Integrate ServiceNow and Microsoft for Success

Mirko PetersPodcasts2 hours ago26 Views


1
00:00:00,000 –> 00:00:03,680
Most organizations still talk about service now like it’s the ticketing system.

2
00:00:03,680 –> 00:00:04,600
They are wrong.

3
00:00:04,600 –> 00:00:07,200
Ticketing was the entry point, not the destination.

4
00:00:07,200 –> 00:00:09,480
The real enterprise problem isn’t too many tools.

5
00:00:09,480 –> 00:00:14,840
It’s that work has no single state, no owner, and no enforceable path from someone asked to.

6
00:00:14,840 –> 00:00:15,880
It’s done.

7
00:00:15,880 –> 00:00:17,840
Microsoft is where intent shows up.

8
00:00:17,840 –> 00:00:20,200
Chats, emails, meetings, documents.

9
00:00:20,200 –> 00:00:23,080
Service now is where intent becomes execution.

10
00:00:23,080 –> 00:00:26,320
Routing, approvals, evidence, audit.

11
00:00:26,320 –> 00:00:29,440
In the next hour, this will get painfully obvious because workflows

12
00:00:29,440 –> 00:00:30,440
don’t fail in theory.

13
00:00:30,440 –> 00:00:32,400
They fail in your org chart.

14
00:00:32,400 –> 00:00:36,520
The enterprise workflow problem, digitally rich, operationally fragmented.

15
00:00:36,520 –> 00:00:38,080
Enterprises are digitally rich.

16
00:00:38,080 –> 00:00:44,160
They have Microsoft 365, they have an ERP, they have a dozen best of breed tools for security,

17
00:00:44,160 –> 00:00:49,400
HR, facilities, finance, procurement, customer operations, and whatever else someone bought

18
00:00:49,400 –> 00:00:51,400
during the last incident review.

19
00:00:51,400 –> 00:00:55,360
And they’re still operationally fragmented because having systems isn’t the same as having

20
00:00:55,360 –> 00:00:57,360
an operating layer.

21
00:00:57,360 –> 00:01:00,240
What most environments actually have is a collection of queues.

22
00:01:00,240 –> 00:01:05,640
In boxes, teams, channels, portals, ticket forms, Excel trackers, and shared mailboxes.

23
00:01:05,640 –> 00:01:06,920
Each queue has local truth.

24
00:01:06,920 –> 00:01:08,400
None of them have end to end truth.

25
00:01:08,400 –> 00:01:10,160
That distinction matters.

26
00:01:10,160 –> 00:01:12,000
The typical day looks like this.

27
00:01:12,000 –> 00:01:15,360
Someone starts in teams or outlook because that’s where people actually work.

28
00:01:15,360 –> 00:01:19,480
They describe a need, new laptop, new access, purchase approval, urgent security alert,

29
00:01:19,480 –> 00:01:23,200
production outage, intent is created as a message, not a record.

30
00:01:23,200 –> 00:01:24,880
Then the system forces a context switch.

31
00:01:24,880 –> 00:01:29,040
Go to a portal, find the right form, pick the right category, attach the right screenshot,

32
00:01:29,040 –> 00:01:31,760
retype the same story you already wrote in chat.

33
00:01:31,760 –> 00:01:34,320
Submit, wait, follow up, follow up again.

34
00:01:34,320 –> 00:01:37,520
This is not a user experience problem, it’s an execution model problem.

35
00:01:37,520 –> 00:01:41,160
Every time someone jumps from teams to a portal to an email thread to a spreadsheet and

36
00:01:41,160 –> 00:01:43,400
back again, the organization is paying attacks.

37
00:01:43,400 –> 00:01:47,320
It’s not just time, it’s loss of state, loss of accountability, and loss of evidence.

38
00:01:47,320 –> 00:01:48,640
People don’t remember what they did.

39
00:01:48,640 –> 00:01:49,920
They remember where they did it.

40
00:01:49,920 –> 00:01:52,920
And that becomes the root cause of, we don’t know what happened.

41
00:01:52,920 –> 00:01:57,080
The worst part is what happens next, manual handoffs, approvals, escalations, exceptions,

42
00:01:57,080 –> 00:02:00,000
quick favors, side channel decisions in chat.

43
00:02:00,000 –> 00:02:03,400
These are entropy generators that they feel fast in the moment and they’re catastrophic

44
00:02:03,400 –> 00:02:04,400
later.

45
00:02:04,400 –> 00:02:08,640
Because each exception bypasses the thing that makes an enterprise predictable, a controlled

46
00:02:08,640 –> 00:02:13,440
sequence of steps with clear ownership and an ordered trail that survives turnover and

47
00:02:13,440 –> 00:02:14,440
panic.

48
00:02:14,440 –> 00:02:18,040
So you end up with a business that can produce documents, send messages, and host meetings

49
00:02:18,040 –> 00:02:21,480
at industrial scale, but can’t reliably move work across boundaries.

50
00:02:21,480 –> 00:02:24,000
And that’s why visibility fails.

51
00:02:24,000 –> 00:02:25,480
Locally everyone can see their piece.

52
00:02:25,480 –> 00:02:26,920
I sent the email.

53
00:02:26,920 –> 00:02:28,200
I approved in chat.

54
00:02:28,200 –> 00:02:30,000
I deployed the fix.

55
00:02:30,000 –> 00:02:32,000
Procurement is looking at it.

56
00:02:32,000 –> 00:02:33,160
Security said it was fine.

57
00:02:33,160 –> 00:02:34,360
Each team has a story.

58
00:02:34,360 –> 00:02:35,360
End to end.

59
00:02:35,360 –> 00:02:36,360
Nobody has the state machine.

60
00:02:36,360 –> 00:02:39,000
You get status everywhere and progress nowhere.

61
00:02:39,000 –> 00:02:42,160
Now the comfortable objection is, but we have an ERP.

62
00:02:42,160 –> 00:02:43,160
Yes, you do.

63
00:02:43,160 –> 00:02:44,560
It records transactions.

64
00:02:44,560 –> 00:02:45,560
It doesn’t root work.

65
00:02:45,560 –> 00:02:48,640
It’s designed to preserve integrity, not orchestrate humans.

66
00:02:48,640 –> 00:02:50,240
And ERP is a system of record.

67
00:02:50,240 –> 00:02:51,240
That’s not an insult.

68
00:02:51,240 –> 00:02:52,240
That’s the point.

69
00:02:52,240 –> 00:02:55,040
It’s slow by design because correctness matters more than speed.

70
00:02:55,040 –> 00:02:58,080
The next objection is, but we have Microsoft 365.

71
00:02:58,080 –> 00:02:59,080
Yes, you do.

72
00:02:59,080 –> 00:03:02,120
It creates artifacts, emails, documents, meetings, chats, tasks.

73
00:03:02,120 –> 00:03:05,440
It captures intent extremely well, but it doesn’t enforce intent.

74
00:03:05,440 –> 00:03:06,880
It doesn’t guarantee sequence.

75
00:03:06,880 –> 00:03:08,800
It doesn’t decide who owns the next step.

76
00:03:08,800 –> 00:03:10,320
It doesn’t compel evidence.

77
00:03:10,320 –> 00:03:12,680
It’s a productivity surface, not an execution engine.

78
00:03:12,680 –> 00:03:15,680
So organizations try to patch the gap with automation.

79
00:03:15,680 –> 00:03:20,440
They build small flows, post a message, create a task, mirror a notification.

80
00:03:20,440 –> 00:03:24,440
Even those flows multiply, ownership disappears and governance never shows up.

81
00:03:24,440 –> 00:03:25,960
Shadow automation is not innovation.

82
00:03:25,960 –> 00:03:28,360
It’s integration debt with a friendly UI.

83
00:03:28,360 –> 00:03:31,360
And the longer it runs, the worse it gets.

84
00:03:31,360 –> 00:03:33,800
Connectors get overscoped to make it work.

85
00:03:33,800 –> 00:03:37,360
Service accounts become permanent super-users and nobody remembers why.

86
00:03:37,360 –> 00:03:39,320
This is the foundational mistake.

87
00:03:39,320 –> 00:03:42,160
Treating workflows like a side feature of tools.

88
00:03:42,160 –> 00:03:45,520
Instead of treating workflows as the thing the enterprise runs on, because the enterprise

89
00:03:45,520 –> 00:03:47,000
already runs on workflows.

90
00:03:47,000 –> 00:03:48,800
They’re just undocumented and unowned.

91
00:03:48,800 –> 00:03:50,440
And boarding isn’t an HR ticket.

92
00:03:50,440 –> 00:03:52,440
It’s a cross-domain supply chain.

93
00:03:52,440 –> 00:03:56,800
Identity, access, hardware, payroll, compliance and training.

94
00:03:56,800 –> 00:03:58,920
Security incident response isn’t a team’s chat.

95
00:03:58,920 –> 00:04:02,480
It’s a controlled sequence of containment actions with approvals and evidence.

96
00:04:02,480 –> 00:04:04,680
Finance approvals aren’t an email thread.

97
00:04:04,680 –> 00:04:08,080
They’re policy enforcement with segregation of duties and auditability.

98
00:04:08,080 –> 00:04:09,840
Major incidents aren’t a war room.

99
00:04:09,840 –> 00:04:13,800
They’re coordinated human communication plus authoritative execution and change control.

100
00:04:13,800 –> 00:04:16,360
So when people say tools sprawl, they’re not wrong.

101
00:04:16,360 –> 00:04:19,240
But the real problem is workflow fragmentation.

102
00:04:19,240 –> 00:04:23,520
Work starts in one place, gets decided in another, gets executed in the third and gets documented

103
00:04:23,520 –> 00:04:24,840
maybe in a fourth.

104
00:04:24,840 –> 00:04:27,960
And that is the missing operating layer between people and systems.

105
00:04:27,960 –> 00:04:29,600
It is not optional.

106
00:04:29,600 –> 00:04:35,680
It will exist either by design, with governance or by accident, with entropy.

107
00:04:35,680 –> 00:04:37,760
The foundational misunderstanding.

108
00:04:37,760 –> 00:04:40,720
Tickets track pain, workflows control outcomes.

109
00:04:40,720 –> 00:04:42,200
Here’s what most people miss.

110
00:04:42,200 –> 00:04:43,520
A ticket is not a workflow.

111
00:04:43,520 –> 00:04:45,160
A ticket is a container for pain.

112
00:04:45,160 –> 00:04:48,720
It’s a log entry that says something is wrong or someone wants something.

113
00:04:48,720 –> 00:04:51,120
It’s useful because enterprises need triage.

114
00:04:51,120 –> 00:04:52,120
They need cues.

115
00:04:52,120 –> 00:04:53,120
They need assignment.

116
00:04:53,120 –> 00:04:54,440
They need SLA’s.

117
00:04:54,440 –> 00:04:56,600
But tickets don’t control outcomes.

118
00:04:56,600 –> 00:05:00,760
Tickets just describe the problem while humans improvise a path to resolution.

119
00:05:00,760 –> 00:05:02,080
That sounds pedantic.

120
00:05:02,080 –> 00:05:03,080
It isn’t.

121
00:05:03,080 –> 00:05:06,440
Because when an organization believes tickets are the operating model, it starts optimizing

122
00:05:06,440 –> 00:05:07,960
for the wrong things.

123
00:05:07,960 –> 00:05:12,560
Faster logging, better categorization, cleaner fields, nicer dashboards.

124
00:05:12,560 –> 00:05:15,200
Meanwhile, the real failure remains untouched.

125
00:05:15,200 –> 00:05:17,480
Work still moves through side channels.

126
00:05:17,480 –> 00:05:21,200
Approvals still happen in meetings and exceptions still get granted by whoever shouts

127
00:05:21,200 –> 00:05:22,200
loudest in teams.

128
00:05:22,200 –> 00:05:23,440
A workflow is different.

129
00:05:23,440 –> 00:05:25,080
A workflow is a control system.

130
00:05:25,080 –> 00:05:27,360
It defines sequence ownership and evidence.

131
00:05:27,360 –> 00:05:30,160
It makes the path from requested to done repeatable.

132
00:05:30,160 –> 00:05:32,280
It doesn’t just track the thing that happened.

133
00:05:32,280 –> 00:05:34,800
It creates the conditions for the thing to happen predictably.

134
00:05:34,800 –> 00:05:37,160
That’s why, beyond ITSM is not marketing.

135
00:05:37,160 –> 00:05:38,160
It’s a category shift.

136
00:05:38,160 –> 00:05:42,240
ITSM is the first place most enterprises meet workflow discipline because incidents

137
00:05:42,240 –> 00:05:44,280
and requests force the conversation.

138
00:05:44,280 –> 00:05:49,040
But the minute you cross into cross-domain work and HR, security, finance, facilities,

139
00:05:49,040 –> 00:05:50,760
the ticket model starts lying to you.

140
00:05:50,760 –> 00:05:52,840
Take the three classic idle shapes.

141
00:05:52,840 –> 00:05:53,840
Incidents are interruptions.

142
00:05:53,840 –> 00:05:55,960
They demand speed and coordination.

143
00:05:55,960 –> 00:05:57,280
Requests are supply chain.

144
00:05:57,280 –> 00:06:00,360
They need fulfillment, approvals and inventory like thinking.

145
00:06:00,360 –> 00:06:01,840
Changes are risk management.

146
00:06:01,840 –> 00:06:04,320
They exist to prevent you from making a bad day worse.

147
00:06:04,320 –> 00:06:07,440
Now watch what happens when you treat all three like a ticket.

148
00:06:07,440 –> 00:06:11,360
You build one intake form, one queue, one set of statuses, and then you rely on humans

149
00:06:11,360 –> 00:06:13,040
to do the orchestration in their heads.

150
00:06:13,040 –> 00:06:14,240
That’s where drift starts.

151
00:06:14,240 –> 00:06:17,240
Because the moment reality gets messy, onboarding a VP,

152
00:06:17,240 –> 00:06:20,640
responding to an incident trying to buy something before quarter end,

153
00:06:20,640 –> 00:06:23,360
the workflow gets replaced by just do it.

154
00:06:23,360 –> 00:06:24,640
Approvals happen in chat.

155
00:06:24,640 –> 00:06:26,640
Access gets granted temporarily.

156
00:06:26,640 –> 00:06:28,200
Procurement bypasses checks.

157
00:06:28,200 –> 00:06:30,400
Security says, “We’ll document later.”

158
00:06:30,400 –> 00:06:31,920
And later never arrives.

159
00:06:31,920 –> 00:06:33,040
That’s the entropy pattern.

160
00:06:33,040 –> 00:06:35,200
A shortcut under pressure becomes the real process.

