
1
00:00:00,000 –> 00:00:04,280
Most organizations treat Microsoft 365 as a collection of features to be purchased.
2
00:00:04,280 –> 00:00:05,280
They are wrong.
3
00:00:05,280 –> 00:00:07,880
What they’re actually operating is an economic system.
4
00:00:07,880 –> 00:00:10,640
And like all systems, it leaks, not dramatically.
5
00:00:10,640 –> 00:00:12,160
Silently.
6
00:00:12,160 –> 00:00:14,800
Let me walk you through the seven patterns I see over and over.
7
00:00:14,800 –> 00:00:16,960
Each one individually looks manageable.
8
00:00:16,960 –> 00:00:20,040
Together they compound into what I call architectural entropy,
9
00:00:20,040 –> 00:00:23,400
the slow, invisible decay of value in your Microsoft tenant iter.
10
00:00:23,400 –> 00:00:26,440
Sin 1, the myth of procurement as strategy,
11
00:00:26,440 –> 00:00:27,680
the lie sound simple.
12
00:00:27,680 –> 00:00:30,040
Buy the right license, get the right outcome.
13
00:00:30,040 –> 00:00:34,360
Most organizations believe that purchasing e5 licenses equals digital transformation.
14
00:00:34,360 –> 00:00:36,560
They tell their CFO, they are modernizing.
15
00:00:36,560 –> 00:00:38,120
They renew annually.
16
00:00:38,120 –> 00:00:42,040
Nobody questions whether the capability they bought is actually creating value.
17
00:00:42,040 –> 00:00:43,160
Here’s what happens instead.
18
00:00:43,160 –> 00:00:47,240
A global engineering firm with 5,000 seats decides to go digital.
19
00:00:47,240 –> 00:00:49,200
They land on e5 as the standard.
20
00:00:49,200 –> 00:00:52,040
90% adoption across the knowledge worker base.
21
00:00:52,040 –> 00:00:53,440
On paper, perfect.
22
00:00:53,440 –> 00:00:56,840
In reality, only a fraction of users ever touched the premium connectors.
23
00:00:56,840 –> 00:01:00,720
Co-pilot set unused, defender features were never operationalized.
24
00:01:00,720 –> 00:01:04,520
After 18 months, a rationalization audit revealed the truth.
25
00:01:04,520 –> 00:01:08,760
56% of those licenses were either inactive, underutilized,
26
00:01:08,760 –> 00:01:11,400
or completely misaligned with actual work patterns.
27
00:01:11,400 –> 00:01:13,960
Buy roll, buy region, buy function.
28
00:01:13,960 –> 00:01:15,240
The economic leakage?
29
00:01:15,240 –> 00:01:17,600
$1.6 million annually.
30
00:01:17,600 –> 00:01:20,720
They were financing architectural erosion without knowing it.
31
00:01:20,720 –> 00:01:23,320
This is what I mean by procurement masquerading as strategy.
32
00:01:23,320 –> 00:01:24,440
You bought a feature bundle.
33
00:01:24,440 –> 00:01:26,200
You mistook it for an operating model.
34
00:01:26,200 –> 00:01:28,360
The control plane fix is brutally simple.
35
00:01:28,360 –> 00:01:31,920
If you cannot map telemetry to quarterly value realization,
36
00:01:31,920 –> 00:01:34,680
if you cannot prove that the premium capabilities you paid for
37
00:01:34,680 –> 00:01:38,600
are actively driving business outcomes, then you don’t have architecture.
38
00:01:38,600 –> 00:01:39,960
You have procurement.
39
00:01:39,960 –> 00:01:44,640
And procurement by definition has no accountability for the money after the check clears.
40
00:01:44,640 –> 00:01:46,680
Sin 2, permission sprawl.
41
00:01:46,680 –> 00:01:49,080
The authorization compiler nobody built.
42
00:01:49,080 –> 00:01:53,160
The next pattern is permission creep, and it’s more dangerous than most organizations realize.
43
00:01:53,160 –> 00:01:57,040
In Entra ID, there’s a default culture I call ad-only.
44
00:01:57,040 –> 00:01:58,040
Permissions get granted.
45
00:01:58,040 –> 00:01:59,680
They rarely get revoked.
46
00:01:59,680 –> 00:02:00,680
That’s not in competence.
47
00:02:00,680 –> 00:02:01,680
That’s design inertia.
48
00:02:01,680 –> 00:02:02,880
No one owns the life cycle.
49
00:02:02,880 –> 00:02:03,880
No one reviews it.
50
00:02:03,880 –> 00:02:04,880
So it accumulates.
51
00:02:04,880 –> 00:02:07,440
I audited a financial services firm last year.
52
00:02:07,440 –> 00:02:11,600
They discovered 847, often app registrations.
53
00:02:11,600 –> 00:02:15,640
Applications that were granted permissions three years ago for a pilot project that was abandoned.
54
00:02:15,640 –> 00:02:17,320
The permissions were never removed.
55
00:02:17,320 –> 00:02:22,440
The service principles still held Microsoft GraphRides to access tenant data, user information,
56
00:02:22,440 –> 00:02:23,720
mailbox contents.
57
00:02:23,720 –> 00:02:27,560
54% of IT leaders report complex identity and privilege sprawl.
58
00:02:27,560 –> 00:02:32,280
In large tenants, it’s normal to have 200, 300, sometimes 400 privileged applications running
59
00:02:32,280 –> 00:02:35,000
with permissions that nobody can fully account for.
60
00:02:35,000 –> 00:02:36,600
Here’s the economic consequence.
61
00:02:36,600 –> 00:02:37,600
Audit friction.
62
00:02:37,600 –> 00:02:38,920
Breach exposure.
63
00:02:38,920 –> 00:02:40,120
Operational paralysis.
64
00:02:40,120 –> 00:02:42,720
When a compliance team asks who has access to what?
65
00:02:42,720 –> 00:02:44,520
The answer takes weeks to assemble.
66
00:02:44,520 –> 00:02:45,640
And in a breach, you’re blind.
67
00:02:45,640 –> 00:02:48,640
You don’t know what was exposed because you don’t know what permissions existed.
68
00:02:48,640 –> 00:02:53,160
The control plane fixes this treat permissions as entropy generators, not rewards.
69
00:02:53,160 –> 00:02:56,040
Design expiration into every access ground from the start.
70
00:02:56,040 –> 00:02:57,680
Enforced life cycle ownership.
71
00:02:57,680 –> 00:03:01,360
If an application’s purpose has expired, its permissions expire with it.
72
00:03:01,360 –> 00:03:02,840
Automatically, this is not optional.
73
00:03:02,840 –> 00:03:04,360
This is architectural law.
74
00:03:04,360 –> 00:03:05,360
Sin, three.
75
00:03:05,360 –> 00:03:06,760
Tactical governance.
76
00:03:06,760 –> 00:03:08,480
The theater of compliance.
77
00:03:08,480 –> 00:03:10,920
Most organizations claim they have governance.
78
00:03:10,920 –> 00:03:12,360
What they actually have is theater.
79
00:03:12,360 –> 00:03:16,160
I walked into a healthcare organization with 72 teams governance policies.
80
00:03:16,160 –> 00:03:17,320
All of them documented.
81
00:03:17,320 –> 00:03:18,400
None of them automated.
82
00:03:18,400 –> 00:03:20,040
They relied on manual approvals.
83
00:03:20,040 –> 00:03:21,360
On reactive policing.
84
00:03:21,360 –> 00:03:22,600
On human bottlenecks.
85
00:03:22,600 –> 00:03:24,400
On inconsistent enforcement.
86
00:03:24,400 –> 00:03:26,720
How many manual hours went into that every year?
87
00:03:26,720 –> 00:03:27,720
4,000.
88
00:03:27,720 –> 00:03:28,720
Minimum.
89
00:03:28,720 –> 00:03:31,480
Someone’s job was refreshing spreadsheets and sending escalation emails.
90
00:03:31,480 –> 00:03:36,360
72% of organizations cannot enforce full governance policies at scale.
91
00:03:36,360 –> 00:03:37,600
And the reason is always the same.
92
00:03:37,600 –> 00:03:41,120
They build governance as a control function instead of a system’s layer.
93
00:03:41,120 –> 00:03:43,680
The economic consequence is hidden but substantial.
94
00:03:43,680 –> 00:03:46,240
4,000 hours annually per organization.
95
00:03:46,240 –> 00:03:49,120
It’s two full-time employees just maintaining compliance theater.
96
00:03:49,120 –> 00:03:50,120
And it’s fragile.
97
00:03:50,120 –> 00:03:51,160
One person leaves.
98
00:03:51,160 –> 00:03:52,160
The policies drift.
99
00:03:52,160 –> 00:03:53,520
The system decays.
100
00:03:53,520 –> 00:03:55,000
The fix is existential.
101
00:03:55,000 –> 00:03:57,600
Governance that isn’t code is just a suggestion.
102
00:03:57,600 –> 00:04:02,080
If you’re still relying on PDF policies and SharePoint checklists and email approvals,
103
00:04:02,080 –> 00:04:04,520
you have compliance theater, not compliance.
104
00:04:04,520 –> 00:04:05,520
Automated.
105
00:04:05,520 –> 00:04:06,520
Make it part of the system.
106
00:04:06,520 –> 00:04:07,520
Make violations impossible.
107
00:04:07,520 –> 00:04:08,520
Not just monitored.
108
00:04:08,520 –> 00:04:10,920
If you cannot automate it, you don’t actually have governance.
109
00:04:10,920 –> 00:04:11,920
You have hope.
110
00:04:11,920 –> 00:04:12,920
Sin 4.
111
00:04:12,920 –> 00:04:13,920
Appworship.
112
00:04:13,920 –> 00:04:14,920
Confusing output.
113
00:04:14,920 –> 00:04:17,680
Enterprises celebrate app proliferation.
114
00:04:17,680 –> 00:04:19,720
We shipped 50 power apps this year.
115
00:04:19,720 –> 00:04:21,280
Citizen developers are empowered.
116
00:04:21,280 –> 00:04:22,760
Feature velocity is accelerating.
117
00:04:22,760 –> 00:04:24,040
But here’s what actually happened.
118
00:04:24,040 –> 00:04:26,200
You created 50 new maintenance liabilities.
119
00:04:26,200 –> 00:04:28,040
50 new surface area multipliers.
120
00:04:28,040 –> 00:04:30,680
Every app is another piece of code someone has to support.
121
00:04:30,680 –> 00:04:32,240
Another integration that can fail.
122
00:04:32,240 –> 00:04:33,520
Another attack surface to defend.
123
00:04:33,520 –> 00:04:37,200
A mid-market organization had 340 power apps in their tenant.
124
00:04:37,200 –> 00:04:39,760
127 of them had never been used.
125
00:04:39,760 –> 00:04:40,760
Nobody owned them.
126
00:04:40,760 –> 00:04:41,760
Nobody maintained them.
127
00:04:41,760 –> 00:04:42,960
They were digital craft.
128
00:04:42,960 –> 00:04:46,560
Systemic causes structural builders get rewarded for creation.
129
00:04:46,560 –> 00:04:47,560
Architects are invisible.
130
00:04:47,560 –> 00:04:52,120
So the tenant fills up with applications that looked good in isolation, but create a technical
131
00:04:52,120 –> 00:04:53,120
debt at scale.
132
00:04:53,120 –> 00:04:55,880
The economic consequence is support overhead.
133
00:04:55,880 –> 00:04:56,880
Compliance risk.
134
00:04:56,880 –> 00:04:57,880
Vendorsprone.
135
00:04:57,880 –> 00:05:02,120
When you have 340 applications, the complexity of governance becomes overwhelming.
136
00:05:02,120 –> 00:05:03,880
Entitlements multiply.
137
00:05:03,880 –> 00:05:05,080
Integrations tangle.
138
00:05:05,080 –> 00:05:06,680
Security becomes impossible to manage.
139
00:05:06,680 –> 00:05:08,760
The control plane fixes architectural zoning.
140
00:05:08,760 –> 00:05:10,080
Stop counting apps.
141
00:05:10,080 –> 00:05:12,160
Start counting technical debt surface area.
142
00:05:12,160 –> 00:05:13,960
Enforce life cycle ownership.
143
00:05:13,960 –> 00:05:17,960
Decommission anything that doesn’t have a clear owner and a business justification.
144
00:05:17,960 –> 00:05:21,000
Treat app portfolios the way you treat real estate.
145
00:05:21,000 –> 00:05:23,560
Not every building belongs in your district.
146
00:05:23,560 –> 00:05:24,560
Sin 5.
147
00:05:24,560 –> 00:05:25,560
AI chaos.
148
00:05:25,560 –> 00:05:26,920
Agents without boundaries.
149
00:05:26,920 –> 00:05:28,240
This one is still forming.
150
00:05:28,240 –> 00:05:29,920
Most organizations don’t see it yet.
151
00:05:29,920 –> 00:05:31,480
That’s the danger.
152
00:05:31,480 –> 00:05:35,040
Organizations are deploying co-pilot onto flat, unclassified data structures.
153
00:05:35,040 –> 00:05:38,680
They’re standing up co-pilot studio agents without defining what data those agents can
154
00:05:38,680 –> 00:05:39,680
access.
155
00:05:39,680 –> 00:05:42,920
Accelerating AI adoption while data governance lags behind.
156
00:05:42,920 –> 00:05:43,920
Here’s what I mean.
157
00:05:43,920 –> 00:05:48,760
An enterprise co-pilot pilot, six weeks in, discovered that custom agents were accessing
158
00:05:48,760 –> 00:05:52,000
personally identifiable information without classification.
159
00:05:52,000 –> 00:05:55,560
They were reading payroll data, benefit information, address records.
160
00:05:55,560 –> 00:06:00,240
All available because the data was unclassified and the agent permissions were unrestricted,
161
00:06:00,240 –> 00:06:02,760
the economic consequence is immediate and expensive.
162
00:06:02,760 –> 00:06:04,080
Security retrofits.
163
00:06:04,080 –> 00:06:06,880
Co-pilot studio credits burning through the budget.
164
00:06:06,880 –> 00:06:11,840
Every exposure, compliance re-ordered, all because someone deployed AI without architectural
165
00:06:11,840 –> 00:06:12,840
zoning.
166
00:06:12,840 –> 00:06:16,120
49% of AI programs stole due to unclear value.
167
00:06:16,120 –> 00:06:19,560
80% of Fortune 500 use agents without formal governance.
168
00:06:19,560 –> 00:06:24,560
The pattern is familiar, speed first, architecture second, then disaster.
169
00:06:24,560 –> 00:06:26,520
The fix is non-negotiable.
170
00:06:26,520 –> 00:06:29,440
Define data boundaries before deploying agents.
171
00:06:29,440 –> 00:06:33,920
Classified data, tier agents by risk, enforce data access via identity and policy.
172
00:06:33,920 –> 00:06:38,600
Meet AI not as a feature to ship, but as a governance layer that has to sit on top of solid
173
00:06:38,600 –> 00:06:39,840
data architecture.
174
00:06:39,840 –> 00:06:42,840
If your data foundation is weak, AI amplifies the weakness.
175
00:06:42,840 –> 00:06:44,160
It doesn’t fix it.
176
00:06:44,160 –> 00:06:47,000
Since six, builder bias, the architect vacuum.
177
00:06:47,000 –> 00:06:49,480
Here’s a pattern that explains everything else.
178
00:06:49,480 –> 00:06:51,400
Enterprises promote the person who knows the buttons.
179
00:06:51,400 –> 00:06:54,680
They re-roared builders, they celebrate features shipped.
180
00:06:54,680 –> 00:06:58,960
An architect, the people thinking about system resilience, about decay, about integration
181
00:06:58,960 –> 00:06:59,960
costs.
182
00:06:59,960 –> 00:07:01,120
Those people are invisible.
183
00:07:01,120 –> 00:07:06,040
An IT director recently hired a power platform expert and fired the identity architect.
184
00:07:06,040 –> 00:07:07,640
The reasoning was straightforward.
185
00:07:07,640 –> 00:07:09,120
We need builders right now.
186
00:07:09,120 –> 00:07:11,360
Strategy can wait.
187
00:07:11,360 –> 00:07:13,000
What actually happened was structural.
188
00:07:13,000 –> 00:07:16,800
Without architects enforcing design constraints, the platform started accumulating entropy
189
00:07:16,800 –> 00:07:17,800
faster.
190
00:07:17,800 –> 00:07:21,520
Features shipped, systems decayed, technical debt compounded.
191
00:07:21,520 –> 00:07:25,200
The economic consequence is an 18 month productivity wall.
192
00:07:25,200 –> 00:07:28,960
Initial gains from rapid development flatten, then performance degrades, then your managing
193
00:07:28,960 –> 00:07:31,320
technical debt instead of shipping features.
194
00:07:31,320 –> 00:07:33,400
The systemic problem is organizational.
195
00:07:33,400 –> 00:07:38,640
Only 23% of organizations have formal AI agent identity strategy.
196
00:07:38,640 –> 00:07:39,880
Ownership is fragmented.
197
00:07:39,880 –> 00:07:41,600
Seasows, see security risks.
198
00:07:41,600 –> 00:07:42,600
Builders see opportunity.
199
00:07:42,600 –> 00:07:43,600
Finance sees cost.
200
00:07:43,600 –> 00:07:45,440
Nobody is looking at the system as a whole.
201
00:07:45,440 –> 00:07:47,840
The control plane fix requires a mindset shift.
202
00:07:47,840 –> 00:07:50,040
Treat architects as leverage engineers.
203
00:07:50,040 –> 00:07:51,520
Not cost centers.
204
00:07:51,520 –> 00:07:55,160
Measure them by system health, by entropy reduction, by the number of future problems they
205
00:07:55,160 –> 00:07:56,400
prevent.
206
00:07:56,400 –> 00:07:58,120
Builders create visible value.
207
00:07:58,120 –> 00:07:59,600
Builders create invisible value.
208
00:07:59,600 –> 00:08:00,760
Invisible value is just as real.
209
00:08:00,760 –> 00:08:02,480
It’s just harder to see.
210
00:08:02,480 –> 00:08:03,480
Sin 7.
211
00:08:03,480 –> 00:08:04,480
Licensing blindness.
212
00:08:04,480 –> 00:08:05,680
Capacity is strategy.
213
00:08:05,680 –> 00:08:09,200
The final sin is the most expensive because it’s the most normalized.
214
00:08:09,200 –> 00:08:12,120
Organizations renew E5 because it’s what we do.
215
00:08:12,120 –> 00:08:14,560
Not because they’ve mapped capability to value.
216
00:08:14,560 –> 00:08:17,560
Not because they’ve assessed whether users actually need premium features.
217
00:08:17,560 –> 00:08:21,200
Not because they’ve measured adoption of the capabilities they’re already paying for.
218
00:08:21,200 –> 00:08:23,320
Meanwhile, shadow IT thrives.
219
00:08:23,320 –> 00:08:26,040
Users on basic skews accomplish the same roles.
220
00:08:26,040 –> 00:08:27,400
Premium features sit idle.
221
00:08:27,400 –> 00:08:31,560
The licensing strategy becomes a budget line item, not an architectural lever.
222
00:08:31,560 –> 00:08:32,560
Real numbers.
223
00:08:32,560 –> 00:08:37,160
An enterprise paying $2.1 million annually for E5 across the board.
224
00:08:37,160 –> 00:08:41,840
A rationalization audit found that 34% of those users could perform their exact same
225
00:08:41,840 –> 00:08:43,080
role on business standard.
226
00:08:43,080 –> 00:08:45,240
They had no need for the premium connector library.
227
00:08:45,240 –> 00:08:46,440
They didn’t use co-pilot.
228
00:08:46,440 –> 00:08:49,560
They didn’t need advanced threat protection beyond what business standard includes.
229
00:08:49,560 –> 00:08:53,120
The economic consequence is orthogonal to what most organizations see.
230
00:08:53,120 –> 00:08:55,440
It’s not just the cost of unused licenses.
231
00:08:55,440 –> 00:08:59,080
It’s the cost of not using licensing as a behavioral incentive.
232
00:08:59,080 –> 00:09:03,120
If your licensing skew is aligned to roles and capabilities, then it drives adoption.
233
00:09:03,120 –> 00:09:06,040
It forces you to make decisions about what’s actually needed.
234
00:09:06,040 –> 00:09:09,320
The control plane fix is this licensing skew is a behavioral lever.
