:55:42,240
action depends on a handful of people with elevated access you haven't actually removed
1039
00:55:42,240 --> 00:55:47,200
the concentration of power, you've just formalized it.
1040
00:55:47,200 --> 00:55:50,980
In this kind of setup delay isn't a side effect hidden by openness, it is a feature built
1041
00:55:50,980 --> 00:55:53,180
directly into the operating model.
1042
00:55:53,180 --> 00:55:57,040
When a team needs access to a project site to hit a deadline they wait, when a business
1043
00:55:57,040 --> 00:56:01,540
owner needs to add one new column to a critical list to track a metric they wait.
1044
00:56:01,540 --> 00:56:04,840
If a department wants to update a workflow that no longer matches how they actually work
1045
00:56:04,840 --> 00:56:05,840
they wait.
1046
00:56:05,840 --> 00:56:09,100
Even when a leader needs a cross-functional view of information that's currently scattered
1047
00:56:09,100 --> 00:56:12,440
across protected silos they still have to wait and why is that?
1048
00:56:12,440 --> 00:56:16,480
It's because the environment was designed to prioritize approval integrity over operational
1049
00:56:16,480 --> 00:56:17,480
flow.
1050
00:56:17,480 --> 00:56:20,720
The system protects control by narrowing who is allowed to act but in doing that it also
1051
00:56:20,720 --> 00:56:23,360
narrows who is allowed to move the business forward.
1052
00:56:23,360 --> 00:56:26,320
That creates a very specific pattern almost immediately.
1053
00:56:26,320 --> 00:56:30,000
Admins, owners and platform specialists become mandatory intermediaries for even the most
1054
00:56:30,000 --> 00:56:31,560
basic business movements.
1055
00:56:31,560 --> 00:56:34,800
This isn't because they are doing a bad job or trying to be difficult but because the
1056
00:56:34,800 --> 00:56:38,320
system design placed them squarely between demand and execution.
1057
00:56:38,320 --> 00:56:42,160
I worked with one organization where the symptoms actually looked quite respectable at first
1058
00:56:42,160 --> 00:56:46,600
glance. There were no horror stories about oversharing, no obvious permission sprawl and no
1059
00:56:46,600 --> 00:56:48,680
shocks during the audit process.
1060
00:56:48,680 --> 00:56:52,800
But underneath that calm surface the business was compensating for the friction everywhere.
1061
00:56:52,800 --> 00:56:57,160
Teams started keeping private copies of approved files because the official repository was too
1062
00:56:57,160 --> 00:56:58,680
slow to navigate.
1063
00:56:58,680 --> 00:57:01,960
People built their own side spreadsheets because getting reporting access through the formal
1064
00:57:01,960 --> 00:57:03,800
path took way too long.
1065
00:57:03,800 --> 00:57:07,480
Managers even used private chat groups to make decisions before submitting official requests
1066
00:57:07,480 --> 00:57:11,560
knowing that once a request entered the governed process the speed would drop to zero.
1067
00:57:11,560 --> 00:57:14,280
And inevitably the shadow automation started to appear.
1068
00:57:14,280 --> 00:57:18,160
It wasn't anything massive, just small local flows and personal workarounds that people
1069
00:57:18,160 --> 00:57:22,800
build when the official route asks them to trade too much time for too little flexibility.
1070
00:57:22,800 --> 00:57:28,040
The lockdown organization had strong visible control but it had zero structural resilience.
1071
00:57:28,040 --> 00:57:32,440
Because the business relied on a few highly trusted actors to unlock every single exception
1072
00:57:32,440 --> 00:57:34,960
and change, those people became indispensable.
1073
00:57:34,960 --> 00:57:38,480
That might feel secure but it actually makes the business much less adaptive than leadership
1074
00:57:38,480 --> 00:57:39,480
realises.
1075
00:57:39,480 --> 00:57:41,160
Now map that reality to AI.
1076
00:57:41,160 --> 00:57:45,840
Many executives assume a locked down environment is the safest place for a tool like co-pilot because
1077
00:57:45,840 --> 00:57:48,080
there's less exposure and cleaner boundaries.
1078
00:57:48,080 --> 00:57:51,760
That might be true for security but if the right people still can't access the context
1079
00:57:51,760 --> 00:57:55,720
they need, your AI adoption is going to stall for a completely different reason.
1080
00:57:55,720 --> 00:57:58,520
The problem won't be that too much is discoverable.
1081
00:57:58,520 --> 00:58:00,760
It will be that too little is useful.
1082
00:58:00,760 --> 00:58:05,160
An AI tool cannot generate meaningful support or insights from information the user isn't
1083
00:58:05,160 --> 00:58:06,160
allowed to reach.
1084
00:58:06,160 --> 00:58:08,560
The answers come back partial, thin and generic.
1085
00:58:08,560 --> 00:58:11,840
They are technically safe but they are operationally useless.
1086
00:58:11,840 --> 00:58:14,280
Once that happens trust in the technology evaporates.
1087
00:58:14,280 --> 00:58:18,800
Users decide the AI isn't helpful, leadership starts questioning the return on investment
1088
00:58:18,800 --> 00:58:22,400
and security points to the lack of leaks as a total success.
1089
00:58:22,400 --> 00:58:26,200
Meanwhile the business just goes back to the same few people who already hold all the
1090
00:58:26,200 --> 00:58:27,360
access and context.
1091
00:58:27,360 --> 00:58:31,440
The locked down environment ends up recreating the same core issue as the overpermissioned
1092
00:58:31,440 --> 00:58:32,440
one.
1093
00:58:32,440 --> 00:58:34,240
Misaligned control.
1094
00:58:34,240 --> 00:58:37,760
One side creates confusion through overexposure while the other creates bottlenecks
1095
00:58:37,760 --> 00:58:39,240
through over restriction.
1096
00:58:39,240 --> 00:58:42,120
Both setups produce the exact same business reality.
1097
00:58:42,120 --> 00:58:46,240
Decisions slow down hidden dependencies grow and unofficial paths emerge as the people inside
1098
00:58:46,240 --> 00:58:50,040
the system realize the formal structure isn't where the real work happens.
1099
00:58:50,040 --> 00:58:52,640
The problem isn't openness or strictness on their own.
1100
00:58:52,640 --> 00:58:56,280
The real issue is whether access matches responsibility closely enough for the business
1101
00:58:56,280 --> 00:58:59,720
to move without people having to find a way around the rules.