161
00:06:35,200 –> 00:06:38,160
And this is where cross-domain work breaks ticket thinking completely.

162
00:06:38,160 –> 00:06:41,840
Onboarding is not an HR ticket plus an IT ticket.

163
00:06:41,840 –> 00:06:43,880
It’s one workflow with dependencies.

164
00:06:43,880 –> 00:06:48,160
Higher date triggers identity, identity triggers access, access triggers device provisioning,

165
00:06:48,160 –> 00:06:51,200
device provisioning triggers security baselines, security baselines,

166
00:06:51,200 –> 00:06:53,080
trigger compliance confirmations.

167
00:06:53,080 –> 00:06:56,800
If that chain isn’t enforced somewhere, you get chaos disguised as productivity,

168
00:06:56,800 –> 00:07:01,160
same with access requests, same with procurement, same with security response.

169
00:07:01,160 –> 00:07:03,720
A ticket can sit in a queue and still be open.

170
00:07:03,720 –> 00:07:05,320
That’s fine for pain tracking.

171
00:07:05,320 –> 00:07:07,960
But it tells you nothing about throughput bottlenecks or risk.

172
00:07:07,960 –> 00:07:10,680
You can close a ticket and still have the wrong access assigned.

173
00:07:10,680 –> 00:07:14,120
You can resolve an incident and still have the same conditions that caused it.

174
00:07:14,120 –> 00:07:18,600
You can implement a change and have zero evidence for why the blast radius was acceptable.

175
00:07:18,600 –> 00:07:20,120
So the reframe is simple.

176
00:07:20,120 –> 00:07:22,080
Ticketing is a visibility tool.

177
00:07:22,080 –> 00:07:23,560
Workflows are an execution tool.

178
00:07:23,560 –> 00:07:26,560
And the enterprise doesn’t get punished for missing visibility.

179
00:07:26,560 –> 00:07:28,520
It gets punished for missing execution.

180
00:07:28,520 –> 00:07:33,440
Because execution is where risk accumulates, who approved, who changed what, what evidence exists,

181
00:07:33,440 –> 00:07:37,600
what controls were bypassed and what is now permanently true in your environment.

182
00:07:37,600 –> 00:07:39,720
Because someone needed it done.

183
00:07:39,720 –> 00:07:45,720
So when leaders say we need to get beyond ITSM, what they usually mean without having the words for it is,

184
00:07:45,720 –> 00:07:48,320
we need enterprise request fulfillment and orchestration.

185
00:07:48,320 –> 00:07:52,880
We need an operating layer that makes work deterministic even when humans are not.

186
00:07:52,880 –> 00:07:55,520
That’s the platform lens executives actually fund.

187
00:07:55,520 –> 00:07:58,160
Not apps, not tickets, operating layers.

188
00:07:58,160 –> 00:08:01,920
And once you see that, the Microsoft and ServiceNow split stops being confusing.

189
00:08:01,920 –> 00:08:03,200
It becomes obvious.

190
00:08:03,200 –> 00:08:06,680
Platform not product, systems of record versus systems of action.

191
00:08:06,680 –> 00:08:08,720
Executives keep buying platforms.

192
00:08:08,720 –> 00:08:13,000
But most of what gets implemented is still treated like a product, a portal, a ticket form,

193
00:08:13,000 –> 00:08:16,280
a reporting dashboard, an AI add-on, a new license tier.

194
00:08:16,280 –> 00:08:19,880
That’s how you end up with expensive tooling and the same operational outcomes.

195
00:08:19,880 –> 00:08:22,240
The useful lens is older and much less exciting.

196
00:08:22,240 –> 00:08:24,640
System of record versus system of action.

197
00:08:24,640 –> 00:08:27,040
A system of record is where truth lives.

198
00:08:27,040 –> 00:08:30,760
It’s authoritative data, governed fields, auditability and retention.

199
00:08:30,760 –> 00:08:33,720
It’s built to be correct, durable and defensible.

200
00:08:33,720 –> 00:08:35,960
The price of that durability is friction.

201
00:08:35,960 –> 00:08:39,080
Approvals, controls and slower change velocity.

202
00:08:39,080 –> 00:08:41,600
ERP is the obvious example, so is your HRS.

203
00:08:41,600 –> 00:08:45,240
And yes, ServiceNow can be a system of record for certain operational data too.

204
00:08:45,240 –> 00:08:47,160
A system of action is where work moves.

205
00:08:47,160 –> 00:08:52,720
It roots tasks, enforces sequencing, captures decisions and produces outcomes with evidence.

206
00:08:52,720 –> 00:08:54,080
It’s designed for throughput.

207
00:08:54,080 –> 00:08:57,840
It has to handle humans, exceptions and time pressure without turning into folklore.

208
00:08:57,840 –> 00:09:01,920
Most organizations try to force their systems of record to behave like systems of action.

209
00:09:01,920 –> 00:09:05,520
They attach a workflow to an ERP transaction and call it orchestration.

210
00:09:05,520 –> 00:09:10,240
Or they treat Microsoft 365 artifacts, emails, planet asks, teams, messages as if they are

211
00:09:10,240 –> 00:09:11,560
a process state.

212
00:09:11,560 –> 00:09:13,080
That mistake doesn’t show up in a demo.

213
00:09:13,080 –> 00:09:15,960
It shows up when the CFO asks who approved this.

214
00:09:15,960 –> 00:09:18,280
And the answer is it was in a chat thread.

215
00:09:18,280 –> 00:09:21,760
Or when security asks who authorized that privilege elevation.

216
00:09:21,760 –> 00:09:23,960
And the answer is we agreed in the war room.

217
00:09:23,960 –> 00:09:25,720
Documents aren’t state chat isn’t governance.

218
00:09:25,720 –> 00:09:27,800
A mailbox is not an audit trail.

219
00:09:27,800 –> 00:09:30,600
And here’s the part that makes architects uncomfortable.

220
00:09:30,600 –> 00:09:33,720
A system of action must behave like a state machine.

221
00:09:33,720 –> 00:09:34,720
That’s not a metaphor.

222
00:09:34,720 –> 00:09:35,720
It’s a requirement.

223
00:09:35,720 –> 00:09:39,480
There has to be an authoritative definition of where this work is.

224
00:09:39,480 –> 00:09:40,840
What happens next?

225
00:09:40,840 –> 00:09:42,200
Who can move it?

226
00:09:42,200 –> 00:09:44,920
And what evidence is required to move it?

227
00:09:44,920 –> 00:09:49,120
If the work can progress by someone typing approved into teams, you do not have a state

228
00:09:49,120 –> 00:09:50,120
machine.

229
00:09:50,120 –> 00:09:51,400
You have conditional chaos.

230
00:09:51,400 –> 00:09:55,040
This is why we have M365 doesn’t solve execution.

231
00:09:55,040 –> 00:09:58,760
Microsoft is exceptional at capturing intent and providing collaboration surfaces.

232
00:09:58,760 –> 00:10:02,760
It is not designed to be the authoritative engine that enforces enterprise sequence,

233
00:10:02,760 –> 00:10:04,560
policy and evidence across domains.

234
00:10:04,560 –> 00:10:07,680
It will happily host the conversation where the bypass decision gets made.

235
00:10:07,680 –> 00:10:09,240
It will not stop you from doing it.

236
00:10:09,240 –> 00:10:12,160
And this is why we have an ERP doesn’t solve execution.

237
00:10:12,160 –> 00:10:16,560
ERP will preserve the transaction after the fact it won’t coordinate the human chain

238
00:10:16,560 –> 00:10:20,640
of approvals, exception handling and downstream tasks that make the transaction legitimate

239
00:10:20,640 –> 00:10:21,640
in the first place.

240
00:10:21,640 –> 00:10:23,640
So enterprises need both layers.

241
00:10:23,640 –> 00:10:25,520
System of record underneath.

242
00:10:25,520 –> 00:10:27,960
Authoritative data, integrity compliance.

243
00:10:27,960 –> 00:10:32,160
System of action above it, orchestration, rooting, enforcement, audit, surface for execution.

244
00:10:32,160 –> 00:10:34,320
The mistake is believing one replaces the other.

245
00:10:34,320 –> 00:10:38,000
It’s also why ServiceNow’s gravity keeps expanding beyond ITSM.

246
00:10:38,000 –> 00:10:39,960
It’s not because IT tickets are exciting.

247
00:10:39,960 –> 00:10:43,280
It’s because the enterprise keeps discovering the same gap.

248
00:10:43,280 –> 00:10:48,160
There is no shared execution layer between people, set a thing and systems change the thing.

249
00:10:48,160 –> 00:10:52,640
ServiceNow fits that gap because it can hold state across domains, tie tasks and approvals

250
00:10:52,640 –> 00:10:55,520
together in force policy gates and produce evidence.

251
00:10:55,520 –> 00:10:59,600
The turns we should into, we did, with a trail you can actually defend.

252
00:10:59,600 –> 00:11:03,240
And Microsoft fits the other half because it owns where humans actually live.

253
00:11:03,240 –> 00:11:08,400
Autlook, SharePoint, Word, Meetings, Calls, that’s where intent shows up, that’s where decisions

254
00:11:08,400 –> 00:11:11,280
get discussed, that’s where people demand status.

255
00:11:11,280 –> 00:11:15,280
So the correct architecture isn’t ServiceNow versus Microsoft.

256
00:11:15,280 –> 00:11:17,920
It’s a split-brain model by design.

257
00:11:17,920 –> 00:11:19,440
Microsoft is the engagement plane.

258
00:11:19,440 –> 00:11:22,760
Capture intent, collaboration, communication, context.

259
00:11:22,760 –> 00:11:25,000
ServiceNow is the execution plane.

260
00:11:25,000 –> 00:11:27,440
Authoritative state, routing, approvals, evidence.

261
00:11:27,440 –> 00:11:31,040
Once you accept that, the rest of the episode stops sounding like theory.

262
00:11:31,040 –> 00:11:32,360
It becomes an operating pattern.

263
00:11:32,360 –> 00:11:37,680
Now the only question worth asking is what happens when those two planes get stitched together correctly,

264
00:11:37,680 –> 00:11:40,760
without letting governance evaporate?

265
00:11:40,760 –> 00:11:44,200
One sentence each, the Microsoft ServiceNow.

266
00:11:44,200 –> 00:11:48,920
PowerSplit, ServiceNow in one sentence, it’s the enterprise execution engine, the place

267
00:11:48,920 –> 00:11:52,800
where work becomes a govern state machine, not a conversation.

268
00:11:52,800 –> 00:11:56,840
Microsoft in one sentence, it’s the productivity and intelligence surface.

269
00:11:56,840 –> 00:12:00,440
The place where humans generate intent, context and pressure, that’s the split and it’s

270
00:12:00,440 –> 00:12:04,520
not philosophical, it’s architectural jurisdiction.

271
00:12:04,520 –> 00:12:09,000
Most organizations keep trying to crown one platform as the single pane of glass.

272
00:12:09,000 –> 00:12:10,400
That instinct is understandable.

273
00:12:10,400 –> 00:12:14,080
It’s also how you end up with a pane of glass full of cracks, because the problem isn’t

274
00:12:14,080 –> 00:12:15,080
visibility.

275
00:12:15,080 –> 00:12:17,200
The problem is ownership of state.

276
00:12:17,200 –> 00:12:21,760
Microsoft owns human behavior, teams chats, outlook threads, meetings, documents, that’s

277
00:12:21,760 –> 00:12:23,320
where intent shows up.

278
00:12:23,320 –> 00:12:27,560
ServiceNow owns operational truth, the current state, the next owner, the approvals, the gates

279
00:12:27,560 –> 00:12:28,640
and the evidence.

280
00:12:28,640 –> 00:12:30,640
That’s execution.

281
00:12:30,640 –> 00:12:34,080
So the partnership story becomes obvious when you strip away the press releases.

282
00:12:34,080 –> 00:12:35,600
The goal isn’t to merge products.

283
00:12:35,600 –> 00:12:39,200
The goal is to reduce context switching without collapsing governance.

284
00:12:39,200 –> 00:12:42,080
Teams is where the request starts because that’s where people are.

285
00:12:42,080 –> 00:12:46,480
ServiceNow is where the request stays coherent because that’s where process lives.

286
00:12:46,480 –> 00:12:48,440
Microsoft gives you the easiest place to ask.

287
00:12:48,440 –> 00:12:51,960
ServiceNow gives you the hardest thing to build, an operating layer that keeps working

288
00:12:51,960 –> 00:12:53,520
after the chat scrolls away.

289
00:12:53,520 –> 00:12:55,120
And here’s the uncomfortable truth.

290
00:12:55,120 –> 00:12:58,800
You can’t lose beat point solutions because entropy scales faster than your org chart.

291
00:12:58,800 –> 00:13:02,880
Every time a team solves their problem with a one off board, a custom form, a flow or a

292
00:13:02,880 –> 00:13:05,320
mailbox rule, they create a local optimum.

293
00:13:05,320 –> 00:13:06,600
Then another team does the same.

294
00:13:06,600 –> 00:13:10,040
You end up with 50 local optima and one global mess.

295
00:13:10,040 –> 00:13:12,560
Central policy doesn’t fail because people are malicious.

296
00:13:12,560 –> 00:13:15,160
It fails because exceptions accumulate.

297
00:13:15,160 –> 00:13:17,560
This is why the Microsoft captures intent.

298
00:13:17,560 –> 00:13:19,680
ServiceNow executes intent line matters.

299
00:13:19,680 –> 00:13:20,680
It’s not a slogan.

300
00:13:20,680 –> 00:13:22,000
It’s an enforcement boundary.

301
00:13:22,000 –> 00:13:27,760
Intent means take human language, human context and human ambiguity and turn it into something

302
00:13:27,760 –> 00:13:29,520
structured enough to act on.

303
00:13:29,520 –> 00:13:34,320
That’s what co-pilot is good at inside M365, summarizing extracting tasks, identifying relevant

304
00:13:34,320 –> 00:13:36,960
files, pulling context from meetings and messages.

305
00:13:36,960 –> 00:13:41,840
It helps humans articulate executing intent means take that structured request and push it

306
00:13:41,840 –> 00:13:49,600
through deterministic gates, approvals, routing, SLA timers, risk decisions and auditable outcomes.

307
00:13:49,600 –> 00:13:52,880
That’s what ServiceNow is built to do, own the workflow state, the policy surface and the

308
00:13:52,880 –> 00:13:53,880
evidence trail.

309
00:13:53,880 –> 00:13:55,960
In other words, Microsoft is your front door.

310
00:13:55,960 –> 00:13:57,400
ServiceNow is the factory floor.

311
00:13:57,400 –> 00:14:02,560
You don’t run a factory by letting every employee rewrite the assembly line in chat.