235
00:09:09,320 –> 00:09:10,320
Use it.
236
00:09:10,320 –> 00:09:13,800
If you’re paying for E5 across the board, you’ve removed the constraint that forces architectural
237
00:09:13,800 –> 00:09:14,800
discipline.
238
00:09:14,800 –> 00:09:17,360
You’ve said effectively that everyone gets access to everything.
239
00:09:17,360 –> 00:09:18,360
That’s not strategy.
240
00:09:18,360 –> 00:09:20,000
That’s capitulation.
241
00:09:20,000 –> 00:09:22,440
These seven sins are patterns, not anomalies.
242
00:09:22,440 –> 00:09:23,760
They compound.
243
00:09:23,760 –> 00:09:25,400
Permission sprawl feeds abs sprawl.
244
00:09:25,400 –> 00:09:28,280
Conconcing blindness enables governance theatre.
245
00:09:28,280 –> 00:09:30,880
Procurement strategy masks the absence of architecture.
246
00:09:30,880 –> 00:09:33,280
Together they create what I call the leakage model.
247
00:09:33,280 –> 00:09:37,160
Millions of dollars in invisible inefficiency that nobody’s measuring because nobody owns
248
00:09:37,160 –> 00:09:38,160
the outcome.
249
00:09:38,160 –> 00:09:39,160
That’s the diagnosis.
250
00:09:39,160 –> 00:09:41,160
That’s what we’re actually operating here.
251
00:09:41,160 –> 00:09:43,160
The umbrella sin control plane neglect.
252
00:09:43,160 –> 00:09:45,120
These seven sins don’t exist in isolation.
253
00:09:45,120 –> 00:09:46,440
They’re not random failures.
254
00:09:46,440 –> 00:09:49,200
They’re all symptoms of one structural absence.
255
00:09:49,200 –> 00:09:51,600
That absence is what I want to talk about now.
256
00:09:51,600 –> 00:09:55,360
Operating without a system’s layer means entropy becomes your default operating system.
257
00:09:55,360 –> 00:09:56,360
You don’t have governance.
258
00:09:56,360 –> 00:09:58,680
You have chaos with policies written on top of it.
259
00:09:58,680 –> 00:09:59,680
You don’t have architecture.
260
00:09:59,680 –> 00:10:01,680
You have a platform which is something else entirely.
261
00:10:01,680 –> 00:10:03,080
Here is how it manifests.
262
00:10:03,080 –> 00:10:07,720
A 10,000 seat organization I worked with had EntraID governed by one team.
263
00:10:07,720 –> 00:10:09,080
Intune handled by another.
264
00:10:09,080 –> 00:10:11,080
Microsoft Defender managed separately.
265
00:10:11,080 –> 00:10:12,080
Per view.
266
00:10:12,080 –> 00:10:14,320
Data governance owned by compliance.
267
00:10:14,320 –> 00:10:17,280
Teams and SharePoint loosely monitored by service adoption.
268
00:10:17,280 –> 00:10:19,760
Nobody was looking at identity to app orchestration.
269
00:10:19,760 –> 00:10:23,360
Nobody was enforcing zoning and tearing across the entire system.
270
00:10:23,360 –> 00:10:24,880
Every service had its own policies.
271
00:10:24,880 –> 00:10:26,240
Its own approval workflows.
272
00:10:26,240 –> 00:10:27,960
Its own definitions of security baseline.
273
00:10:27,960 –> 00:10:30,920
What that organization actually had wasn’t a security posture.
274
00:10:30,920 –> 00:10:34,240
It was security theater orchestrated across five different teams.
275
00:10:34,240 –> 00:10:35,640
The systemic causes this.
276
00:10:35,640 –> 00:10:39,960
Most organizations treat Microsoft Cloud as a collection of disconnected services.
277
00:10:39,960 –> 00:10:41,120
Identity over here.
278
00:10:41,120 –> 00:10:42,720
Data governance over there.
279
00:10:42,720 –> 00:10:44,120
Application somewhere else.
280
00:10:44,120 –> 00:10:45,280
Compliance in a separate silo.
281
00:10:45,280 –> 00:10:47,680
This creates what I call policy fragmentation.
282
00:10:47,680 –> 00:10:49,840
Each domain solves its own problems locally.
283
00:10:49,840 –> 00:10:53,800
But there’s no layer that decides how those domains interact, how data flows from one
284
00:10:53,800 –> 00:10:55,040
system to another.
285
00:10:55,040 –> 00:10:59,400
How a user’s access in EntraID connects to what they can do in SharePoint, what they can
286
00:10:59,400 –> 00:11:01,080
see in a co-pilot agent.
287
00:11:01,080 –> 00:11:02,800
That connecting layer, that’s the control plane.
288
00:11:02,800 –> 00:11:04,320
And most organizations don’t have one.
289
00:11:04,320 –> 00:11:07,760
The economic consequence of operating without it is staggering.
290
00:11:07,760 –> 00:11:12,400
That 10,000 seat organization, 3.2 million in unrealized productivity benefits over three
291
00:11:12,400 –> 00:11:13,400
years.
292
00:11:13,400 –> 00:11:14,520
Not because they lacked features.
293
00:11:14,520 –> 00:11:16,760
They had every Microsoft feature available.
294
00:11:16,760 –> 00:11:21,520
But because those features weren’t integrated into a system, users couldn’t find information.
295
00:11:21,520 –> 00:11:23,320
Admins couldn’t trust their governance.
296
00:11:23,320 –> 00:11:25,800
They had no way to enforce decisions at scale.
297
00:11:25,800 –> 00:11:28,880
Control plane absence also means security debt accumulates.
298
00:11:28,880 –> 00:11:31,080
When EntraID policies drift, you don’t know it.
299
00:11:31,080 –> 00:11:34,120
When SharePoint permissions exceed your threshold, there’s nobody watching.
300
00:11:34,120 –> 00:11:38,240
When a co-pilot agent is accessing data you never approved, the policy layer doesn’t catch
301
00:11:38,240 –> 00:11:39,240
it.
302
00:11:39,240 –> 00:11:40,240
Each service does its best.
303
00:11:40,240 –> 00:11:43,920
But there’s no circuit breaker, no orchestration, no central place where someone says,
304
00:11:43,920 –> 00:11:46,440
no, that violates our architecture.
305
00:11:46,440 –> 00:11:48,920
The control plane fix requires a foundational shift.
306
00:11:48,920 –> 00:11:51,600
You have to build a unified policy compilation layer.
307
00:11:51,600 –> 00:11:55,200
Create Identity, EntraID as the control plane backbone.
308
00:11:55,200 –> 00:11:58,880
Make it the place where you define not just who can access what, but what that access means
309
00:11:58,880 –> 00:12:00,240
across your entire system.
310
00:12:00,240 –> 00:12:03,480
A user is an employee, a contractor, a vendor, a guest.
311
00:12:03,480 –> 00:12:07,960
Once you make that decision in Identity, every other system, Defender, PerView, Teams, SharePoint
312
00:12:07,960 –> 00:12:09,560
should inherit that context.
313
00:12:09,560 –> 00:12:11,240
Not ask for it separately.
314
00:12:11,240 –> 00:12:13,960
Inherited, then enforce cross-platform orchestration.
315
00:12:13,960 –> 00:12:17,840
If a user’s EntraID role says they’re in finance that determines their default access
316
00:12:17,840 –> 00:12:20,000
to financial data in SharePoint.
317
00:12:20,000 –> 00:12:23,040
If they’re classified as guest, that determines what they see in Teams.
318
00:12:23,040 –> 00:12:27,240
If a co-pilot agent is tagged as accessing customer data, its identity and permissions
319
00:12:27,240 –> 00:12:29,120
flow from a single source of truth.
320
00:12:29,120 –> 00:12:30,480
Let me define this precisely.
321
00:12:30,480 –> 00:12:34,880
A control plane is the system that makes decisions about how other systems behave.
322
00:12:34,880 –> 00:12:36,400
It’s the layer above execution.
323
00:12:36,400 –> 00:12:38,600
It’s where intent is translated into policy.
324
00:12:38,600 –> 00:12:42,720
Without it, you have a platform, individual services, operating independently.
325
00:12:42,720 –> 00:12:43,880
With it, you have architecture.
326
00:12:43,880 –> 00:12:45,120
You have a system.
327
00:12:45,120 –> 00:12:46,640
Most organizations have the first.
328
00:12:46,640 –> 00:12:48,080
Almost none have the second.
329
00:12:48,080 –> 00:12:52,080
And that distinction is the difference between leaking millions invisibly and knowing exactly
330
00:12:52,080 –> 00:12:53,560
where your money is going.
331
00:12:53,560 –> 00:12:57,440
That distinction is the difference between a security posture and security theater.
332
00:12:57,440 –> 00:13:00,480
That distinction is the difference between governance that works and governance that’s
333
00:13:00,480 –> 00:13:01,800
just a suggestion.
334
00:13:01,800 –> 00:13:03,800
People ignore when it inconveniences them.
335
00:13:03,800 –> 00:13:05,880
This is what makes the seven sins actually dangerous.
336
00:13:05,880 –> 00:13:07,560
It’s not that they exist independently.
337
00:13:07,560 –> 00:13:11,280
It’s that they compound because there’s no central control layer catching them, measuring
338
00:13:11,280 –> 00:13:13,480
them, stopping them from spiraling.
339
00:13:13,480 –> 00:13:16,080
Without control plane architecture, you’re not managing a system.
340
00:13:16,080 –> 00:13:18,640
You’re managing a collection of problems.
341
00:13:18,640 –> 00:13:19,640
Sin 2.
342
00:13:19,640 –> 00:13:20,640
Permission sprawl.
343
00:13:20,640 –> 00:13:22,080
The authorization compiler nobody built.
344
00:13:22,080 –> 00:13:24,440
The next pattern I see constantly is permission creep.
345
00:13:24,440 –> 00:13:28,680
And it’s more dangerous than most organizations realize because it operates silently, compounding
346
00:13:28,680 –> 00:13:30,440
over years while nobody’s watching.
347
00:13:30,440 –> 00:13:32,960
In EntraID, there’s a default culture I call ad-only.
348
00:13:32,960 –> 00:13:34,280
And permissions get granted.
349
00:13:34,280 –> 00:13:35,760
They rarely get revoked.
350
00:13:35,760 –> 00:13:36,760
That’s not incompetence.
351
00:13:36,760 –> 00:13:38,560
That’s architectural inertia.
352
00:13:38,560 –> 00:13:39,880
No life cycle ownership.
353
00:13:39,880 –> 00:13:41,320
No systematic review.
354
00:13:41,320 –> 00:13:43,680
No exploration mechanism built into the systems.
355
00:13:43,680 –> 00:13:45,400
So it accumulates.
356
00:13:45,400 –> 00:13:46,400
Here’s how it works.
357
00:13:46,400 –> 00:13:49,680
A developer needs access to a specific Microsoft Graph endpoint.
358
00:13:49,680 –> 00:13:51,080
An application gets registered.
359
00:13:51,080 –> 00:13:52,080
It receives permissions.
360
00:13:52,080 –> 00:13:53,080
The project succeeds.
361
00:13:53,080 –> 00:13:54,480
The developer moves on.
362
00:13:54,480 –> 00:13:58,560
And the application registration sits there still holding permissions because nobody owned
363
00:13:58,560 –> 00:14:00,040
the task of sunsetting it.
364
00:14:00,040 –> 00:14:02,360
I audited a financial services firm last year.
365
00:14:02,360 –> 00:14:07,520
They discovered 847, often app registrations.
366
00:14:07,520 –> 00:14:10,800
Applications that were granted permissions three, four, sometimes five years ago for pilots
367
00:14:10,800 –> 00:14:12,040
that were abandoned.
368
00:14:12,040 –> 00:14:13,520
The permissions were never removed.
369
00:14:13,520 –> 00:14:18,120
The service principle still held Microsoft GraphRites to access tenant data, user information,
370
00:14:18,120 –> 00:14:19,480
mailbox contents.
371
00:14:19,480 –> 00:14:22,200
Some of them had credentials that hadn’t been rotated in years.
372
00:14:22,200 –> 00:14:26,960
54% of IT leaders report complex identity and privilege sprawl in their environments.
373
00:14:26,960 –> 00:14:31,760
In a large tenant, it’s normal to have 200, 300, sometimes 400 privileged applications running
374
00:14:31,760 –> 00:14:35,800
simultaneously with permissions that nobody can fully account for.
375
00:14:35,800 –> 00:14:41,000
Add in the growth of automation, AI agents and custom integrations, and that number explodes.
376
00:14:41,000 –> 00:14:45,320
125 or more apps holding elevator drives is no longer anomalous.
377
00:14:45,320 –> 00:14:46,320
It’s expected.
378
00:14:46,320 –> 00:14:47,560
And here’s what makes it dangerous.
379
00:14:47,560 –> 00:14:51,560
Each of these applications is a potential entry point, not just for attackers, for compliance
380
00:14:51,560 –> 00:14:54,760
violations, for uncontrolled data access.
381
00:14:54,760 –> 00:14:58,160
For mission creep, where an application that was designed to do one thing gradually gets
382
00:14:58,160 –> 00:15:01,560
permissions to do five other things because convenience wins over governance.
383
00:15:01,560 –> 00:15:04,320
The economic consequence manifests in multiple ways.
384
00:15:04,320 –> 00:15:05,600
First, audit friction.
385
00:15:05,600 –> 00:15:09,640
When a compliance team asks who has access to what in your tenant the answer takes weeks
386
00:15:09,640 –> 00:15:10,640
to assemble.
387
00:15:10,640 –> 00:15:12,040
Clearing app registrations.
388
00:15:12,040 –> 00:15:13,600
You’re tracking credential history.
389
00:15:13,600 –> 00:15:16,640
You’re cross referencing permissions against actual usage.
390
00:15:16,640 –> 00:15:19,280
And half the time you find permissions that shouldn’t exist.
391
00:15:19,280 –> 00:15:22,560
And then you have to decide whether removing them will break something nobody remembers
392
00:15:22,560 –> 00:15:23,720
depending on.
393
00:15:23,720 –> 00:15:24,920
Second, breach exposure.
394
00:15:24,920 –> 00:15:28,640
In a breach scenario, you don’t know what was exposed because you don’t know what permissions
395
00:15:28,640 –> 00:15:29,640
actually existed.
396
00:15:29,640 –> 00:15:33,600
You assume an attacker who compromised the service principle can access customer data,
397
00:15:33,600 –> 00:15:35,600
financial records, employee information.
398
00:15:35,600 –> 00:15:36,960
But do they have graph permissions?
399
00:15:36,960 –> 00:15:38,480
Do they have mail delegation?
400
00:15:38,480 –> 00:15:39,720
Can they reset passwords?
401
00:15:39,720 –> 00:15:40,720
No guessing.
402
00:15:40,720 –> 00:15:42,520
And guessing in a breach is expensive.
403
00:15:42,520 –> 00:15:43,720
Third, operational paralysis.
404
00:15:43,720 –> 00:15:48,040
You can’t move forward with security hardening because you don’t understand the dependency graph.
405
00:15:48,040 –> 00:15:52,120
You can’t enforce conditional access because it might break an integration nobody documented.
406
00:15:52,120 –> 00:15:55,200
You can’t implement least privilege because the permission landscape is too sprawling
407
00:15:55,200 –> 00:15:56,200
to untangle.
408
00:15:56,200 –> 00:15:58,000
The systemic cause is architectural.
409
00:15:58,000 –> 00:16:01,200
Most organizations lack entitlement management discipline.
410
00:16:01,200 –> 00:16:03,280
There’s no design lifecycle for applications.
411
00:16:03,280 –> 00:16:04,520
No automatic expiration.
412
00:16:04,520 –> 00:16:06,520
No regular access reviews that have teeth.
413
00:16:06,520 –> 00:16:10,520
No mechanism that says if you don’t explicitly renew this permission every six months it gets
414
00:16:10,520 –> 00:16:11,520
revoked.
415
00:16:11,520 –> 00:16:13,200
The control plane fixes this.
416
00:16:13,200 –> 00:16:15,960
Treat permissions as entropy generators, not rewards.
417
00:16:15,960 –> 00:16:19,000
Every time you grant access, you’re adding entropy to the system.
418
00:16:19,000 –> 00:16:21,520
Design expiration into every access grant from the start.
419
00:16:21,520 –> 00:16:22,520
Make it automatic.
420
00:16:22,520 –> 00:16:26,720
If an application’s purpose has been fulfilled or abandoned, its permissions expire with it.
421
00:16:26,720 –> 00:16:30,600
Don’t require a manual cleanup process that depends on someone remembering.
422
00:16:30,600 –> 00:16:31,920
Make it architectural law.
423
00:16:31,920 –> 00:16:35,920
This means implementing entitlement management that’s not just an audit tool but a governance
424
00:16:35,920 –> 00:16:36,920
engine.
425
00:16:36,920 –> 00:16:41,040
Life cycle workflows that automatically remove permissions based on defined criteria, access
426
00:16:41,040 –> 00:16:42,680
packages that expire.
427
00:16:42,680 –> 00:16:45,520
Service principles with credential rotation enforced.
428
00:16:45,520 –> 00:16:49,080
Regular access reviews that don’t just report on sprawl, they remediate it.
429
00:16:49,080 –> 00:16:51,920
And critically it means assigning life cycle ownership.
430
00:16:51,920 –> 00:16:55,720
Someone has to be accountable for whether an application still serves a business purpose.
431
00:16:55,720 –> 00:16:57,600
If the answer is no, the permissions go.
432
00:16:57,600 –> 00:16:59,520
Not eventually, immediately.
433
00:16:59,520 –> 00:17:01,520
Permission sprawl is the invisible attack surface.
434
00:17:01,520 –> 00:17:03,120
But the real problem is deeper.
435
00:17:03,120 –> 00:17:05,040
Its governance that isn’t automated.
436
00:17:05,040 –> 00:17:08,880
One three, tactical governance, the theatre of compliance.
437
00:17:08,880 –> 00:17:11,400
Most organizations claim they have governance.
438
00:17:11,400 –> 00:17:12,640
What they actually have is theatre.
439
00:17:12,640 –> 00:17:16,800
I walked into a healthcare organization last year with 72 teams governance policies.
440
00:17:16,800 –> 00:17:20,080
All of them documented, beautifully written, signed off by compliance leadership, none
441
00:17:20,080 –> 00:17:21,880
of them automated zero.
442
00:17:21,880 –> 00:17:23,200
What did they rely on instead?
443
00:17:23,200 –> 00:17:24,200
Manual approvals.
444
00:17:24,200 –> 00:17:28,120
Someone had to review new teams requests and decide whether they met policy criteria,
445
00:17:28,120 –> 00:17:29,120
reactive policing.
446
00:17:29,120 –> 00:17:32,440
When someone created a team’s channel without classification, someone else had to send
447
00:17:32,440 –> 00:17:34,360
them an email asking them to fix it.
448
00:17:34,360 –> 00:17:35,600
Human bottlenecks everywhere.
449
00:17:35,600 –> 00:17:36,920
An inconsistent enforcement.
450
00:17:36,920 –> 00:17:38,000
Some teams got corrected.
451
00:17:38,000 –> 00:17:39,000
Others didn’t.
452
00:17:39,000 –> 00:17:40,680
It depended on who noticed and how busy they were.
453
00:17:40,680 –> 00:17:43,400
The real measure of governance isn’t policy documents.
454
00:17:43,400 –> 00:17:44,560
It’s enforcement.
455
00:17:44,560 –> 00:17:46,720
And this organization had no enforcement mechanism.
456
00:17:46,720 –> 00:17:47,720
They had hope.
457
00:17:47,720 –> 00:17:49,400
Here’s how it manifests in practice.
458
00:17:49,400 –> 00:17:52,040
A business unit wants to create a new team’s workspace.
459
00:17:52,040 –> 00:17:53,040
They fill out a form.
460
00:17:53,040 –> 00:17:54,760
It goes into an approval queue.
461
00:17:54,760 –> 00:17:57,920
Someone reviews it against 72 governance policies.
462
00:17:57,920 –> 00:18:00,880
Manually comparing what they’re proposing against written criteria.
463
00:18:00,880 –> 00:18:01,880
This takes time.
464
00:18:01,880 –> 00:18:04,120
The request doesn’t clearly violate a policy.
465
00:18:04,120 –> 00:18:05,120
It gets approved.
466
00:18:05,120 –> 00:18:06,800
If it’s ambiguous, it gets escalated.