1102
00:58:59,720 --> 00:59:01,040
The real diagnosis.
1103
00:59:01,040 --> 00:59:02,360
Misaligned control.
1104
00:59:02,360 --> 00:59:04,400
So, here is the real diagnosis.
1105
00:59:04,400 --> 00:59:07,200
It isn't about having too much control or too little control.
1106
00:59:07,200 --> 00:59:08,840
It's about misaligned control.
1107
00:59:08,840 --> 00:59:13,080
This matters because most organizations try to fix permission problems by swinging wildly
1108
00:59:13,080 --> 00:59:14,920
between two basic instincts.
1109
00:59:14,920 --> 00:59:19,520
One side says we should open everything up to remove friction and trust our people while
1110
00:59:19,520 --> 00:59:23,720
the other side demands we tighten every screw and centralize authority.
1111
00:59:23,720 --> 00:59:27,720
Both of those responses can feel right in the moment and both might solve one specific
1112
00:59:27,720 --> 00:59:32,080
pain point but they both fail if they don't address the structural issue underneath.
1113
00:59:32,080 --> 00:59:36,760
The real question is whether access, responsibility and decision rights still match each other closely
1114
00:59:36,760 --> 00:59:39,600
enough for work to move without constant human intervention.
1115
00:59:39,600 --> 00:59:40,600
That is the ultimate test.
1116
00:59:40,600 --> 00:59:44,920
If the person who is actually accountable for an outcome cannot reliably access the information
1117
00:59:44,920 --> 00:59:48,080
or the tools they need to deliver it, your design is misaligned.
1118
00:59:48,080 --> 00:59:51,600
If the person with the most access isn't the one who has to live with the consequences
1119
00:59:51,600 --> 00:59:54,040
of the decision, your design is misaligned.
1120
00:59:54,040 --> 00:59:58,560
And if the only reason work keeps moving is that one person holds historical context,
1121
00:59:58,560 --> 01:00:01,400
no one else can reach, your design is definitely misaligned.
1122
01:00:01,400 --> 01:00:02,840
And why does this happen so often?
1123
01:00:02,840 --> 01:00:06,720
It happens because organizations evolve much faster than their control models do.
1124
01:00:06,720 --> 01:00:11,160
Roles change, teams merge and all projects leave digital residue behind while emergency
1125
01:00:11,160 --> 01:00:14,040
exceptions somehow become permanent fixtures.
1126
01:00:14,040 --> 01:00:18,280
Work flows get patched together and original owners move on to new roles, all while AI is
1127
01:00:18,280 --> 01:00:20,680
being layered on top of the whole mess.
1128
01:00:20,680 --> 01:00:24,200
Governance language usually stays the same long after the operational reality has shifted
1129
01:00:24,200 --> 01:00:25,200
on the ground.
1130
01:00:25,200 --> 01:00:29,000
Leaders continue to read about control through policy documents, but the people in the business
1131
01:00:29,000 --> 01:00:33,280
experience control through lived dependency and frustration.
1132
01:00:33,280 --> 01:00:36,000
That gap is where friction becomes a chronic illness.
1133
01:00:36,000 --> 01:00:39,880
This is important because misaligned control creates the same symptoms regardless of the
1134
01:00:39,880 --> 01:00:40,880
environment.
1135
01:00:40,880 --> 01:00:45,480
In an overpermissioned company, people move fast into a fog of ambiguity while in a locked
1136
01:00:45,480 --> 01:00:49,320
down company, they move slowly into a series of bottlenecks.
1137
01:00:49,320 --> 01:00:52,120
In both cases, the result is the same.
1138
01:00:52,120 --> 01:00:56,320
Responsibility gets blurry, trust becomes uneven, and people start compensating for design
1139
01:00:56,320 --> 01:00:58,280
flaws in informal, risky ways.
1140
01:00:58,280 --> 01:01:02,160
I wouldn't frame this primarily as a security issue, even though security is a huge part
1141
01:01:02,160 --> 01:01:03,160
of the conversation.
1142
01:01:03,160 --> 01:01:06,640
It also wouldn't call it just a collaboration issue, even though it clearly hurts teamwork.
1143
01:01:06,640 --> 01:01:08,440
This is an operating model issue.
1144
01:01:08,440 --> 01:01:11,920
Every permission model you build is also a decision model, and every ownership structure
1145
01:01:11,920 --> 01:01:13,720
is secretly a power structure.
1146
01:01:13,720 --> 01:01:17,320
Every workflow is a statement about who is allowed to move, who is forced to wait, and
1147
01:01:17,320 --> 01:01:19,480
who has to interpret the rules for everyone else.
1148
01:01:19,480 --> 01:01:24,360
When control is misaligned, the system starts producing very predictable, negative outcomes.
1149
01:01:24,360 --> 01:01:29,080
Decision latency goes up because every movement requires an escalation and shadow IT grows,
1150
01:01:29,080 --> 01:01:32,880
because the formal paths don't match what the business actually needs to do.
1151
01:01:32,880 --> 01:01:37,000
Standard findings start to multiply because ownership and access no longer reflect reality,
1152
01:01:37,000 --> 01:01:41,520
and digital transformation stalls, because new tools like co-pilot inherit all these old
1153
01:01:41,520 --> 01:01:43,240
structural contradictions.
1154
01:01:43,240 --> 01:01:45,520
This is exactly why so many AI pilots fail.
1155
01:01:45,520 --> 01:01:49,560
It's not because the AI is weak, but because the business hasn't clearly decided who should
1156
01:01:49,560 --> 01:01:52,280
be allowed to know, act, and decide.
1157
01:01:52,280 --> 01:01:56,160
From a system perspective, structural resilience depends on three things.
1158
01:01:56,160 --> 01:01:58,120
Clarity, redundancy, and review.
1159
01:01:58,120 --> 01:02:02,240
Clarity means the people responsible for an outcome can actually reach the context they
1160
01:02:02,240 --> 01:02:04,120
need to own that outcome.
1161
01:02:04,120 --> 01:02:08,080
Redundancy means you don't have a single person acting as an invisible bridge between information
1162
01:02:08,080 --> 01:02:12,440
and execution, and review means you treat permissions and ownership as living parts of the
1163
01:02:12,440 --> 01:02:14,800
business rather than historical leftovers.
1164
01:02:14,800 --> 01:02:18,920
Without those three pillars, control will always drift, and when control drifts, power doesn't
1165
01:02:18,920 --> 01:02:23,840
just disappear, it relocates into the hands of whoever is still able to unlock movement.
