Microsoft Consultant Blueprint

Mirko PetersPodcasts1 hour ago32 Views


1
00:00:00,000 –> 00:00:02,080
Most Microsoft consultants are commoditized,

2
00:00:02,080 –> 00:00:03,400
not because they lack skill,

3
00:00:03,400 –> 00:00:05,640
because they sell the wrong thing, they sell execution,

4
00:00:05,640 –> 00:00:07,880
they sell hours, they sell apps and automations

5
00:00:07,880 –> 00:00:10,760
and migrations, they compete on delivery speed and cost,

6
00:00:10,760 –> 00:00:12,480
and they lose every single time

7
00:00:12,480 –> 00:00:15,200
to the consultant who understands what companies actually need.

8
00:00:15,200 –> 00:00:17,960
The highest paid Microsoft consultants in 2026

9
00:00:17,960 –> 00:00:20,600
don’t build anything, they architect control systems,

10
00:00:20,600 –> 00:00:23,920
they engineer governance, they reduce architectural entropy,

11
00:00:23,920 –> 00:00:26,240
and they charge 250’s an hour, not 60,

12
00:00:26,240 –> 00:00:28,200
because they’re not competing on technical skill,

13
00:00:28,200 –> 00:00:29,840
they’re competing on risk mitigation,

14
00:00:29,840 –> 00:00:32,640
and here’s the gap, feature work pays $60 an hour,

15
00:00:32,640 –> 00:00:35,320
entropy mitigation pays $250 an hour,

16
00:00:35,320 –> 00:00:38,320
a power app costs 50K and takes three months,

17
00:00:38,320 –> 00:00:41,840
a governance remediation costs 150K and takes 12 weeks,

18
00:00:41,840 –> 00:00:43,520
and it prevents a $2 million breach,

19
00:00:43,520 –> 00:00:45,640
one is a project, the other is necessity.

20
00:00:45,640 –> 00:00:47,360
By the end of this, you’ll have a framework

21
00:00:47,360 –> 00:00:50,440
for repositioning what you sell, how you price it,

22
00:00:50,440 –> 00:00:52,880
and how you acquire clients who will pay for governance

23
00:00:52,880 –> 00:00:53,800
instead of builds.

24
00:00:53,800 –> 00:00:55,200
This isn’t about certifications,

25
00:00:55,200 –> 00:00:58,320
it’s about understanding that companies don’t have app problems,

26
00:00:58,320 –> 00:01:01,880
they have architectural decay, the architectural entropy problem.

27
00:01:01,880 –> 00:01:03,880
Most consultants miss the real problem

28
00:01:03,880 –> 00:01:05,800
because they’re looking at the wrong layer.

29
00:01:05,800 –> 00:01:07,760
Architectural entropy is the proliferation

30
00:01:07,760 –> 00:01:09,840
of possible system states, configurations,

31
00:01:09,840 –> 00:01:12,200
and dependencies that make behavior unpredictable.

32
00:01:12,200 –> 00:01:14,400
It’s not a feature problem, it’s a structural problem,

33
00:01:14,400 –> 00:01:16,760
and it compounds silently until it costs millions,

34
00:01:16,760 –> 00:01:18,840
it manifests across four dimensions.

35
00:01:18,840 –> 00:01:23,320
State entropy, data inconsistencies, dual rights,

36
00:01:23,320 –> 00:01:27,320
permanent temporary copies that nobody can remove.

37
00:01:27,320 –> 00:01:30,520
Configuration entropy, feature flags, settings,

38
00:01:30,520 –> 00:01:32,000
policies that drift over time

39
00:01:32,000 –> 00:01:34,920
until nobody remembers why they exist.

40
00:01:34,920 –> 00:01:38,920
Interaction entropy, service cascades, retry storms,

41
00:01:38,920 –> 00:01:42,520
dependencies that multiply faster than anyone can track.

42
00:01:42,520 –> 00:01:45,280
Organizational entropy, unclear ownership,

43
00:01:45,280 –> 00:01:48,680
distributed decision making, teams operating in silos.