467
00:18:06,800 –> 00:18:10,480
If the escalation path is blocked, it gets approved by default because nobody wants to
468
00:18:10,480 –> 00:18:12,880
be the person blocking business velocity.
469
00:18:12,880 –> 00:18:14,480
Then someone creates the team.
470
00:18:14,480 –> 00:18:17,200
And then someone else has to verify that it was set up correctly.
471
00:18:17,200 –> 00:18:18,920
Check the sensitivity label.
472
00:18:18,920 –> 00:18:20,440
Verify the membership controls.
473
00:18:20,440 –> 00:18:21,600
Confirm the sharing settings.
474
00:18:21,600 –> 00:18:22,600
All manual.
475
00:18:22,600 –> 00:18:24,160
All dependent on discipline and memory.
476
00:18:24,160 –> 00:18:28,880
How many manual hours did that organization spend every year maintaining compliance theater?
477
00:18:28,880 –> 00:18:29,880
4,000.
478
00:18:29,880 –> 00:18:34,160
That’s two full-time employees whose entire job was spreadsheets and escalation emails
479
00:18:34,160 –> 00:18:36,560
and follow-up conversations about policy drift.
480
00:18:36,560 –> 00:18:40,520
And it was fragile when the person maintaining the governance process left the organization
481
00:18:40,520 –> 00:18:42,200
knowledge walked out the door.
482
00:18:42,200 –> 00:18:43,200
Policies drifted.
483
00:18:43,200 –> 00:18:46,840
New teams started getting created without the controls that were supposed to exist.
484
00:18:46,840 –> 00:18:47,840
The system decayed.
485
00:18:47,840 –> 00:18:49,520
This is the fundamental disconnect.
486
00:18:49,520 –> 00:18:54,080
72% of organizations cannot enforce full governance policies at scale.
487
00:18:54,080 –> 00:18:55,360
And the reason is always the same.
488
00:18:55,360 –> 00:18:57,680
They built governance as a control function.
489
00:18:57,680 –> 00:19:00,240
And you do after the fact react to violations.
490
00:19:00,240 –> 00:19:01,240
Remind people to comply.
491
00:19:01,240 –> 00:19:05,040
Instead of building it as a system’s layer, the systemic cause is structural.
492
00:19:05,040 –> 00:19:07,120
Governance is treated as a necessary evil.
493
00:19:07,120 –> 00:19:08,120
Compliance is seen as friction.
494
00:19:08,120 –> 00:19:10,280
So organizations minimize the investment.
495
00:19:10,280 –> 00:19:11,280
They write policies.
496
00:19:11,280 –> 00:19:12,280
They create processes.
497
00:19:12,280 –> 00:19:13,280
They hope people follow them.
498
00:19:13,280 –> 00:19:17,000
And then they’re shocked when the system breaks under the weight of actual organizational
499
00:19:17,000 –> 00:19:18,000
scale.
500
00:19:18,000 –> 00:19:20,120
The economic consequence is hidden, but substantial.
501
00:19:20,120 –> 00:19:22,120
4,000 hours annually per organization.
502
00:19:22,120 –> 00:19:25,400
That’s two full-time people just maintaining governance theater.
503
00:19:25,400 –> 00:19:26,400
And it’s fragile.
504
00:19:26,400 –> 00:19:30,280
And it leaves priorities shift the governance system decays because it was never actually
505
00:19:30,280 –> 00:19:31,480
part of the architecture.
506
00:19:31,480 –> 00:19:35,280
It was bolted on top, dependent on sustained discipline and attention that eventually
507
00:19:35,280 –> 00:19:36,280
withers.
508
00:19:36,280 –> 00:19:39,480
The control plain fix is existential.
509
00:19:39,480 –> 00:19:42,880
Governance that isn’t code is just a suggestion.
510
00:19:42,880 –> 00:19:46,720
If you’re still relying on PDF policies and SharePoint checklists and email approvals,
511
00:19:46,720 –> 00:19:47,880
you have compliance theater.
512
00:19:47,880 –> 00:19:48,880
You don’t have governance.
513
00:19:48,880 –> 00:19:49,880
And here’s why it matters.
514
00:19:49,880 –> 00:19:51,280
Theater scales poorly.
515
00:19:51,280 –> 00:19:53,080
It breaks when you need it most.
516
00:19:53,080 –> 00:19:56,840
It depends on heroic individual effort and it never actually prevents violations.
517
00:19:56,840 –> 00:19:59,040
It just documents them after they happen.
518
00:19:59,040 –> 00:20:00,600
Real governance works differently.
519
00:20:00,600 –> 00:20:04,280
When someone creates a team’s workspace, the system automatically applies the correct
520
00:20:04,280 –> 00:20:05,280
sensitivity label.
521
00:20:05,280 –> 00:20:06,560
The access controls are set.
522
00:20:06,560 –> 00:20:08,520
The membership restrictions are enforced.
523
00:20:08,520 –> 00:20:11,600
The data classification is inherited from the policy layer.
524
00:20:11,600 –> 00:20:15,480
No approval queue, no human review, no gap between intent and execution.
525
00:20:15,480 –> 00:20:16,640
That requires automation.
526
00:20:16,640 –> 00:20:17,640
It requires code.
527
00:20:17,640 –> 00:20:21,360
It requires treating governance as part of the system architecture, not as an external
528
00:20:21,360 –> 00:20:22,360
control function.
529
00:20:22,360 –> 00:20:25,440
If you cannot automate your governance, you don’t actually have governance.
530
00:20:25,440 –> 00:20:26,440
You have hope.
531
00:20:26,440 –> 00:20:27,960
And hope is not a control.
532
00:20:27,960 –> 00:20:33,320
Sin 4, app worship, confusing output with architecture, enterprises celebrate app proliferation.
533
00:20:33,320 –> 00:20:34,880
We shipped 50 power apps this year.
534
00:20:34,880 –> 00:20:36,480
Citizen developers are empowered.
535
00:20:36,480 –> 00:20:37,880
Feature velocities accelerating.
536
00:20:37,880 –> 00:20:39,120
The business is moving faster.
537
00:20:39,120 –> 00:20:40,120
We’re transforming.
538
00:20:40,120 –> 00:20:41,640
But here’s what actually happened.
539
00:20:41,640 –> 00:20:45,560
You created 15 new maintenance liabilities, 15 new surface area multipliers.
540
00:20:45,560 –> 00:20:47,520
Every application is another piece of code.
541
00:20:47,520 –> 00:20:50,160
Someone has to support another integration that can fail.
542
00:20:50,160 –> 00:20:52,240
Another attack surface to defend.
543
00:20:52,240 –> 00:20:53,880
Another permission boundary to govern.
544
00:20:53,880 –> 00:20:57,560
This is where the builder bias I mentioned earlier collides with architectural reality.
545
00:20:57,560 –> 00:20:59,080
Builders get rewarded for shipping.
546
00:20:59,080 –> 00:21:00,520
The organization sees features.
547
00:21:00,520 –> 00:21:02,520
The business celebrates velocity.
548
00:21:02,520 –> 00:21:05,000
And nobody’s counting the cost in technical debt.
549
00:21:05,000 –> 00:21:09,760
A mid market organization I worked with had 340 power apps in their tenant.
550
00:21:09,760 –> 00:21:12,400
340, I asked them how many were actively used.
551
00:21:12,400 –> 00:21:13,400
They didn’t know.
552
00:21:13,400 –> 00:21:14,400
So we audited it.
553
00:21:14,400 –> 00:21:16,760
127 of them had never been used.
554
00:21:16,760 –> 00:21:17,760
Not once.
555
00:21:17,760 –> 00:21:19,640
Nobody ever registered a successful run.
556
00:21:19,640 –> 00:21:21,760
Some of them had been created three years ago.
557
00:21:21,760 –> 00:21:25,360
The original builder had long since moved on or left the organization.
558
00:21:25,360 –> 00:21:26,360
Nobody owned them.
559
00:21:26,360 –> 00:21:27,360
Nobody maintained them.
560
00:21:27,360 –> 00:21:28,680
They were digital craft.
561
00:21:28,680 –> 00:21:32,680
Sitting in the environment, creating governance complexity and compliance risk.
562
00:21:32,680 –> 00:21:37,120
Of the remaining 213 apps that were actually used fewer than half had documented business
563
00:21:37,120 –> 00:21:38,120
owners.
564
00:21:38,120 –> 00:21:40,520
The ones that did, the owners often didn’t realize they owned them.
565
00:21:40,520 –> 00:21:43,720
They inherited the responsibility when they took over a team.
566
00:21:43,720 –> 00:21:46,840
Or the original creator had left it assigned to them without ever asking.
567
00:21:46,840 –> 00:21:48,680
The systemic causes structural.
568
00:21:48,680 –> 00:21:50,880
Builders get promotions for shipping features.
569
00:21:50,880 –> 00:21:54,360
The apps are invisible so the tenant fills up with applications that looked good in isolation
570
00:21:54,360 –> 00:21:56,000
but created technical debt at scale.
571
00:21:56,000 –> 00:21:57,440
There was no gating function.
572
00:21:57,440 –> 00:22:00,640
No architectural review that asked is this app necessary?
573
00:22:00,640 –> 00:22:02,720
Does it duplicate existing capability?
574
00:22:02,720 –> 00:22:03,720
Who owns it?
575
00:22:03,720 –> 00:22:04,720
What happens when the builder leaves?
576
00:22:04,720 –> 00:22:08,120
Instead, the organization operated on optimistic assumptions.
577
00:22:08,120 –> 00:22:09,400
Power apps are low-code.
578
00:22:09,400 –> 00:22:10,400
Citizens can build them.
579
00:22:10,400 –> 00:22:11,400
That’s empowerment.
580
00:22:11,400 –> 00:22:12,400
That’s agility.
581
00:22:12,400 –> 00:22:13,400
And it is.
582
00:22:13,400 –> 00:22:17,600
Until you wake up one day with 340 applications and no idea what most of them do.
583
00:22:17,600 –> 00:22:20,000
Economic consequence is operational paralysis.
584
00:22:20,000 –> 00:22:21,480
Support overhead explodes.
585
00:22:21,480 –> 00:22:23,520
When an application breaks, who fixes it?
586
00:22:23,520 –> 00:22:26,200
If the original builder is gone, nobody knows the code.
587
00:22:26,200 –> 00:22:30,320
So you either let it stay broken or you spend engineering time reverse engineering something
588
00:22:30,320 –> 00:22:32,360
that was never properly documented.
589
00:22:32,360 –> 00:22:33,720
Compliance risk multiplies.
590
00:22:33,720 –> 00:22:38,040
When an auditor asks how many applications access customer data you can’t answer confidently.
591
00:22:38,040 –> 00:22:39,640
Vendors Brawl increases.
592
00:22:39,640 –> 00:22:42,560
Every app might integrate with external SaaS systems.
593
00:22:42,560 –> 00:22:46,680
Every integration is another contract, another permission boundary, another security surface.
594
00:22:46,680 –> 00:22:48,840
And here’s the thing nobody talks about.
595
00:22:48,840 –> 00:22:51,640
Applications Brawl mirrors the sprawl you see in teams and SharePoint.
596
00:22:51,640 –> 00:22:54,160
It’s the same root cause, default permissive settings.
597
00:22:54,160 –> 00:22:56,880
No life cycle governance, no exploration mechanism.
598
00:22:56,880 –> 00:23:01,240
No architecture that says if this application has no owner, it gets decommissioned.
599
00:23:01,240 –> 00:23:03,640
The control plane fix requires a mindset shift.
600
00:23:03,640 –> 00:23:04,640
Stop counting apps.
601
00:23:04,640 –> 00:23:05,640
That’s the wrong metric.
602
00:23:05,640 –> 00:23:07,840
Start counting technical debt surface area.
603
00:23:07,840 –> 00:23:10,320
The real question isn’t how many power apps do we have.
604
00:23:10,320 –> 00:23:14,600
It’s what is the total complexity and maintenance burden we’ve accumulated and is it justified
605
00:23:14,600 –> 00:23:15,840
by business value?
606
00:23:15,840 –> 00:23:17,440
And for zoning laws.
607
00:23:17,440 –> 00:23:19,720
Not every application belongs in the environment.
608
00:23:19,720 –> 00:23:24,040
Some should be built as power platform solutions, governed as infrastructure.
609
00:23:24,040 –> 00:23:26,400
Others should be SaaS products, not custom builds.
610
00:23:26,400 –> 00:23:29,440
Some should be enterprise applications with formal governance.
611
00:23:29,440 –> 00:23:32,840
Some should be a femoral tools that disappear after they solve the problem they were meant
612
00:23:32,840 –> 00:23:33,840
to solve.
613
00:23:33,840 –> 00:23:37,280
And a sign, life cycle ownership, make it architectural law.
614
00:23:37,280 –> 00:23:41,120
An application without an identified accountable owner gets decommissioned.
615
00:23:41,120 –> 00:23:43,920
Not eventually, immediately, that forces discipline.
616
00:23:43,920 –> 00:23:47,760
That forces the organization to ask, do we actually need this instead of accumulating
617
00:23:47,760 –> 00:23:48,760
forever?
618
00:23:48,760 –> 00:23:52,680
This brings us to the most dangerous sin because it’s one thing to have 340 applications
619
00:23:52,680 –> 00:23:54,600
creating support overhead.
620
00:23:54,600 –> 00:23:58,960
It’s another entirely when you deploy AI onto that chaotic sprawling application landscape
621
00:23:58,960 –> 00:24:00,920
without architectural zoning.
622
00:24:00,920 –> 00:24:01,920
Sin 5.
623
00:24:01,920 –> 00:24:02,920
AI chaos.
624
00:24:02,920 –> 00:24:04,280
Agents without boundaries.
625
00:24:04,280 –> 00:24:05,520
This one is still forming.
626
00:24:05,520 –> 00:24:07,120
Most organizations don’t see it yet.
627
00:24:07,120 –> 00:24:08,120
That’s the danger.
628
00:24:08,120 –> 00:24:11,880
Organizations are deploying co-pilot onto flat, unclassified data structures.
629
00:24:11,880 –> 00:24:17,480
They’re standing up co-pilot studio agents without defining what data those agents can access.
630
00:24:17,480 –> 00:24:20,720
They’re accelerating AI adoption while data governance lags behind.
631
00:24:20,720 –> 00:24:22,000
And here’s the architectural truth.
632
00:24:22,000 –> 00:24:23,840
AI doesn’t solve your data problem.
633
00:24:23,840 –> 00:24:25,320
It broadcasts it at scale.
634
00:24:25,320 –> 00:24:26,320
Let me tell you what I mean.
635
00:24:26,320 –> 00:24:29,480
An enterprise co-pilot pilot six weeks in, they were excited.
636
00:24:29,480 –> 00:24:31,280
Initial adoption metrics looked strong.
637
00:24:31,280 –> 00:24:35,360
Users were asking the agent questions about products, customers, internal processes.
638
00:24:35,360 –> 00:24:37,840
And then someone asked it a question about compensation.
639
00:24:37,840 –> 00:24:40,800
The agent answered, it told them salary data benefits information.
640
00:24:40,800 –> 00:24:44,680
payroll details from the HR system, all available because the data was unclassified
641
00:24:44,680 –> 00:24:46,760
and the agent permissions were unrestricted.
642
00:24:46,760 –> 00:24:49,120
Here’s what actually happened architecturally.
643
00:24:49,120 –> 00:24:52,560
The organization deployed co-pilot before they classified their data.
644
00:24:52,560 –> 00:24:56,840
Before they defined what co-pilot agents could access, before they implemented data boundaries.
645
00:24:56,840 –> 00:25:01,120
They treated AI as a feature to ship, not as a governance layer that has to sit on top
646
00:25:01,120 –> 00:25:02,520
of solid data architecture.
647
00:25:02,520 –> 00:25:04,000
The systemic cause is predictable.
648
00:25:04,000 –> 00:25:05,000
AI feels urgent.
649
00:25:05,000 –> 00:25:06,320
Everyone’s talking about it.
650
00:25:06,320 –> 00:25:07,320
Competitors are moving.
651
00:25:07,320 –> 00:25:08,640
So organizations rush.
652
00:25:08,640 –> 00:25:10,240
They want to show value quickly.
653
00:25:10,240 –> 00:25:12,280
co-pilot adoption metrics.
654
00:25:12,280 –> 00:25:13,800
Agent deployment numbers.
655
00:25:13,800 –> 00:25:17,880
Proof of concept turned pilot turned production all before the foundational architecture is
656
00:25:17,880 –> 00:25:18,880
in place.
657
00:25:18,880 –> 00:25:22,280
But here’s what happens when you deploy AI without data architecture.
658
00:25:22,280 –> 00:25:25,200
An agent gets access to everything it needs to do its job.
659
00:25:25,200 –> 00:25:26,200
That’s reasonable.
660
00:25:26,200 –> 00:25:27,440
But everything it needs expands.
661
00:25:27,440 –> 00:25:28,760
It integrates with SharePoint.
662
00:25:28,760 –> 00:25:30,480
Now it’s reading all documents.
663
00:25:30,480 –> 00:25:32,400
It connects to the mailbox system.
664
00:25:32,400 –> 00:25:33,680
Now it’s processing email.
665
00:25:33,680 –> 00:25:35,240
It links to customer data.
666
00:25:35,240 –> 00:25:37,400
Now it’s handling sensitive information.
667
00:25:37,400 –> 00:25:39,320
Each integration makes sense in isolation.
668
00:25:39,320 –> 00:25:43,960
Collectively, they create an unrestricted data access pattern that violates your compliance
669
00:25:43,960 –> 00:25:45,960
requirements and your common sense.
670
00:25:45,960 –> 00:25:48,960
The economic consequence is immediate and expensive.
671
00:25:48,960 –> 00:25:49,960
Security retrofits.
672
00:25:49,960 –> 00:25:50,960
You deployed co-pilot.
673
00:25:50,960 –> 00:25:55,480
Now you’re scrambling to classify data retroactively, define boundaries, restrict agent
674
00:25:55,480 –> 00:25:56,480
access.
675
00:25:56,480 –> 00:25:57,480
That’s rework.
676
00:25:57,480 –> 00:25:58,480
That’s budget you didn’t plan for.
677
00:25:58,480 –> 00:26:00,400
Co-pilot studio credits burning through.
678
00:26:00,400 –> 00:26:02,600
Every agent interaction consumes credits.
679
00:26:02,600 –> 00:26:08,480
At $200 per 25,000 messages at scale, this becomes a line item nobody forecasted.
680
00:26:08,480 –> 00:26:14,600
You’re processing payroll data, customer information, health records through an AI system
681
00:26:14,600 –> 00:26:16,720
that wasn’t designed with compliance in mind.
682
00:26:16,720 –> 00:26:20,680
Auditor’s notice, regulators notice, and then you’re explaining why you deployed AI faster
683
00:26:20,680 –> 00:26:22,640
than you implemented governance.
684
00:26:22,640 –> 00:26:23,640
Real numbers.
685
00:26:23,640 –> 00:26:27,000
49% of AI programs stall due to unclear value.
686
00:26:27,000 –> 00:26:30,840
80% of Fortune 500 use agents without formal governance.
687
00:26:30,840 –> 00:26:32,480
The pattern is universal.
688
00:26:32,480 –> 00:26:36,920
Speed first, architecture second, then disaster.
689
00:26:36,920 –> 00:26:39,880
The control plane fix is non-negotiable.
690
00:26:39,880 –> 00:26:42,800
Define data boundaries before deploying agents.
691
00:26:42,800 –> 00:26:43,880
Not after, before.
692
00:26:43,880 –> 00:26:45,520
This means classifying your data.
693
00:26:45,520 –> 00:26:46,720
Tearing agents by risk.
694
00:26:46,720 –> 00:26:51,320
An agent that answers FAQ questions has different access requirements than an agent that
695
00:26:51,320 –> 00:26:53,280
processes financial transactions.
696
00:26:53,280 –> 00:26:57,040
An agent that reads public documents has different boundaries than an agent that accesses
697
00:26:57,040 –> 00:26:58,520
customer records.
698
00:26:58,520 –> 00:27:01,600
Then enforce data access via identity and policy.
699
00:27:01,600 –> 00:27:03,520
Use agent 365 as a governance layer.
700
00:27:03,520 –> 00:27:06,800
When you deploy an agent, its permissions flow from Entra ID.
701
00:27:06,800 –> 00:27:08,120
It has a defined identity.