312
00:14:02,560 –> 00:14:05,880
Now the integration implication is where most teams get themselves into trouble.

313
00:14:05,880 –> 00:14:09,040
They hear integrated experience and assume one tool.

314
00:14:09,040 –> 00:14:12,120
What they should hear is one experience, two authorities.

315
00:14:12,120 –> 00:14:16,840
ServiceServiceNow records in teams, reduced context switching, but keep workflow state authoritative

316
00:14:16,840 –> 00:14:20,320
in ServiceNow or your back to screenshots and social approvals.

317
00:14:20,320 –> 00:14:24,000
And yes, AI can answer questions, that’s useful, but answers aren’t outcomes.

318
00:14:24,000 –> 00:14:25,960
AI without workflows creates noise.

319
00:14:25,960 –> 00:14:28,120
AI inside workflows creates outcomes.

320
00:14:28,120 –> 00:14:32,000
So the power play here isn’t that Microsoft and ServiceNow both have assistance.

321
00:14:32,000 –> 00:14:35,400
The power play is that they’re competing for the operating layer and the only sustainable

322
00:14:35,400 –> 00:14:39,680
design is to keep engagement and execution separate, then stitch them together with explicit

323
00:14:39,680 –> 00:14:41,000
controls.

324
00:14:41,000 –> 00:14:44,600
Because if you let the engagement layer right directly into execution without guardrails,

325
00:14:44,600 –> 00:14:45,760
you don’t get automation.

326
00:14:45,760 –> 00:14:52,360
You get accelerated entropy, the operating layer pattern, events, workflows, decisions,

327
00:14:52,360 –> 00:14:53,360
outcomes.

328
00:14:53,360 –> 00:14:57,680
If you want a simple model that explains why we have all the tools still produces chaos,

329
00:14:57,680 –> 00:15:02,040
it’s this chain, events, workflows, decisions, outcomes.

330
00:15:02,040 –> 00:15:06,280
Most enterprises are drowning in events, improvising workflows, outsourcing decisions to side

331
00:15:06,280 –> 00:15:11,440
channels, and then acting surprised when outcomes are inconsistent, the operating layer exists

332
00:15:11,440 –> 00:15:14,680
to make that chain deterministic start with events.

333
00:15:14,680 –> 00:15:18,200
An event is anything that says something changed and work should happen.

334
00:15:18,200 –> 00:15:22,640
A new higher date in the HR system, a security alert from Defender, a manager asking for budget

335
00:15:22,640 –> 00:15:27,160
approval in Teams, a CI pipeline failing, an in-tune device going non-compliant, even a

336
00:15:27,160 –> 00:15:31,680
human sentence like, “Can you get me access by Friday?” is an event, just unstructured.

337
00:15:31,680 –> 00:15:33,240
The problem isn’t that events are missing.

338
00:15:33,240 –> 00:15:36,160
The problem is that events don’t map cleanly to execution.

339
00:15:36,160 –> 00:15:40,520
They land in inboxes, chats and dashboards, and then humans translate them into work by

340
00:15:40,520 –> 00:15:41,520
hand.

341
00:15:41,520 –> 00:15:46,360
This relation is where meaning gets lost, urgency gets distorted, and risk gets ignored.

342
00:15:46,360 –> 00:15:48,120
It’s also where you get the classic failure.

343
00:15:48,120 –> 00:15:51,360
The event is seen, discussed, and then nobody owns the next step.

344
00:15:51,360 –> 00:15:54,200
So the operating layer does something boring and essential.

345
00:15:54,200 –> 00:15:56,280
It converts events into workflows.

346
00:15:56,280 –> 00:15:57,920
A workflow is not a diagram.

347
00:15:57,920 –> 00:16:02,800
It’s an executable state machine, steps, dependencies, ownership, time boundaries, and evidence

348
00:16:02,800 –> 00:16:03,800
requirements.

349
00:16:03,800 –> 00:16:07,840
It turns we should into the system will not proceed until.

350
00:16:07,840 –> 00:16:10,240
This is where the enterprise stops lying to itself.

351
00:16:10,240 –> 00:16:13,360
Because the system can either enforce sequence or it can’t.

352
00:16:13,360 –> 00:16:17,720
And if it can’t, your process is just people with good intentions and bad memory.

353
00:16:17,720 –> 00:16:19,560
Workflows are also where entropy hides.

354
00:16:19,560 –> 00:16:22,120
Approvals are the obvious example, not because approvals are virtuous.

355
00:16:22,120 –> 00:16:23,120
They’re not.

356
00:16:23,120 –> 00:16:25,640
They’re expensive, but approvals are where policy meets pressure.

357
00:16:25,640 –> 00:16:28,520
If approvals happen in the workflow, you get traceability.

358
00:16:28,520 –> 00:16:31,320
If approvals happen in chat, you get plausible deniability.

359
00:16:31,320 –> 00:16:34,040
Next, decisions.

360
00:16:34,040 –> 00:16:36,120
Decisions are not the same as workflow steps.

361
00:16:36,120 –> 00:16:39,320
A workflow step is, request manager approval.

362
00:16:39,320 –> 00:16:45,080
A decision is, is this request eligible under policy and low risk enough to approve?

363
00:16:45,080 –> 00:16:49,560
Enterprises keep trying to remove decisions from the system because decisions create friction.

364
00:16:49,560 –> 00:16:52,000
Then they wonder why risk explodes.

365
00:16:52,000 –> 00:16:53,560
Decisions are where governance lives.

366
00:16:53,560 –> 00:16:58,360
Sagaiation of duties, entitlement boundaries, finance thresholds, change risk scoring, exception

367
00:16:58,360 –> 00:17:00,560
handling, in practical terms.

368
00:17:00,560 –> 00:17:05,080
It’s the difference between deterministic security and probabilistic security.

369
00:17:05,080 –> 00:17:09,160
Socialistic security says, if these conditions are true, the system allows the action and

370
00:17:09,160 –> 00:17:10,800
we can prove it later.

371
00:17:10,800 –> 00:17:14,920
Probabilistic security says, someone said it was fine in a meeting and hopefully that person

372
00:17:14,920 –> 00:17:16,920
still works here during the audit.

373
00:17:16,920 –> 00:17:18,240
That distinction matters.

374
00:17:18,240 –> 00:17:21,000
And this is where identity becomes the enforcement boundary.

375
00:17:21,000 –> 00:17:22,560
Entra ID doesn’t just authenticate.

376
00:17:22,560 –> 00:17:26,800
It defines who the actor is, what roles they have, what conditional access gates apply,

377
00:17:26,800 –> 00:17:30,680
and when you use it correctly, what the blast radius of a bad decision can be.

378
00:17:30,680 –> 00:17:34,520
When you don’t anchor decisions to identity, you end up anchoring them to social authority.

379
00:17:34,520 –> 00:17:36,800
That means the loudest person wins.

380
00:17:36,800 –> 00:17:39,800
Finally, outcomes.

381
00:17:39,800 –> 00:17:41,960
Outcomes aren’t ticket closed.

382
00:17:41,960 –> 00:17:44,000
Outcomes are fulfillment completed.

383
00:17:44,000 –> 00:17:47,840
Access provisioned with evidence, containment executed with approval trail, procurement

384
00:17:47,840 –> 00:17:50,120
posted with policy intact.

385
00:17:50,120 –> 00:17:52,880
Change deployed with roll back path documented.

386
00:17:52,880 –> 00:17:57,440
Outcomes are measurable cycle time, measurable compliance, and measurable throughput.

387
00:17:57,440 –> 00:17:59,480
Here’s the hard reality.

388
00:17:59,480 –> 00:18:01,160
Enterprises don’t fail at planning.

389
00:18:01,160 –> 00:18:02,800
They fail at execution throughput.

390
00:18:02,800 –> 00:18:06,200
They fail because work spends its life in the gaps.

391
00:18:06,200 –> 00:18:09,800
Between systems, between teams, between we agreed and we did.

392
00:18:09,800 –> 00:18:14,280
The operating layer closes those gaps by keeping state authoritative and transitions controlled.

393
00:18:14,280 –> 00:18:16,680
Now AI shows up and tries to be helpful.

394
00:18:16,680 –> 00:18:18,120
Copilot can summarize events.

395
00:18:18,120 –> 00:18:19,680
It can even propose next steps.

396
00:18:19,680 –> 00:18:23,080
Now assist can pull service, now context, and suggest actions.

397
00:18:23,080 –> 00:18:24,320
Useful.

398
00:18:24,320 –> 00:18:28,200
But the operating layer has one law you don’t get to negotiate.

399
00:18:28,200 –> 00:18:30,200
Read can be fast and forgiving.

400
00:18:30,200 –> 00:18:31,840
Right must be governed.

401
00:18:31,840 –> 00:18:36,440
So AI belongs at the event and decision edges interpreting intent, proposing actions,

402
00:18:36,440 –> 00:18:37,440
ranking urgency.

403
00:18:37,440 –> 00:18:40,560
But outcomes still require workflows, approvals, and audit trails.

404
00:18:40,560 –> 00:18:44,760
Otherwise you’ve automated the weakest part of the system, human improvisation.

405
00:18:44,760 –> 00:18:47,560
And that’s how you get what everyone is quietly building right now.

406
00:18:47,560 –> 00:18:48,560
Accelerated entropy.

407
00:18:48,560 –> 00:18:54,240
Scenario one, employee onboarding, HR plus IT plus security without email chains.

408
00:18:54,240 –> 00:18:58,760
Onboarding is the cleanest way to expose enterprise reality because it looks simple until you try

409
00:18:58,760 –> 00:19:00,400
to execute it at scale.

410
00:19:00,400 –> 00:19:05,200
New hire equals laptop, accounts, access, maybe a badge, maybe training, maybe a regulated

411
00:19:05,200 –> 00:19:09,520
role that needs extra approvals, everyone nods, everyone agrees it should be repeatable.

412
00:19:09,520 –> 00:19:10,920
Then it hits the org chart.

413
00:19:10,920 –> 00:19:12,680
Work starts where humans live.

414
00:19:12,680 –> 00:19:14,080
Outlook and teams.

415
00:19:14,080 –> 00:19:17,320
A hiring manager forwards an offer email, HR posts a note.

416
00:19:17,320 –> 00:19:20,280
Someone drops, start date is Monday, into a chat.

417
00:19:20,280 –> 00:19:22,320
Intent exists loudly in human language.

418
00:19:22,320 –> 00:19:23,320
It is not yet work.

419
00:19:23,320 –> 00:19:25,200
It’s just pressure with a calendar attached.

420
00:19:25,200 –> 00:19:30,520
In a 50,000 person global enterprise, the first failure mode shows up immediately.

421
00:19:30,520 –> 00:19:32,520
There is no single owner of the end to end state.

422
00:19:32,520 –> 00:19:37,520
HR owns the employee record, IT owns devices and accounts, security owns access boundaries,

423
00:19:37,520 –> 00:19:41,920
facilities owns physical access, finance owns cost centers, legal might care.

424
00:19:41,920 –> 00:19:43,560
Compliance definitely cares.

425
00:19:43,560 –> 00:19:45,560
So what actually happens is predictable.

426
00:19:45,560 –> 00:19:48,320
People create a chain of messages and call it a process.

427
00:19:48,320 –> 00:19:50,120
One email thread becomes the system.

428
00:19:50,120 –> 00:19:51,960
A team’s chat becomes the hand off.

429
00:19:51,960 –> 00:19:54,320
A spreadsheet becomes the tracker.

430
00:19:54,320 –> 00:19:58,800
And the only reason it works at all is because a few humans remember the tribal sequence.

431
00:19:58,800 –> 00:19:59,800
Until they don’t.

432
00:19:59,800 –> 00:20:03,960
This is where the Microsoft and ServiceNow split becomes useful instead of political.

433
00:20:03,960 –> 00:20:07,560
Microsoft is where the request is born because that’s where the manager already is.

434
00:20:07,560 –> 00:20:11,760
And co-pilot can help at that exact moment in a way that’s actually valuable.

435
00:20:11,760 –> 00:20:13,360
Extract what matters.

436
00:20:13,360 –> 00:20:18,600
Start date, location, role, manager, department, cost center, whether the person is internal,

437
00:20:18,600 –> 00:20:21,840
contractor or vendor, and whether they’re joining a regulated function.

438
00:20:21,840 –> 00:20:25,680
It’s a data capture, normalization, turning a messy message into structured facts, but capturing

439
00:20:25,680 –> 00:20:26,880
intent isn’t the win.

440
00:20:26,880 –> 00:20:30,800
The win is what happens after that when the workflow has to survive the weekend.

441
00:20:30,800 –> 00:20:32,880
ServiceNow has to own the authoritative state.

442
00:20:32,880 –> 00:20:36,200
The onboarding case, its tasks, its dependencies and its gates.

443
00:20:36,200 –> 00:20:38,360
HR triggers the joiner event.

444
00:20:38,360 –> 00:20:40,120
ServiceNow generates the work.

445
00:20:40,120 –> 00:20:44,520
Device requests, identity provisioning, mailbox creation, baseline access, application

446
00:20:44,520 –> 00:20:48,760
entitlements, security training, and whatever region-specific requirements exist.

447
00:20:48,760 –> 00:20:51,680
And every task has an owner, not a someone.

448
00:20:51,680 –> 00:20:57,160
An assignment group, a queue, an SLA and escalation rules that don’t rely on a helpful person noticing

449
00:20:57,160 –> 00:20:58,160
the message.

450
00:20:58,160 –> 00:21:00,160
Here’s what most people miss.

451
00:21:00,160 –> 00:21:01,560
Identity is not a task.

452
00:21:01,560 –> 00:21:03,240
Identity is the enforcement boundary.

453
00:21:03,240 –> 00:21:08,040
In onboarding, enter ID is where the organization decides what the new hire is allowed to become.

454
00:21:08,040 –> 00:21:12,200
It’s the difference between they should have access to these apps and they do.

455
00:21:12,200 –> 00:21:15,920
That means entitlements and group membership can’t be granted through sidechats.

456
00:21:15,920 –> 00:21:18,000
They have to be routed, approved, and auditable.

457
00:21:18,000 –> 00:21:19,360
So the right pattern is boring.

458
00:21:19,360 –> 00:21:20,960
The manager asks in teams.

459
00:21:20,960 –> 00:21:22,640
The workflow runs in ServiceNow.

460
00:21:22,640 –> 00:21:24,360
Identity changes happen under control.

461
00:21:24,360 –> 00:21:28,760
If the organization needs privileged access, the workflow has to force explicit approvals

462
00:21:28,760 –> 00:21:29,760
and time boundaries.

463
00:21:29,760 –> 00:21:31,400
No permanent temporary access.