1166
01:02:23,840 --> 01:02:28,200
That's why an org chart is such a poor explanation of how a company actually functions over time.
1167
01:02:28,200 --> 01:02:32,360
It shows you who is accountable in theory, but the systems underneath show you who has the
1168
01:02:32,360 --> 01:02:34,280
operational influence in practice.
1169
01:02:34,280 --> 01:02:38,760
If those two maps don't align, the business pays for it every single day through slower decisions,
1170
01:02:38,760 --> 01:02:40,600
more workarounds, and lower trust.
1171
01:02:40,600 --> 01:02:44,120
The real diagnosis isn't that your people need to collaborate better or that your governance
1172
01:02:44,120 --> 01:02:45,520
needs to be stricter.
1173
01:02:45,520 --> 01:02:49,200
It's that the way control is distributed in your environment no longer matches the way
1174
01:02:49,200 --> 01:02:51,480
responsibilities distributed in your business.
1175
01:02:51,480 --> 01:02:55,640
Once you see that clearly, you can stop arguing about personalities and start mapping power
1176
01:02:55,640 --> 01:02:57,280
where it actually lives.
1177
01:02:57,280 --> 01:03:00,040
How to map real power without buying new tools?
1178
01:03:00,040 --> 01:03:03,520
Once the invisible structures become visible, the next question is purely practical.
1179
01:03:03,520 --> 01:03:08,040
You need to know how to map real power without turning this into another massive transformation
1180
01:03:08,040 --> 01:03:12,760
program, a bloated dashboard project, or an expensive governance initiative.
1181
01:03:12,760 --> 01:03:16,840
The good news is that you usually don't need new tools to see the pattern, but you definitely
1182
01:03:16,840 --> 01:03:18,360
need a different starting point.
1183
01:03:18,360 --> 01:03:22,640
Most organizations begin with formal structure by looking at the org chart, role descriptions,
1184
01:03:22,640 --> 01:03:23,640
and approval matrices.
1185
01:03:23,640 --> 01:03:27,840
That feels logical, but it only gives you the intended model rather than the actual operating
1186
01:03:27,840 --> 01:03:28,840
one.
1187
01:03:28,840 --> 01:03:32,000
If you want to understand where power actually sits, you have to start with friction.
1188
01:03:32,000 --> 01:03:36,240
Look for the places where decisions feel slow, strange, or oddly dependent on specific
1189
01:03:36,240 --> 01:03:38,880
people, because friction always leaves a trail.
1190
01:03:38,880 --> 01:03:42,880
That trail usually tells you more about real power than any policy deck ever will.
1191
01:03:42,880 --> 01:03:45,120
Start by picking a few decisions that actually matter.
1192
01:03:45,120 --> 01:03:48,680
You don't need to track everything, so just choose a handful of decisions important enough
1193
01:03:48,680 --> 01:03:51,200
to reveal how the model really functions.
1194
01:03:51,200 --> 01:03:55,240
This might include access changes for sensitive content, cross-functional project approvals,
1195
01:03:55,240 --> 01:03:59,320
or budget-related requests where multiple teams and ownership lines intersect.
1196
01:03:59,320 --> 01:04:02,120
Then ask very simple questions about the process.
1197
01:04:02,120 --> 01:04:03,800
Who initiates the request?
1198
01:04:03,800 --> 01:04:06,120
And who has to be consulted before anything moves?
1199
01:04:06,120 --> 01:04:09,960
You need to know who gives the formal approval, but more importantly, you need to find out who
1200
01:04:09,960 --> 01:04:11,680
actually unblocks the movement.
1201
01:04:11,680 --> 01:04:14,840
When the process becomes unclear, who gets pulled into fix it?
1202
01:04:14,840 --> 01:04:18,720
Find out who knows where the trusted content lives, and who has the technical power to change
1203
01:04:18,720 --> 01:04:20,840
the access or the workflow if needed.
1204
01:04:20,840 --> 01:04:25,600
And sequence matters because it separates declared authority from operational influence.
1205
01:04:25,600 --> 01:04:28,880
Once you do this a few times, you'll notice that patterns begin to repeat.
1206
01:04:28,880 --> 01:04:33,560
The same names keep showing up in teams, threads, and sharepoint spaces, and the same coordinators
1207
01:04:33,560 --> 01:04:37,760
or admins reappear at the exact moment a decision either moves or stalls.
1208
01:04:37,760 --> 01:04:41,960
This is your first real map, and while it isn't a visual one, it is a structural map
1209
01:04:41,960 --> 01:04:43,960
that traces real dependency.
1210
01:04:43,960 --> 01:04:47,160
The next step is to compare business responsibility with technical reach.
1211
01:04:47,160 --> 01:04:51,160
Think one critical business area and ask if the people accountable for outcomes have the
1212
01:04:51,160 --> 01:04:53,680
access they need to see, verify, and act.
1213
01:04:53,680 --> 01:04:55,280
This isn't a theoretical question.
1214
01:04:55,280 --> 01:04:56,280
It's a practical one.
1215
01:04:56,280 --> 01:04:59,840
If a leader owns the outcome but cannot see the relevant content or trigger a workflow
1216
01:04:59,840 --> 01:05:03,600
change without rooting through someone else, then the power has already shifted somewhere
1217
01:05:03,600 --> 01:05:04,600
else.
1218
01:05:04,600 --> 01:05:07,080
This is where the concept of effective permissions becomes useful.
1219
01:05:07,080 --> 01:05:10,720
You don't need to read technical logs to understand the core question, who can actually
1220
01:05:10,720 --> 01:05:11,720
access what right now?
1221
01:05:11,720 --> 01:05:15,060
It's not about who should have access or who used to have it, but who possesses the
1222
01:05:15,060 --> 01:05:16,760
ability to act in this moment.
1223
01:05:16,760 --> 01:05:18,520
And look at where communication concentrates.
1224
01:05:18,520 --> 01:05:22,080
When things get important, where do the conversations keep converging?
1225
01:05:22,080 --> 01:05:26,220
Identify the people who bridge multiple teams repeatedly and translate ambiguity into
1226
01:05:26,220 --> 01:05:27,220
movement.
1227
01:05:27,220 --> 01:05:30,840
You aren't trying to prove who is politically influential, but rather identifying where
1228
01:05:30,840 --> 01:05:35,360
the organization has become dependent on human centrality to compensate for weak structural
1229
01:05:35,360 --> 01:05:36,360
flow.