702
00:27:08,120 –> 00:27:10,840
It can access only the data it’s authorized to access.
703
00:27:10,840 –> 00:27:12,280
Its interactions are audited.
704
00:27:12,280 –> 00:27:14,240
It can be revoked if it’s misused.
705
00:27:14,240 –> 00:27:15,840
This requires architectural discipline.
706
00:27:15,840 –> 00:27:17,320
It requires saying no to speed.
707
00:27:17,320 –> 00:27:21,360
It requires doing the unglamorous work of data classification and boundary definition
708
00:27:21,360 –> 00:27:23,160
before you ship the next agent.
709
00:27:23,160 –> 00:27:25,400
But without it, AI doesn’t solve your data problems.
710
00:27:25,400 –> 00:27:26,400
It creates new ones.
711
00:27:26,400 –> 00:27:30,320
It takes the sprawl and the governance gaps you already have and amplifies them at scale.
712
00:27:30,320 –> 00:27:32,840
It turns hidden risks into active liabilities.
713
00:27:32,840 –> 00:27:34,040
And here’s the uncomfortable truth.
714
00:27:34,040 –> 00:27:39,720
If your organization has 340 power apps without owners, if you have 700 orphaned app registrations
715
00:27:39,720 –> 00:27:44,160
in Entra ID, if you have governance policies that nobody enforces, then you’re not ready
716
00:27:44,160 –> 00:27:46,000
to deploy AI agents.
717
00:27:46,000 –> 00:27:47,440
Because AI will make all of that worst.
718
00:27:47,440 –> 00:27:51,480
It will inherit all of that chaos and it will operate at a speed that your manual governance
719
00:27:51,480 –> 00:27:53,440
processes can’t keep up with.
720
00:27:53,440 –> 00:27:54,880
This brings us to the root cause.
721
00:27:54,880 –> 00:27:57,040
All these sins don’t exist independently.
722
00:27:57,040 –> 00:27:59,840
They exist because of one structural absence.
723
00:27:59,840 –> 00:28:03,120
Sin 6, Builder Bias, the architect vacuum.
724
00:28:03,120 –> 00:28:05,200
Here’s a pattern that explains everything else.
725
00:28:05,200 –> 00:28:09,800
And its organizational, not technical, enterprises promote the person who knows the buttons.
726
00:28:09,800 –> 00:28:13,760
The person who shipped the feature, the person who delivered on deadline, they reward builders,
727
00:28:13,760 –> 00:28:17,920
they celebrate features shipped, they measure velocity, and architects, the people thinking
728
00:28:17,920 –> 00:28:21,560
about system resilience, about decay, about integration costs, about what happens five
729
00:28:21,560 –> 00:28:24,240
years from now, those people are invisible.
730
00:28:24,240 –> 00:28:27,120
An IT director I worked with recently made a telling decision.
731
00:28:27,120 –> 00:28:30,560
They hired a power platform expert and they fired the identity architect.
732
00:28:30,560 –> 00:28:32,360
The reasoning was straight forward.
733
00:28:32,360 –> 00:28:33,560
We need builders right now.
734
00:28:33,560 –> 00:28:35,080
We need people who can ship.
735
00:28:35,080 –> 00:28:36,080
Strategy can wait.
736
00:28:36,080 –> 00:28:37,080
Modernization can wait.
737
00:28:37,080 –> 00:28:38,960
We need features and we need them fast.
738
00:28:38,960 –> 00:28:40,560
What actually happened was structural.
739
00:28:40,560 –> 00:28:44,400
Without architects enforcing design constraints, without someone saying no, we can’t do it that
740
00:28:44,400 –> 00:28:45,400
way.
741
00:28:45,400 –> 00:28:47,800
The platform started accumulating entropy faster.
742
00:28:47,800 –> 00:28:49,720
Features shipped, systems decayed.
743
00:28:49,720 –> 00:28:50,720
Technical debt compounded.
744
00:28:50,720 –> 00:28:55,280
18 months later, the organization hit what I called the productivity wall.
745
00:28:55,280 –> 00:28:57,520
Initial gains from rapid development flattened.
746
00:28:57,520 –> 00:28:58,520
Performance degraded.
747
00:28:58,520 –> 00:29:00,600
Infrastructure complexity made change harder.
748
00:29:00,600 –> 00:29:03,800
The organization was managing technical debt instead of shipping features.
749
00:29:03,800 –> 00:29:07,160
They’d moved fast initially, but they were moving slowly now because nobody had been thinking
750
00:29:07,160 –> 00:29:08,160
about sustainability.
751
00:29:08,160 –> 00:29:09,480
Here’s how it manifests.
752
00:29:09,480 –> 00:29:14,200
A builder comes to you and says, “I need to integrate with this new SaaS system.”
753
00:29:14,200 –> 00:29:16,480
And builders are great at solving immediate problems.
754
00:29:16,480 –> 00:29:17,760
So they build an integration.
755
00:29:17,760 –> 00:29:18,760
It works.
756
00:29:18,760 –> 00:29:19,760
The business is happy.
757
00:29:19,760 –> 00:29:22,600
But the builder didn’t think about or wasn’t asked to think about what happens when
758
00:29:22,600 –> 00:29:26,720
that SaaS systems API changes, what happens when the password for the service account needs
759
00:29:26,720 –> 00:29:30,560
to be rotated, what happens when you need to audit, who accessed, what?
760
00:29:30,560 –> 00:29:35,000
Who that integration, what happens when three other builders independently build integrations
761
00:29:35,000 –> 00:29:36,000
to the same system?
762
00:29:36,000 –> 00:29:39,200
And now you have three different approaches, three different failure modes, three times
763
00:29:39,200 –> 00:29:40,680
the maintenance burden.
764
00:29:40,680 –> 00:29:44,240
The systemic causes organizational structure, builders create visible value.
765
00:29:44,240 –> 00:29:45,880
They ship, they deliver.
766
00:29:45,880 –> 00:29:47,600
Organizations see progress.
767
00:29:47,600 –> 00:29:49,280
Architects prevent invisible failures.
768
00:29:49,280 –> 00:29:50,280
They say no.
769
00:29:50,280 –> 00:29:51,600
They require documentation.
770
00:29:51,600 –> 00:29:54,160
They ask hard questions about sustainability.
771
00:29:54,160 –> 00:29:56,960
And their value is invisible until something breaks.
772
00:29:56,960 –> 00:30:00,840
By which time the organization has learned the hard way that architecture matters.
773
00:30:00,840 –> 00:30:03,400
The real consequence is fragmented ownership.
774
00:30:03,400 –> 00:30:07,680
Only 23% of organizations have a formal AI agent identity strategy.
775
00:30:07,680 –> 00:30:08,680
Think about that.
776
00:30:08,680 –> 00:30:10,520
AI agents are proliferating.
777
00:30:10,520 –> 00:30:12,560
Most organizations don’t have governance for them.
778
00:30:12,560 –> 00:30:13,560
Why?
779
00:30:13,560 –> 00:30:14,960
Because ownership is fragmented.
780
00:30:14,960 –> 00:30:16,280
Security thinks it’s I’d’s problem.
781
00:30:16,280 –> 00:30:17,760
It thinks it’s the business’s problem.
782
00:30:17,760 –> 00:30:19,640
The business thinks it’s securities problem.
783
00:30:19,640 –> 00:30:23,680
And builders are shipping agents without anyone owning the architectural decision of whether
784
00:30:23,680 –> 00:30:25,920
they should exist or what their boundaries are.
785
00:30:25,920 –> 00:30:28,360
The economic consequence is substantial and usually lagged.
786
00:30:28,360 –> 00:30:29,800
You don’t see it for 18 months.
787
00:30:29,800 –> 00:30:31,640
But when you do it’s expensive.
788
00:30:31,640 –> 00:30:32,640
Technical debt compounds.
789
00:30:32,640 –> 00:30:33,640
Support costs rise.
790
00:30:33,640 –> 00:30:35,040
Security risks accumulate.
791
00:30:35,040 –> 00:30:36,400
Compliance becomes harder.
792
00:30:36,400 –> 00:30:38,880
And the organization realizes it needs architects.
793
00:30:38,880 –> 00:30:40,840
But architects are expensive to retrofit.
794
00:30:40,840 –> 00:30:44,720
You can’t just hire one and expect them to untangle 18 months of architectural decisions
795
00:30:44,720 –> 00:30:46,000
made without their input.
796
00:30:46,000 –> 00:30:48,720
The control plane fix requires a mindset shift.
797
00:30:48,720 –> 00:30:51,760
Reframed architects as leverage engineers not cost centers.
798
00:30:51,760 –> 00:30:54,080
A builder can increase velocity on one project.
799
00:30:54,080 –> 00:30:58,000
An architect can increase velocity across the entire system by making good structural
800
00:30:58,000 –> 00:31:00,360
decisions that everyone benefits from.
801
00:31:00,360 –> 00:31:04,560
An architect can prevent the entire organization from making the same mistake in five different
802
00:31:04,560 –> 00:31:05,560
places.
803
00:31:05,560 –> 00:31:06,960
Measure architects by system health.
804
00:31:06,960 –> 00:31:08,120
By entropy reduction.
805
00:31:08,120 –> 00:31:10,400
By the number of future problems they prevent.
806
00:31:10,400 –> 00:31:12,600
By whether integration patterns are consistent.
807
00:31:12,600 –> 00:31:14,360
By whether governance is enforceable.
808
00:31:14,360 –> 00:31:17,960
By whether new builders inherit a platform that’s easy to build on or swamp they have to
809
00:31:17,960 –> 00:31:18,960
wait through.
810
00:31:18,960 –> 00:31:20,840
Builders create visible value.
811
00:31:20,840 –> 00:31:22,720
Architects create invisible value.
812
00:31:22,720 –> 00:31:24,160
Local value is just as real.
813
00:31:24,160 –> 00:31:25,360
It’s just harder to see.
814
00:31:25,360 –> 00:31:29,000
And organizations that don’t see it are the ones that end up with sprawl with chaos with
815
00:31:29,000 –> 00:31:31,880
technical debt that becomes impossible to manage.
816
00:31:31,880 –> 00:31:33,640
This brings us to the final sin.
817
00:31:33,640 –> 00:31:37,760
Because even good architects fail if the foundational decisions about resources and investment
818
00:31:37,760 –> 00:31:38,760
are wrong.
819
00:31:38,760 –> 00:31:41,480
And that decision is usually made in procurement.
820
00:31:41,480 –> 00:31:43,000
Scene 7.
821
00:31:43,000 –> 00:31:44,000
Licensing blindness.
822
00:31:44,000 –> 00:31:45,480
Capacity as strategy.
823
00:31:45,480 –> 00:31:49,560
The final sin is the most expensive because it’s the most normalized.
824
00:31:49,560 –> 00:31:52,680
Organizations renew E5 because it’s what we do.
825
00:31:52,680 –> 00:31:55,000
Not because they’ve mapped capability to value.
826
00:31:55,000 –> 00:31:58,360
Not because they’ve assessed whether users actually need premium features.
827
00:31:58,360 –> 00:32:01,600
Not because they’ve measured adoption of the premium connectors they’re already paying
828
00:32:01,600 –> 00:32:02,600
for.
829
00:32:02,600 –> 00:32:04,440
They renew because the license was good last year.
830
00:32:04,440 –> 00:32:05,440
So it’s good this year.
831
00:32:05,440 –> 00:32:07,120
And the year after that no one questions it.
832
00:32:07,120 –> 00:32:09,440
Meanwhile shadow IT thrives.
833
00:32:09,440 –> 00:32:13,640
Users on basic skews accomplish the same roles as E5 users.
834
00:32:13,640 –> 00:32:15,120
Premium features sit idle.
835
00:32:15,120 –> 00:32:16,480
Copilot remains unused.
836
00:32:16,480 –> 00:32:20,240
The advanced threat protection that comes with E5 never gets operationalized.
837
00:32:20,240 –> 00:32:21,800
Feature parity is ignored.
838
00:32:21,800 –> 00:32:26,280
What is tracking whether the premium capabilities you paid for are actually driving outcomes.
839
00:32:26,280 –> 00:32:27,520
Here’s a real example.
840
00:32:27,520 –> 00:32:33,160
An enterprise paying 2.1 million dollars annually for E5 across their knowledge worker base.
841
00:32:33,160 –> 00:32:34,760
They’d standardised on it years ago.
842
00:32:34,760 –> 00:32:35,760
E5 for finance.
843
00:32:35,760 –> 00:32:36,760
E5 for engineering.
844
00:32:36,760 –> 00:32:38,240
E5 for operations.
845
00:32:38,240 –> 00:32:39,720
Everyone gets the same license.
846
00:32:39,720 –> 00:32:41,040
In order to reveal the truth.
847
00:32:41,040 –> 00:32:46,760
34% of those users, roughly a third, could perform their exact same role on business standard.
848
00:32:46,760 –> 00:32:48,760
They had no need for the premium connector library.
849
00:32:48,760 –> 00:32:49,960
They didn’t use copilot.
850
00:32:49,960 –> 00:32:53,280
They didn’t need advanced threat protection beyond what business standard includes.
851
00:32:53,280 –> 00:32:55,280
They needed email teams, a document platform.
852
00:32:55,280 –> 00:32:56,280
That’s it.
853
00:32:56,280 –> 00:32:57,800
They were paying for capabilities they would never touch.
854
00:32:57,800 –> 00:33:01,280
The economic consequences are orthogonal to what most organisations see.
855
00:33:01,280 –> 00:33:03,640
It’s not just the cost of unused licenses.
856
00:33:03,640 –> 00:33:04,640
That’s obvious.
857
00:33:04,640 –> 00:33:08,280
The real consequence is the cost of not using licensing as a behavioural incentive.
858
00:33:08,280 –> 00:33:12,560
If your licensing skews are aligned to roles and capabilities then it drives adoption.
859
00:33:12,560 –> 00:33:14,280
It forces architectural decisions.
860
00:33:14,280 –> 00:33:16,320
It makes you think about what people actually need.
861
00:33:16,320 –> 00:33:20,920
When you standardise on E5 across the board you’ve removed the constraint that forces architectural
862
00:33:20,920 –> 00:33:21,920
discipline.
863
00:33:21,920 –> 00:33:24,400
You’ve said effectively that everyone gets access to everything.
864
00:33:24,400 –> 00:33:25,400
That’s not strategy.
865
00:33:25,400 –> 00:33:26,400
That’s capitulation.
866
00:33:26,400 –> 00:33:27,400
It’s budget capitulation.
867
00:33:27,400 –> 00:33:29,240
It’s architectural capitulation.
868
00:33:29,240 –> 00:33:30,640
And it’s expensive.
869
00:33:30,640 –> 00:33:33,040
The 2026 price hikes compound this mistake.
870
00:33:33,040 –> 00:33:38,600
Microsoft is implementing increases ranging from 9 to 33% effective July 1st.
871
00:33:38,600 –> 00:33:41,840
F1 plans jumping from $2.25 to $3.00.
872
00:33:41,840 –> 00:33:45,520
E3 rising from $36.39 per user per month.
873
00:33:45,520 –> 00:33:47,760
That organisation paying 2.1 million?
874
00:33:47,760 –> 00:33:48,760
Next renewal?
875
00:33:48,760 –> 00:33:50,360
That’s closer to 2.4 million.
876
00:33:50,360 –> 00:33:55,200
If they’d rationalised licensing earlier they could have cut that by 20-30% but they didn’t.
877
00:33:55,200 –> 00:33:57,520
And now they’re paying twice for the same mistake.
878
00:33:57,520 –> 00:34:00,440
Here’s what happens when you finally audit your licensing landscape.
879
00:34:00,440 –> 00:34:02,560
You discover premium connectors nobody’s using.
880
00:34:02,560 –> 00:34:06,480
You find copated licenses assigned to roles that have no integration points.
881
00:34:06,480 –> 00:34:10,280
You realise that your premium security features are redundant with network based controls
882
00:34:10,280 –> 00:34:11,960
you already paid for elsewhere.
883
00:34:11,960 –> 00:34:17,000
You uncover the fact that 34% of your e5 investment could be recovered if you had the discipline
884
00:34:17,000 –> 00:34:20,600
to match licensing to actual capability requirements.
885
00:34:20,600 –> 00:34:22,320
The control plane fixes this.
886
00:34:22,320 –> 00:34:24,240
Licensing skyu is a behavioural lever.
887
00:34:24,240 –> 00:34:25,240
Use it.
888
00:34:25,240 –> 00:34:28,880
If you’re paying for e5 across the board you’ve removed the mechanism that forces you to
889
00:34:28,880 –> 00:34:30,440
make architectural decisions.
890
00:34:30,440 –> 00:34:34,720
You’ve optimised for everyone gets everything instead of everyone gets what they need.
891
00:34:34,720 –> 00:34:37,080
Real architecture means saying no to simplicity.
892
00:34:37,080 –> 00:34:38,800
It means matching licensing to roles.
893
00:34:38,800 –> 00:34:44,120
e5 for roles that actually need premium connectors, threat intelligence or advanced governance.
894
00:34:44,120 –> 00:34:48,240
e3 for users who need collaboration and productivity but not advanced security.
895
00:34:48,240 –> 00:34:53,000
Business standard for roles that only need core email and team’s functionality.
896
00:34:53,000 –> 00:34:56,040
And making those decisions forces you to understand your user base.
897
00:34:56,040 –> 00:34:59,320
It forces you to ask why does this person need this capability?
898
00:34:59,320 –> 00:35:02,160
And if you can’t answer that question they don’t get that licence.
899
00:35:02,160 –> 00:35:05,680
This is where the abstraction becomes concrete because when you force licensing alignment
900
00:35:05,680 –> 00:35:06,880
you also force governance.
901
00:35:06,880 –> 00:35:08,400
You have to know who’s in what role.
902
00:35:08,400 –> 00:35:10,040
You have to enforce role definitions.
903
00:35:10,040 –> 00:35:13,880
You have to make sure the business is actually using the features you’re paying for.
904
00:35:13,880 –> 00:35:16,520
And that discipline cascades into everything else.
905
00:35:16,520 –> 00:35:20,760
Better identity governance, better data classification, better understanding of what your
906
00:35:20,760 –> 00:35:22,680
system is actually supposed to do.
907
00:35:22,680 –> 00:35:24,760
All 7Sints point to one diagnosis.
908
00:35:24,760 –> 00:35:26,280
The absence of a control plane.
909
00:35:26,280 –> 00:35:28,400
The umbrella sin control plane neglect.
910
00:35:28,400 –> 00:35:30,400
These 7Sints don’t exist in isolation.
911
00:35:30,400 –> 00:35:31,920
They’re not random failures.
912
00:35:31,920 –> 00:35:35,240
They’re not separate problems that happen to accumulate in the same tenant.
913
00:35:35,240 –> 00:35:37,320
They’re all symptoms of one structural absence.
914
00:35:37,320 –> 00:35:41,520
And that absence is what binds them together into a single architectural failure.
915
00:35:41,520 –> 00:35:44,840
Operating without a system’s layer means entropy becomes your default operating system.
916
00:35:44,840 –> 00:35:45,920
You don’t have governance.
917
00:35:45,920 –> 00:35:48,480
You have chaos with policies written on top of it.
918
00:35:48,480 –> 00:35:52,200
Trying to contain something that was never architecturally constrained in the first place.
919
00:35:52,200 –> 00:35:53,320
You don’t have architecture.
920
00:35:53,320 –> 00:35:54,320
You have a platform.
921
00:35:54,320 –> 00:35:55,920
And a platform is something else entirely.
922
00:35:55,920 –> 00:35:58,080
A platform is a collection of services.
923
00:35:58,080 –> 00:35:59,520
An architecture is a system.
924
00:35:59,520 –> 00:36:01,040
Here’s how it manifests in practice.
925
00:36:01,040 –> 00:36:05,600
A 10,000 seed organisation I worked with had EntraID governed by one team.
926
00:36:05,600 –> 00:36:09,240
They handled identity provisioning conditional access role definitions.
927
00:36:09,240 –> 00:36:10,240
Solid work.
928
00:36:10,240 –> 00:36:11,680
Intune was managed by a separate team.
929
00:36:11,680 –> 00:36:15,240
They owned device management and point security compliance baselines.
930
00:36:15,240 –> 00:36:16,240
Also good.
931
00:36:16,240 –> 00:36:18,000
Microsoft defender handled by another team.