464
00:21:31,400 –> 00:21:32,400
No informal.

465
00:21:32,400 –> 00:21:33,400
I’ll remove it later.

466
00:21:33,400 –> 00:21:36,360
The system either expires access automatically, or it doesn’t.

467
00:21:36,360 –> 00:21:38,240
And if it doesn’t, you didn’t onboard someone.

468
00:21:38,240 –> 00:21:39,920
You created future incident fuel.

469
00:21:39,920 –> 00:21:43,640
Now let’s talk about where it breaks today because this is where executives recognize

470
00:21:43,640 –> 00:21:44,640
themselves.

471
00:21:44,640 –> 00:21:47,960
First approvals happen in email or chat because it feels faster.

472
00:21:47,960 –> 00:21:50,240
That means the approval isn’t linked to the action.

473
00:21:50,240 –> 00:21:54,320
Having an audit, you can’t prove who approved what only that people talked about it.

474
00:21:54,320 –> 00:21:56,440
Second, exceptions become the default.

475
00:21:56,440 –> 00:21:57,440
Just give them access.

476
00:21:57,440 –> 00:21:58,440
They start tomorrow.

477
00:21:58,440 –> 00:21:59,800
Then tomorrow becomes six months.

478
00:21:59,800 –> 00:22:03,400
Then the person changes roles and keeps the old access because nobody owns deprovisioning

479
00:22:03,400 –> 00:22:04,800
across domains.

480
00:22:04,800 –> 00:22:05,800
Third visibility is fake.

481
00:22:05,800 –> 00:22:09,280
HR says the hire is complete because the HR tasks are complete.

482
00:22:09,280 –> 00:22:11,280
IT says the laptop shipped.

483
00:22:11,280 –> 00:22:12,680
Security says training is assigned.

484
00:22:12,680 –> 00:22:14,720
The new hire says they can’t do their job.

485
00:22:14,720 –> 00:22:16,240
Every system is locally correct.

486
00:22:16,240 –> 00:22:17,280
And to end, it’s a failure.

487
00:22:17,280 –> 00:22:19,320
So what does good look like in this scenario?

488
00:22:19,320 –> 00:22:23,600
It looks like one request thread in teams that never pretends to be the authoritative state.

489
00:22:23,600 –> 00:22:24,600
It’s just the interface.

490
00:22:24,600 –> 00:22:27,800
The same conversation can surface a service now card.

491
00:22:27,800 –> 00:22:31,640
On-boarding case created, current status, blockers, and next steps.

492
00:22:31,640 –> 00:22:33,880
The manager can ask, “What’s holding this up?”

493
00:22:33,880 –> 00:22:37,320
And get an answer that’s derived from workflow state, not someone’s memory.

494
00:22:37,320 –> 00:22:39,600
It also means controlled exception handling.

495
00:22:39,600 –> 00:22:43,680
If someone needs early access, the workflow captures it as an exception with a reason,

496
00:22:43,680 –> 00:22:46,840
an approver, a time limit, and a log change.

497
00:22:46,840 –> 00:22:47,840
It’s hard for bidden.

498
00:22:47,840 –> 00:22:49,560
They’re recorded and constrained.

499
00:22:49,560 –> 00:22:50,720
That’s entropy management.

500
00:22:50,720 –> 00:22:54,120
And the real payoff is off-boarding, even though nobody wants to talk about it during

501
00:22:54,120 –> 00:22:55,120
onboarding.

502
00:22:55,120 –> 00:22:58,600
If you build onboarding as a governed state machine, you can build off-boarding as the

503
00:22:58,600 –> 00:23:00,920
inverse workflow with the same discipline.

504
00:23:00,920 –> 00:23:05,640
That’s how you stop often access from becoming a security incident with a press release

505
00:23:05,640 –> 00:23:06,640
attached.

506
00:23:06,640 –> 00:23:09,320
On-boarding is the happy path, but it’s still a stress test.

507
00:23:09,320 –> 00:23:13,400
It forces you to decide where intent lives, where execution lives, and whether identity

508
00:23:13,400 –> 00:23:16,800
is controlled by policy or by social urgency.

509
00:23:16,800 –> 00:23:19,200
Next, the stress test becomes explicit.

510
00:23:19,200 –> 00:23:23,640
Security incident response where everyone wants speed and governance is always later.

511
00:23:23,640 –> 00:23:29,280
Scenario 2 Security incident response, collaboration in teams, execution in workflows.

512
00:23:29,280 –> 00:23:33,280
Security incident response is where every nice process dies, because under pressure people

513
00:23:33,280 –> 00:23:34,280
don’t follow policy.

514
00:23:34,280 –> 00:23:35,280
They follow urgency.

515
00:23:35,280 –> 00:23:37,000
They spin up a team’s war room.

516
00:23:37,000 –> 00:23:41,880
Tag everyone they can think of and start trading theories, screenshots, and half-finished conclusions.

517
00:23:41,880 –> 00:23:43,440
And that part is fine.

518
00:23:43,440 –> 00:23:44,680
Collaboration is supposed to be messy.

519
00:23:44,680 –> 00:23:48,000
The failure happens when the messy part becomes the control system.

520
00:23:48,000 –> 00:23:51,560
In a regulated enterprise, the first question isn’t, can we fix it?

521
00:23:51,560 –> 00:23:55,040
It’s who is allowed to do what and who approved it?

522
00:23:55,040 –> 00:24:00,120
Containment actions change reality, disabling accounts, revoking sessions, isolating devices,

523
00:24:00,120 –> 00:24:04,200
blocking IPs, rotating secrets, pulling logs, escalating privileges.

524
00:24:04,200 –> 00:24:05,520
Those aren’t chat decisions.

525
00:24:05,520 –> 00:24:07,800
Those are governed operations with blast radius.

526
00:24:07,800 –> 00:24:09,840
So here’s the pattern that actually works.

527
00:24:09,840 –> 00:24:14,040
The alert surfaces in Microsoft, but the execution runs in service now.

528
00:24:14,040 –> 00:24:18,480
The alert might come from Defender, Sentinel, a SOC tool or a third party platform.

529
00:24:18,480 –> 00:24:19,480
Where does it land?

530
00:24:19,480 –> 00:24:20,480
Teams.

531
00:24:20,480 –> 00:24:21,480
Because that’s where humans are.

532
00:24:21,480 –> 00:24:23,000
And that’s where humans coordinate.

533
00:24:23,000 –> 00:24:26,840
You want the incident channel, the pinned context, the running timeline, the stakeholders,

534
00:24:26,840 –> 00:24:29,600
the communications lead, the who’s on point assignments.

535
00:24:29,600 –> 00:24:32,720
Microsoft is the engagement plane doing exactly what it’s built to do.

536
00:24:32,720 –> 00:24:36,040
But the moment you start taking action, the system needs an execution plane.

537
00:24:36,040 –> 00:24:37,040
Service.

538
00:24:37,040 –> 00:24:41,680
Now owns the Security incident record, the workflow state, the tasking, the evidence capture,

539
00:24:41,680 –> 00:24:44,000
and the approvals that you can defend later.

540
00:24:44,000 –> 00:24:46,440
The triage isn’t just, we think it’s fishing.

541
00:24:46,440 –> 00:24:50,560
It’s classification, severity, assignment, SLA triggers, and a controlled flow that can

542
00:24:50,560 –> 00:24:51,960
survive shift changes.

543
00:24:51,960 –> 00:24:54,960
Because the incident doesn’t care that the night team is different people.

544
00:24:54,960 –> 00:24:57,760
This is where the Microsoft captures intent.

545
00:24:57,760 –> 00:25:01,360
Service now executes intent, split becomes operational.

546
00:25:01,360 –> 00:25:04,240
In Teams, someone says, we need to disable this account now.

547
00:25:04,240 –> 00:25:06,320
It’s actively exfiltrating.

548
00:25:06,320 –> 00:25:07,680
That sentence is intent.

549
00:25:07,680 –> 00:25:09,320
It’s also a liability.

550
00:25:09,320 –> 00:25:13,600
In a mature model, that intent becomes an action request, a workflow step in service

551
00:25:13,600 –> 00:25:20,000
now that says disable account X with an approver, a reason, a timestamp, and a recorded outcome.

552
00:25:20,000 –> 00:25:24,480
If the organization uses privileged identity management, the workflow drives that elevation

553
00:25:24,480 –> 00:25:25,920
through controlled gates.

554
00:25:25,920 –> 00:25:30,760
If it doesn’t, the workflow at least forces a documented approval and ties it to the change.

555
00:25:30,760 –> 00:25:35,160
Because the ugly truth is this, the fastest way to create security debt is to let containment

556
00:25:35,160 –> 00:25:37,000
happen through informal authority.

557
00:25:37,000 –> 00:25:38,520
The other failure mode is evidence.

558
00:25:38,520 –> 00:25:41,520
In a security incident, evidence isn’t nice to have.

559
00:25:41,520 –> 00:25:44,840
It’s the difference between a controllable incident and an audit nightmare.

560
00:25:44,840 –> 00:25:46,520
Teams conversations don’t give you evidence.

561
00:25:46,520 –> 00:25:48,000
They give you a transcript.

562
00:25:48,000 –> 00:25:49,920
Service now can force evidence.

563
00:25:49,920 –> 00:25:56,200
Log links, indicators, containment actions, impacted assets, who approved what was changed

564
00:25:56,200 –> 00:25:57,400
and when.

565
00:25:57,400 –> 00:25:59,680
Nobody likes documentation in the middle of a fire.

566
00:25:59,680 –> 00:26:02,880
That’s why it has to be baked into the workflow, not left to human discipline.

567
00:26:02,880 –> 00:26:06,720
Now layer in AI because this is where everyone gets confused and starts building the wrong

568
00:26:06,720 –> 00:26:07,720
thing.

569
00:26:07,720 –> 00:26:11,320
Copilot is great at summarizing teams, threats, pulling key decisions, finding the file

570
00:26:11,320 –> 00:26:16,000
that contains the indicator list and generating a draft comms update.

571
00:26:16,000 –> 00:26:19,000
That’s real value because it reduces cognitive load.

572
00:26:19,000 –> 00:26:23,080
But Copilot doesn’t get to execute containment just because it can write a confident paragraph.

573
00:26:23,080 –> 00:26:25,680
Now assist is great at the service now side.

574
00:26:25,680 –> 00:26:30,160
Summarizing case history, suggesting related incidents, pulling knowledge articles, proposing

575
00:26:30,160 –> 00:26:34,880
next actions based on prior patterns and helping agents write resolution notes.

576
00:26:34,880 –> 00:26:38,120
That’s useful because it speeds decisions inside the execution plane.

577
00:26:38,120 –> 00:26:42,480
And here’s the law, AI can propose workflows decide read operations can be fast, right

578
00:26:42,480 –> 00:26:43,880
operations must be governed.

579
00:26:43,880 –> 00:26:49,040
So the correct flow is AI accelerates triage and decision making, but execution remains

580
00:26:49,040 –> 00:26:50,040
deterministic.

581
00:26:50,040 –> 00:26:55,200
If you let an AI agent just take care of it, you’ve replaced human improvisation with probabilistic

582
00:26:55,200 –> 00:26:57,040
improvisation at machine speed.

583
00:26:57,040 –> 00:26:58,040
That’s not automation.

584
00:26:58,040 –> 00:27:02,200
That’s a faster incident in the composite enterprise 50k employees, multiple regions,

585
00:27:02,200 –> 00:27:03,200
heavy regulation.

586
00:27:03,200 –> 00:27:05,520
This also becomes a communications problem.

587
00:27:05,520 –> 00:27:10,440
The war room needs an external narrative leadership updates, customer comms, legal review and

588
00:27:10,440 –> 00:27:11,920
operational timelines.

589
00:27:11,920 –> 00:27:15,920
Teams is still the best place to coordinate that, but service now needs to remain the authoritative

590
00:27:15,920 –> 00:27:18,040
timeline for what was actually done.

591
00:27:18,040 –> 00:27:22,600
Otherwise the post-incident review becomes a debate about whose memory is correct.

592
00:27:22,600 –> 00:27:27,200
So good in this scenario looks like teams for coordination and shared awareness.

593
00:27:27,200 –> 00:27:30,920
Service now for triage assignment approvals, evidence and outcome tracking identity as

594
00:27:30,920 –> 00:27:33,360
the enforcement boundary for privileged actions.

595
00:27:33,360 –> 00:27:38,160
AI as an accelerant inside the guardrails, not a replacement for them and the payoff is

596
00:27:38,160 –> 00:27:39,160
measurable.

597
00:27:39,160 –> 00:27:43,600
Lower decision latency, fewer manual handoffs, cleaner audit trails and fewer temporary access

598
00:27:43,600 –> 00:27:46,280
grants that survive into the next quarter.

599
00:27:46,280 –> 00:27:47,120
Reflection pause.

600
00:27:47,120 –> 00:27:50,400
If you’re listening to this and thinking, yes, this sounds familiar, that’s the point.

601
00:27:50,400 –> 00:27:51,720
None of this is hypothetical.

602
00:27:51,720 –> 00:27:54,320
This is how your organization already works just without an owner.

603
00:27:54,320 –> 00:27:58,560
Now take that same discipline and move it out of the SOC and into finance where pressure

604
00:27:58,560 –> 00:28:01,800
comes from quarter end instead of attackers.

605
00:28:01,800 –> 00:28:06,480
In our three finance approvals, procure to pay without policy erosion.

606
00:28:06,480 –> 00:28:10,240
Finance is where people finally admit they don’t want better collaboration.

607
00:28:10,240 –> 00:28:13,560
They want enforceable policy because the failure mode isn’t that nobody can request

608
00:28:13,560 –> 00:28:14,560
spend.

609
00:28:14,560 –> 00:28:18,440
The failure mode is that spend gets approved in the least defensible place possible.

610
00:28:18,440 –> 00:28:22,800
An email thread, a team’s message or a hallway conversation that later becomes we all

611
00:28:22,800 –> 00:28:23,800
agreed.

612
00:28:23,800 –> 00:28:27,600
Procure to pay is basically the same pattern as onboarding and security response just

613
00:28:27,600 –> 00:28:28,600
with different nouns.

614
00:28:28,600 –> 00:28:31,600
The work starts in Microsoft because that’s where the pressure lives.

615
00:28:31,600 –> 00:28:34,920
Moving forwards a vendor quote, someone tags a finance lead in teams.

616
00:28:34,920 –> 00:28:36,400
Can we get this approved today?

617
00:28:36,400 –> 00:28:37,400
Quarter end.

618
00:28:37,400 –> 00:28:39,480
Someone drops a spreadsheet link and asks for a thumbs up.