1230
01:05:36,360 --> 01:05:38,120
Finally, move to content stewardship.
1231
01:05:38,120 --> 01:05:41,960
You need to know who owns the critical sharepoint spaces, who updates them, and who decides
1232
01:05:41,960 --> 01:05:44,280
what information is current enough to trust.
1233
01:05:44,280 --> 01:05:47,740
After the formal owners with the real stewards in healthy structures, those roles are closely
1234
01:05:47,740 --> 01:05:50,200
aligned, but in fragile ones, they drift apart.
1235
01:05:50,200 --> 01:05:53,880
When they drift, information power starts moving away from formal accountability.
1236
01:05:53,880 --> 01:05:57,800
If you focus on decision tracing, access comparison, and stewardship, you will have more than
1237
01:05:57,800 --> 01:05:59,600
enough to see where power really sits.
1238
01:05:59,600 --> 01:06:04,240
Real power leaves evidence in movement, showing up in who can unblock work, surface the truth,
1239
01:06:04,240 --> 01:06:06,840
or make the system usable for everyone else.
1240
01:06:06,840 --> 01:06:10,640
You are mapping operational influence, not status or personality.
1241
01:06:10,640 --> 01:06:21,640
Once leaders see this clearly, the conversation changes.
1242
01:06:21,640 --> 01:06:25,040
That question is far more useful because it allows you to stop treating friction as random
1243
01:06:25,040 --> 01:06:27,640
and start treating it as design evidence.
1244
01:06:27,640 --> 01:06:28,840
Action Step 1.
1245
01:06:28,840 --> 01:06:30,360
Measure decision latency.
1246
01:06:30,360 --> 01:06:34,040
If you want to make this practical, the first thing I would measure is decision latency.
1247
01:06:34,040 --> 01:06:38,600
Don't look at meeting volume, sentiment, or how many approvals exist on paper.
1248
01:06:38,600 --> 01:06:42,400
Decisions on the time between a request becoming real and a decision becoming usable because
1249
01:06:42,400 --> 01:06:46,840
this is where hidden power stops sounding abstract and starts becoming business evidence.
1250
01:06:46,840 --> 01:06:50,520
Most organizations already feel this problem, and people will tell you that decisions take
1251
01:06:50,520 --> 01:06:53,800
too long or that work slows down around certain dependencies.
1252
01:06:53,800 --> 01:06:58,360
However, unless you define the start and endpoints clearly, the conversation stays soft and gets
1253
01:06:58,360 --> 01:06:59,360
explained away.
1254
01:06:59,360 --> 01:07:03,040
You have to make it concrete by picking three to five decisions that regularly affect delivery
1255
01:07:03,040 --> 01:07:05,320
speed, risk, or client response.
1256
01:07:05,320 --> 01:07:09,640
Then define the exact decision window, does the clock start when the request is submitted,
1257
01:07:09,640 --> 01:07:11,440
or when a manager asks for action.
1258
01:07:11,440 --> 01:07:14,080
You also need to define the end point just as clearly.
1259
01:07:14,080 --> 01:07:17,760
A decision isn't done when someone says yes in theory, it's only done when it becomes
1260
01:07:17,760 --> 01:07:18,920
executable.
1261
01:07:18,920 --> 01:07:23,480
If the content is still unclear or a workflow owner still needs to adjust something manually,
1262
01:07:23,480 --> 01:07:25,600
the decision is only nominally finished.
1263
01:07:25,600 --> 01:07:29,480
Measure from the initial request to the usable outcome to find the real latency.
1264
01:07:29,480 --> 01:07:33,080
Once you have that data, don't just look at the total duration, break the path down
1265
01:07:33,080 --> 01:07:37,040
to see where the request waited, where it looped back, and where someone had to step in outside
1266
01:07:37,040 --> 01:07:39,440
the official process to get it across the line.
1267
01:07:39,440 --> 01:07:43,360
These moments are vital because they show you where movement depends on hidden intervention.
1268
01:07:43,360 --> 01:07:46,920
In the anchor case, this data changed the conversation almost immediately.
1269
01:07:46,920 --> 01:07:50,680
Leaders had a general sense that things were slow, but once the workflows were traced,
1270
01:07:50,680 --> 01:07:52,880
the shape of the problem was impossible to ignore.
1271
01:07:52,880 --> 01:07:55,120
The formal approvals weren't always the slowest point.
1272
01:07:55,120 --> 01:07:59,320
Instead, the actual delay sat in the spaces between them while people waited for context,
1273
01:07:59,320 --> 01:08:01,160
access, or validation.
1274
01:08:01,160 --> 01:08:02,640
That is where power reveals itself.
1275
01:08:02,640 --> 01:08:06,720
It doesn't show up where responsibility is declared, but at the point where time accumulates.
1276
01:08:06,720 --> 01:08:11,760
Delay is rarely random as it tends to cluster around uncertainty and places where access
1277
01:08:11,760 --> 01:08:13,760
and flow are misaligned.
1278
01:08:13,760 --> 01:08:17,480
When you measure latency properly, you are measuring structural dependence and identifying
1279
01:08:17,480 --> 01:08:21,120
where the system still requires human translation to function.
1280
01:08:21,120 --> 01:08:25,520
This makes latency a powerful executive metric because it reframes friction in operational
1281
01:08:25,520 --> 01:08:26,520
terms.
1282
01:08:26,520 --> 01:08:28,440
You are no longer just saying people are frustrated.
1283
01:08:28,440 --> 01:08:32,160
You are proving that a decision takes 11 days when only two of those days involve formal
1284
01:08:32,160 --> 01:08:33,160
review.
1285
01:08:33,160 --> 01:08:36,440
That realization lands differently and changes what leaders can do next.
1286
01:08:36,440 --> 01:08:41,160
You can then compare decisions that look similar on paper but behave differently in practice.
1287
01:08:41,160 --> 01:08:44,920
Why does one approval path move cleanly while another keeps stalling?
1288
01:08:44,920 --> 01:08:48,600
Why do the same names keep appearing at the moments where movement finally resumes?
1289
01:08:48,600 --> 01:08:50,080
These are the real power questions.
1290
01:08:50,080 --> 01:08:53,560
It is important not to use latency as a weapon against individuals.
1291
01:08:53,560 --> 01:08:54,880
Use it diagnostically instead.
1292
01:08:54,880 --> 01:08:58,360
If one person appears in every bottleneck, it doesn't mean they are slow.