932
00:36:18,000 –> 00:36:21,240
They owned threat detection, incident response, security monitoring.
933
00:36:21,240 –> 00:36:26,600
Yet another team owned purview, data governance, sensitivity labels, retention policies.
934
00:36:26,600 –> 00:36:29,880
And teams in SharePoint were loosely monitored by the service adoption team.
935
00:36:29,880 –> 00:36:32,760
They tracked usage metrics and provided training.
936
00:36:32,760 –> 00:36:35,040
Nobody was looking at identity to app orchestration.
937
00:36:35,040 –> 00:36:38,000
Nobody was enforcing zoning and tearing across the entire system.
938
00:36:38,000 –> 00:36:41,560
Every service had its own policies, its own approval workflows, its own definitions of
939
00:36:41,560 –> 00:36:43,080
what security baseline meant.
940
00:36:43,080 –> 00:36:45,360
Each domain solved its own problems locally.
941
00:36:45,360 –> 00:36:49,560
But there was no layer that decided how those domains actually interacted, how data flowed
942
00:36:49,560 –> 00:36:53,800
from one system to another, how users access decisions in EntraID connected to what they
943
00:36:53,800 –> 00:36:57,840
could do in SharePoint, how that related to what they could see in a co-pilot agent,
944
00:36:57,840 –> 00:37:00,520
what that organisation actually had wasn’t a security posture.
945
00:37:00,520 –> 00:37:04,800
It was security theatre orchestrated across five different teams, each performing their
946
00:37:04,800 –> 00:37:06,640
part with no conductor.
947
00:37:06,640 –> 00:37:08,320
The systemic cause is this.
948
00:37:08,320 –> 00:37:12,560
Most organisations treat Microsoft Cloud as a collection of disconnected services.
949
00:37:12,560 –> 00:37:16,240
Identity over here, data governance over there, applications somewhere else, compliance
950
00:37:16,240 –> 00:37:17,520
in a separate silo.
951
00:37:17,520 –> 00:37:19,720
This creates what I call policy fragmentation.
952
00:37:19,720 –> 00:37:21,960
Each domain solves its own problems locally.
953
00:37:21,960 –> 00:37:24,560
But there’s no layer that ensures consistency.
954
00:37:24,560 –> 00:37:29,000
No place that says, when we make an identity decision, what does that mean for data access,
955
00:37:29,000 –> 00:37:32,240
for app permissions, for compliance boundaries?
956
00:37:32,240 –> 00:37:36,320
That connecting layer is the control plane, and most organisations don’t have one.
957
00:37:36,320 –> 00:37:37,320
They think they do.
958
00:37:37,320 –> 00:37:40,680
They point to their EntraID governance, they show you their defender dashboards.
959
00:37:40,680 –> 00:37:43,160
They talk about their purview compliance framework.
960
00:37:43,160 –> 00:37:46,680
But those are individual services responding to local constraints.
961
00:37:46,680 –> 00:37:49,280
Not a unified system making coordinated decisions.
962
00:37:49,280 –> 00:37:52,120
The economic consequence of operating without it is massive.
963
00:37:52,120 –> 00:37:57,600
That 10,000 seat organisation, 3.2 million in unrealised productivity benefits over three
964
00:37:57,600 –> 00:37:58,600
years.
965
00:37:58,600 –> 00:38:01,600
Not because they lacked features, they had every Microsoft feature available.
966
00:38:01,600 –> 00:38:05,080
Because those features weren’t integrated into a system.
967
00:38:05,080 –> 00:38:09,360
Users couldn’t find information because it was classified inconsistently across SharePoint.
968
00:38:09,360 –> 00:38:13,280
Admins couldn’t trust their governance because policies drifted when one team made changes
969
00:38:13,280 –> 00:38:15,840
without checking impact on other teams.
970
00:38:15,840 –> 00:38:20,000
Architects had no way to enforce decisions at scale because there was no mechanism to translate
971
00:38:20,000 –> 00:38:22,240
intent into system-wide behaviour.
972
00:38:22,240 –> 00:38:25,600
Control plane absence also means security debt accumulates invisibly.
973
00:38:25,600 –> 00:38:27,880
When EntraID policies drift, nobody knows it.
974
00:38:27,880 –> 00:38:31,000
When SharePoint permissions exceed your threshold, there’s nobody watching.
975
00:38:31,000 –> 00:38:35,480
When a co-pilot agent is accessing data you never approved, the policy layer doesn’t catch
976
00:38:35,480 –> 00:38:36,480
it.
977
00:38:36,480 –> 00:38:37,480
Each service does its best.
978
00:38:37,480 –> 00:38:38,480
But there’s no circuit breaker.
979
00:38:38,480 –> 00:38:43,400
No orchestration, no central place where someone says no, that violates our architecture.
980
00:38:43,400 –> 00:38:45,520
Real security data backs this up.
981
00:38:45,520 –> 00:38:50,560
63% of M365 tenants face configuration tampering in identity and device management.
982
00:38:50,560 –> 00:38:52,200
And here’s the architectural gap.
983
00:38:52,200 –> 00:38:54,960
Microsoft doesn’t natively back up tenant configurations.
984
00:38:54,960 –> 00:38:56,320
You deploy defender policies.
985
00:38:56,320 –> 00:38:57,600
You configure EntraID.
986
00:38:57,600 –> 00:38:59,000
You set up purview rules.
987
00:38:59,000 –> 00:39:03,160
If something goes catastrophically wrong if an attacker modifies your policies, if someone
988
00:39:03,160 –> 00:39:07,760
accidentally deletes your conditional access rules, you don’t have a native recovery mechanism.
989
00:39:07,760 –> 00:39:10,640
You’re relying on change logs and manual reconstruction.
990
00:39:10,640 –> 00:39:13,560
The control plane fix requires foundational architecture.
991
00:39:13,560 –> 00:39:17,720
You have to build a unified policy compilation layer, a single source of truth where architectural
992
00:39:17,720 –> 00:39:20,800
intent gets translated into system-wide policy.
993
00:39:20,800 –> 00:39:23,840
Treat identity EntraID as the control plane backbone.
994
00:39:23,840 –> 00:39:27,840
Make it the place where you define not just who can access what, but what that access means
995
00:39:27,840 –> 00:39:29,160
across your entire system.
996
00:39:29,160 –> 00:39:32,560
A user is an employee, a contractor, a vendor, a guest.
997
00:39:32,560 –> 00:39:36,760
Once you make that decision in identity, every other system should inherit that context.
998
00:39:36,760 –> 00:39:38,200
Not ask for it separately.
999
00:39:38,200 –> 00:39:39,200
Inherited.
1000
00:39:39,200 –> 00:39:41,160
Then enforce cross-platform orchestration.
1001
00:39:41,160 –> 00:39:45,880
If a user’s EntraID role says finance, that determines their default access to financial
1002
00:39:45,880 –> 00:39:47,320
data in SharePoint.
1003
00:39:47,320 –> 00:39:50,320
If they are classified as guest, that determines what they see in teams.
1004
00:39:50,320 –> 00:39:54,400
If a copilot agent is accessing customer data, its identity and permissions flow from a single
1005
00:39:54,400 –> 00:39:55,400
source of truth.
1006
00:39:55,400 –> 00:39:56,400
Let me define this precisely.
1007
00:39:56,400 –> 00:40:00,560
A control plane is the system that makes decisions about how other systems behave.
1008
00:40:00,560 –> 00:40:02,160
It’s the layer above execution.
1009
00:40:02,160 –> 00:40:04,760
It’s where intent gets translated into policy.
1010
00:40:04,760 –> 00:40:08,480
Without it, you have a platform, individual services operating independently.
1011
00:40:08,480 –> 00:40:10,960
With it, you have architecture, you have a system.
1012
00:40:10,960 –> 00:40:12,720
Most organizations have the first.
1013
00:40:12,720 –> 00:40:14,240
Almost none have the second.
1014
00:40:14,240 –> 00:40:15,600
The leakage model.
1015
00:40:15,600 –> 00:40:17,960
How to calculate your invisible waste.
1016
00:40:17,960 –> 00:40:19,960
Let me walk you through a calculation.
1017
00:40:19,960 –> 00:40:20,960
And I want you to follow along.
1018
00:40:20,960 –> 00:40:23,240
If you have a notebook nearby, now’s the time to grab it.
1019
00:40:23,240 –> 00:40:24,320
This isn’t complicated math.
1020
00:40:24,320 –> 00:40:26,800
And it’s the math most organizations never actually do.
1021
00:40:26,800 –> 00:40:30,480
So they never see how much money is actually flowing out of their tenant invisibly.
1022
00:40:30,480 –> 00:40:31,880
Start with your total seat count.
1023
00:40:31,880 –> 00:40:33,800
Let’s say you’re a mid-sized organization.
1024
00:40:33,800 –> 00:40:36,720
5,000 employees, round number, easy to think about.
1025
00:40:36,720 –> 00:40:41,480
Now assume that roughly 20 to 30% of the advanced Microsoft capabilities you’ve paid for
1026
00:40:41,480 –> 00:40:42,960
are not operationalized.
1027
00:40:42,960 –> 00:40:43,960
Not used.
1028
00:40:43,960 –> 00:40:44,960
Just available.
1029
00:40:44,960 –> 00:40:45,960
This isn’t cynicism.
1030
00:40:45,960 –> 00:40:46,960
This is empirical.
1031
00:40:46,960 –> 00:40:48,120
I’ve ordered a dozens of tenants.
1032
00:40:48,120 –> 00:40:49,120
It’s consistent.
1033
00:40:49,120 –> 00:40:51,200
One in three advanced features sits idle.
1034
00:40:51,200 –> 00:40:56,960
For a 5,000 seat organization on e5, the delta between e5 and e3 is roughly $12 per user per
1035
00:40:56,960 –> 00:40:58,440
month, $12.
1036
00:40:58,440 –> 00:41:04,060
Times 5,000 seats, times 12 months, that’s $720,000 annually that you’re spending on features
1037
00:41:04,060 –> 00:41:05,160
you’re not using.
1038
00:41:05,160 –> 00:41:06,520
But that’s just the beginning.
1039
00:41:06,520 –> 00:41:08,680
Now add the inactive license premium.
1040
00:41:08,680 –> 00:41:13,120
Roughly 10 to 15% of licenses are assigned to accounts that haven’t logged in in 30 days
1041
00:41:13,120 –> 00:41:14,120
or longer.
1042
00:41:14,120 –> 00:41:15,120
Dormant.
1043
00:41:15,120 –> 00:41:16,120
Forgotten.
1044
00:41:16,120 –> 00:41:17,120
Still being built.
1045
00:41:17,120 –> 00:41:21,920
$26 per user for e5 and 15% of your licenses are inactive.
1046
00:41:21,920 –> 00:41:24,560
That’s another $250,000.
1047
00:41:24,560 –> 00:41:25,560
Gone.
1048
00:41:25,560 –> 00:41:26,560
Just evaporated.
1049
00:41:26,560 –> 00:41:27,560
That’s nearly a million right there.
1050
00:41:27,560 –> 00:41:28,560
Now add co-pilot.
1051
00:41:28,560 –> 00:41:31,640
The base cost of co-pilot is $30 per user per month.
1052
00:41:31,640 –> 00:41:32,920
But that’s not the real cost.
1053
00:41:32,920 –> 00:41:34,080
That’s the headline number.
1054
00:41:34,080 –> 00:41:39,640
The real cost includes co-pilot studio credits burning through $200 per 25,000 messages.
1055
00:41:39,640 –> 00:41:44,520
For a tenant of 5,000 employees, if even half of them use co-pilot occasionally, you’re
1056
00:41:44,520 –> 00:41:46,160
burning through credits fast.
1057
00:41:46,160 –> 00:41:49,400
You’re going to get a $250,000 annually for a mid-size deployment.
1058
00:41:49,400 –> 00:41:50,880
Then add the security retrofits.
1059
00:41:50,880 –> 00:41:55,040
When you deploy co-pilot without data boundaries, you have to go back and classify data, define
1060
00:41:55,040 –> 00:41:57,080
agent access, implement DLP policies.
1061
00:41:57,080 –> 00:41:58,080
That’s not a feature.
1062
00:41:58,080 –> 00:41:59,080
That’s remediation.
1063
00:41:59,080 –> 00:42:01,280
Call it $50,000 in unplanned spending.
1064
00:42:01,280 –> 00:42:04,920
So co-pilot alone is consuming $200,000 plus and that’s conservative.
1065
00:42:04,920 –> 00:42:06,320
And then there’s governance labor.
1066
00:42:06,320 –> 00:42:08,000
The hours spend managing sprawl.
1067
00:42:08,000 –> 00:42:09,000
The manual cleanup.
1068
00:42:09,000 –> 00:42:10,000
The spreadsheets.
1069
00:42:10,000 –> 00:42:11,000
The escalation emails.
1070
00:42:11,000 –> 00:42:15,320
For a 5,000 seat tenant, that’s roughly two full-time employees’ worth of effort.
1071
00:42:15,320 –> 00:42:21,040
$150,000 annually minimum added up 720,000 in unused feature capacity.
1072
00:42:21,040 –> 00:42:23,840
$250,000 in inactive licenses.
1073
00:42:23,840 –> 00:42:27,240
$200,000 in co-pilot costs and security retrofits.
1074
00:42:27,240 –> 00:42:29,480
$150,000 in governance labor.
1075
00:42:29,480 –> 00:42:33,280
That’s $1.3 million annually in a mid-sized organization.
1076
00:42:33,280 –> 00:42:35,320
And here’s what the breakdown actually looks like.
1077
00:42:35,320 –> 00:42:36,320
License waste.
1078
00:42:36,320 –> 00:42:38,000
Features you paid for but don’t use.
1079
00:42:38,000 –> 00:42:40,200
Accounts for about 40%.
1080
00:42:40,200 –> 00:42:43,040
Unoptimized connectors and shadow IT, another 20%.
1081
00:42:43,040 –> 00:42:45,120
AI sprawl, 15%.
1082
00:42:45,120 –> 00:42:48,480
Accounts labor that doesn’t actually prevent anything 25%.
1083
00:42:48,480 –> 00:42:53,640
Real organizations implementing software asset management best practices can cut spending
1084
00:42:53,640 –> 00:42:55,880
by 30% in year one.
1085
00:42:55,880 –> 00:42:59,480
30% of 1.3 million is nearly $400,000.
1086
00:42:59,480 –> 00:43:00,480
Recovered.
1087
00:43:00,480 –> 00:43:01,480
Just by paying attention.
1088
00:43:01,480 –> 00:43:02,480
That’s the leakage model.
1089
00:43:02,480 –> 00:43:05,200
That’s what most organizations are bleeding without knowing it.
1090
00:43:05,200 –> 00:43:09,560
And that’s before the July 2026 price increases hit when they do that leak gets worse.
1091
00:43:09,560 –> 00:43:10,560
Not better.
1092
00:43:10,560 –> 00:43:11,640
But these numbers are symptoms.
1093
00:43:11,640 –> 00:43:13,320
The disease is systemic.
1094
00:43:13,320 –> 00:43:14,320
It causes analysis.
1095
00:43:14,320 –> 00:43:15,440
Why this happens?
1096
00:43:15,440 –> 00:43:16,880
The leakage isn’t random.
1097
00:43:16,880 –> 00:43:18,560
The seven sins aren’t coincidences.
1098
00:43:18,560 –> 00:43:21,840
They’re not separate failures that happen to occur in the same organization.
1099
00:43:21,840 –> 00:43:26,200
Their structural outcomes of how enterprises make decisions about Microsoft Cloud.
1100
00:43:26,200 –> 00:43:29,160
And if you understand the structure, you understand why this keeps happening.
1101
00:43:29,160 –> 00:43:31,200
The core problem is an operating model failure.
1102
00:43:31,200 –> 00:43:32,280
Not a technical one.
1103
00:43:32,280 –> 00:43:33,960
An organizational one.
1104
00:43:33,960 –> 00:43:38,600
Architectural decisions about Microsoft 365 are made by procurement, not by architects.
1105
00:43:38,600 –> 00:43:40,120
Let me say that again because it matters.
1106
00:43:40,120 –> 00:43:44,600
The decision about what you’re going to buy, which SKU, how many licenses, what feature
1107
00:43:44,600 –> 00:43:47,240
set, that decision gets made at the procurement level.
1108
00:43:47,240 –> 00:43:52,040
It gets made by someone looking at a spreadsheet comparing price per user across different vendors.
1109
00:43:52,040 –> 00:43:55,160
It gets made by someone asking, what’s the industry standard?
1110
00:43:55,160 –> 00:43:56,320
And then buying that.
1111
00:43:56,320 –> 00:44:00,360
It gets made by someone who’s never been inside an enter ID policy or a conditional access
1112
00:44:00,360 –> 00:44:01,360
rule.
1113
00:44:01,360 –> 00:44:04,400
And then that procurement decision gets treated as an architectural decision.
1114
00:44:04,400 –> 00:44:05,400
We bought E5.
1115
00:44:05,400 –> 00:44:06,960
So E5 is our architecture.
1116
00:44:06,960 –> 00:44:10,160
We standardized on teams, so teams governance is solved.
1117
00:44:10,160 –> 00:44:12,400
We licensed co-pilot, so we have an AI strategy.
1118
00:44:12,400 –> 00:44:13,880
That’s not how architecture works.
1119
00:44:13,880 –> 00:44:16,600
That’s how you end up with a shopping cart instead of a system.
1120
00:44:16,600 –> 00:44:19,320
The second structural problem is an accountability vacuum.
1121
00:44:19,320 –> 00:44:21,000
Nobody owns the economic outcome.
1122
00:44:21,000 –> 00:44:22,000
Budgets get siloed.
1123
00:44:22,000 –> 00:44:24,200
Finance owns the Microsoft licensing budget.
1124
00:44:24,200 –> 00:44:26,680
IT owns the infrastructure operations budget.
1125
00:44:26,680 –> 00:44:31,120
The business owns their departmental software spending, procurement owns vendor contracts.
1126
00:44:31,120 –> 00:44:32,920
And nobody’s looking at the tenant as a whole.
1127
00:44:32,920 –> 00:44:35,120
Nobody’s asking, are we getting value from this?
1128
00:44:35,120 –> 00:44:38,400
Is the money we spent on E5 actually driving business outcomes?
1129
00:44:38,400 –> 00:44:40,880
If the co-pilot pilot stalls, who’s accountable?
1130
00:44:40,880 –> 00:44:43,080
Not the executive who approved the spending.
1131
00:44:43,080 –> 00:44:44,920
Not the business unit who didn’t adopt it.
1132
00:44:44,920 –> 00:44:47,720
It gets blamed on poor change management or lack of training.
1133
00:44:47,720 –> 00:44:50,680
Nobody says we spent 200,000 on this and got nothing.
1134
00:44:50,680 –> 00:44:51,920
Who owns that failure?
1135
00:44:51,920 –> 00:44:53,160
This leads to the third problem.
1136
00:44:53,160 –> 00:44:55,840
Finance is completely absent from architecture decisions.
1137
00:44:55,840 –> 00:44:57,480
The CFO sees the spend line.
1138
00:44:57,480 –> 00:44:59,000
The CIO sees the features.
1139
00:44:59,000 –> 00:45:00,080
They never reconcile.
1140
00:45:00,080 –> 00:45:02,560
The CFO doesn’t know what the premium connectors cost.
1141
00:45:02,560 –> 00:45:05,200
The CIO doesn’t know how many of them are actually used.
1142
00:45:05,200 –> 00:45:07,880
They’re operating in different universes with different success metrics.
1143
00:45:07,880 –> 00:45:09,520
The CFO wants to reduce cost.
1144
00:45:09,520 –> 00:45:11,280
The CIO wants to increase adoption.
1145
00:45:11,280 –> 00:45:12,280
Those aren’t aligned.
1146
00:45:12,280 –> 00:45:13,280
They’re at odds.
1147
00:45:13,280 –> 00:45:14,880
And when they’re at odds neither gets what they want.
1148
00:45:14,880 –> 00:45:18,800
You end up with expensive features that nobody uses and cheap tools that everybody
1149
00:45:18,800 –> 00:45:20,400
re-impliments with Shadow IT.
1150
00:45:20,400 –> 00:45:23,400
This is what I call the procurement lead transformation trap.
1151
00:45:23,400 –> 00:45:25,320
The organization buys the right tools.
1152
00:45:25,320 –> 00:45:27,120
The tools are technically sound.