619
00:28:39,480 –> 00:28:40,480
That’s intent.

620
00:28:40,480 –> 00:28:44,040
And it’s also the beginning of policy erosion because finance policy doesn’t fail through

621
00:28:44,040 –> 00:28:45,040
malice.

622
00:28:45,040 –> 00:28:46,040
It fails through impatience.

623
00:28:46,040 –> 00:28:47,640
Approvals get rushed.

624
00:28:47,640 –> 00:28:49,520
Thresholds get ignored.

625
00:28:49,520 –> 00:28:52,960
Segregation of duties becomes, can you just approve it for me?

626
00:28:52,960 –> 00:28:56,760
And once the organization proves it can bypass controls when it’s inconvenient, it will

627
00:28:56,760 –> 00:28:57,760
keep doing it.

628
00:28:57,760 –> 00:28:58,760
That’s not culture.

629
00:28:58,760 –> 00:29:00,120
That’s system behavior.

630
00:29:00,120 –> 00:29:04,320
So in the composite enterprise, 50K employees regulated industry, the operating layer has

631
00:29:04,320 –> 00:29:05,840
to be explicit.

632
00:29:05,840 –> 00:29:09,600
Microsoft captures the request and the context, but service now enforces the gates that

633
00:29:09,600 –> 00:29:11,520
make the request legitimate.

634
00:29:11,520 –> 00:29:13,440
The way it usually breaks is almost boring.

635
00:29:13,440 –> 00:29:14,840
A request lands in teams.

636
00:29:14,840 –> 00:29:16,160
The approver is on mobile.

637
00:29:16,160 –> 00:29:19,760
They reply approved because it’s faster than opening the portal.

638
00:29:19,760 –> 00:29:23,840
Someone screenshots that message and attaches it to something maybe.

639
00:29:23,840 –> 00:29:26,520
Then procurement moves forward because we have approval.

640
00:29:26,520 –> 00:29:31,520
The ERP eventually records the transaction because that’s what ERPs do, but the ERP doesn’t

641
00:29:31,520 –> 00:29:33,080
know whether the approval met policy.

642
00:29:33,080 –> 00:29:35,080
It just knows the transaction exists.

643
00:29:35,080 –> 00:29:39,320
And when audit time arrives, the organization tries to reconstruct governance from scattered

644
00:29:39,320 –> 00:29:40,320
artifacts.

645
00:29:40,320 –> 00:29:42,720
An email, a team’s thread, a PDF, a memory.

646
00:29:42,720 –> 00:29:43,880
That’s not an audit trail.

647
00:29:43,880 –> 00:29:45,120
That’s archaeology.

648
00:29:45,120 –> 00:29:49,280
So what does good look like without turning finance into a bureaucratic museum exhibit?

649
00:29:49,280 –> 00:29:51,640
Good looks like letting teams stay the front door.

650
00:29:51,640 –> 00:29:53,960
Let the requests start where people already work.

651
00:29:53,960 –> 00:29:58,520
It co-pilot help translate the messy human ask into structured fields.

652
00:29:58,520 –> 00:30:02,920
Vendor, amount, cost center, description, urgency, whether it’s capex or opax and which

653
00:30:02,920 –> 00:30:03,920
policy applies.

654
00:30:03,920 –> 00:30:05,520
That’s intent capture.

655
00:30:05,520 –> 00:30:10,720
But the moment the request becomes real money, execution moves to a workflow state machine.

656
00:30:10,720 –> 00:30:14,840
Service now owns the approval workflow because it can enforce sequence, thresholds and separation

657
00:30:14,840 –> 00:30:15,840
of duties.

658
00:30:15,840 –> 00:30:17,240
It can root automatically.

659
00:30:17,240 –> 00:30:21,160
Manager approval under one threshold, finance approval under another, security review

660
00:30:21,160 –> 00:30:25,920
if it touches a risky vendor category procurement review if a preferred vendor exists, legal

661
00:30:25,920 –> 00:30:27,920
review if contract terms trigger it.

662
00:30:27,920 –> 00:30:29,120
The point isn’t complexity.

663
00:30:29,120 –> 00:30:32,400
The point is enforceable branching with an auditable Y.

664
00:30:32,400 –> 00:30:34,720
And the ERP stays exactly where it belongs.

665
00:30:34,720 –> 00:30:35,800
The system of record.

666
00:30:35,800 –> 00:30:37,160
It posts the purchase order.

667
00:30:37,160 –> 00:30:38,160
It pays the invoice.

668
00:30:38,160 –> 00:30:39,800
It preserves the financial truth.

669
00:30:39,800 –> 00:30:42,240
Service now sits above it as the system of action.

670
00:30:42,240 –> 00:30:46,120
It orchestrates the human chain that makes the transaction acceptable, then hands the result

671
00:30:46,120 –> 00:30:48,400
to the ERP with evidence attached.

672
00:30:48,400 –> 00:30:52,120
This is also where executives finally see the cost of quick exceptions.

673
00:30:52,120 –> 00:30:55,160
Every exception to approval policy is an entropy generator.

674
00:30:55,160 –> 00:30:56,160
It feels like speed.

675
00:30:56,160 –> 00:30:57,960
It actually creates ambiguity.

676
00:30:57,960 –> 00:31:01,120
And ambiguity is what auditors charge for, not emotionally.

677
00:31:01,120 –> 00:31:05,200
Financially, in time, remediation and the constant tax of controls that nobody trusts.

678
00:31:05,200 –> 00:31:09,960
So the real value proposition in finance isn’t faster approvals as a vanity metric.

679
00:31:09,960 –> 00:31:12,040
It’s consistent enforcement under pressure.

680
00:31:12,040 –> 00:31:15,920
Because quarter end is basically a recurring incident except itself inflicted and everyone

681
00:31:15,920 –> 00:31:16,920
pretends it’s normal.

682
00:31:16,920 –> 00:31:18,600
Now the integration pattern matters.

683
00:31:18,600 –> 00:31:23,320
If all you do is surface finance requests inside teams as read-only cards you reduce context

684
00:31:23,320 –> 00:31:26,240
switching but you haven’t stopped bypass behavior.

685
00:31:26,240 –> 00:31:28,360
People still approve in chat because it’s convenient.

686
00:31:28,360 –> 00:31:29,640
Retrieval doesn’t fix execution.

687
00:31:29,640 –> 00:31:32,920
So the operating layer has to support actual actions under control.

688
00:31:32,920 –> 00:31:36,560
Approvals can approve from within teams, but the approval must be written into the service

689
00:31:36,560 –> 00:31:40,560
now workflow state tied to identity and locked as a structured decision.

690
00:31:40,560 –> 00:31:44,000
Not as a message, not as a reaction icon, as a control transition.

691
00:31:44,000 –> 00:31:49,000
And because finance is a right heavy domain, approvals, rooting, updates, the read fast,

692
00:31:49,000 –> 00:31:51,160
right governed rule becomes non-negotiable.

693
00:31:51,160 –> 00:31:53,880
You start with assisted drafting and summarization, sure.

694
00:31:53,880 –> 00:31:55,800
But you keep rights supervised and auditable.

695
00:31:55,800 –> 00:31:58,720
Otherwise you’ve just built a faster way to create non-compliance.

696
00:31:58,720 –> 00:32:01,640
If you want the executive version of this scenario, it’s simple.

697
00:32:01,640 –> 00:32:03,640
Microsoft is where spend pressure gets expressed.

698
00:32:03,640 –> 00:32:05,880
Service now is where spend policy gets enforced.

699
00:32:05,880 –> 00:32:07,600
ERP is where spend gets recorded.

700
00:32:07,600 –> 00:32:11,880
When those three roles stay clean, cycle time improves, audit findings drop and nobody

701
00:32:11,880 –> 00:32:13,600
has to ask who approved this.

702
00:32:13,600 –> 00:32:17,800
Like it’s a mystery novel and once finance works this way, it becomes impossible to keep pretending

703
00:32:17,800 –> 00:32:19,720
service now is just eat.

704
00:32:19,720 –> 00:32:21,280
It’s the enterprise execution layer.

705
00:32:21,280 –> 00:32:25,840
Next, take the same pattern back to the place most organizations think they understand.

706
00:32:25,840 –> 00:32:30,480
The major incident war room, where teams feels like the whole story, until change control

707
00:32:30,480 –> 00:32:31,720
shows up.

708
00:32:31,720 –> 00:32:36,880
Scenario 4, major IT incident plus change, the war room versus the control system.

709
00:32:36,880 –> 00:32:40,800
Major incidents are where organizations confuse adrenaline with control.

710
00:32:40,800 –> 00:32:44,880
The war room spins up in teams because that’s where humans can coordinate at speed.

711
00:32:44,880 –> 00:32:48,680
Voice, chat, screen shares, a running narrative and the one thing people actually need in the

712
00:32:48,680 –> 00:32:50,080
first 10 minutes.

713
00:32:50,080 –> 00:32:51,600
Shared situational awareness.

714
00:32:51,600 –> 00:32:52,840
Who’s on what’s impacted?

715
00:32:52,840 –> 00:32:53,920
What’s the latest signal?

716
00:32:53,920 –> 00:32:54,920
What are we trying next?

717
00:32:54,920 –> 00:32:55,920
Teams is perfect for that.

718
00:32:55,920 –> 00:33:00,040
It’s also the place where most enterprises accidentally move, change control into a chat

719
00:33:00,040 –> 00:33:01,880
thread and call it agility.

720
00:33:01,880 –> 00:33:03,360
Here’s the uncomfortable truth.

721
00:33:03,360 –> 00:33:06,320
A major incident is not just fix it fast.

722
00:33:06,320 –> 00:33:09,200
It’s fix it fast without making the blast radius worse.

723
00:33:09,200 –> 00:33:13,560
The only mechanism enterprises have for controlling blast radius is change management.

724
00:33:13,560 –> 00:33:15,480
Not because key Airbnb meetings are fun.

725
00:33:15,480 –> 00:33:17,440
Because production doesn’t care about feelings.

726
00:33:17,440 –> 00:33:20,960
So this scenario is the cleanest proof of the split brain model.

727
00:33:20,960 –> 00:33:22,240
Teams is the war room.

728
00:33:22,240 –> 00:33:23,600
Service now is the control system.

729
00:33:23,600 –> 00:33:27,720
In the composite enterprise, a major incident usually starts with a flood of symptoms.

730
00:33:27,720 –> 00:33:28,720
Users can’t log in.

731
00:33:28,720 –> 00:33:29,720
An API is timing out.

732
00:33:29,720 –> 00:33:33,600
A region is degraded or a minor change from earlier in the day quietly becomes the root

733
00:33:33,600 –> 00:33:35,480
cause of a widespread outage.

734
00:33:35,480 –> 00:33:38,240
The first job is triage and coms that belongs in Microsoft.

735
00:33:38,240 –> 00:33:42,400
You want incident channels, stay-coulder coms and the ability to brief leadership without

736
00:33:42,400 –> 00:33:43,800
digging through 10 portals.

737
00:33:43,800 –> 00:33:46,760
But the second job, the dangerous one is execution.

738
00:33:46,760 –> 00:33:52,160
Execution is assigned tasks with owners and time boundaries, coordinate remediation steps,

739
00:33:52,160 –> 00:33:57,120
create emergency changes, capture approvals, record what was done, and preserve enough evidence

740
00:33:57,120 –> 00:34:00,240
that the post-incident review isn’t a religious argument.

741
00:34:00,240 –> 00:34:02,240
That work needs an authoritative state machine.

742
00:34:02,240 –> 00:34:03,880
This is where service now earns its keep.

743
00:34:03,880 –> 00:34:05,600
A team’s war room can tell a story.

744
00:34:05,600 –> 00:34:06,600
It cannot enforce one.

745
00:34:06,600 –> 00:34:09,720
A team’s thread can say we agreed to reboot the database.

746
00:34:09,720 –> 00:34:14,440
It cannot prove who authorized it, whether the rollback plan existed, or whether that reboot

747
00:34:14,440 –> 00:34:16,520
was part of a control change sequence.

748
00:34:16,520 –> 00:34:19,400
And in a regulated environment, we agreed it’s not governance.

749
00:34:19,400 –> 00:34:20,400
It’s a liability.

750
00:34:20,400 –> 00:34:22,720
So the right design is boring and strict.

751
00:34:22,720 –> 00:34:25,480
The major incident record lives in service now.

752
00:34:25,480 –> 00:34:30,480
It owns the timeline, the tasks, the coms artifacts, and the dependency map between actions.

753
00:34:30,480 –> 00:34:35,840
The team’s channel is linked to the major incident record, not treated as a parallel universe.

754
00:34:35,840 –> 00:34:37,440
And the problem happens in teams.

755
00:34:37,440 –> 00:34:38,760
Authorities stays in service now.

756
00:34:38,760 –> 00:34:42,600
Now the part that always collapses under pressure, emergency change in the war room, someone

757
00:34:42,600 –> 00:34:45,240
says we need to push a conflict change right now.

758
00:34:45,240 –> 00:34:47,640
Another person says just do it, we’ll backfill later.

759
00:34:47,640 –> 00:34:51,400
And this is exactly how temporary bypass becomes permanent policy decay.

760
00:34:51,400 –> 00:34:52,920
Because the bypass isn’t the outage.

761
00:34:52,920 –> 00:34:54,440
The bypass is the future outage.

762
00:34:54,440 –> 00:34:58,440
If you let major incidents teach your teams that controls are optional, you don’t get

763
00:34:58,440 –> 00:34:59,640
faster recovery.

764
00:34:59,640 –> 00:35:01,160
You get repeatable chaos.

765
00:35:01,160 –> 00:35:05,560
So emergency change has to be a first-class workflow, not an apology.

766
00:35:05,560 –> 00:35:06,680
Now can do that.

767
00:35:06,680 –> 00:35:10,360
Create the emergency change record as part of the major incident workflow.

768
00:35:10,360 –> 00:35:12,720
Enforced the minimum approvals required.

769
00:35:12,720 –> 00:35:14,840
Capture the reason for urgency.

770
00:35:14,840 –> 00:35:16,520
Link the impacted services.

771
00:35:16,520 –> 00:35:19,400
And record the implementation and rollback steps.

772
00:35:19,400 –> 00:35:23,000
It can keep the blast radius bounded even when humans are improvising.

773
00:35:23,000 –> 00:35:24,000
And yes, it adds friction.

774
00:35:24,000 –> 00:35:25,000
That’s the point.

775
00:35:25,000 –> 00:35:29,200
Friction is what turns someone push the thing into the organization can defend why it push

776
00:35:29,200 –> 00:35:30,200
the thing.

777
00:35:30,200 –> 00:35:34,080
This is also where good looks counterintuitive to teams first organizations.