1293
01:08:58,360 --> 01:09:01,160
It often means they are carrying the weight of the entire system.
1294
01:09:01,160 --> 01:09:04,240
The system has simply routed too much through them.
1295
01:09:04,240 --> 01:09:07,520
The point isn't to find someone to blame but to expose the truth.
1296
01:09:07,520 --> 01:09:11,360
Measure where the business weights and you will learn where the organization has placed
1297
01:09:11,360 --> 01:09:12,600
real power.
1298
01:09:12,600 --> 01:09:14,920
Every repeated delay is telling you the same thing.
1299
01:09:14,920 --> 01:09:18,640
Authority might live on the org chart but movement lives where decisions stop waiting.
1300
01:09:18,640 --> 01:09:19,640
Action step 2.
1301
01:09:19,640 --> 01:09:21,960
Ordered access against responsibility.
1302
01:09:21,960 --> 01:09:25,680
The second step in this process is to order access against responsibility.
1303
01:09:25,680 --> 01:09:29,280
This is the point where the permission problem becomes impossible to ignore because you are
1304
01:09:29,280 --> 01:09:32,360
no longer just looking at delay as an unfortunate outcome.
1305
01:09:32,360 --> 01:09:35,960
Instead you are looking at the actual structure that keeps producing that delay.
1306
01:09:35,960 --> 01:09:37,840
The core question here is very simple.
1307
01:09:37,840 --> 01:09:41,160
Does your current access model actually reflect the business reality of today?
1308
01:09:41,160 --> 01:09:45,120
I am not talking about the reality from two reorganizations ago or the way things worked
1309
01:09:45,120 --> 01:09:46,760
before the last big merger.
1310
01:09:46,760 --> 01:09:50,960
I am certainly not talking about the reality from before that emergency project created
1311
01:09:50,960 --> 01:09:54,080
six different exception groups that nobody ever bothered to clean up.
1312
01:09:54,080 --> 01:09:55,360
I am talking about right now.
1313
01:09:55,360 --> 01:09:58,960
If you look closely at most environments, they are carrying a massive amount of historical
1314
01:09:58,960 --> 01:10:02,680
access long after the underlying responsibility has moved on.
1315
01:10:02,680 --> 01:10:06,960
People change roles, projects end and owners leave the company, yet group memberships and
1316
01:10:06,960 --> 01:10:09,480
inherited permissions stay behind like sediment.
1317
01:10:09,480 --> 01:10:13,680
When leaders ask who actually holds the power in a system, the honest answer is often buried
1318
01:10:13,680 --> 01:10:15,200
inside that residue.
1319
01:10:15,200 --> 01:10:18,920
Because fixing a whole tenant in one motion is usually a recipe for failure, I recommend
1320
01:10:18,920 --> 01:10:20,800
starting with a very narrow scope.
1321
01:10:20,800 --> 01:10:24,720
Pick a few critical business areas where bad access creates either massive business drag
1322
01:10:24,720 --> 01:10:26,080
or real exposure.
1323
01:10:26,080 --> 01:10:30,360
This might include finance reporting, HR sensitive collaboration, commercial proposals or executive
1324
01:10:30,360 --> 01:10:31,720
decision material.
1325
01:10:31,720 --> 01:10:34,440
Once you have your focus, compare two things side by side.
1326
01:10:34,440 --> 01:10:38,240
Ask who is formally accountable for the outcome and then ask who can actually see, change,
1327
01:10:38,240 --> 01:10:40,080
share or grant access in that space.
1328
01:10:40,080 --> 01:10:43,040
That comparison is where the real story of your organization starts.
1329
01:10:43,040 --> 01:10:47,200
On paper accountability usually looks clear because there is a named owner or a formal role.
1330
01:10:47,200 --> 01:10:51,360
But when you trace effective permissions, you often find a much messier map where someone
1331
01:10:51,360 --> 01:10:54,720
still has access through an old group they joined years ago.
1332
01:10:54,720 --> 01:10:58,280
Someone else might have added rights because they were added directly during a crisis and
1333
01:10:58,280 --> 01:11:02,400
never removed, while a former project structure is still granting visibility into material
1334
01:11:02,400 --> 01:11:05,280
that now supports a completely different decision process.
1335
01:11:05,280 --> 01:11:09,120
Sometimes the opposite is true and the person now responsible for the outcome cannot see
1336
01:11:09,120 --> 01:11:10,120
enough to manage it.
1337
01:11:10,120 --> 01:11:14,480
They end up stuck asking others for screenshots, forwarded links or verbal confirmation just
1338
01:11:14,480 --> 01:11:15,720
to do their jobs.
1339
01:11:15,720 --> 01:11:19,600
That is misaligned control in its purest form where the org chart says one thing, but
1340
01:11:19,600 --> 01:11:21,280
the permission model says another.
1341
01:11:21,280 --> 01:11:24,920
This matters because access is not just a security issue.
1342
01:11:24,920 --> 01:11:27,760
It is a fundamental business capability issue.
1343
01:11:27,760 --> 01:11:31,520
If the wrong people hold broad reach, they gain influence whether anyone intended that
1344
01:11:31,520 --> 01:11:32,520
or not.
1345
01:11:32,520 --> 01:11:36,480
Conversely, if the right people lack reach, they lose decision quality even if they keep
1346
01:11:36,480 --> 01:11:38,400
their impressive titles.
1347
01:11:38,400 --> 01:11:41,800
Effective permissions are about more than just the principle of least privilege.
1348
01:11:41,800 --> 01:11:43,520
They are about operating legitimacy.
1349
01:11:43,520 --> 01:11:46,920
You have to ask if the people carrying the responsibility can actually operate from first-hand
1350
01:11:46,920 --> 01:11:50,360
context and if they can't, you need to find out who can.
1351
01:11:50,360 --> 01:11:54,280
The last question is vital because hidden influence often sits with the people who bridge the gap
1352
01:11:54,280 --> 01:11:57,280
between formal ownership and actual visibility.
1353
01:11:57,280 --> 01:12:00,040
In practical terms, I look for four specific red flags.
1354
01:12:00,040 --> 01:12:04,040
First is "Stayl Group Membership" which tells you that your review process has drifted.
1355
01:12:04,040 --> 01:12:08,040
Second is "inherited access" that nobody would consciously design today, which suggests
1356
01:12:08,040 --> 01:12:10,360
control is spreading further than you intended.