1153
00:45:27,120 –> 00:45:28,880
Microsoft 365 is a good platform.
1154
00:45:28,880 –> 00:45:31,040
But then procurement declares victory.
1155
00:45:31,040 –> 00:45:32,200
We bought the right tools.
1156
00:45:32,200 –> 00:45:34,000
We have the right strategy.
1157
00:45:34,000 –> 00:45:36,280
Success is now inevitable, except it’s not.
1158
00:45:36,280 –> 00:45:40,120
85% of organizations increased AI investments in the past 12 months.
1159
00:45:40,120 –> 00:45:43,920
Only 5% are what Gardner calls future build leaders.
1160
00:45:43,920 –> 00:45:46,880
Organizations that are actually getting multiplier effects from their AI spending.
1161
00:45:46,880 –> 00:45:48,680
The other 80% bought the tools.
1162
00:45:48,680 –> 00:45:50,160
They didn’t build the architecture.
1163
00:45:50,160 –> 00:45:51,160
Here’s a real story.
1164
00:45:51,160 –> 00:45:55,360
An enterprise spent $4.2 million on Microsoft 365 modernization.
1165
00:45:55,360 –> 00:45:56,360
That’s not a small bet.
1166
00:45:56,360 –> 00:45:57,920
That’s organizational commitment.
1167
00:45:57,920 –> 00:46:00,120
And they measured success by adoption percentage.
1168
00:46:00,120 –> 00:46:01,120
Did people use teams?
1169
00:46:01,120 –> 00:46:02,120
Yes.
1170
00:46:02,120 –> 00:46:03,120
Did usage go up?
1171
00:46:03,120 –> 00:46:04,120
Absolutely.
1172
00:46:04,120 –> 00:46:06,880
But did those tools drive business outcomes?
1173
00:46:06,880 –> 00:46:08,040
Nobody measured that.
1174
00:46:08,040 –> 00:46:11,040
Did the premium capabilities actually reduce support tickets?
1175
00:46:11,040 –> 00:46:12,040
Nobody tracked it?
1176
00:46:12,040 –> 00:46:13,840
Did automation save labor hours?
1177
00:46:13,840 –> 00:46:14,840
Nobody quantified it.
1178
00:46:14,840 –> 00:46:16,000
The only metric was adoption.
1179
00:46:16,000 –> 00:46:17,000
An adoption looked good.
1180
00:46:17,000 –> 00:46:18,600
But adoption isn’t architecture.
1181
00:46:18,600 –> 00:46:20,080
Adoption is visibility.
1182
00:46:20,080 –> 00:46:22,800
Someone using a tool doesn’t mean the tool is solving a problem.
1183
00:46:22,800 –> 00:46:24,120
It just means they’re using it.
1184
00:46:24,120 –> 00:46:25,720
And here’s the final structural problem.
1185
00:46:25,720 –> 00:46:28,080
This is the one most organizations don’t want to hear.
1186
00:46:28,080 –> 00:46:29,960
Microsoft doesn’t enforce governance.
1187
00:46:29,960 –> 00:46:31,800
It enables chaos by default.
1188
00:46:31,800 –> 00:46:35,280
Microsoft 365 assumes you want to be permissive.
1189
00:46:35,280 –> 00:46:36,600
Everyone can create teams.
1190
00:46:36,600 –> 00:46:38,120
Everyone can register apps.
1191
00:46:38,120 –> 00:46:39,640
Everyone can consent to permissions.
1192
00:46:39,640 –> 00:46:40,920
Everyone can share data widely.
1193
00:46:40,920 –> 00:46:41,920
That’s not a bug.
1194
00:46:41,920 –> 00:46:42,920
That’s a feature.
1195
00:46:42,920 –> 00:46:44,320
It makes the product more accessible.
1196
00:46:44,320 –> 00:46:48,080
But that permissiveness cascades into sprawl without intentional architecture to constrain
1197
00:46:48,080 –> 00:46:49,080
it.
1198
00:46:49,080 –> 00:46:50,560
Microsoft doesn’t force you to classify data.
1199
00:46:50,560 –> 00:46:52,800
It doesn’t require approval for co-pilot agents.
1200
00:46:52,800 –> 00:46:54,720
It doesn’t mandate permission life cycles.
1201
00:46:54,720 –> 00:46:56,600
Those are architectural decisions you have to make.
1202
00:46:56,600 –> 00:46:58,120
And most organizations don’t make them.
1203
00:46:58,120 –> 00:46:59,560
So they get the default behavior.
1204
00:46:59,560 –> 00:47:00,560
Which is chaos.
1205
00:47:00,560 –> 00:47:01,600
This is not Microsoft’s failure.
1206
00:47:01,600 –> 00:47:02,600
It’s yours.
1207
00:47:02,600 –> 00:47:03,600
And it’s fixable.
1208
00:47:03,600 –> 00:47:06,040
But fixing it requires a different operating model.
1209
00:47:06,040 –> 00:47:09,840
The compliance wall, CMMC 2.0 and the architects trap.
1210
00:47:09,840 –> 00:47:13,080
Here’s what happens when you don’t architect for tomorrow’s requirements.
1211
00:47:13,080 –> 00:47:15,160
Tomorrow’s requirements architect you instead.
1212
00:47:15,160 –> 00:47:19,400
CMMC 2.0 enforcement became mandatory on November 10, 2025.
1213
00:47:19,400 –> 00:47:20,880
That date has already passed.
1214
00:47:20,880 –> 00:47:23,440
And it caught a lot of organizations flat-footed.
1215
00:47:23,440 –> 00:47:26,600
CMMC is the cybersecurity maturity model certification.
1216
00:47:26,600 –> 00:47:29,840
It’s the Department of Defense’s way of saying that if you want to work with us, if you
1217
00:47:29,840 –> 00:47:33,520
want a government contract, if you want to touch controlled, unclassified information,
1218
00:47:33,520 –> 00:47:38,640
which is what the DOD call CUI, then your security infrastructure has to meet specific standards,
1219
00:47:38,640 –> 00:47:40,240
not guidelines, standards.
1220
00:47:40,240 –> 00:47:43,160
110 controls from NIST SP 871.
1221
00:47:43,160 –> 00:47:44,880
Level 2 compliance is non-negotiable.
1222
00:47:44,880 –> 00:47:47,080
And here’s the architectural detail that matters.
1223
00:47:47,080 –> 00:47:50,840
Microsoft 365 commercial cannot be used for CMMC level 2.
1224
00:47:50,840 –> 00:47:51,840
Full stop.
1225
00:47:51,840 –> 00:47:53,320
The commercial cloud is multi-tenant.
1226
00:47:53,320 –> 00:47:56,560
Data from your organization sits alongside data from other organizations.
1227
00:47:56,560 –> 00:47:58,320
The DOD doesn’t accept that risk boundary.
1228
00:47:58,320 –> 00:48:02,680
So if you’re a defense contractor and you’ve been using Microsoft 365 commercial, which
1229
00:48:02,680 –> 00:48:06,520
is what most organizations do because it’s cheaper and simpler, you cannot use it for
1230
00:48:06,520 –> 00:48:07,520
CUI anymore.
1231
00:48:07,520 –> 00:48:09,280
You have to migrate to GCC High.
1232
00:48:09,280 –> 00:48:13,560
Government community cloud, a separate isolated cloud environment, different infrastructure,
1233
00:48:13,560 –> 00:48:17,360
different data centers, different governance, it’s not a checkbox upgrade.
1234
00:48:17,360 –> 00:48:20,920
It’s a retennanting, it’s an architectural pivot, how it manifests in practice.
1235
00:48:20,920 –> 00:48:24,240
A defense contractor, 2000 seats, running in commercial.
1236
00:48:24,240 –> 00:48:29,000
They’re already using Teams, Exchange, SharePoint, everything’s deployed, integrated working,
1237
00:48:29,000 –> 00:48:30,840
then CMMC enforcement happens.
1238
00:48:30,840 –> 00:48:34,720
And suddenly they learn, usually from their compliance officer or their government customer
1239
00:48:34,720 –> 00:48:38,680
that they need to be in GCC High by a specific date or they lose their contract.
1240
00:48:38,680 –> 00:48:39,680
Now they’re scrambling.
1241
00:48:39,680 –> 00:48:44,240
They have to migrate 2000 users and all their data to a completely different cloud environment.
1242
00:48:44,240 –> 00:48:47,840
They have to revalidate their conditional access policies because GCC High has different
1243
00:48:47,840 –> 00:48:48,840
feature availability.
1244
00:48:48,840 –> 00:48:52,840
They have to retest integrations because third party connectors behave differently in
1245
00:48:52,840 –> 00:48:54,000
government clouds.
1246
00:48:54,000 –> 00:48:58,480
They have to re-architect their governance because the audit logging in GCC High works differently
1247
00:48:58,480 –> 00:48:59,640
than in commercial.
1248
00:48:59,640 –> 00:49:01,600
The systemic cause is straightforward.
1249
00:49:01,600 –> 00:49:04,320
Compliance requirements were not baked into the initial tenant design.
1250
00:49:04,320 –> 00:49:07,440
The organization chose commercial because it was the standard choice.
1251
00:49:07,440 –> 00:49:11,720
Nobody asked if we were a defense contractor what are our long term compliance requirements.
1252
00:49:11,720 –> 00:49:14,560
Nobody mapped that requirement to an architectural decision.
1253
00:49:14,560 –> 00:49:19,080
Nobody said we should build this in GCC High from day one, even though it’s more expensive
1254
00:49:19,080 –> 00:49:21,320
because our business model requires it.
1255
00:49:21,320 –> 00:49:25,520
We had the organization built for cost and simplicity and then when compliance requirements
1256
00:49:25,520 –> 00:49:29,160
arrived they had to re-tenant, which is expensive.
1257
00:49:29,160 –> 00:49:33,600
Real numbers, a defense contractor re-tenanting 2000 users to GCC High.
1258
00:49:33,600 –> 00:49:38,080
Professional services alone, the migration effort, the testing, the validation runs north
1259
00:49:38,080 –> 00:49:39,680
of $500,000.
1260
00:49:39,680 –> 00:49:42,560
Then there’s the period of operational disruption.
1261
00:49:42,560 –> 00:49:45,560
Users relearning systems that work slightly differently.
1262
00:49:45,560 –> 00:49:47,600
Integrations that broke and had to be rebuilt.
1263
00:49:47,600 –> 00:49:50,720
Training for the new environment, audits that have to be repeated.
1264
00:49:50,720 –> 00:49:54,160
In the extended timeline, what should have been a two week migration stretch to three months
1265
00:49:54,160 –> 00:49:55,960
because the architecture wasn’t built for it?
1266
00:49:55,960 –> 00:49:59,040
The economic consequence is layered, the direct cost of migration.
1267
00:49:59,040 –> 00:50:03,120
The opportunity cost of the engineering team’s time diverted to crisis mode.
1268
00:50:03,120 –> 00:50:07,440
The risk of incomplete migration where some data or configurations get missed, discovered
1269
00:50:07,440 –> 00:50:08,520
later in an audit.
1270
00:50:08,520 –> 00:50:13,000
And the ongoing cost, GCC High licensing is more expensive than commercial and you can’t
1271
00:50:13,000 –> 00:50:14,320
easily move back.
1272
00:50:14,320 –> 00:50:16,680
The control plane fix is ruthlessly simple.
1273
00:50:16,680 –> 00:50:19,360
Design your tenant for your compliance requirements from day one.
1274
00:50:19,360 –> 00:50:20,360
Not eventually.
1275
00:50:20,360 –> 00:50:23,720
If you’re a defense contractor, you build in GCC High.
1276
00:50:23,720 –> 00:50:27,440
You accept the higher cost and complexity upfront because your business model requires
1277
00:50:27,440 –> 00:50:28,440
it.
1278
00:50:28,440 –> 00:50:31,400
If you’re in healthcare, you might need HIPAA compliance, which affects data residency
1279
00:50:31,400 –> 00:50:32,720
and audit logging.
1280
00:50:32,720 –> 00:50:36,960
If you’re in financial services, you might need SoC2, which affects who can access what
1281
00:50:36,960 –> 00:50:38,280
these aren’t nice to have.
1282
00:50:38,280 –> 00:50:39,840
These are architectural constraints.
1283
00:50:39,840 –> 00:50:41,880
And here’s the lesson that applies beyond CMMC.
1284
00:50:41,880 –> 00:50:44,680
The window for architectural decisions closes early.
1285
00:50:44,680 –> 00:50:48,560
You make the decision about which cloud to use, about how to classify data, about where
1286
00:50:48,560 –> 00:50:49,800
to store information.
1287
00:50:49,800 –> 00:50:52,760
And then that decision constrains everything that comes after.
1288
00:50:52,760 –> 00:50:56,480
If you make the wrong decision early because you didn’t anticipate compliance requirements,
1289
00:50:56,480 –> 00:50:57,720
you’re rebuilding later.
1290
00:50:57,720 –> 00:50:58,720
That’s expensive.
1291
00:50:58,720 –> 00:51:02,440
If you don’t architect for tomorrow’s requirements, tomorrow’s requirements will architect
1292
00:51:02,440 –> 00:51:03,440
you.
1293
00:51:03,440 –> 00:51:05,760
And by then you’re already operating at a cost disadvantage.
1294
00:51:05,760 –> 00:51:08,080
The recovery path from decay to design.
1295
00:51:08,080 –> 00:51:09,600
Here’s the thing about architecture.
1296
00:51:09,600 –> 00:51:10,800
You can’t fix it all at once.
1297
00:51:10,800 –> 00:51:14,400
You have to fix it deliberately in phases with clear outcomes at each step.
1298
00:51:14,400 –> 00:51:18,640
Otherwise you’ll just be throwing money at problems without solving the structural issues
1299
00:51:18,640 –> 00:51:19,960
that created them.
1300
00:51:19,960 –> 00:51:21,960
Recovery from 10NTK follows a pattern.
1301
00:51:21,960 –> 00:51:22,960
And the pattern works.
1302
00:51:22,960 –> 00:51:24,320
I’ve seen it work dozens of times.
1303
00:51:24,320 –> 00:51:28,280
It takes 90 days to get to a place where you can actually claim you have architecture instead
1304
00:51:28,280 –> 00:51:30,160
of just a platform running unsupervised.
1305
00:51:30,160 –> 00:51:31,560
Phase one is 30 days.
1306
00:51:31,560 –> 00:51:32,560
Audit and inventory.
1307
00:51:32,560 –> 00:51:35,760
You have to see what you’ve actually got before you can change anything.
1308
00:51:35,760 –> 00:51:40,240
This means discovering inactive licenses, running reports on user log in history.
1309
00:51:40,240 –> 00:51:43,400
Finding accounts that haven’t authenticated in 30 days or longer.
1310
00:51:43,400 –> 00:51:44,400
These are your easy wins.
1311
00:51:44,400 –> 00:51:46,040
You reclaim them immediately.
1312
00:51:46,040 –> 00:51:47,720
You also discover often apps.
1313
00:51:47,720 –> 00:51:49,320
The 340 power apps.
1314
00:51:49,320 –> 00:51:52,000
The 847 app registrations.
1315
00:51:52,000 –> 00:51:54,680
The automation flows that nobody remembers creating.
1316
00:51:54,680 –> 00:51:55,680
You don’t delete them yet.
1317
00:51:55,680 –> 00:51:56,960
You just inventory them.
1318
00:51:56,960 –> 00:51:57,960
Who owns this?
1319
00:51:57,960 –> 00:51:58,960
Has it been used?
1320
00:51:58,960 –> 00:52:00,160
Is there a business case for keeping it?
1321
00:52:00,160 –> 00:52:01,600
You also do a permission audit.
1322
00:52:01,600 –> 00:52:02,880
You look at entry-d roles.
1323
00:52:02,880 –> 00:52:04,840
You find the accounts with excessive privilege.
1324
00:52:04,840 –> 00:52:08,480
You find the service principles with credentials that haven’t been rotated.
1325
00:52:08,480 –> 00:52:12,040
You find application permissions that exceed what the application actually needs.
1326
00:52:12,040 –> 00:52:13,680
None of this gets fixed in phase one.
1327
00:52:13,680 –> 00:52:15,840
You just establish what the baseline looks like.
1328
00:52:15,840 –> 00:52:17,640
By the end of 30 days you have clarity.
1329
00:52:17,640 –> 00:52:19,160
You know how much leakage exists.
1330
00:52:19,160 –> 00:52:20,880
You know how many licenses are wasted.
1331
00:52:20,880 –> 00:52:23,640
You know how many often applications are sitting in your environment.
1332
00:52:23,640 –> 00:52:24,640
You have a number.
1333
00:52:24,640 –> 00:52:26,880
And that number becomes your benchmark for recovery.
1334
00:52:26,880 –> 00:52:28,560
Phase two is 60 days.
1335
00:52:28,560 –> 00:52:29,560
Automate governance.
1336
00:52:29,560 –> 00:52:32,440
Now that you know what you have, you start building the systems that will prevent decay
1337
00:52:32,440 –> 00:52:33,600
from happening again.
1338
00:52:33,600 –> 00:52:36,160
You deploy life cycle workflows in Entra ID.
1339
00:52:36,160 –> 00:52:39,400
When a user joins, their access gets provisioned automatically.
1340
00:52:39,400 –> 00:52:42,600
When they leave, their access gets deprovisioned automatically.
1341
00:52:42,600 –> 00:52:43,600
No manual process.
1342
00:52:43,600 –> 00:52:44,600
No spreadsheets.
1343
00:52:44,600 –> 00:52:46,760
No emails asking someone to remember to offboard this person.
1344
00:52:46,760 –> 00:52:47,760
The system does it.
1345
00:52:47,760 –> 00:52:49,080
You implement entitlement management.
1346
00:52:49,080 –> 00:52:52,720
You create access packages that bundle related permissions.
1347
00:52:52,720 –> 00:52:53,960
Employee joins the finance team.
1348
00:52:53,960 –> 00:52:58,080
They automatically get access to the finance shared mailbox, the finance share point side,
1349
00:52:58,080 –> 00:52:59,480
the finance team’s channel.
1350
00:52:59,480 –> 00:53:01,560
All through a single approval workflow.
1351
00:53:01,560 –> 00:53:03,560
Not separate requests to different people.
1352
00:53:03,560 –> 00:53:07,560
Not finding out three weeks later that someone didn’t get access to something they needed.
1353
00:53:07,560 –> 00:53:11,040
You enforce sensitivity labels and data loss prevention at scale.
1354
00:53:11,040 –> 00:53:13,040
Every document in SharePoint gets classified.
1355
00:53:13,040 –> 00:53:14,040
Not manually.
1356
00:53:14,040 –> 00:53:15,040
Automatically.
1357
00:53:15,040 –> 00:53:17,000
Content analysis based on metadata.
1358
00:53:17,000 –> 00:53:21,720
If a document contains sensitive financial information, it gets the finance label automatically.
1359
00:53:21,720 –> 00:53:25,760
And once it’s labeled, DLP policies automatically restrict how it can be shared.
1360
00:53:25,760 –> 00:53:28,480
You can’t email a sensitive financial document externally.
1361
00:53:28,480 –> 00:53:29,480
The policy blocks it.
1362
00:53:29,480 –> 00:53:30,880
Phase three is 90 days.
1363
00:53:30,880 –> 00:53:31,880
Build the control plane.
1364
00:53:31,880 –> 00:53:33,160
This is where you architect.
1365
00:53:33,160 –> 00:53:35,000
You define a policy compilation layer.
1366
00:53:35,000 –> 00:53:40,080
A single system of truth where organizational intent gets translated into platform policy.
1367
00:53:40,080 –> 00:53:42,760
You establish Entra ID as the orchestration backbone.
1368
00:53:42,760 –> 00:53:46,640
Every other system in your tenant inherits authorization decisions from identity.
1369
00:53:46,640 –> 00:53:50,920
A user’s role in Entra ID determines their access to data in SharePoint, their visibility
1370
00:53:50,920 –> 00:53:53,720
in teams, their permissions in co-pilot agents.
1371
00:53:53,720 –> 00:53:55,720
You implement cross-platform governance.
1372
00:53:55,720 –> 00:53:58,360
When you make a decision in one place, it cascades everywhere.
1373
00:53:58,360 –> 00:53:59,360
It doesn’t break systems.
1374
00:53:59,360 –> 00:54:00,640
It doesn’t create exceptions.
1375
00:54:00,640 –> 00:54:02,400
It creates consistency.