44
00:01:48,680 –> 00:01:50,600
Companies don’t know they have an entropy problem

45
00:01:50,600 –> 00:01:53,160
until it costs them, a breach that takes six months

46
00:01:53,160 –> 00:01:55,840
to detect because identity governance never existed

47
00:01:55,840 –> 00:01:59,280
and audit failure because access reviews were never automated.

48
00:01:59,280 –> 00:02:02,200
A failed migration that takes 18 months instead of six

49
00:02:02,200 –> 00:02:04,560
because the architecture was never designed for cloud.

50
00:02:04,560 –> 00:02:07,480
A compliance incident because data loss prevention policies

51
00:02:07,480 –> 00:02:08,560
were never enforced.

52
00:02:08,560 –> 00:02:10,800
By then the debt is structural, it’s not fixable

53
00:02:10,800 –> 00:02:12,520
with another app or another automation.

54
00:02:12,520 –> 00:02:13,520
This is where you come in,

55
00:02:13,520 –> 00:02:16,000
but only if you’re positioned as the architect of control,

56
00:02:16,000 –> 00:02:17,640
not the builder of features.

57
00:02:17,640 –> 00:02:20,280
The consultant who sees entropy wins the contract.

58
00:02:20,280 –> 00:02:23,720
The one who sees we need a power app loses to the lowest bidder.

59
00:02:23,720 –> 00:02:25,120
That’s the fundamental distinction.

60
00:02:25,120 –> 00:02:27,200
One consultant diagnoses the disease,

61
00:02:27,200 –> 00:02:28,600
the other treats the symptom.

62
00:02:28,600 –> 00:02:30,920
Most organizations are operating in reactive mode.

63
00:02:30,920 –> 00:02:32,200
They solve yesterday’s problems

64
00:02:32,200 –> 00:02:34,000
while entropy accumulates in the background

65
00:02:34,000 –> 00:02:35,840
by the time leadership notices.

66
00:02:35,840 –> 00:02:38,440
Through an audit failure, a breach, a failed migration,

67
00:02:38,440 –> 00:02:39,920
the problem is no longer technical.

68
00:02:39,920 –> 00:02:42,920
It’s architectural, the system has too many possible states,

69
00:02:42,920 –> 00:02:46,000
too many configuration parts, too many undocumented dependencies,

70
00:02:46,000 –> 00:02:47,800
too many teams making independent decisions

71
00:02:47,800 –> 00:02:49,080
without shared governance.

72
00:02:49,080 –> 00:02:50,680
And here’s what matters, they know this,

73
00:02:50,680 –> 00:02:53,480
CISOs know it, CFOs know it, Chief Risk Officers know it,

74
00:02:53,480 –> 00:02:55,560
but most IT teams don’t know how to articulate it.

75
00:02:55,560 –> 00:02:56,840
They don’t have a language for it.

76
00:02:56,840 –> 00:02:58,640
They don’t have a framework for measuring it.

77
00:02:58,640 –> 00:03:00,160
They don’t have a path to fixing it.

78
00:03:00,160 –> 00:03:02,160
That’s your opening, that’s your positioning.

79
00:03:02,160 –> 00:03:04,800
You become the person who sees the entropy, quantifies it,

80
00:03:04,800 –> 00:03:07,280
and builds a remediation roadmap that actually works.

81
00:03:07,280 –> 00:03:08,720
The consultant who treats identities,

82
00:03:08,720 –> 00:03:10,400
sprawl, power platform chaos,

83
00:03:10,400 –> 00:03:13,640
and a Zua cost entropy as separate problems loses every time.

84
00:03:13,640 –> 00:03:16,280
The consultant who treats them as symptoms of one problem,

85
00:03:16,280 –> 00:03:19,480
architectural entropy across the entire Microsoft control plane

86
00:03:19,480 –> 00:03:20,480
becomes indispensable.

87
00:03:20,480 –> 00:03:24,920
This is the shift from I build apps to I architect control systems.

88
00:03:24,920 –> 00:03:28,040
It’s the difference between 80K annually and 100K plus,

89
00:03:28,040 –> 00:03:30,400
why companies are drowning in architectural debt.

90
00:03:30,400 –> 00:03:33,200
Understanding why organizations end up in this position

91
00:03:33,200 –> 00:03:35,720
requires looking at how they actually adopted cloud

92
00:03:35,720 –> 00:03:37,040
and Microsoft technologies.