1357
01:12:10,360 --> 01:12:14,600
Third is the presence of direct exceptions granted to solve old friction, proving the
1358
01:12:14,600 --> 01:12:17,360
formal model failed and someone had to patch around it.
1359
01:12:17,360 --> 01:12:21,760
Finally, look for broad access around critical data sets that has no clear business justification
1360
01:12:21,760 --> 01:12:24,560
because that is where power sits in places the business isn't governing.
1361
01:12:24,560 --> 01:12:26,840
Do not stop at user accounts when you do this audit.
1362
01:12:26,840 --> 01:12:31,560
You must look at service principles, automation ownership and workflow identities as well.
1363
01:12:31,560 --> 01:12:36,680
In modern environments, access is held by automated actors that shape what data moves where and
1364
01:12:36,680 --> 01:12:38,080
who can act without asking.
1365
01:12:38,080 --> 01:12:41,240
This matters even more now that we are moving into the era of AI.
1366
01:12:41,240 --> 01:12:45,600
Tools like co-pilot and various agents inherit the same messy reality and if the underlying
1367
01:12:45,600 --> 01:12:49,160
access layer is wrong, the intelligence layer will not correct it.
1368
01:12:49,160 --> 01:12:51,040
It will simply operationalize the chaos.
1369
01:12:51,040 --> 01:12:55,520
The purpose of this step is not to create another boring access review ritual for the sake
1370
01:12:55,520 --> 01:12:56,720
of compliance.
1371
01:12:56,720 --> 01:12:59,520
The purpose is to ask a much sharper business question.
1372
01:12:59,520 --> 01:13:03,880
Does authority in this area still line up with visibility action and consequence?
1373
01:13:03,880 --> 01:13:07,200
If it doesn't, you shouldn't be surprised when decisions get political or when the
1374
01:13:07,200 --> 01:13:11,800
same unofficial experts keep reappearing to validate reality for everyone else.
1375
01:13:11,800 --> 01:13:15,360
Once access drifts away from responsibility, power always drifts with it.
1376
01:13:15,360 --> 01:13:19,160
If you want to understand how your organization actually works, don't ask who reports to
1377
01:13:19,160 --> 01:13:20,160
whom.
1378
01:13:20,160 --> 01:13:21,760
Ask who has access to what?
1379
01:13:21,760 --> 01:13:22,760
Action step 3.
1380
01:13:22,760 --> 01:13:24,080
Reduce hidden dependencies.
1381
01:13:24,080 --> 01:13:28,800
The third step is to reduce hidden dependencies before they harden into permanent architecture.
1382
01:13:28,800 --> 01:13:32,680
Once you have measured how long decisions take and compared access with responsibility,
1383
01:13:32,680 --> 01:13:34,400
the next logical question is obvious.
1384
01:13:34,400 --> 01:13:38,720
Where is the business still depending on one specific person, one flow maintainer, or
1385
01:13:38,720 --> 01:13:41,880
one piece of undocumented history just to keep the lights on?
1386
01:13:41,880 --> 01:13:43,560
That is the dependency you need to remove.
1387
01:13:43,560 --> 01:13:47,720
This isn't because dependency is always a bad thing, as every organization has specialists
1388
01:13:47,720 --> 01:13:49,760
and trust nodes who hold deep context.
1389
01:13:49,760 --> 01:13:51,800
That is a normal part of working with experts.
1390
01:13:51,800 --> 01:13:56,280
What is not healthy is when ordinary business continuity depends on those people remaining
1391
01:13:56,280 --> 01:14:01,200
continuously available to interpret or unlock what the system should already make clear.
1392
01:14:01,200 --> 01:14:04,000
That is where structural resilience starts breaking down.
1393
01:14:04,000 --> 01:14:09,040
To fix this, I look in three specific places, critical content, workflow ownership and context
1394
01:14:09,040 --> 01:14:10,040
concentration.
1395
01:14:10,040 --> 01:14:14,680
Start by identifying which sharepoint spaces or document sets are genuinely business critical.
1396
01:14:14,680 --> 01:14:16,360
Then ask yourself a hard question.
1397
01:14:16,360 --> 01:14:20,600
If the current owner disappeared for two weeks, would the business still know what is current
1398
01:14:20,600 --> 01:14:21,600
and how to manage it?
1399
01:14:21,600 --> 01:14:24,560
If the answer is no, then you do not have true ownership.
1400
01:14:24,560 --> 01:14:27,080
You have a dependency wearing the clothes of ownership.
1401
01:14:27,080 --> 01:14:31,080
To fix this, you need redundancy in the form of a second accountable owner and cleaner
1402
01:14:31,080 --> 01:14:32,080
stewardship rules.
1403
01:14:32,080 --> 01:14:36,120
You need clearer signals around what is trusted and operationally valid so the system can
1404
01:14:36,120 --> 01:14:37,760
function without a gatekeeper.
1405
01:14:37,760 --> 01:14:41,960
Then you have to look at workflow ownership, which is a detail that gets missed constantly
1406
01:14:41,960 --> 01:14:43,440
in power platform environments.
1407
01:14:43,440 --> 01:14:48,200
A flow might exist and work perfectly, but if only one person understands how to modify
1408
01:14:48,200 --> 01:14:53,000
it or what happens when it breaks, that workflow is not a scalable business asset.
1409
01:14:53,000 --> 01:14:57,320
It is a hidden fragility because workflow control and process power are the same thing.
1410
01:14:57,320 --> 01:15:00,960
The people who can change the flow effectively control the pace of the business.
1411
01:15:00,960 --> 01:15:03,840
Finally, we have to address context concentration.
1412
01:15:03,840 --> 01:15:07,400
This is the hardest one to solve because it lives inside people's heads.
1413
01:15:07,400 --> 01:15:12,040
You have to find out who knows why a certain exception exists or which version of a file
1414
01:15:12,040 --> 01:15:13,480
can actually be trusted.
1415
01:15:13,480 --> 01:15:17,920
These are dangerous questions if only one or two people can answer them consistently.
1416
01:15:17,920 --> 01:15:22,360
You can reduce that dependency structurally by documenting the rules and making stewardship
1417
01:15:22,360 --> 01:15:23,360
visible.
1418
01:15:23,360 --> 01:15:26,640
Shift interpretation into a shared process wherever you can, not because documents solve
1419
01:15:26,640 --> 01:15:30,200
every problem, but because invisible context is expensive.
1420
01:15:30,200 --> 01:15:34,000
Concentrated, invisible context is exactly how gatekeepers become permanent fixtures in
1421
01:15:34,000 --> 01:15:35,000
a company.