1376
00:54:02,400 –> 00:54:05,040
A global firm I worked with followed this path.
1377
00:54:05,040 –> 00:54:06,160
Five thousand seats.
1378
00:54:06,160 –> 00:54:10,280
They recovered $1.2 million in year one through systematic rationalization.
1379
00:54:10,280 –> 00:54:14,800
They reclaimed $130,000 in unused licenses in month one.
1380
00:54:14,800 –> 00:54:17,960
They decommissioned 78 orphaned power apps in month two.
1381
00:54:17,960 –> 00:54:22,880
By month three, they’d reduced their password reset volume by 86% through automated entitlement
1382
00:54:22,880 –> 00:54:23,880
management.
1383
00:54:23,880 –> 00:54:24,880
The research is consistent.
1384
00:54:24,880 –> 00:54:30,400
The break-even point for technology investment in M365 is 54 minutes of time savings per employee
1385
00:54:30,400 –> 00:54:31,400
per month.
1386
00:54:31,400 –> 00:54:34,720
This organization achieved that in the first 30 days.
1387
00:54:34,720 –> 00:54:36,600
Everything after that was pure recovery.
1388
00:54:36,600 –> 00:54:40,480
All outcomes matter.
1389
00:54:40,480 –> 00:54:43,640
Help desk tickets for access requests basically disappeared.
1390
00:54:43,640 –> 00:54:45,960
Compliance audits became routine instead of crisis.
1391
00:54:45,960 –> 00:54:49,800
They could prove they had governance because governance was built into the platform, but
1392
00:54:49,800 –> 00:54:53,160
recovery requires something else beyond process.
1393
00:54:53,160 –> 00:54:54,400
The mindset shift.
1394
00:54:54,400 –> 00:54:58,600
From procurement to architecture, recovery requires a mindset shift.
1395
00:54:58,600 –> 00:55:02,800
And mindset shifts are harder than process changes because they require executives to change
1396
00:55:02,800 –> 00:55:04,760
how they think about what they’re doing.
1397
00:55:04,760 –> 00:55:08,280
The shift sounds simple when you say it, but it reshapes everything.
1398
00:55:08,280 –> 00:55:10,280
Stop asking what tools should we buy?
1399
00:55:10,280 –> 00:55:12,120
Start asking what system do we need?
1400
00:55:12,120 –> 00:55:13,720
This is the fundamental reframe.
1401
00:55:13,720 –> 00:55:16,880
Most organizations approach Microsoft 365 like they’re shopping.
1402
00:55:16,880 –> 00:55:17,880
What features do we need?
1403
00:55:17,880 –> 00:55:19,160
What’s the industry standard?
1404
00:55:19,160 –> 00:55:20,560
What are competitors using?
1405
00:55:20,560 –> 00:55:21,760
What’s the price per user?
1406
00:55:21,760 –> 00:55:22,760
And then they buy?
1407
00:55:22,760 –> 00:55:25,320
They’ve solved the problem by acquiring the product.
1408
00:55:25,320 –> 00:55:27,000
But tools and systems are different things.
1409
00:55:27,000 –> 00:55:28,760
A tool is something you buy and deploy.
1410
00:55:28,760 –> 00:55:30,400
A system is something you architect.
1411
00:55:30,400 –> 00:55:32,080
A tool solves isolated problems.
1412
00:55:32,080 –> 00:55:33,800
A system solves interconnected problems.
1413
00:55:33,800 –> 00:55:34,800
You can buy a co-pilot.
1414
00:55:34,800 –> 00:55:37,280
That’s a tool, but you can’t buy a co-pilot system.
1415
00:55:37,280 –> 00:55:38,280
You have to architect it.
1416
00:55:38,280 –> 00:55:40,120
You have to decide what data it accesses.
1417
00:55:40,120 –> 00:55:41,480
You have to define its boundaries.
1418
00:55:41,480 –> 00:55:43,880
You have to think about how it integrates with governance.
1419
00:55:43,880 –> 00:55:45,600
You have to measure what it actually delivers.
1420
00:55:45,600 –> 00:55:50,240
The shift from tools to systems changes everything because now the question isn’t, how do we buy
1421
00:55:50,240 –> 00:55:51,240
this faster?
1422
00:55:51,240 –> 00:55:53,480
It’s, what are we trying to accomplish?
1423
00:55:53,480 –> 00:55:56,480
And how does this tool fit into the larger system we need?
1424
00:55:56,480 –> 00:55:58,320
Stop measuring by adoption percentage.
1425
00:55:58,320 –> 00:56:00,280
Start measuring by economic realization.
1426
00:56:00,280 –> 00:56:02,680
Most organizations track adoption because it’s visible.
1427
00:56:02,680 –> 00:56:04,360
How many users logged into co-pilot?
1428
00:56:04,360 –> 00:56:05,920
How many teams channels got created?
1429
00:56:05,920 –> 00:56:07,320
How many people attended training?
1430
00:56:07,320 –> 00:56:10,120
These metrics feel like success because they’re easy to see.
1431
00:56:10,120 –> 00:56:11,120
And they’re useless.
1432
00:56:11,120 –> 00:56:13,480
A user logged into co-pilot once and never returned.
1433
00:56:13,480 –> 00:56:14,480
Is that adoption?
1434
00:56:14,480 –> 00:56:15,480
Technically yes.
1435
00:56:15,480 –> 00:56:17,120
But economically, it’s a failure.
1436
00:56:17,120 –> 00:56:20,520
You spend $30 a month on a license that delivered zero value.
1437
00:56:20,520 –> 00:56:21,520
That’s not adoption.
1438
00:56:21,520 –> 00:56:22,840
That’s waste measured in percentages.
1439
00:56:22,840 –> 00:56:23,920
Real metrics are different.
1440
00:56:23,920 –> 00:56:26,640
Did co-pilot reduce the time it takes to write a report?
1441
00:56:26,640 –> 00:56:28,240
By how much can you quantify that?
1442
00:56:28,240 –> 00:56:30,080
Did it reduce password reset calls?
1443
00:56:30,080 –> 00:56:31,560
How many fewer calls per month?
1444
00:56:31,560 –> 00:56:33,440
Did it accelerate on boarding by how long?
1445
00:56:33,440 –> 00:56:34,440
These are economic metrics.
1446
00:56:34,440 –> 00:56:36,600
They connect tool usage to business outcome.
1447
00:56:36,600 –> 00:56:37,920
And they’re much harder to achieve.
1448
00:56:37,920 –> 00:56:39,680
So organizations don’t measure them.
1449
00:56:39,680 –> 00:56:41,360
They measure adoption instead.
1450
00:56:41,360 –> 00:56:43,360
Stop treating architects as cost centers.
1451
00:56:43,360 –> 00:56:45,080
Start treating them as leverage multipliers.
1452
00:56:45,080 –> 00:56:49,000
This is the hardest mindset shift because it requires the organization to value something
1453
00:56:49,000 –> 00:56:50,960
that’s invisible until something breaks.
1454
00:56:50,960 –> 00:56:52,520
A builder creates a feature.
1455
00:56:52,520 –> 00:56:53,520
Everyone sees it.
1456
00:56:53,520 –> 00:56:54,880
The business sees value immediately.
1457
00:56:54,880 –> 00:56:58,480
An architect prevents a problem that would have cost millions to fix later.
1458
00:56:58,480 –> 00:57:00,720
Nobody sees it because the problem never happened.
1459
00:57:00,720 –> 00:57:02,160
But invisibility is dangerous.
1460
00:57:02,160 –> 00:57:05,000
It gets architects fired and builders promoted.
1461
00:57:05,000 –> 00:57:06,360
But here’s the arithmetic.
1462
00:57:06,360 –> 00:57:09,640
One architect can set standards that affect hundreds of builders.
1463
00:57:09,640 –> 00:57:13,680
One architectural decision about how to handle data boundaries can prevent thousands of hours
1464
00:57:13,680 –> 00:57:14,840
of rework later.
1465
00:57:14,840 –> 00:57:19,160
One governance framework that automates entitlement management can reclaim hundreds of thousands
1466
00:57:19,160 –> 00:57:21,160
of dollars in license waste and labor.
1467
00:57:21,160 –> 00:57:22,160
That’s leverage.
1468
00:57:22,160 –> 00:57:25,280
Stop treating licensing as a budget line item.
1469
00:57:25,280 –> 00:57:27,400
Start treating it as a behavioral incentive.
1470
00:57:27,400 –> 00:57:28,800
Licensing SKU drives behavior.
1471
00:57:28,800 –> 00:57:32,400
If you assign everyone E5, you’re saying everyone gets access to everything that removes
1472
00:57:32,400 –> 00:57:33,400
all constraints.
1473
00:57:33,400 –> 00:57:34,560
It removes all discipline.
1474
00:57:34,560 –> 00:57:38,640
It removes the mechanism that forces you to make hard architectural decisions about what
1475
00:57:38,640 –> 00:57:39,840
people actually need.
1476
00:57:39,840 –> 00:57:44,120
But if you intentionally align licensing to roles, then the organization has to know what
1477
00:57:44,120 –> 00:57:45,120
roles are.
1478
00:57:45,120 –> 00:57:46,320
It has to enforce role definitions.
1479
00:57:46,320 –> 00:57:49,920
It has to ask why does this person need this capability?
1480
00:57:49,920 –> 00:57:53,520
And in asking that question, it starts building architecture instead of buying features.
1481
00:57:53,520 –> 00:57:56,200
A CIO I worked with made this shift explicitly.
1482
00:57:56,200 –> 00:57:58,520
They’d been trying to drive co-pilot adoption.
1483
00:57:58,520 –> 00:58:03,680
Doing it out to everyone, measuring usage metrics, adoption wasn’t happening, usage was low,
1484
00:58:03,680 –> 00:58:05,400
value was unclear.
1485
00:58:05,400 –> 00:58:06,840
So they reframed it.
1486
00:58:06,840 –> 00:58:11,940
Instead of co-pilot is a productivity tool, they said co-pilot is a data governance accelerator.
1487
00:58:11,940 –> 00:58:13,440
And they changed who got licenses.
1488
00:58:13,440 –> 00:58:18,480
Not everyone, teams that had high data governance maturity, teams that had classified their data,
1489
00:58:18,480 –> 00:58:20,600
teams that understood their compliance requirements.
1490
00:58:20,600 –> 00:58:25,120
Suddenly, co-pilot became an incentive for doing the unglomerious work of data classification
1491
00:58:25,120 –> 00:58:26,120
first.
1492
00:58:26,120 –> 00:58:31,000
But reframing looks like in practice, not different tools, different intent, different alignment,
1493
00:58:31,000 –> 00:58:32,200
different outcomes.
1494
00:58:32,200 –> 00:58:33,320
And here’s the final refram.
1495
00:58:33,320 –> 00:58:35,880
Your Microsoft tenant is not a collection of applications.
1496
00:58:35,880 –> 00:58:37,840
It is not a set of services you subscribe to.
1497
00:58:37,840 –> 00:58:39,080
It is an economic system.
1498
00:58:39,080 –> 00:58:41,080
Every decision has an economic consequence.
1499
00:58:41,080 –> 00:58:43,120
Every sprawl you tolerate costs money.
1500
00:58:43,120 –> 00:58:45,620
Every governance gap you ignore compounds into debt.
1501
00:58:45,620 –> 00:58:48,400
The question isn’t, do we have Microsoft 365?
1502
00:58:48,400 –> 00:58:50,960
The question is, are we managing it as a system?
1503
00:58:50,960 –> 00:58:53,840
The governance operating model, how to sustain it?
1504
00:58:53,840 –> 00:58:55,280
Recovery is the easy part.
1505
00:58:55,280 –> 00:58:57,600
Making it is where most organizations fail.
1506
00:58:57,600 –> 00:58:59,440
You’ll go through the 90 day recovery.
1507
00:58:59,440 –> 00:59:00,680
You’ll reclaim licenses.
1508
00:59:00,680 –> 00:59:02,640
You’ll decommission orfant applications.
1509
00:59:02,640 –> 00:59:04,120
You’ll implement automation.
1510
00:59:04,120 –> 00:59:06,840
And for about six months, the organization will feel good about it.
1511
00:59:06,840 –> 00:59:07,840
We fixed it.
1512
00:59:07,840 –> 00:59:08,840
We’re more efficient.
1513
00:59:08,840 –> 00:59:09,840
We have governance.
1514
00:59:09,840 –> 00:59:11,600
Then slowly entropy returns.
1515
00:59:11,600 –> 00:59:16,240
A new business unit wants to deploy a co-pilot agent without following the approval workflow.
1516
00:59:16,240 –> 00:59:19,960
Someone creates a teams channel for a project and assigns permissions to broadly.
1517
00:59:19,960 –> 00:59:24,440
A new integration gets built because the standard integration points are documented poorly.
1518
00:59:24,440 –> 00:59:26,200
And the builder doesn’t know they exist.
1519
00:59:26,200 –> 00:59:28,000
The control plane drifts.
1520
00:59:28,000 –> 00:59:29,600
Policies become suggestions again.
1521
00:59:29,600 –> 00:59:32,040
This is why governance requires an operating model.
1522
00:59:32,040 –> 00:59:35,280
Not a one time intervention, not a checklist you complete and then ignore.
1523
00:59:35,280 –> 00:59:39,000
An ongoing system that sustains architectural discipline.
1524
00:59:39,000 –> 00:59:40,880
Governance operating models have three components.
1525
00:59:40,880 –> 00:59:44,440
Ownership, decision rights, cadence.
1526
00:59:44,440 –> 00:59:45,440
First ownership.
1527
00:59:45,440 –> 00:59:46,720
Somebody has to own the control plane.
1528
00:59:46,720 –> 00:59:47,720
Not everyone.
1529
00:59:47,720 –> 00:59:51,800
Not a committee that meets quarterly, one accountable person or a small office that
1530
00:59:51,800 –> 00:59:55,440
owns architectural intent and policy, consistency.
1531
00:59:55,440 –> 00:59:58,120
At many organizations, this gets assigned to the CIO.
1532
00:59:58,120 –> 01:00:02,920
But if your CIO is spread across a hundred initiatives, ownership becomes meaningless.
1533
01:00:02,920 –> 01:00:05,160
Effective models establish a distinct role.
1534
01:00:05,160 –> 01:00:08,480
Chief architect or office of architecture or governance council lead.
1535
01:00:08,480 –> 01:00:13,320
Someone whose primary responsibility, not secondary, not among other things, is ensuring
1536
01:00:13,320 –> 01:00:15,320
the control plane stays intact.
1537
01:00:15,320 –> 01:00:16,520
This ownership is active.
1538
01:00:16,520 –> 01:00:17,920
It’s not theoretical.
1539
01:00:17,920 –> 01:00:21,760
It’s weekly staff meetings where the architecture team reviews what’s being requested.
1540
01:00:21,760 –> 01:00:26,960
New applications, new integrations, new data classifications, new governance exceptions.
1541
01:00:26,960 –> 01:00:28,960
Every request flows through this office.
1542
01:00:28,960 –> 01:00:33,080
And the office has the authority to say no, not to obstruct, to enforce standards.
1543
01:00:33,080 –> 01:00:34,960
Second, decision rights.
1544
01:00:34,960 –> 01:00:36,600
Define explicitly who decides what.
1545
01:00:36,600 –> 01:00:39,360
This prevents the diffusion of responsibility that kills governance.
1546
01:00:39,360 –> 01:00:41,800
Who approves new applications, not the business.
1547
01:00:41,800 –> 01:00:43,760
Specifically, the application review board.
1548
01:00:43,760 –> 01:00:47,240
Who has authority to create co-pilot agents, the AI governance council.
1549
01:00:47,240 –> 01:00:50,560
Who decides data classifications, the data owner with IT validation.
1550
01:00:50,560 –> 01:00:53,640
Who can request exceptions to conditional access policies.
1551
01:00:53,640 –> 01:00:57,840
The executive sponsor with the CISO sign off, write these down, make them clear.
1552
01:00:57,840 –> 01:00:59,640
And then enforce them without exception.
1553
01:00:59,640 –> 01:01:01,640
Real exceptions happen, legitimate ones.
1554
01:01:01,640 –> 01:01:06,680
But if you grant exceptions without requiring explicit approval and documented business justification,
1555
01:01:06,680 –> 01:01:07,760
exceptions become the rule.
1556
01:01:07,760 –> 01:01:09,080
And rules become irrelevant.
1557
01:01:09,080 –> 01:01:10,680
Third, cadence.
1558
01:01:10,680 –> 01:01:13,400
Governance that operates only in crisis mode isn’t governance.
1559
01:01:13,400 –> 01:01:14,880
It’s damage control.
1560
01:01:14,880 –> 01:01:16,320
Establish three levels of rhythm.
1561
01:01:16,320 –> 01:01:17,320
Weekly operational.
1562
01:01:17,320 –> 01:01:22,080
The governance team meeting to review requests, approve standard decisions, identify anomalies.
1563
01:01:22,080 –> 01:01:23,600
Not long meetings, 30 minutes.
1564
01:01:23,600 –> 01:01:24,600
What came in this week?
1565
01:01:24,600 –> 01:01:25,600
Are we seeing drift?
1566
01:01:25,600 –> 01:01:26,920
Do we need to escalate anything?
1567
01:01:26,920 –> 01:01:27,920
Monthly tactical.
1568
01:01:27,920 –> 01:01:28,920
This is the broader review.
1569
01:01:28,920 –> 01:01:30,240
How are policies performing?
1570
01:01:30,240 –> 01:01:31,440
What did automation catch?
1571
01:01:31,440 –> 01:01:33,040
What required manual intervention?
1572
01:01:33,040 –> 01:01:34,520
Are there patterns we should address?
1573
01:01:34,520 –> 01:01:36,960
Are there new threats we need to govern against?
1574
01:01:36,960 –> 01:01:37,960
Quaternary strategic.
1575
01:01:37,960 –> 01:01:39,800
This is alignment with business outcomes.
1576
01:01:39,800 –> 01:01:42,480
Are our governance decisions supporting business goals?
1577
01:01:42,480 –> 01:01:44,920
Are we over-controlling and blocking innovation?
1578
01:01:44,920 –> 01:01:46,640
Are we under-controlling and exposing risk?
1579
01:01:46,640 –> 01:01:49,320
Do we need to adjust policies based on what we’ve learned?
1580
01:01:49,320 –> 01:01:51,960
This is the meeting that connects governance to business impact.
1581
01:01:51,960 –> 01:01:54,120
Tide this to outcomes.
1582
01:01:54,120 –> 01:01:59,000
Organizations with formal governance operating models achieve 130% or higher ROI in year
1583
01:01:59,000 –> 01:02:00,000
one.
1584
01:02:00,000 –> 01:02:04,000
Not through cost savings alone, through the compounding effect of consistent decision making,
1585
01:02:04,000 –> 01:02:08,160
of reduced rework, of architects preventing problems instead of engineers fixing them
1586
01:02:08,160 –> 01:02:09,160
after the fact.
1587
01:02:09,160 –> 01:02:12,840
A global enterprise established an architecture council.
1588
01:02:12,840 –> 01:02:16,520
Representatives from IT, finance, security, business, met quarterly.
1589
01:02:16,520 –> 01:02:20,040
And all new initiatives evaluated them against architectural standards.
1590
01:02:20,040 –> 01:02:21,240
Court problems early.
1591
01:02:21,240 –> 01:02:25,560
Within two years, they had reduced infrastructure change failures by 70%.
1592
01:02:25,560 –> 01:02:28,800
Because architectural intent was clear and decisions were coordinated.
1593
01:02:28,800 –> 01:02:29,880
Track metrics that matter.
1594
01:02:29,880 –> 01:02:33,000
Not adoption, cost per seat, feature utilization percentage.
1595
01:02:33,000 –> 01:02:35,280
Audit readiness score, breach risk score.
1596
01:02:35,280 –> 01:02:37,360
These connect governance to business reality.
1597
01:02:37,360 –> 01:02:39,040
Is your co-pilot adoption tracking?
1598
01:02:39,040 –> 01:02:41,360
Measure actual time saved, not just login events.
1599
01:02:41,360 –> 01:02:43,000
Are your license cost predictable?
1600
01:02:43,000 –> 01:02:44,760
Track cost per user by role?
1601
01:02:44,760 –> 01:02:46,840
Is your security post your hardening?
1602
01:02:46,840 –> 01:02:51,360
Measure your conditional access coverage, your MFA adoption rate, your unmanaged device exposure?