93
00:03:37,040 –> 00:03:39,640
It wasn’t strategic, it was reactive.

94
00:03:39,640 –> 00:03:42,080
Organizations adopted cloud, Microsoft 365,

95
00:03:42,080 –> 00:03:45,200
Azure Power Platform, without establishing control planes first.

96
00:03:45,200 –> 00:03:46,560
They didn’t build identity governance

97
00:03:46,560 –> 00:03:47,920
before rolling out EntraID.

98
00:03:47,920 –> 00:03:49,800
They didn’t implement data loss prevention

99
00:03:49,800 –> 00:03:51,280
before enabling Power Platform.

100
00:03:51,280 –> 00:03:52,920
They didn’t establish subscription governance

101
00:03:52,920 –> 00:03:54,800
before spinning up Azure resources.

102
00:03:54,800 –> 00:03:56,560
They just started using the tools.

103
00:03:56,560 –> 00:03:58,440
Each new tool added complexity,

104
00:03:58,440 –> 00:04:00,880
without simplifying the underlying architecture.

105
00:04:00,880 –> 00:04:04,240
Co-pilot arrived, and suddenly there is AI interacting

106
00:04:04,240 –> 00:04:06,400
with sensitive data without governance.

107
00:04:06,400 –> 00:04:08,800
Agents launched and nobody knows which autonomous systems

108
00:04:08,800 –> 00:04:10,360
have access to which resources.

109
00:04:10,360 –> 00:04:11,920
Fabric launched and the data estate

110
00:04:11,920 –> 00:04:13,360
became even more fragmented.

111
00:04:13,360 –> 00:04:16,200
Every innovation added another layer of possible states

112
00:04:16,200 –> 00:04:18,200
without reducing the layers below it.

113
00:04:18,200 –> 00:04:19,400
Teams operate in silos.

114
00:04:19,400 –> 00:04:21,120
IT doesn’t know what Power Platform is building.

115
00:04:21,120 –> 00:04:23,600
Security doesn’t see the EntraID drift accumulating

116
00:04:23,600 –> 00:04:24,520
in the background.

117
00:04:24,520 –> 00:04:26,640
Finance doesn’t understand the Azure sprawl.

118
00:04:26,640 –> 00:04:28,960
Nobody owns the problem because everybody assumes

119
00:04:28,960 –> 00:04:30,480
someone else is managing it.

120
00:04:30,480 –> 00:04:31,960
The result is predictable.

121
00:04:31,960 –> 00:04:33,600
I’ve seen it hundreds of times.

122
00:04:33,600 –> 00:04:36,840
A financial services organization with fund 200 direct

123
00:04:36,840 –> 00:04:40,320
role assignments when best practice is 50 to 100.

124
00:04:40,320 –> 00:04:43,560
23 global administrators when the number should be three to five.

125
00:04:43,560 –> 00:04:45,080
No privileged identity management,

126
00:04:45,080 –> 00:04:47,960
no access reviews, no life cycle automation,

127
00:04:47,960 –> 00:04:49,960
service principles with permanent credentials

128
00:04:49,960 –> 00:04:51,560
and no rotation schedule.

129
00:04:51,560 –> 00:04:54,880
847 of them discovered in a single audit.

130
00:04:54,880 –> 00:04:57,560
A manufacturing company with 430 unmanaged power

131
00:04:57,560 –> 00:05:00,280
automate flows, 87 unmanaged canvas apps,

132
00:05:00,280 –> 00:05:03,320
zero data loss prevention policies, no environment tiering,

133
00:05:03,320 –> 00:05:06,280
citizen developers creating flows that export production data

134
00:05:06,280 –> 00:05:08,440
to personal one-drive accounts without approval.

135
00:05:08,440 –> 00:05:11,320
Nobody knows it’s happening until the data is accidentally

136
00:05:11,320 –> 00:05:12,680
shared externally.

137
00:05:12,680 –> 00:05:16,000
An enterprise with Azure subscriptions organized by department

138
00:05:16,000 –> 00:05:19,000
instead of governance model, inconsistent tagging.

139
00:05:19,000 –> 00:05:21,840
Reserved instances that don’t match actual usage.