778
00:35:34,080 –> 00:35:36,520
It does not mean forcing everyone out of teams.

779
00:35:36,520 –> 00:35:40,840
Good means letting teams be the interface while refusing to let it become the system of record

780
00:35:40,840 –> 00:35:42,040
for execution.

781
00:35:42,040 –> 00:35:46,440
The incident commander can run comms in teams, but the tasks are created, owned and closed

782
00:35:46,440 –> 00:35:47,440
in service now.

783
00:35:47,440 –> 00:35:50,760
The approvals can be surfaced in teams, but the approval state must be written to the

784
00:35:50,760 –> 00:35:53,520
change record tied to identity with an audit trail.

785
00:35:53,520 –> 00:35:56,160
This is where AI tempts people into the wrong move.

786
00:35:56,160 –> 00:35:58,960
Copilot can summarize the war room and draft status updates.

787
00:35:58,960 –> 00:35:59,960
Great.

788
00:35:59,960 –> 00:36:04,600
Assist can generate post-incident review drafts and resolution notes, also useful, but

789
00:36:04,600 –> 00:36:09,280
AI cannot be allowed to convert we think into we changed without controls, because right

790
00:36:09,280 –> 00:36:11,560
operations are blast radius multipliers.

791
00:36:11,560 –> 00:36:14,400
So the measurable outcome isn’t, we had a great war room.

792
00:36:14,400 –> 00:36:17,840
It’s, did the incident produce a clean authoritative timeline?

793
00:36:17,840 –> 00:36:19,160
Did every action have an owner?

794
00:36:19,160 –> 00:36:22,080
Did emergency changes have approvals and rollback paths?

795
00:36:22,080 –> 00:36:27,200
Did the organization avoid creating new security and compliance debt while restoring service?

796
00:36:27,200 –> 00:36:28,760
Teams makes the war room fast.

797
00:36:28,760 –> 00:36:30,800
Now makes the recovery defensible.

798
00:36:30,800 –> 00:36:33,920
And if those two responsibilities blur, you don’t get resilience.

799
00:36:33,920 –> 00:36:36,320
You get a group chat with production permissions?

800
00:36:36,320 –> 00:36:37,320
Integration.

801
00:36:37,320 –> 00:36:38,320
Reality.

802
00:36:38,320 –> 00:36:39,800
Connectors give answers.

803
00:36:39,800 –> 00:36:40,960
Orchestration gets outcomes.

804
00:36:40,960 –> 00:36:44,640
Now take those four scenarios and ask the only question that matters once you leave

805
00:36:44,640 –> 00:36:45,640
the whiteboard.

806
00:36:45,640 –> 00:36:49,840
How do these two worlds actually connect without creating a new category of failure?

807
00:36:49,840 –> 00:36:52,520
Because integration gets marketed like it’s a single thing.

808
00:36:52,520 –> 00:36:53,520
It isn’t.

809
00:36:53,520 –> 00:36:57,500
In practice, there are two modes and confusing them is how organizations end up with a shiny

810
00:36:57,500 –> 00:36:59,500
demo and unchanged throughput.

811
00:36:59,500 –> 00:37:03,660
Mode one is red, mode two is right, read integration is about answers.

812
00:37:03,660 –> 00:37:06,740
It’s search, indexing, summaries and quick lookups.

813
00:37:06,740 –> 00:37:08,260
Microsoft has a clean story here.

814
00:37:08,260 –> 00:37:12,660
Microsoft Graph Connectors can index service now content, so co-pilot can retrieve it in

815
00:37:12,660 –> 00:37:14,340
the flow of work.

816
00:37:14,340 –> 00:37:16,820
Incidents, knowledge articles, catalog items.

817
00:37:16,820 –> 00:37:18,500
Those are common connector patterns.

818
00:37:18,500 –> 00:37:22,660
People ask in teams, co-pilot answers with the relevant service now context, and nobody

819
00:37:22,660 –> 00:37:26,340
has to alt tab into another portal just to find a link that is real value.

820
00:37:26,340 –> 00:37:27,780
But it is not orchestration.

821
00:37:27,780 –> 00:37:28,780
It’s an information plane.

822
00:37:28,780 –> 00:37:30,340
It reduces context switching.

823
00:37:30,340 –> 00:37:31,780
It reduces time to knowledge.

824
00:37:31,780 –> 00:37:36,900
It reduces the, where do I even find this friction that burns hours across large companies?

825
00:37:36,900 –> 00:37:40,300
And for early adoption, read only is politically easy.

826
00:37:40,300 –> 00:37:45,220
Lower risk, minimal change control, fewer permission arguments and far less blast radius if

827
00:37:45,220 –> 00:37:46,660
something is mis-scoped.

828
00:37:46,660 –> 00:37:50,580
This is why read only wins first, because everyone can agree that finding answers faster

829
00:37:50,580 –> 00:37:55,060
is good, and almost nobody wants to be the executive who approved letting an AI write

830
00:37:55,060 –> 00:37:56,740
to production systems.

831
00:37:56,740 –> 00:37:58,620
Now mode two, write integration.

832
00:37:58,620 –> 00:38:02,820
Write integration is about outcomes, creating the request, updating the record, approving

833
00:38:02,820 –> 00:38:07,220
the step, executing the workflow transition, triggering the containment task, posting the

834
00:38:07,220 –> 00:38:10,620
approval decision, calling the API that changes reality.

835
00:38:10,620 –> 00:38:14,860
Write is orchestration, and orchestration is where governance lives or dies.

836
00:38:14,860 –> 00:38:18,780
Microsoft’s path to write typically runs through controlled action frameworks.

837
00:38:18,780 –> 00:38:23,860
Co-pilot studio connectors, approved plugins, explicit API calls, and tooling that can be

838
00:38:23,860 –> 00:38:25,620
governed and monitored.

839
00:38:25,620 –> 00:38:28,060
ServiceNow’s side runs through its workflow engine.

840
00:38:28,060 –> 00:38:32,260
Flow designer, integration hub, approval engines, and the record state machine that actually

841
00:38:32,260 –> 00:38:33,260
owns the process.

842
00:38:33,260 –> 00:38:35,220
The architectural point is simple.

843
00:38:35,220 –> 00:38:36,940
Connectors can tell you what’s happening.

844
00:38:36,940 –> 00:38:38,260
Orchestration makes something happen.

845
00:38:38,260 –> 00:38:41,540
If you stop at read integration, you’ll build what looks like progress, but behaves like

846
00:38:41,540 –> 00:38:42,540
theater.

847
00:38:42,540 –> 00:38:44,860
Co-pilot can summarize an incident, great.

848
00:38:44,860 –> 00:38:49,140
Someone still has to open service now, create tasks, chase approvals and record evidence.

849
00:38:49,140 –> 00:38:51,140
Co-pilot can find the right knowledge article.

850
00:38:51,140 –> 00:38:52,140
Great.

851
00:38:52,140 –> 00:38:55,580
First, to execute the onboarding workflow and enforce identit gates.

852
00:38:55,580 –> 00:38:57,860
Retrieval without execution is just faster browsing.

853
00:38:57,860 –> 00:39:02,380
This is the line where most enterprises get stuck, because moving from read to write forces

854
00:39:02,380 –> 00:39:04,420
three ugly conversations.

855
00:39:04,420 –> 00:39:07,820
First permissions read can tolerate broad access patterns, write cannot.

856
00:39:07,820 –> 00:39:11,540
When you let something create or update records, you are delegating authority.

857
00:39:11,540 –> 00:39:15,340
An authority needs least privilege, explicit scope, and revocation parts.

858
00:39:15,340 –> 00:39:19,180
Otherwise the integration account becomes a permanent super user, and you’ve created a

859
00:39:19,180 –> 00:39:21,340
bot-shaped insider threat.

860
00:39:21,340 –> 00:39:22,340
You need audit.

861
00:39:22,340 –> 00:39:26,300
If a workflow step gets approved from teams, you need to know who approved it under what

862
00:39:26,300 –> 00:39:29,860
identity with what context and what record state changed as a result.

863
00:39:29,860 –> 00:39:34,740
If you can’t prove that, you didn’t automate approvals, you created an un-auditable bypass

864
00:39:34,740 –> 00:39:36,340
with a nicer interface.

865
00:39:36,340 –> 00:39:38,980
Third, change control and blast radius.

866
00:39:38,980 –> 00:39:41,900
Read failures are annoying, write failures are incidents.

867
00:39:41,900 –> 00:39:45,420
The moment actions can be triggered from the engagement layer, you need to think like

868
00:39:45,420 –> 00:39:46,820
an architect.

869
00:39:46,820 –> 00:39:51,300
How do you limit scope, monitor behavior, roll back mistakes, and keep the system

870
00:39:51,300 –> 00:39:52,300
deterministic?

871
00:39:52,300 –> 00:39:55,060
So the same operating stance is phased.

872
00:39:55,060 –> 00:39:59,300
Start with search and read only surfaces to reduce context switching and prove adoption.

873
00:39:59,300 –> 00:40:04,780
Clean up knowledge hygiene because AI search will amplify whatever mess you already have.

874
00:40:04,780 –> 00:40:09,300
Then graduate to governed actions, a limited set of requests, updates, and approvals where

875
00:40:09,300 –> 00:40:12,700
workflow state remains authoritative in service now.

876
00:40:12,700 –> 00:40:16,820
Rites are supervised at first because supervised rights are entropy control.

877
00:40:16,820 –> 00:40:19,580
Only then do you talk about agentic execution.

878
00:40:19,580 –> 00:40:22,980
Those agents that can write without guardrails aren’t helpful.

879
00:40:22,980 –> 00:40:24,460
They are probabilistic operators.

880
00:40:24,460 –> 00:40:28,060
The integration reality stripped of the sales gloss is this.

881
00:40:28,060 –> 00:40:31,660
Microsoft can be the best front end your enterprise has ever had.

882
00:40:31,660 –> 00:40:35,340
Service now has to remain the execution engine your enterprise can defend.

883
00:40:35,340 –> 00:40:39,700
If you can’t separate answering from acting, you will automate, but you’ll automate the

884
00:40:39,700 –> 00:40:41,900
wrong thing.

885
00:40:41,900 –> 00:40:45,660
Copilot plus now assist, two brains, two jurisdictions.

886
00:40:45,660 –> 00:40:49,860
Now we get to the part everyone wants to skip to, copilot and now assist, two assistance,

887
00:40:49,860 –> 00:40:53,820
two brands, two demos where someone types a sentence and the system politely pretends

888
00:40:53,820 –> 00:40:55,620
enterprise execution is simple.

889
00:40:55,620 –> 00:40:56,700
Here’s the correct framing.

890
00:40:56,700 –> 00:40:58,940
These are two brains with two jurisdictions.

891
00:40:58,940 –> 00:41:03,460
And if you don’t define jurisdiction, you get a constitutional crisis at scale.

892
00:41:03,460 –> 00:41:06,580
Copilot’s jurisdiction is the Microsoft productivity estate.

893
00:41:06,580 –> 00:41:10,740
It understands meetings, mail chats, files, calendars, and the messy human context that

894
00:41:10,740 –> 00:41:12,500
lives inside M365.

895
00:41:12,500 –> 00:41:16,380
It’s good at turning unstructured intent into something coherent.

896
00:41:16,380 –> 00:41:20,380
Summaries, action items, drafts, and what did we decide in that meeting it?

897
00:41:20,380 –> 00:41:22,300
It reduces the cost of thinking and searching.

898
00:41:22,300 –> 00:41:25,780
Now assists jurisdiction is service now operational reality.

899
00:41:25,780 –> 00:41:30,620
It understands records, workflows, knowledge bases, catalog items, case history, assignment

900
00:41:30,620 –> 00:41:34,100
groups, SLAs and the govern state machine that actually moves work.

901
00:41:34,100 –> 00:41:37,940
It’s good at turning operational context into controlled next steps.

902
00:41:37,940 –> 00:41:43,180
Occasion, routing, suggested actions, response drafting, and workflow aware assistance for agents.

903
00:41:43,180 –> 00:41:47,100
So if you want a single sentence that doesn’t lie, copilot is fluent in human context.

904
00:41:47,100 –> 00:41:49,260
Now assist is fluent in operational state.

905
00:41:49,260 –> 00:41:52,700
That’s why two assistance is not redundancy, it’s separation of concerns.

906
00:41:52,700 –> 00:41:55,140
But it’s also where organizations make a classic mistake.

907
00:41:55,140 –> 00:41:58,100
They assume the assistant that can talk should also be allowed to write.

908
00:41:58,100 –> 00:42:02,380
That’s how you get AI actions that are really just permission drift wearing a lab coat.

909
00:42:02,380 –> 00:42:05,900
The integration pattern that actually survives audit is a handoff model.

910
00:42:05,900 –> 00:42:08,660
It operates in teams as the engagement surface.

911
00:42:08,660 –> 00:42:13,660
It captures the request in human terms, pulls relevant Microsoft context, and then hands

912
00:42:13,660 –> 00:42:17,100
off to service now when the next step requires workflow state.

913
00:42:17,100 –> 00:42:20,820
That handoff can look like a service now card, a linked record, or a guided request flow

914
00:42:20,820 –> 00:42:23,980
that lands inside the service now workflow engine.

915
00:42:23,980 –> 00:42:26,060
Now assist does the inverse when needed.

916
00:42:26,060 –> 00:42:30,820
From inside service now it can call Microsoft context to help with communication artifacts,

917
00:42:30,820 –> 00:42:35,820
drafting an incident update email, generating a PowerPoint summary for leadership, or pulling

918
00:42:35,820 –> 00:42:37,700
relevant meeting notes.

919
00:42:37,700 –> 00:42:42,580
Without pretending that the Microsoft artifact is the authoritative record of the incident.

920
00:42:42,580 –> 00:42:44,940
This is not one AI to rule them all.

921
00:42:44,940 –> 00:42:46,660
It’s two assistance that delegate properly.

922
00:42:46,660 –> 00:42:50,460
Now the hidden complexity is not the models, it’s grounding and permissions.

923
00:42:50,460 –> 00:42:53,540
Grounding is the question of what the assistant is allowed to know.

924
00:42:53,540 –> 00:42:56,060
And what sources it uses to generate an answer.

925
00:42:56,060 –> 00:43:00,220
Copilot is grounded in Microsoft Graph, and whatever your tenant exposes through permissions

926
00:43:00,220 –> 00:43:01,220
and connectors.

927
00:43:01,220 –> 00:43:03,020
Now assist is grounded in service.

928
00:43:03,020 –> 00:43:07,620
Now records and knowledge sources governed by service now access controls and user criteria.