1603
01:02:51,360 –> 01:02:53,120
These metrics create accountability.
1604
01:02:53,120 –> 01:02:54,600
The governance team owns them.
1605
01:02:54,600 –> 01:02:56,000
They report quarterly.
1606
01:02:56,000 –> 01:02:59,840
When metrics drift, someone has to explain why and what they’re doing to fix it.
1607
01:02:59,840 –> 01:03:01,040
This is not optional.
1608
01:03:01,040 –> 01:03:02,960
This is foundational.
1609
01:03:02,960 –> 01:03:06,160
Without an operating model to sustain it, your recovery becomes temporary.
1610
01:03:06,160 –> 01:03:08,640
Within 18 months, your back where you started.
1611
01:03:08,640 –> 01:03:11,720
Slightly more expensive, but fundamentally unchanged.
1612
01:03:11,720 –> 01:03:14,280
With it, governance becomes a permanent capability.
1613
01:03:14,280 –> 01:03:17,840
Having the organization does not something it periodically attempts.
1614
01:03:17,840 –> 01:03:20,720
The executive prescription, what leadership must do.
1615
01:03:20,720 –> 01:03:22,120
Here is what needs to happen.
1616
01:03:22,120 –> 01:03:23,120
Not eventually.
1617
01:03:23,120 –> 01:03:27,360
Before your next renewal, before the July 2026 price increases, force your hand.
1618
01:03:27,360 –> 01:03:30,080
Demand an architecture audit before your next license renewal.
1619
01:03:30,080 –> 01:03:31,080
Not a vendor assessment.
1620
01:03:31,080 –> 01:03:32,400
Not a feature comparison.
1621
01:03:32,400 –> 01:03:33,560
An actual audit.
1622
01:03:33,560 –> 01:03:37,360
Someone independent, not your infrastructure team, they have incentive to minimize problems.
1623
01:03:37,360 –> 01:03:38,880
Comes in and maps your tenant.
1624
01:03:38,880 –> 01:03:39,880
What’s actually running?
1625
01:03:39,880 –> 01:03:40,880
What’s being used?
1626
01:03:40,880 –> 01:03:41,880
What’s decaying?
1627
01:03:41,880 –> 01:03:42,880
What’s the compliance posture?
1628
01:03:42,880 –> 01:03:44,240
What’s the governance maturity?
1629
01:03:44,240 –> 01:03:45,240
What’s the secondary?
1630
01:03:45,240 –> 01:03:46,800
Truth is primary.
1631
01:03:46,800 –> 01:03:50,240
This audit produces three artifacts, first a baseline of where you are.
1632
01:03:50,240 –> 01:03:51,360
What’s the current leakage?
1633
01:03:51,360 –> 01:03:52,880
How much license waste exists?
1634
01:03:52,880 –> 01:03:53,880
What’s your security debt?
1635
01:03:53,880 –> 01:03:55,040
Second, a gap analysis.
1636
01:03:55,040 –> 01:03:59,640
If you want to achieve a specific level of governance maturity, what do you need to change?
1637
01:03:59,640 –> 01:04:01,280
Third, a recovery roadmap.
1638
01:04:01,280 –> 01:04:02,280
90 days.
1639
01:04:02,280 –> 01:04:03,280
Minimum.
1640
01:04:03,280 –> 01:04:04,280
Clear milestones.
1641
01:04:04,280 –> 01:04:05,280
Economic outcomes measured.
1642
01:04:05,280 –> 01:04:06,600
This audit is not free.
1643
01:04:06,600 –> 01:04:09,960
Plan for 50,000 to 150,000 depending on size.
1644
01:04:09,960 –> 01:04:10,960
That’s not an expense.
1645
01:04:10,960 –> 01:04:14,960
Insurance.
1646
01:04:14,960 –> 01:04:17,560
Your assumptions are wrong.
1647
01:04:17,560 –> 01:04:19,160
Everyone’s assumptions are wrong.
1648
01:04:19,160 –> 01:04:23,000
Require a quarterly economic outcome reporting tied to your Microsoft spend.
1649
01:04:23,000 –> 01:04:28,480
Your CFO shouldn’t see a line item that says Microsoft 365 3.2 million dollars.
1650
01:04:28,480 –> 01:04:31,880
Your CFO should see Microsoft 365 3.2 million.
1651
01:04:31,880 –> 01:04:33,280
ROI outcomes.
1652
01:04:33,280 –> 01:04:36,040
Reduce time to onboard by 25%.
1653
01:04:36,040 –> 01:04:40,280
Automated 86% of access requests prevented four compliance failures.
1654
01:04:40,280 –> 01:04:41,280
That’s a conversation.
1655
01:04:41,280 –> 01:04:42,280
That’s governance.
1656
01:04:42,280 –> 01:04:44,440
Establish a control plane governance model with clear ownership.
1657
01:04:44,440 –> 01:04:45,920
Assign someone.
1658
01:04:45,920 –> 01:04:46,920
Explicitly.
1659
01:04:46,920 –> 01:04:49,000
Not a committee, not a part-time responsibilities.
1660
01:04:49,000 –> 01:04:52,600
Someone whose primary job is ensuring architectural intent gets enforced.
1661
01:04:52,600 –> 01:04:55,120
Give them authority to approve or reject requests.
1662
01:04:55,120 –> 01:04:56,120
Give them budget.
1663
01:04:56,120 –> 01:04:57,440
Measure them by system health.
1664
01:04:57,440 –> 01:04:59,080
Not by features shipped.
1665
01:04:59,080 –> 01:05:02,120
Map licensing SKU to organizational roles and capabilities.
1666
01:05:02,120 –> 01:05:04,360
This is unglamorous work, but it’s mandatory.
1667
01:05:04,360 –> 01:05:05,360
You need a matrix.
1668
01:05:05,360 –> 01:05:09,480
Finance roles require E5 because they need advanced threat intelligence and premium
1669
01:05:09,480 –> 01:05:10,880
connectors.
1670
01:05:10,880 –> 01:05:15,360
Engineering roles require E3 because they need collaboration but not premium security.
1671
01:05:15,360 –> 01:05:18,720
Support roles require business standard because they need email and teams and nothing
1672
01:05:18,720 –> 01:05:19,720
else.
1673
01:05:19,720 –> 01:05:20,720
Write this down.
1674
01:05:20,720 –> 01:05:22,840
Make it policy and force it.
1675
01:05:22,840 –> 01:05:25,960
Implement automated compliance monitoring for regulatory requirements.
1676
01:05:25,960 –> 01:05:29,480
If you’re a defense contractor, you need to know continuously whether you’re maintaining
1677
01:05:29,480 –> 01:05:31,160
CMMC compliance.
1678
01:05:31,160 –> 01:05:32,160
Not at audit time.
1679
01:05:32,160 –> 01:05:33,160
Continuously.
1680
01:05:33,160 –> 01:05:37,160
If you’re in health care, you need to know whether your HIPAA controls are intact, automated
1681
01:05:37,160 –> 01:05:38,160
real-time.
1682
01:05:38,160 –> 01:05:39,160
It requires tooling.
1683
01:05:39,160 –> 01:05:40,160
It requires investment.
1684
01:05:40,160 –> 01:05:41,160
It’s non-negotiable.
1685
01:05:41,160 –> 01:05:42,160
Real story.
1686
01:05:42,160 –> 01:05:46,680
A CFO at a mid-market organization demanded an ROI model before approving the co-pilot rollout.
1687
01:05:46,680 –> 01:05:47,680
The team pushed back.
1688
01:05:47,680 –> 01:05:48,680
Just let us pilot it.
1689
01:05:48,680 –> 01:05:49,680
See how adoption goes.
1690
01:05:49,680 –> 01:05:50,680
The CFO said no.
1691
01:05:50,680 –> 01:05:51,680
Show me the model.
1692
01:05:51,680 –> 01:05:53,400
Show me what time savings will achieve.
1693
01:05:53,400 –> 01:05:55,400
Show me how that translates to economic value.
1694
01:05:55,400 –> 01:05:58,280
They built the model and they discovered something.
1695
01:05:58,280 –> 01:06:03,240
40% of existing E5 licenses could be downgraded to E3 because users weren’t using the premium
1696
01:06:03,240 –> 01:06:05,480
connectors or the advanced security features.
1697
01:06:05,480 –> 01:06:08,200
They were just using the basic collaboration tools.
1698
01:06:08,200 –> 01:06:12,520
40% that’s hundreds of thousands of dollars recovered before they spent a dime on co-pilot.
1699
01:06:12,520 –> 01:06:15,560
The CFO’s insistence on economic modeling exposed the real problem.
1700
01:06:15,560 –> 01:06:16,880
Here’s the conversation starter.
1701
01:06:16,880 –> 01:06:21,640
If you cannot explain your Microsoft strategy in economic terms, you don’t have a strategy.
1702
01:06:21,640 –> 01:06:22,640
You have a shopping list.
1703
01:06:22,640 –> 01:06:25,680
A strategy connects technical decisions to business outcomes.
1704
01:06:25,680 –> 01:06:29,840
The strategy says we’re implementing this control because it reduces risk.
1705
01:06:29,840 –> 01:06:32,480
Or we’re decommissioning that because it’s not driving value.
1706
01:06:32,480 –> 01:06:36,360
Or we’re investing in governance because the savings from automation exceed the cost
1707
01:06:36,360 –> 01:06:37,600
by 5 to 1.
1708
01:06:37,600 –> 01:06:40,320
If you can’t say those things, you don’t have a strategy.
1709
01:06:40,320 –> 01:06:41,840
And here’s the non-negotiable.
1710
01:06:41,840 –> 01:06:43,640
Procurement is not transformation.
1711
01:06:43,640 –> 01:06:44,640
Architecture is.
1712
01:06:44,640 –> 01:06:45,640
Stop conflating the two.
1713
01:06:45,640 –> 01:06:46,640
Buying tools is easy.
1714
01:06:46,640 –> 01:06:47,640
Building systems is hard.
1715
01:06:47,640 –> 01:06:48,640
One is a transaction.
1716
01:06:48,640 –> 01:06:49,920
The other is a capability.
1717
01:06:49,920 –> 01:06:51,240
One generates a purchase order.
1718
01:06:51,240 –> 01:06:53,080
The other generates economic value.
1719
01:06:53,080 –> 01:06:56,640
Your job as a leader is to demand architecture, not procurement.
1720
01:06:56,640 –> 01:07:00,320
Demand that before you renew, someone explains to you how your Microsoft tenant is actually
1721
01:07:00,320 –> 01:07:04,680
organized, what the control plane looks like, how decisions are enforced, what’s working,
1722
01:07:04,680 –> 01:07:07,280
what’s decaying, what the economics actually are.
1723
01:07:07,280 –> 01:07:08,280
That’s leadership.
1724
01:07:08,280 –> 01:07:09,960
Everything else is just spending money.
1725
01:07:09,960 –> 01:07:10,960
The uncomfortable truth.
1726
01:07:10,960 –> 01:07:12,280
Why this matters now?
1727
01:07:12,280 –> 01:07:13,760
This is not a 2027 problem.
1728
01:07:13,760 –> 01:07:15,080
This is a 26 problem.
1729
01:07:15,080 –> 01:07:16,080
And it’s already here.
1730
01:07:16,080 –> 01:07:21,160
Microsoft is increasing prices 9 to 33% effective July 1, 2026.
1731
01:07:21,160 –> 01:07:22,200
That date is approaching.
1732
01:07:22,200 –> 01:07:25,160
For most organizations, that’s your next renewal window.
1733
01:07:25,160 –> 01:07:27,320
The question isn’t whether prices are going up.
1734
01:07:27,320 –> 01:07:31,320
The question is whether you’ll be paying higher prices on a rationalized tenant or a
1735
01:07:31,320 –> 01:07:32,360
decayed one.
1736
01:07:32,360 –> 01:07:36,760
If you rationalize now, before renewal, you recover license waste while you’re still paying
1737
01:07:36,760 –> 01:07:37,760
current pricing.
1738
01:07:37,760 –> 01:07:43,040
A 30% cost reduction on your E5 mix locked in at today’s rates survives the July increase.
1739
01:07:43,040 –> 01:07:47,440
If you wait until after the increase, you’re recovering 30% over higher base.
1740
01:07:47,440 –> 01:07:49,160
You’re optimizing at a disadvantage.
1741
01:07:49,160 –> 01:07:52,440
The arithmetic is stock, a global firm delayed rationalization.
1742
01:07:52,440 –> 01:07:54,960
They told themselves they’d address it after their renewal.
1743
01:07:54,960 –> 01:07:57,720
They renewal landed two weeks after the price increase.
1744
01:07:57,720 –> 01:07:59,360
They tried to write size licenses then.
1745
01:07:59,360 –> 01:08:01,800
They recovered 100,000 in quarterly waste.
1746
01:08:01,800 –> 01:08:05,680
But they were recovering it from a base that had already increased by 300,000.
1747
01:08:05,680 –> 01:08:06,680
They optimized too late.
1748
01:08:06,680 –> 01:08:11,200
They’re now paying 200,000 more annually than if they had acted before the increase.
1749
01:08:11,200 –> 01:08:12,680
The second pressure is regulatory.
1750
01:08:12,680 –> 01:08:14,840
The compliance landscape is tightening, not loosening.
1751
01:08:14,840 –> 01:08:16,960
CMMC 2.0 enforcement is not optional.
1752
01:08:16,960 –> 01:08:18,600
It’s not something to handle eventually.
1753
01:08:18,600 –> 01:08:19,600
It’s here.
1754
01:08:19,600 –> 01:08:22,800
And if you’re a defense contractor and you’re not already in GCC high, you’re operating
1755
01:08:22,800 –> 01:08:23,800
on borrowed time.
1756
01:08:23,800 –> 01:08:25,320
The customer will enforce it.
1757
01:08:25,320 –> 01:08:26,720
Your contract depends on it.
1758
01:08:26,720 –> 01:08:28,760
Waiting until you lose the contract is expensive.
1759
01:08:28,760 –> 01:08:32,400
Beyond CMMC, state level AI regulation is accelerating.
1760
01:08:32,400 –> 01:08:36,800
38 US states enacted roughly 100 AI measures in 2025.
1761
01:08:36,800 –> 01:08:39,480
The number is growing and regulations require governance.
1762
01:08:39,480 –> 01:08:41,680
Real governance, not policies written in English.
1763
01:08:41,680 –> 01:08:44,600
Automated enforcement, audit trails, human oversight.
1764
01:08:44,600 –> 01:08:46,320
These are not optional nice to have.
1765
01:08:46,320 –> 01:08:48,960
These are requirements and they’re expensive to retrofit.
1766
01:08:48,960 –> 01:08:50,960
The third pressure is threat velocity.
1767
01:08:50,960 –> 01:08:53,320
Tenant level attacks are becoming more sophisticated.
1768
01:08:53,320 –> 01:08:56,840
63% of M365 tenants face configuration tampering.
1769
01:08:56,840 –> 01:08:58,440
And here’s the architectural consequence.
1770
01:08:58,440 –> 01:09:01,560
Microsoft doesn’t natively back up tenant configurations.
1771
01:09:01,560 –> 01:09:04,560
You deploy a conditional access policy and attacker modifies it.
1772
01:09:04,560 –> 01:09:06,000
You have no recovery point.
1773
01:09:06,000 –> 01:09:07,000
No native rollback.
1774
01:09:07,000 –> 01:09:09,000
You’re reconstructing from logs if you’re lucky.
1775
01:09:09,000 –> 01:09:10,520
If you’re not, you’re rebuilding.
1776
01:09:10,520 –> 01:09:11,840
That’s not a theoretical risk.
1777
01:09:11,840 –> 01:09:15,920
That’s your architecture exposing you to extended downtime with no recovery path.
1778
01:09:15,920 –> 01:09:17,960
The fourth pressure is AI sprawl.
1779
01:09:17,960 –> 01:09:20,200
And this one’s moving faster than you can see it.
1780
01:09:20,200 –> 01:09:25,440
80% of Fortune 500 companies are using active AI agents, 80% and most of them have no formal
1781
01:09:25,440 –> 01:09:28,080
strategy for agent identity management.
1782
01:09:28,080 –> 01:09:29,680
No governance, no boundaries.
1783
01:09:29,680 –> 01:09:34,160
Agents are proliferating, consuming credits, accessing data, operating without oversight.
1784
01:09:34,160 –> 01:09:35,920
Co-pilot itself burns tokens fast.
1785
01:09:35,920 –> 01:09:37,440
The cost model isn’t linear.
1786
01:09:37,440 –> 01:09:39,280
Popular agents accelerate consumption.
1787
01:09:39,280 –> 01:09:43,240
And without capacity planning, without governance, without boundaries, your co-pilot budget becomes
1788
01:09:43,240 –> 01:09:44,240
unpredictable.
1789
01:09:44,240 –> 01:09:48,040
The tenant debt of unmanaged agents is real and it’s compounding faster than cleanup can
1790
01:09:48,040 –> 01:09:49,040
address it.
1791
01:09:49,040 –> 01:09:53,360
Your ties all for pressures together, the window for proactive architecture is closing.
1792
01:09:53,360 –> 01:09:57,920
Every month you delay recovery, your storing up compound problems, more orphaned applications
1793
01:09:57,920 –> 01:10:01,960
accumulate, more permissions drift, more inactive licenses get built, more technical debt
1794
01:10:01,960 –> 01:10:05,440
accrues and every month the cost of fixing it later increases.
1795
01:10:05,440 –> 01:10:08,360
Organizations that act now in the next 90 days have leveraged.
1796
01:10:08,360 –> 01:10:10,760
You can recover licenses before the price increase.
1797
01:10:10,760 –> 01:10:14,520
You can rationalize co-pilot costs before agent sprawl becomes unmanageable.
1798
01:10:14,520 –> 01:10:18,080
You can implement governance frameworks before regulatory audits expose gaps.
1799
01:10:18,080 –> 01:10:22,560
You can build a control plane while you still have the organizational bandwidth to do it.
1800
01:10:22,560 –> 01:10:24,400
Organizations that wait face a different arithmetic.
1801
01:10:24,400 –> 01:10:26,840
They’ll pay higher prices on misaligned licenses.
1802
01:10:26,840 –> 01:10:29,440
They’ll face compliance fines because governance wasn’t in place.
1803
01:10:29,440 –> 01:10:33,200
They’ll have security incidents from unmanaged agents and permissions sprawl.
1804
01:10:33,200 –> 01:10:35,800
And they’ll pay crisis premiums to fix all of it at once.
1805
01:10:35,800 –> 01:10:36,800
This is not doom.
1806
01:10:36,800 –> 01:10:38,280
This is inevitability.
1807
01:10:38,280 –> 01:10:40,080
This is what happens when debt compounds.
1808
01:10:40,080 –> 01:10:41,840
The question isn’t whether it will happen.
1809
01:10:41,840 –> 01:10:45,280
It’s whether you’ll address it proactively or reactively.
1810
01:10:45,280 –> 01:10:46,640
The final diagnosis.
1811
01:10:46,640 –> 01:10:47,680
Here’s what I know.
1812
01:10:47,680 –> 01:10:49,560
Your Microsoft tenant is leaking millions.
1813
01:10:49,560 –> 01:10:51,280
Your financing your own decay.
1814
01:10:51,280 –> 01:10:52,280
And you can stop it.
1815
01:10:52,280 –> 01:10:53,280
The problem is not Microsoft.
1816
01:10:53,280 –> 01:10:56,440
It is the absence of economic ownership in your architecture.
1817
01:10:56,440 –> 01:10:58,160
The solution is not more tools.
1818
01:10:58,160 –> 01:10:59,160
It is a control plane.
1819
01:10:59,160 –> 01:11:00,640
The timeline is not eventually.
1820
01:11:00,640 –> 01:11:01,640
It is now.
1821
01:11:01,640 –> 01:11:02,640
Remember this.
1822
01:11:02,640 –> 01:11:03,640
This is not about tools.
1823
01:11:03,640 –> 01:11:04,640
This is about economic ownership.
1824
01:11:04,640 –> 01:11:05,640
Ordered your tenant.
1825
01:11:05,640 –> 01:11:06,640
Established governance ownership.
1826
01:11:06,640 –> 01:11:07,640
Measure economic outcomes.
1827
01:11:07,640 –> 01:11:09,320
Do it in the next 90 days.
1828
01:11:09,320 –> 01:11:10,360
Your margins depend on it.