140
00:05:21,840 –> 00:05:24,680
Multi-region deployments without clear failover strategy.

141
00:05:24,680 –> 00:05:27,960
Cost entropy building silently until the bill arrives

142
00:05:27,960 –> 00:05:29,800
and nobody can explain where the money went.

143
00:05:29,800 –> 00:05:30,880
These aren’t edge cases.

144
00:05:30,880 –> 00:05:31,720
These are the norm.

145
00:05:31,720 –> 00:05:34,120
Most organizations have exceeded their entropy budget

146
00:05:34,120 –> 00:05:36,600
in at least one control plane, often all three.

147
00:05:36,600 –> 00:05:38,880
Most consultants treat these as separate problems,

148
00:05:38,880 –> 00:05:41,880
hire a security consultant to fix identity,

149
00:05:41,880 –> 00:05:44,400
hire an automation consultant to fix power platform,

150
00:05:44,400 –> 00:05:46,360
hire a cloud architect to fix Azure.

151
00:05:46,360 –> 00:05:48,120
Each consultant solves their piece.

152
00:05:48,120 –> 00:05:49,760
The organization still has entropy

153
00:05:49,760 –> 00:05:51,320
because the underlying problem,

154
00:05:51,320 –> 00:05:53,560
unclear ownership, no life cycle automation,

155
00:05:53,560 –> 00:05:56,800
no policy-driven access decisions, never gets addressed.

156
00:05:56,800 –> 00:05:58,760
The consultant who sees the pattern wins.

157
00:05:58,760 –> 00:06:00,360
The one who understands that enter ID

158
00:06:00,360 –> 00:06:02,200
isn’t just an identity provider,

159
00:06:02,200 –> 00:06:04,880
but a distributed decision engine making thousands

160
00:06:04,880 –> 00:06:07,000
of real-time authorization decisions.

161
00:06:07,000 –> 00:06:09,200
The one who understands that every accept clause

162
00:06:09,200 –> 00:06:10,600
in a conditional access policy

163
00:06:10,600 –> 00:06:12,640
converts a deterministic security model

164
00:06:12,640 –> 00:06:14,000
into a probabilistic one.

165
00:06:14,000 –> 00:06:16,040
The one who understands that power platform

166
00:06:16,040 –> 00:06:18,480
without governance creates collaboration entropy

167
00:06:18,480 –> 00:06:21,520
that compounds faster than IT can remediate it,

168
00:06:21,520 –> 00:06:23,720
that consultant becomes the architect of necessity,

169
00:06:23,720 –> 00:06:24,960
not because they’re smarter,

170
00:06:24,960 –> 00:06:26,600
because they’re positioned differently.

171
00:06:26,600 –> 00:06:28,520
They’re not competing on implementation speed.

172
00:06:28,520 –> 00:06:30,640
They’re competing on the ability to reduce risk,

173
00:06:30,640 –> 00:06:33,480
enforce compliance and prevent the architectural decay

174
00:06:33,480 –> 00:06:34,520
that costs millions.

175
00:06:34,520 –> 00:06:36,480
This is the repositioning that separates

176
00:06:36,480 –> 00:06:39,560
80K consultants from 100K plus consultants.

177
00:06:39,560 –> 00:06:42,040
One builds features, the other architects control,

178
00:06:42,040 –> 00:06:44,400
one competes on hours, the other competes on outcomes,

179
00:06:44,400 –> 00:06:47,520
one loses to price, the other doesn’t compete on price at all.

180
00:06:47,520 –> 00:06:49,840
The control plane model, to sell governance,

181
00:06:49,840 –> 00:06:52,600
you need to frame it in terms that executives understand.

182
00:06:52,600 –> 00:06:55,360
And that means understanding what a control plane actually is,

183
00:06:55,360 –> 00:06:57,720
and what it means when you exceed its entropy budget.

184
00:06:57,720 –> 00:07:00,280
A control plane is the set of systems, policies,

185
00:07:00,280 –> 00:07:02,360
and processes that enforce intent at scale.

186
00:07:02,360 –> 00:07:03,920
It’s not a feature, it’s the mechanism

187
00:07:03,920 –> 00:07:06,000
that makes behavior predictable and auditable.

188
00:07:06,000 –> 00:07:09,200
Microsoft has three primary control planes in 2026.