1422
01:15:35,000 --> 01:15:38,280
In the case I've been tracking, this was one of the biggest shifts we saw.
1423
01:15:38,280 --> 01:15:42,800
Once the organization stopped praising the people who kept rescuing broken flows and started
1424
01:15:42,800 --> 01:15:46,480
redesigning the system around the load they were carrying, everything changed.
1425
01:15:46,480 --> 01:15:50,120
They assigned additional owners to critical content and shared workflow knowledge instead
1426
01:15:50,120 --> 01:15:53,480
of letting it sit with the person who built the original fix.
1427
01:15:53,480 --> 01:15:58,040
Most importantly, leaders stopped treating the always needed person as proof of excellence.
1428
01:15:58,040 --> 01:16:02,560
They started seeing that pattern as evidence of a design gap, which is a major shift in how
1429
01:16:02,560 --> 01:16:03,560
you view your team.
1430
01:16:03,560 --> 01:16:07,720
It removes the blame from the individual without leaving the broken structure untouched.
1431
01:16:07,720 --> 01:16:11,200
The person at the center of these dependencies is usually not the problem.
1432
01:16:11,200 --> 01:16:15,160
In fact, they are often the only reason the business is still functioning.
1433
01:16:15,160 --> 01:16:19,000
But if you leave that hidden dependency in place, you are building future delay and burn
1434
01:16:19,000 --> 01:16:20,880
out directly into your operating model.
1435
01:16:20,880 --> 01:16:22,400
The goal here is simple.
1436
01:16:22,400 --> 01:16:25,800
Make important work survivable without requiring heroics.
1437
01:16:25,800 --> 01:16:29,800
You want content to be trustworthy without private interpretation and workflows to be
1438
01:16:29,800 --> 01:16:32,240
maintainable without a single human key.
1439
01:16:32,240 --> 01:16:35,040
That is what structural resilience looks like in practice.
1440
01:16:35,040 --> 01:16:39,280
It isn't about perfect control or maximum restriction, but a design where responsibility
1441
01:16:39,280 --> 01:16:43,240
and continuity hold firm even when one person goes offline.
1442
01:16:43,240 --> 01:16:47,200
When you achieve that, the organization becomes much easier to scale because movement is
1443
01:16:47,200 --> 01:16:50,320
no longer trapped inside a single point of failure.
1444
01:16:50,320 --> 01:16:52,040
What executive teams need to understand?
1445
01:16:52,040 --> 01:16:55,920
What executive teams need to understand is that digital structure is no longer an IT
1446
01:16:55,920 --> 01:16:58,200
hygiene issue sitting somewhere below strategy.
1447
01:16:58,200 --> 01:16:59,440
It is strategy.
1448
01:16:59,440 --> 01:17:03,560
Because every major transformation decision now runs through digital architecture, any change
1449
01:17:03,560 --> 01:17:08,560
in access, workflow or automation fundamentally alters how the business thinks and moves.
1450
01:17:08,560 --> 01:17:12,200
When leaders approve a digital transformation program or an AI rollout, they aren't just
1451
01:17:12,200 --> 01:17:13,320
investing in new tools.
1452
01:17:13,320 --> 01:17:18,240
They are actively redesigning the power dynamics of the entire organization.
1453
01:17:18,240 --> 01:17:19,240
And why is that?
1454
01:17:19,240 --> 01:17:22,640
Because every permission model is actually an operating model choice in disguise.
1455
01:17:22,640 --> 01:17:26,600
It determines who can see enough context to act and who has to ask for permission, while
1456
01:17:26,600 --> 01:17:30,120
also defining who can move directly and who is forced to wait.
1457
01:17:30,120 --> 01:17:34,160
These technical settings decide who becomes essential in the middle of a process and who
1458
01:17:34,160 --> 01:17:39,400
gets bypassed entirely, often leaving specific people to carry the consequences of a project
1459
01:17:39,400 --> 01:17:41,920
without having the visibility to manage it.
1460
01:17:41,920 --> 01:17:43,120
That is executive territory.
1461
01:17:43,120 --> 01:17:46,320
This isn't because leaders need to manage every group membership themselves.
1462
01:17:46,320 --> 01:17:50,440
But because the distribution of access quietly determines the distribution of influence,
1463
01:17:50,440 --> 01:17:52,800
speed and risk across the company.
1464
01:17:52,800 --> 01:17:58,000
If an executive team says it wants faster decisions while approving structures that fragment information,
1465
01:17:58,000 --> 01:18:02,600
then the system is doing exactly what leadership has allowed it to do by producing latency.
1466
01:18:02,600 --> 01:18:06,640
When an executive team demands accountability but tolerates weak content ownership and
1467
01:18:06,640 --> 01:18:10,680
stale permissions, they shouldn't be surprised when decisions become muddy and politically
1468
01:18:10,680 --> 01:18:11,680
dependent.
1469
01:18:11,680 --> 01:18:13,720
That isn't a culture problem in the soft sense.
1470
01:18:13,720 --> 01:18:15,960
It's an architecture problem in the hard sense.
1471
01:18:15,960 --> 01:18:19,640
This is also why digital governance cannot be treated as a purely protective function
1472
01:18:19,640 --> 01:18:22,040
that only exists for audit and compliance.
1473
01:18:22,040 --> 01:18:26,280
While governance certainly reduces exposure, it also serves as the mechanism that allocates
1474
01:18:26,280 --> 01:18:28,520
decision capability across the workforce.
1475
01:18:28,520 --> 01:18:32,600
It defines whether responsibility can be exercised with enough context to be real.
1476
01:18:32,600 --> 01:18:36,160
And once you introduce AI, that reality becomes even more visible.
1477
01:18:36,160 --> 01:18:40,160
Every AI rollout is effectively a trust test of your existing infrastructure.
1478
01:18:40,160 --> 01:18:44,080
We have to ask if we trust our access model enough to let a language interface make it
1479
01:18:44,080 --> 01:18:45,160
more usable.
1480
01:18:45,160 --> 01:18:49,680
Or if our ownership model is strong enough to let answers surface from across the environment.
1481
01:18:49,680 --> 01:18:54,080
If the answer is no, then the executive problem isn't actually AI skepticism.
1482
01:18:54,080 --> 01:18:56,440
It is unresolved structural misalignment.
1483
01:18:56,440 --> 01:19:00,800
That is the part many leadership teams still underestimate because they expect productivity
1484
01:19:00,800 --> 01:19:04,480
tools to increase output while the core operating structure stays untouched.