929
00:43:07,620 –> 00:43:12,820
If you blur those boundaries, you get confident nonsense or worse, confident data leakage.

930
00:43:12,820 –> 00:43:14,060
Permissions are the harder landmine.

931
00:43:14,060 –> 00:43:18,220
Copilot can only act within the permissions of the user and the configured connectors.

932
00:43:18,220 –> 00:43:19,540
Same story with now assist.

933
00:43:19,540 –> 00:43:23,380
That sounds comforting until someone fixes a failing integration by giving the connector

934
00:43:23,380 –> 00:43:24,700
account broad access.

935
00:43:24,700 –> 00:43:26,340
Then it works, then nobody reduces it.

936
00:43:26,340 –> 00:43:29,740
Then you’ve created a silent super user that will outlive the project.

937
00:43:29,740 –> 00:43:32,540
That’s not misconfiguration, that’s design omission.

938
00:43:32,540 –> 00:43:35,740
This is where jurisdiction becomes a security control, not a diagram.

939
00:43:35,740 –> 00:43:40,060
The assistance can only be as safe as the identity and authorization model they operate under.

940
00:43:40,060 –> 00:43:42,500
And that brings you right back to the operating layer law.

941
00:43:42,500 –> 00:43:44,780
Read can be generous, right must be governed.

942
00:43:44,780 –> 00:43:46,260
So a same design looks like this.

943
00:43:46,260 –> 00:43:50,580
Copilot can read service now contacts through connectors and summarize it for the user in teams,

944
00:43:50,580 –> 00:43:52,460
low blast radius, high adoption.

945
00:43:52,460 –> 00:43:57,380
When the user wants to do something, create a request, approve a change, trigger containment.

946
00:43:57,380 –> 00:44:02,460
The system routes that into service now as a workflow step with explicit identity, logging

947
00:44:02,460 –> 00:44:03,980
and approval state.

948
00:44:03,980 –> 00:44:06,380
Rights are either supervised or constrained by policy.

949
00:44:06,380 –> 00:44:09,420
And if someone wants fully agentic behavior, just take care of it.

950
00:44:09,420 –> 00:44:10,860
The answer is still no.

951
00:44:10,860 –> 00:44:15,100
Not because AI is bad, because enterprises run on constrained authority, not vibes.

952
00:44:15,100 –> 00:44:18,220
So the power play isn’t Microsoft versus service now assistance.

953
00:44:18,220 –> 00:44:21,740
The power play is who owns the next step when the assistant finishes talking.

954
00:44:21,740 –> 00:44:26,620
If Copilot closes a conversation but no workflow change state, you created a nicer chat experience.

955
00:44:26,620 –> 00:44:31,060
If now assist proposes an action, but it can’t execute it under governance, you created

956
00:44:31,060 –> 00:44:32,340
better suggestions.

957
00:44:32,340 –> 00:44:36,660
The operating layer only exists when the state machine moves with evidence, two brains,

958
00:44:36,660 –> 00:44:38,140
two jurisdictions.

959
00:44:38,140 –> 00:44:42,220
And one non-negotiable boundary, the assistant can speak anywhere, but it can only write

960
00:44:42,220 –> 00:44:43,940
where you can audit it.

961
00:44:43,940 –> 00:44:49,380
AI changes who executes work, deterministic workflows versus probabilistic agents.

962
00:44:49,380 –> 00:44:53,940
Now the uncomfortable part, AI doesn’t just change how work is requested, it changes who

963
00:44:53,940 –> 00:44:55,220
is executing work.

964
00:44:55,220 –> 00:44:59,660
And enterprises are about to learn the difference between deterministic systems and probabilistic

965
00:44:59,660 –> 00:45:00,660
ones the hard way.

966
00:45:00,660 –> 00:45:03,220
A deterministic workflow is boring on purpose.

967
00:45:03,220 –> 00:45:06,220
Given the same inputs, it produces the same outcome.

968
00:45:06,220 –> 00:45:11,820
Same rooting, same approvals, same evidence requirements, same SLA timers, same escalation

969
00:45:11,820 –> 00:45:12,820
paths.

970
00:45:12,820 –> 00:45:14,260
It behaves like an authorization compiler.

971
00:45:14,260 –> 00:45:17,700
You feed it policy and state and it decides what’s allowed next.

972
00:45:17,700 –> 00:45:19,420
A probabilistic agent is different.

973
00:45:19,420 –> 00:45:23,780
It interprets, it guesses, it ranks options, it can be right for the wrong reasons and

974
00:45:23,780 –> 00:45:25,540
it can be wrong with high confidence.

975
00:45:25,540 –> 00:45:26,540
That’s not a flaw.

976
00:45:26,540 –> 00:45:28,260
That’s the nature of LL-em based systems.

977
00:45:28,260 –> 00:45:31,220
They generate plausible output, not guaranteed truth.

978
00:45:31,220 –> 00:45:34,260
So the enterprise decision isn’t AI or workflows.

979
00:45:34,260 –> 00:45:38,100
It’s where does probabilistic behavior belong and where is it forbidden?

980
00:45:38,100 –> 00:45:41,300
AI belongs at the edges of the operating layer.

981
00:45:41,300 –> 00:45:46,180
Intake, summarization, classification suggestions, prioritization and drafting.

982
00:45:46,180 –> 00:45:49,500
It belongs anywhere the primary job is to reduce human cognitive load.

983
00:45:49,500 –> 00:45:53,620
AI does not belong as an unconstrained writer into your execution plane.

984
00:45:53,620 –> 00:45:56,740
Because once an agent can write, it can create state transitions.

985
00:45:56,740 –> 00:46:00,940
It can approve, it can provision access, it can close an incident, it can trigger containment,

986
00:46:00,940 –> 00:46:04,940
it can move money, it can change reality and that’s the exact moment your organization

987
00:46:04,940 –> 00:46:06,580
stops being deterministic.

988
00:46:06,580 –> 00:46:08,220
You become probabilistic by design.

989
00:46:08,220 –> 00:46:11,180
This is why human in the loop isn’t a temporary phase.

990
00:46:11,180 –> 00:46:14,700
It’s the only sustainable operating model for write operations at scale.

991
00:46:14,700 –> 00:46:17,020
Read operations can move autonomous earlier.

992
00:46:17,020 –> 00:46:22,260
Let the assistant fetch records, summarize threads, draft responses and propose the next step.

993
00:46:22,260 –> 00:46:24,220
Read failures are annoying but survivable.

994
00:46:24,220 –> 00:46:26,260
They create confusion, not catastrophe.

995
00:46:26,260 –> 00:46:28,500
Read operations must start supervised.

996
00:46:28,500 –> 00:46:32,140
Every write needs an approval boundary, a logged identity and a rollback story.

997
00:46:32,140 –> 00:46:36,220
Not because compliance people are mean, because entropy is real and write access is the fastest

998
00:46:36,220 –> 00:46:37,540
way to manufacture it.

999
00:46:37,540 –> 00:46:42,620
So the pattern is simple, AI proposes, a workflow enforces, a human authorizes, the system

1000
00:46:42,620 –> 00:46:43,620
records.

1001
00:46:43,620 –> 00:46:45,980
Over time some writes can become more autonomous.

1002
00:46:45,980 –> 00:46:51,020
But only when you can prove that the action is low risk, reversible and observable.

1003
00:46:51,020 –> 00:46:53,620
That’s not optimism, that’s engineering discipline.

1004
00:46:53,620 –> 00:46:55,820
And this is where governance beats model quality.

1005
00:46:55,820 –> 00:46:57,980
People keep asking, is the model good enough?

1006
00:46:57,980 –> 00:46:59,700
Wrong question, models will improve.

1007
00:46:59,700 –> 00:47:01,180
Your governance won’t fix itself.

1008
00:47:01,180 –> 00:47:05,060
If you don’t build the guard rails now, you’ll just accelerate your existing dysfunction

1009
00:47:05,060 –> 00:47:06,060
later.

1010
00:47:06,060 –> 00:47:10,380
Governance means, least privilege for connectors and agents, explicit scopes, approval gates

1011
00:47:10,380 –> 00:47:13,820
for state changes and audit trails that survive executive turnover.

1012
00:47:13,820 –> 00:47:17,060
It also means you can answer the only question auditors care about.

1013
00:47:17,060 –> 00:47:19,900
Who did what, under what authority and why?

1014
00:47:19,900 –> 00:47:23,060
Rollback paths matter here more than anyone wants to admit.

1015
00:47:23,060 –> 00:47:27,300
If an agent creates a service now, change record and schedules work, can you stop it?

1016
00:47:27,300 –> 00:47:29,980
If it grants access, can you revoke it automatically?

1017
00:47:29,980 –> 00:47:33,980
If it updates a security incident, can you reconstruct the exact sequence of actions without

1018
00:47:33,980 –> 00:47:35,220
relying on chat logs?

1019
00:47:35,220 –> 00:47:36,820
If you can’t, you don’t have automation.

1020
00:47:36,820 –> 00:47:38,940
You have accelerated risk.

1021
00:47:38,940 –> 00:47:42,140
This is why AI inside workflows creates outcomes.

1022
00:47:42,140 –> 00:47:45,100
Isn’t a motivational line, it’s an architectural constraint.

1023
00:47:45,100 –> 00:47:49,180
AI should live inside the workflow state machine, not beside it.

1024
00:47:49,180 –> 00:47:51,420
The workflow provides determinism.

1025
00:47:51,420 –> 00:47:54,140
Steps, gates, evidence and ownership.

1026
00:47:54,140 –> 00:47:58,180
AI provides judgment support, summarized, recommend and draft.

1027
00:47:58,180 –> 00:48:01,100
Together you get throughput without losing control.

1028
00:48:01,100 –> 00:48:04,260
Without the workflow, AI becomes a noise generator.

1029
00:48:04,260 –> 00:48:09,220
More suggestions, more messages, more help and no authoritative state change.

1030
00:48:09,220 –> 00:48:11,460
People feel busy, nothing finishes.

1031
00:48:11,460 –> 00:48:14,860
And when AI does start finishing things without workflows, it finishes them in whatever

1032
00:48:14,860 –> 00:48:16,740
way seems plausible at the time.

1033
00:48:16,740 –> 00:48:18,580
That’s conditional chaos with better grammar.

1034
00:48:18,580 –> 00:48:22,940
So the strategic move for the enterprise isn’t a chase fully autonomous agents.

1035
00:48:22,940 –> 00:48:27,780
The strategic move is to redesign execution so that autonomy is a controlled gradient.

1036
00:48:27,780 –> 00:48:32,540
Read first autonomy, supervised rights, then selective automation where risk is bounded.

1037
00:48:32,540 –> 00:48:36,100
The system doesn’t care about your intent, it only respects what you enforce.

1038
00:48:36,100 –> 00:48:40,180
Failure modes, workflow, entropy, shadow automation and permission drift.

1039
00:48:40,180 –> 00:48:44,060
Every integration story sounds clean until it hits the three forces that always win in

1040
00:48:44,060 –> 00:48:45,460
the real enterprise.

1041
00:48:45,460 –> 00:48:47,700
Urgency, convenience and forgetting.

1042
00:48:47,700 –> 00:48:50,980
Those forces don’t break platforms, they break your assumptions.

1043
00:48:50,980 –> 00:48:53,020
And they always express themselves the same way.

1044
00:48:53,020 –> 00:48:55,900
Workflow, entropy, shadow automation and permission drift.

1045
00:48:55,900 –> 00:48:58,220
Workflow, entropy is the quiet killer.

1046
00:48:58,220 –> 00:49:00,100
It starts as a temporary exception.

1047
00:49:00,100 –> 00:49:01,540
A manager needs access today.

1048
00:49:01,540 –> 00:49:05,660
A procurement approval gets rushed because quarter end, a change gets pushed without the

1049
00:49:05,660 –> 00:49:08,020
formal step because the outage clock is running.

1050
00:49:08,020 –> 00:49:09,820
Nobody thinks they’re undermining governance.

1051
00:49:09,820 –> 00:49:11,420
They think they’re being helpful.

1052
00:49:11,420 –> 00:49:13,820
Then that exception becomes the actual process.

1053
00:49:13,820 –> 00:49:17,260
Not because anyone chose it but because the exception path is faster than the policy

1054
00:49:17,260 –> 00:49:18,260
path.

1055
00:49:18,260 –> 00:49:21,460
People root around friction the same way water roots around rocks.

1056
00:49:21,460 –> 00:49:26,500
Over time your documented workflow becomes ceremonial and your real workflow becomes DM the

1057
00:49:26,500 –> 00:49:28,740
right person, get a thumbs up, move on.

1058
00:49:28,740 –> 00:49:33,220
That’s why conditional access exceptions, emergency approvals and bypass routes are entropy

1059
00:49:33,220 –> 00:49:34,220
generators.

1060
00:49:34,220 –> 00:49:35,460
They don’t just create one gap.

1061
00:49:35,460 –> 00:49:38,980
They teach the organization that state transitions are optional.

1062
00:49:38,980 –> 00:49:43,020
Once state transitions are optional, your system of action becomes a logging tool.

1063
00:49:43,020 –> 00:49:46,100
It records the mess after the fact it doesn’t control it.

1064
00:49:46,100 –> 00:49:48,220
The second failure mode is shadow automation.

1065
00:49:48,220 –> 00:49:51,340
This is where teams and power automate become a parallel universe.

1066
00:49:51,340 –> 00:49:55,140
Someone builds a flow that posts a message to a channel when an email arrives.

1067
00:49:55,140 –> 00:49:58,260
Someone builds a form that creates a task list in planner.

1068
00:49:58,260 –> 00:50:01,020
Someone wires up approvals and chat because it’s just easier.

1069
00:50:01,020 –> 00:50:02,180
And on day one it works.

1070
00:50:02,180 –> 00:50:03,180
Of course it works.

1071
00:50:03,180 –> 00:50:04,860
Local automation always works locally.

1072
00:50:04,860 –> 00:50:07,940
The problem is what it displaces, governed orchestration.

1073
00:50:07,940 –> 00:50:09,940
Shadow automation doesn’t fail because it’s malicious.

1074
00:50:09,940 –> 00:50:11,420
It fails because it’s unowned.

1075
00:50:11,420 –> 00:50:14,820
No life cycle, no audit story, no defined blast radius.

1076
00:50:14,820 –> 00:50:19,420
The builder leaves, the flow keeps running and the next incident response includes.

1077
00:50:19,420 –> 00:50:22,820
Nobody knows what triggers this but it’s been doing it for months.

1078
00:50:22,820 –> 00:50:26,100
That’s what happens when you treat the engagement plane as the execution plane.

1079
00:50:26,100 –> 00:50:30,340
Now the third failure mode is the one that makes security teams tired permission drift.