189
00:07:09,200 –> 00:07:15,360
Identity, EntryD, Productivity, Microsoft 365, Infrastructure, Azure.

190
00:07:15,360 –> 00:07:16,760
Each one has an entropy budget.

191
00:07:16,760 –> 00:07:19,880
The amount of complexity it can absorb before governance fails.

192
00:07:19,880 –> 00:07:22,520
Most organizations have exceeded their entropy budget

193
00:07:22,520 –> 00:07:23,840
in at least one plane.

194
00:07:23,840 –> 00:07:26,200
Often all three, start with identity.

195
00:07:26,200 –> 00:07:29,600
EntryD is not just an identity provider, that’s the marketing term.

196
00:07:29,600 –> 00:07:31,920
Architecturally, it’s a distributed decision engine

197
00:07:31,920 –> 00:07:35,320
making thousands of real-time authorization decisions every second.

198
00:07:35,320 –> 00:07:38,600
Every time a user signs in, every time a service requests access,

199
00:07:38,600 –> 00:07:40,880
every time an agent tries to use a resource,

200
00:07:40,880 –> 00:07:43,400
entry is making a decision, allow or deny.

201
00:07:43,400 –> 00:07:46,120
Based on what policy, here’s where entropy enters.

202
00:07:46,120 –> 00:07:49,120
Every accept clause added to a conditional access policy

203
00:07:49,120 –> 00:07:52,680
converts a deterministic security model into a probabilistic one,

204
00:07:52,680 –> 00:07:55,440
your delegating decisions you never revisited.

205
00:07:55,440 –> 00:07:58,600
A policy says require MFA for all users except,

206
00:07:58,600 –> 00:08:01,800
and then six months later nobody remembers why that exception exists.

207
00:08:01,800 –> 00:08:03,880
It’s still there, it’s still creating risk,

208
00:08:03,880 –> 00:08:06,080
and it’s still making the system less predictable.

209
00:08:06,080 –> 00:08:09,480
By the time you map the identity control plane in a typical enterprise,

210
00:08:09,480 –> 00:08:12,880
you find one 200 direct role assignments that should be 50.

211
00:08:12,880 –> 00:08:15,560
You find 23 global administrators that should be three.

212
00:08:15,560 –> 00:08:19,360
You find service principles with permanent credentials that should be time-bound.

213
00:08:19,360 –> 00:08:21,640
You find access reviews that were never automated.

214
00:08:21,640 –> 00:08:24,240
You find life cycle automation that was never implemented.

215
00:08:24,240 –> 00:08:26,240
The control plane has collapsed into chaos.

216
00:08:26,240 –> 00:08:27,480
Move to productivity.

217
00:08:27,480 –> 00:08:30,160
Microsoft 365 creates collaboration entropy.

218
00:08:30,160 –> 00:08:32,200
Unmanage teams with sensitive data.

219
00:08:32,200 –> 00:08:33,760
Shadow data stores in SharePoint.

220
00:08:33,760 –> 00:08:37,040
Uncontrolled co-pilot interactions with proprietary information.

221
00:08:37,040 –> 00:08:39,360
A citizen developer creates a flow in power automate

222
00:08:39,360 –> 00:08:42,360
that exports production data to a personal cloud storage account.

223
00:08:42,360 –> 00:08:44,320
Nobody approved it, nobody knows it exists,

224
00:08:44,320 –> 00:08:46,360
until it becomes a compliance incident.

225
00:08:46,360 –> 00:08:50,240
The productivity control plane is supposed to enforce what data can flow where,

226
00:08:50,240 –> 00:08:53,360
who can access what and what happens when policies are violated.

227
00:08:53,360 –> 00:08:55,840
But most organizations never built that control plane.

228
00:08:55,840 –> 00:08:57,240
They just enabled the tools,

229
00:08:57,240 –> 00:09:01,400
and now they have 430 unmanaged flows with no data loss prevention policies.

230
00:09:01,400 –> 00:09:03,680
87 unmanaged apps with no governance model.

231
00:09:03,680 –> 00:09:06,800
Citizen developers empowered to build without guardrails.

232
00:09:06,800 –> 00:09:09,720
Then infrastructure, Azure is a sprawl generator.