1485
01:19:04,480 --> 01:19:06,160
But the core structure always matters.
1486
01:19:06,160 --> 01:19:11,080
If the business does not trust its own visibility rules or if ownership is blurred, AI will expose
1487
01:19:11,080 --> 01:19:12,600
those gaps immediately.
1488
01:19:12,600 --> 01:19:16,720
When real decisions happen through informal translators instead of formal pathways, AI
1489
01:19:16,720 --> 01:19:20,520
will highlight that too, which is why this conversation belongs in the executive room for
1490
01:19:20,520 --> 01:19:22,360
a very practical reason.
1491
01:19:22,360 --> 01:19:26,680
Misaligned power slows decisions and increases risk, which ultimately limits your ability to
1492
01:19:26,680 --> 01:19:27,680
scale.
1493
01:19:27,680 --> 01:19:31,360
It delays transformation because every new capability inherits all dependencies.
1494
01:19:31,360 --> 01:19:36,200
And it reduces ROI because tools cannot outperform the structural logic they sit inside.
1495
01:19:36,200 --> 01:19:40,520
From a systems perspective, executive teams have three responsibilities to address this.
1496
01:19:40,520 --> 01:19:43,880
First you must treat permissions as business design rather than technical residues.
1497
01:19:43,880 --> 01:19:47,960
Second you should insist that accountability and access are reviewed together as a single
1498
01:19:47,960 --> 01:19:48,960
unit.
1499
01:19:48,960 --> 01:19:53,720
Third you have to understand that true resilience requires redundancy around information
1500
01:19:53,720 --> 01:19:55,080
and workflow ownership.
1501
01:19:55,080 --> 01:19:58,520
That last point matters because scale does not come from making a few people faster.
1502
01:19:58,520 --> 01:20:01,920
It comes from reducing how many things depend on those few people in the first place.
1503
01:20:01,920 --> 01:20:06,440
If I were sitting with an executive team today, I would frame the whole issue very simply.
1504
01:20:06,440 --> 01:20:10,120
Do not ask whether your governance is strict enough, but instead ask whether your control
1505
01:20:10,120 --> 01:20:13,160
model matches how responsibility actually sits in the business.
1506
01:20:13,160 --> 01:20:17,080
Do not ask whether your AI rollout is ambitious enough, but ask whether the environment underneath
1507
01:20:17,080 --> 01:20:19,960
it actually deserves to be accelerated.
1508
01:20:19,960 --> 01:20:24,080
And do not ask only who owns the process, but ask who can actually move it, because if
1509
01:20:24,080 --> 01:20:28,600
those answers point to different places, then the organization is not running on a hierarchy.
1510
01:20:28,600 --> 01:20:29,960
It is running on hidden power.
1511
01:20:29,960 --> 01:20:33,280
Once you see that, the priority becomes very clear because you aren't just cleaning up
1512
01:20:33,280 --> 01:20:34,280
permissions.
1513
01:20:34,280 --> 01:20:38,600
You are deciding what kind of business reality your systems will keep producing.
1514
01:20:38,600 --> 01:20:39,600
Conclusion.
1515
01:20:39,600 --> 01:20:43,480
When we pull all of this together, the main point is not complicated.
1516
01:20:43,480 --> 01:20:47,840
Power in a modern organization is rarely located exactly where the org chart says it is, because
1517
01:20:47,840 --> 01:20:52,360
it actually sits where systems distribute visibility and workflows allow movement.
1518
01:20:52,360 --> 01:20:56,440
It lives where information can be interpreted and acted on without delay, which is why a formal
1519
01:20:56,440 --> 01:21:01,440
hierarchy can look clean while the operational reality feels incredibly messy.
1520
01:21:01,440 --> 01:21:06,280
The business is not only running on roles and titles, it is running on access, communication,
1521
01:21:06,280 --> 01:21:09,960
and the hidden dependencies built into everyday execution.
1522
01:21:09,960 --> 01:21:13,960
Once you start looking through that lens, a lot of things that used to seem political start
1523
01:21:13,960 --> 01:21:15,160
making much more sense.
1524
01:21:15,160 --> 01:21:19,280
You begin to see why one person keeps appearing in every important decision and why some teams
1525
01:21:19,280 --> 01:21:22,320
move faster than others despite having the same formal authority.
1526
01:21:22,320 --> 01:21:23,520
It is a system outcome.
1527
01:21:23,520 --> 01:21:24,640
The reason is simple.
1528
01:21:24,640 --> 01:21:28,880
The people who can see enough and connect enough will always carry more real influence than
1529
01:21:28,880 --> 01:21:31,000
the structure alone suggests.
1530
01:21:31,000 --> 01:21:34,360
Sometimes that influence is concentrated in one trusted gatekeeper, and other times it
1531
01:21:34,360 --> 01:21:39,960
is scattered across an over-permissioned environment, but the same principle holds in every case.
1532
01:21:39,960 --> 01:21:43,280
Control that does not match responsibility will eventually distort decision making and
1533
01:21:43,280 --> 01:21:44,440
slow the business down.
1534
01:21:44,440 --> 01:21:46,960
It creates shadow behavior and weakens trust.
1535
01:21:46,960 --> 01:21:51,400
And if you layer AI on top of that, it will only amplify whatever misalignment already exists.
1536
01:21:51,400 --> 01:21:55,720
If you want one practical move after this episode, I suggest you make it small and real by picking
1537
01:21:55,720 --> 01:21:58,760
one important decision path this week and tracing it.
1538
01:21:58,760 --> 01:22:03,280
Find out who starts it, who actually unblocks it, and who controls the content when the formal
1539
01:22:03,280 --> 01:22:04,760
process stops being enough.
1540
01:22:04,760 --> 01:22:08,920
That exercise alone will tell you more about your organization than another org chart review
1541
01:22:08,920 --> 01:22:09,920
ever will.
1542
01:22:09,920 --> 01:22:13,800
If this lens changed how you think about power, leave a review for the podcast, and share
1543
01:22:13,800 --> 01:22:17,440
this episode with someone responsible for governance or an AI rollout.
1544
01:22:17,440 --> 01:22:21,160
You can also connect with me on LinkedIn and send me the next question you want me to unpack
1545
01:22:21,160 --> 01:22:22,160
here.
1546
01:22:22,160 --> 01:22:25,160
Because if power in your organization is defined by access, are you sure the right people