1080
00:50:30,340 –> 00:50:35,340
Integrations require permissions, AI assistance require permissions, connectors require permissions.

1081
00:50:35,340 –> 00:50:39,380
And when something fails during setup, the quickest fix is always the same.

1082
00:50:39,380 –> 00:50:40,700
Just give it more access.

1083
00:50:40,700 –> 00:50:43,900
So you create an integration account, you grant board graph permissions,

1084
00:50:43,900 –> 00:50:47,540
you grant broad service, now roles, you get the demo working, everyone claps,

1085
00:50:47,540 –> 00:50:49,780
then nobody goes back and reduces scope.

1086
00:50:49,780 –> 00:50:52,620
Six months later that account has more access than most humans.

1087
00:50:52,620 –> 00:50:56,900
It’s a permanent super user with no human manager, no quarterly access review,

1088
00:50:56,900 –> 00:50:59,300
and no business owner who can explain why it exists.

1089
00:50:59,300 –> 00:51:02,860
That’s not misconfiguration, that’s architectural erosion.

1090
00:51:02,860 –> 00:51:04,820
And permission drift doesn’t stay in one place.

1091
00:51:04,820 –> 00:51:05,540
It spreads.

1092
00:51:05,540 –> 00:51:08,540
A second connector gets deployed and reuses the same account.

1093
00:51:08,540 –> 00:51:09,860
A third flow depends on it.

1094
00:51:09,860 –> 00:51:12,940
Now you can’t fix it without breaking business critical automation.

1095
00:51:12,940 –> 00:51:15,820
That’s how security that becomes operational dependency.

1096
00:51:15,820 –> 00:51:16,820
Here’s the weird part.

1097
00:51:16,820 –> 00:51:19,500
AI accelerates all three failure modes.

1098
00:51:19,500 –> 00:51:24,300
Workflow entropy gets faster because AI makes it easier to justify exceptions.

1099
00:51:24,300 –> 00:51:25,900
Copilot says it’s low risk.

1100
00:51:25,900 –> 00:51:31,700
Shadow automation gets faster because AI makes it easier to build flows without understanding the governance model.

1101
00:51:31,700 –> 00:51:35,340
Permission drift gets faster because agents that can act need permissions

1102
00:51:35,340 –> 00:51:37,620
and people will overscope them to avoid friction.

1103
00:51:37,620 –> 00:51:40,140
That’s why AI without workflows creates noise.

1104
00:51:40,140 –> 00:51:42,380
But AI with bad workflows creates damage.

1105
00:51:42,380 –> 00:51:44,500
So the prevention strategy is not a checklist.

1106
00:51:44,500 –> 00:51:46,060
It’s an operating stance you enforce.

1107
00:51:46,060 –> 00:51:48,540
First, treat exceptions as first class objects.

1108
00:51:48,540 –> 00:51:52,940
If someone needs a bypass, capture it as an exception in the workflow with a reason,

1109
00:51:52,940 –> 00:51:54,980
an approver, and an expiration.

1110
00:51:54,980 –> 00:51:56,900
No expiration means it’s not an exception.

1111
00:51:56,900 –> 00:51:58,500
It’s a hidden policy change.

1112
00:51:58,500 –> 00:52:02,100
Second, treat automations as production assets.

1113
00:52:02,100 –> 00:52:06,020
If it can write, it needs ownership, life cycle management, and controls.

1114
00:52:06,020 –> 00:52:07,580
Otherwise, it’s a ghost system.

1115
00:52:07,580 –> 00:52:10,780
Third, treat permissions as temporary until proven otherwise.

1116
00:52:10,780 –> 00:52:12,300
These privileges are not a principle.

1117
00:52:12,300 –> 00:52:13,620
It’s entropy management.

1118
00:52:13,620 –> 00:52:17,540
If you don’t continuously pull scope back, it will only expand.

1119
00:52:17,540 –> 00:52:19,580
The workflow first operating model,

1120
00:52:19,580 –> 00:52:21,820
re-platform execution in phases.

1121
00:52:21,820 –> 00:52:24,660
So if the diagnosis is workflow fragmentation,

1122
00:52:24,660 –> 00:52:26,820
the treatment isn’t by more apps.

1123
00:52:26,820 –> 00:52:30,180
It’s re-platforming execution, not migrating tickets,

1124
00:52:30,180 –> 00:52:32,020
not rolling out another chatbot,

1125
00:52:32,020 –> 00:52:34,060
re-platforming the operating layer,

1126
00:52:34,060 –> 00:52:37,500
where work starts, how it moves, who can change state,

1127
00:52:37,500 –> 00:52:40,060
and how the organization proves what happened later.

1128
00:52:40,060 –> 00:52:43,140
And the first step is the one everyone skips because it’s not glamorous.

1129
00:52:43,140 –> 00:52:44,340
Mapping execution.

1130
00:52:44,340 –> 00:52:46,340
Not processing mapping as a PowerPoint hobby.

1131
00:52:46,340 –> 00:52:47,420
Execution mapping.

1132
00:52:47,420 –> 00:52:48,900
Where does work actually begin?

1133
00:52:48,900 –> 00:52:50,300
What are the real approval gates?

1134
00:52:50,300 –> 00:52:51,500
What systems change state?

1135
00:52:51,500 –> 00:52:54,500
And what metrics define done across domains?

1136
00:52:54,500 –> 00:52:57,100
If you can’t draw the end-to-end chain for onboarding,

1137
00:52:57,100 –> 00:53:00,180
incident containment, finance approvals, and emergency change,

1138
00:53:00,180 –> 00:53:01,300
you don’t have processes.

1139
00:53:01,300 –> 00:53:02,060
You have traditions.

1140
00:53:02,060 –> 00:53:04,380
Now the split of ownership is non-negotiable.

1141
00:53:04,380 –> 00:53:07,500
Service now owns workflow state, routing, audit, enforcement,

1142
00:53:07,500 –> 00:53:10,540
Microsoft owns collaboration, content, intent, capture,

1143
00:53:10,540 –> 00:53:12,140
and the surfaces where humans live.

1144
00:53:12,140 –> 00:53:13,180
This is not a preference.

1145
00:53:13,180 –> 00:53:15,220
It’s how you prevent authority drift.

1146
00:53:15,220 –> 00:53:17,620
Because the moment teams becomes the authoritative system

1147
00:53:17,620 –> 00:53:21,220
for approvals or changes, you’ve turned chat into a control plane.

1148
00:53:21,220 –> 00:53:22,540
And chat is not a control plane.

1149
00:53:22,540 –> 00:53:23,460
It is not.

1150
00:53:23,460 –> 00:53:25,860
So the operating model is faced because enterprises

1151
00:53:25,860 –> 00:53:27,580
don’t change in one cutover.

1152
00:53:27,580 –> 00:53:29,420
They degrade and improve ingredients.

1153
00:53:29,420 –> 00:53:31,380
Phase one is about reducing context switching

1154
00:53:31,380 –> 00:53:32,740
without moving authority.

1155
00:53:32,740 –> 00:53:35,100
This is where you embed service now into teams,

1156
00:53:35,100 –> 00:53:37,100
service records, and use search connectors

1157
00:53:37,100 –> 00:53:39,860
so people can find knowledge, incidents, and catalog items

1158
00:53:39,860 –> 00:53:41,060
from where they already work.

1159
00:53:41,060 –> 00:53:42,620
It’s intentionally read heavy.

1160
00:53:42,620 –> 00:53:44,780
The goal is adoption and friction removal.

1161
00:53:44,780 –> 00:53:45,940
Fewer portals.

1162
00:53:45,940 –> 00:53:47,300
Fewer, where do I do this?

1163
00:53:47,300 –> 00:53:49,860
Fewer screenshots as status updates.

1164
00:53:49,860 –> 00:53:52,060
But it’s also where you clean your knowledge hygiene.

1165
00:53:52,060 –> 00:53:54,700
Because AI search will amplify whatever mess you’ve allowed

1166
00:53:54,700 –> 00:53:55,420
to accumulate.

1167
00:53:55,420 –> 00:53:58,340
If the knowledge base is stale, your new AI assistant

1168
00:53:58,340 –> 00:54:01,020
will simply produce confident stale answers at scale.

1169
00:54:01,020 –> 00:54:02,060
That’s not transformation.

1170
00:54:02,060 –> 00:54:04,420
That’s automated misinformation.

1171
00:54:04,420 –> 00:54:06,300
Phase two is governed actions.

1172
00:54:06,300 –> 00:54:09,660
This is where you stop pretending that retrieval equals execution.

1173
00:54:09,660 –> 00:54:11,260
Pick a small set of right paths that

1174
00:54:11,260 –> 00:54:12,940
map cleanly to workflows.

1175
00:54:12,940 –> 00:54:15,340
Submit a catalog request, update an incident,

1176
00:54:15,340 –> 00:54:18,100
approve a step, escalate a case, open a change.

1177
00:54:18,100 –> 00:54:20,300
Then make those rights flow through service now

1178
00:54:20,300 –> 00:54:22,180
as authoritative state transitions.

1179
00:54:22,180 –> 00:54:24,020
The user can click approve in teams.

1180
00:54:24,020 –> 00:54:24,700
Fine.

1181
00:54:24,700 –> 00:54:27,180
But the approval must land as a workflow transition

1182
00:54:27,180 –> 00:54:29,180
in service now tied to identity,

1183
00:54:29,180 –> 00:54:30,860
logged, and constrained by policy.

1184
00:54:30,860 –> 00:54:32,780
The engagement plane can host the button.

1185
00:54:32,780 –> 00:54:34,460
The execution plane owns the truth.

1186
00:54:34,460 –> 00:54:36,900
This is also where you enforce least privilege, like you mean it.

1187
00:54:36,900 –> 00:54:39,180
Integration accounts don’t get broad access

1188
00:54:39,180 –> 00:54:40,660
because someone had a demo deadline.

1189
00:54:40,660 –> 00:54:43,780
Agents don’t get right scope, just because it’s easier.

1190
00:54:43,780 –> 00:54:45,860
Every connector and assistant get scoped

1191
00:54:45,860 –> 00:54:47,820
to the minimum set of actions required.

1192
00:54:47,820 –> 00:54:50,620
And it gets reviewed like any other privileged identity.

1193
00:54:50,620 –> 00:54:52,580
Because permissions are not a set-up step.

1194
00:54:52,580 –> 00:54:54,100
They are an operational liability.

1195
00:54:54,100 –> 00:54:56,220
Phase three is a genetic execution.

1196
00:54:56,220 –> 00:54:57,940
And it’s where most organizations rush

1197
00:54:57,940 –> 00:54:59,660
because the demos look magical.

1198
00:54:59,660 –> 00:55:01,260
But a genetic execution only works

1199
00:55:01,260 –> 00:55:02,940
when two conditions are already true.

1200
00:55:02,940 –> 00:55:04,500
The workflow state machine is clean

1201
00:55:04,500 –> 00:55:06,140
and the right controls are enforceable.

1202
00:55:06,140 –> 00:55:07,620
Otherwise, you’re not deploying agents.

1203
00:55:07,620 –> 00:55:09,340
You’re deploying entropy accelerators.

1204
00:55:09,340 –> 00:55:10,380
So the rule is simple.

1205
00:55:10,380 –> 00:55:12,500
Autonomous reads can expand quickly.

1206
00:55:12,500 –> 00:55:14,460
Supervised rights expands slowly.

1207
00:55:14,460 –> 00:55:16,700
And only after you’ve proven that an action is low risk,

1208
00:55:16,700 –> 00:55:19,220
reversible and observable does it earn more autonomy.

1209
00:55:19,220 –> 00:55:22,060
This is also where observability stops being optional.

1210
00:55:22,060 –> 00:55:24,420
If an agent can propose actions, you need to see what it

1211
00:55:24,420 –> 00:55:26,660
proposed, what was approved, what it executed,

1212
00:55:26,660 –> 00:55:27,900
and what changed as a result.

1213
00:55:27,900 –> 00:55:30,540
You need traceability across Microsoft and ServiceNow,

1214
00:55:30,540 –> 00:55:33,260
the intent source, the workflow state and the outcome record.

1215
00:55:33,260 –> 00:55:35,780
If you can’t reconstruct the chain, you have no governance.

1216
00:55:35,780 –> 00:55:37,020
You have vibes.

1217
00:55:37,020 –> 00:55:38,580
And the biggest architectural discipline

1218
00:55:38,580 –> 00:55:39,980
in this whole model is rollback.

1219
00:55:39,980 –> 00:55:43,140
Workflows without rollback are just scripted confidence.

1220
00:55:43,140 –> 00:55:46,340
Every right path needs an undue story, revoke access,

1221
00:55:46,340 –> 00:55:49,820
canceled procurement, rollback a change, reopen the incident,

1222
00:55:49,820 –> 00:55:50,980
restore the prior state.

1223
00:55:50,980 –> 00:55:53,700
Otherwise, your automation becomes a one-way door.

1224
00:55:53,700 –> 00:55:56,580
And one-way doors are how incidents become outages.

1225
00:55:56,580 –> 00:55:58,420
So the workflow first operating model

1226
00:55:58,420 –> 00:56:00,900
is basically enterprise humility formalized,

1227
00:56:00,900 –> 00:56:04,300
humans generate intent in Microsoft, systems execute intent

1228
00:56:04,300 –> 00:56:07,020
in ServiceNow, AI accelerates the edges, not the center,

1229
00:56:07,020 –> 00:56:08,740
and control is what survives pressure.

1230
00:56:08,740 –> 00:56:11,820
That’s the point, not convenience, not novelty.

1231
00:56:11,820 –> 00:56:14,380
Control that still works when people are tired, urgent,

1232
00:56:14,380 –> 00:56:15,700
and improvising.

1233
00:56:15,700 –> 00:56:18,660
Execution throughput is the actual power play.

1234
00:56:18,660 –> 00:56:21,500
The power play isn’t copilot versus now assist.

1235
00:56:21,500 –> 00:56:23,140
It’s building an operating layer

1236
00:56:23,140 –> 00:56:26,300
where intent becomes governed execution every time.

1237
00:56:26,300 –> 00:56:29,220
If you want the next episode, it’s on where governance fails first,

1238
00:56:29,220 –> 00:56:32,540
identity connectors or quick exceptions that become policy.

1239
00:56:32,540 –> 00:56:34,740
Subscribe and watch that one next.





Source link

0 Votes: 0 Upvotes, 0 Downvotes (0 Points)

Leave a reply

Follow
Search
Loading

Signing-in 3 seconds...

Signing-up 3 seconds...

Discover more from 365 Community Online

Subscribe now to keep reading and get access to the full archive.

Continue reading