233
00:09:09,720 –> 00:09:11,120
Subscriptions multiply.

234
00:09:11,120 –> 00:09:13,000
Resources are created without governance.

235
00:09:13,000 –> 00:09:14,680
Cost entropy builds silently.

236
00:09:14,680 –> 00:09:17,840
A team spins up a development environment and forgets to delete it.

237
00:09:17,840 –> 00:09:19,360
Six months later it’s still running.

238
00:09:19,360 –> 00:09:21,360
Nobody owns it, nobody monitors it.

239
00:09:21,360 –> 00:09:24,200
The bill arrives and nobody can explain where the money went.

240
00:09:24,200 –> 00:09:28,600
The infrastructure control plane is supposed to enforce consistent governance across all resources.

241
00:09:28,600 –> 00:09:32,920
Consistent tagging, consistent access controls, consistent cost management.

242
00:09:32,920 –> 00:09:35,880
But most organizations never established that baseline.

243
00:09:35,880 –> 00:09:37,520
They just started using Azure.

244
00:09:37,520 –> 00:09:41,520
And now they have subscriptions organized by department instead of governance model.

245
00:09:41,520 –> 00:09:44,480
Reserved instances that don’t match actual usage.

246
00:09:44,480 –> 00:09:46,960
Multi-region deployments without clear failover strategy.

247
00:09:46,960 –> 00:09:47,800
Here’s what matters.

248
00:09:47,800 –> 00:09:51,480
The consultant who understands these three planes as interconnected systems.

249
00:09:51,480 –> 00:09:54,040
Not separate tools becomes the architect of necessity.

250
00:09:54,040 –> 00:09:55,640
This is not about individual features.

251
00:09:55,640 –> 00:09:58,400
It’s about how intent is enforced across the entire system.

252
00:09:58,400 –> 00:10:02,120
How decisions are made, how policies are applied, how behavior is audited.

253
00:10:02,120 –> 00:10:06,400
When you frame it this way, you’re no longer competing on hourly rate or implementation speed.

254
00:10:06,400 –> 00:10:11,880
You’re competing on the ability to reduce risk, enforce compliance and prevent the architectural decay that costs millions.

255
00:10:11,880 –> 00:10:17,080
You’re competing on necessity, a breach costs two millions, an audit failure costs 500K in fines.

256
00:10:17,080 –> 00:10:19,440
A failed migration costs one million in rework.

257
00:10:19,440 –> 00:10:22,880
A governance remediation costs 150K and prevents all three.

258
00:10:22,880 –> 00:10:23,840
One is a project.

259
00:10:23,840 –> 00:10:24,920
The other is insurance.

260
00:10:24,920 –> 00:10:27,080
This is the positioning that commands premium pricing.

261
00:10:27,080 –> 00:10:30,120
Not because you’re smarter, because you’re solving a different problem.

262
00:10:30,120 –> 00:10:32,760
You’re not building features, you’re architecting control.

263
00:10:32,760 –> 00:10:37,480
And control is what keeps systems predictable, compliant and secure at scale.

264
00:10:37,480 –> 00:10:39,360
The three-plane assessment framework.

265
00:10:39,360 –> 00:10:43,480
To position yourself as an architect, you need a diagnostic lens that reveals entropy.

266
00:10:43,480 –> 00:10:44,920
Most consultants don’t have one.

267
00:10:44,920 –> 00:10:47,920
They walk into an organization and ask, what do you need built?

268
00:10:47,920 –> 00:10:52,240
The right question is, how much entropy are you carrying and where is it creating the most risk?

269
00:10:52,240 –> 00:10:56,680
The three-plane assessment is how you uncover the hidden problems that executives don’t yet see.

270
00:10:56,680 –> 00:10:57,880
It’s your diagnostic tool.

271
00:10:57,880 –> 00:11:02,280
It’s also your first engagement and it’s paid work, not a free discovery call.

272
00:11:02,280 –> 00:11:03,520
Start with the identity plane.

273
00:11:03,520 –> 00:11:04,880
Map all identity types.

274
00:11:04,880 –> 00:11:05,960
Human identities.

275
00:11:05,960 –> 00:11:07,240
Service identities.

276
00:11:07,240 –> 00:11:08,360
Agent identities.

277
00:11:08,360 –> 00:11:09,480
Guest identities.

278
00:11:09,480 –> 00:11:10,880
Measure role assignment drift.

279
00:11:10,880 –> 00:11:16,720
Count how many direct role assignments exist versus how many should exist based on the organization’s size and structure.

280
00:11:16,720 –> 00:11:18,440
Quantify privileged account creep.

281
00:11:18,440 –> 00:11:19,800
How many global administrators?

282
00:11:19,800 –> 00:11:22,200
How many service accounts with permanent credentials?

283
00:11:22,200 –> 00:11:27,600
Assess conditional access coverage. What percentage of sign-in events are evaluated by conditional access policies?

284
00:11:27,600 –> 00:11:29,600
What percentage bypass them entirely?

285
00:11:29,600 –> 00:11:31,720
When you run this assessment, you’ll find patterns.

286
00:11:31,720 –> 00:11:36,480
Most organizations will have 40% or more of identities with excessive permissions.

287
00:11:36,480 –> 00:11:40,160
60% or more of privileged accounts with no just-in-time controls.

288
00:11:40,160 –> 00:11:44,680
80% or more of conditional access policies with accept clauses that undermine security.

289
00:11:44,680 –> 00:11:48,120
These numbers are directional, but they’re consistent across industries.

290
00:11:48,120 –> 00:11:51,880
Move to the productivity plane, inventory, all collaboration tools.

291
00:11:51,880 –> 00:11:57,160
Teams, SharePoint, OneDrive, Power Platform, Measure Shadow IT, how many apps existed aren’t governed?

292
00:11:57,160 –> 00:11:59,080
How many flows? How many canvas apps?

293
00:11:59,080 –> 00:12:00,760
Assess data loss prevention coverage.

294
00:12:00,760 –> 00:12:03,600
What percentage of data flows are protected by DLP policies?

295
00:12:03,600 –> 00:12:04,880
What percentage move freely?

296
00:12:04,880 –> 00:12:06,880
They evaluate co-pilot governance maturity.

297
00:12:06,880 –> 00:12:11,280
Other policies controlling which data co-pilot can access or is co-pilot accessing everything.

298
00:12:11,280 –> 00:12:13,800
Standard findings. 300 ungoverned flows.

299
00:12:13,800 –> 00:12:16,360
50 unmanaged teams with sensitive data.

300
00:12:16,360 –> 00:12:19,760
Zero visibility into co-pilot interactions with proprietary information.

301
00:12:19,760 –> 00:12:24,560
A citizen developer created a flow last month that exports customer data to a personal cloud storage account.

302
00:12:24,560 –> 00:12:27,040
Nobody approved it. Nobody knows it exists.

303
00:12:27,040 –> 00:12:30,240
Until it becomes a compliance incident, then the infrastructure plane.

304
00:12:30,240 –> 00:12:31,840
Map subscription structure.

305
00:12:31,840 –> 00:12:35,360
Our subscriptions organized by business unit or by governance model,

306
00:12:35,360 –> 00:12:36,680
measure governance consistency.

307
00:12:36,680 –> 00:12:40,040
Do all subscriptions have consistent tagging, consistent access controls,

308
00:12:40,040 –> 00:12:43,840
consistent cost management policies, evaluate cost optimization maturity?

309
00:12:43,840 –> 00:12:47,160
Our reserved instances being used are they matching actual consumption,

310
00:12:47,160 –> 00:12:51,440
assessed disaster recovery readiness can the organization actually recover from a regional failure,

311
00:12:51,440 –> 00:12:52,520
or is it theoretical?

312
00:12:52,520 –> 00:12:53,400
Standard findings.

313
00:12:53,400 –> 00:12:56,160
Subscriptions organized by department, not governance,

314
00:12:56,160 –> 00:12:58,520
inconsistent tagging across environments.

315
00:12:58,520 –> 00:13:01,280
Reserved instances that don’t match actual usage.

316
00:13:01,280 –> 00:13:04,240
Multi-region deployments without clear failover strategy.

317
00:13:04,240 –> 00:13:07,680
A development environment was spun up six months ago and never deleted.

318
00:13:07,680 –> 00:13:11,600
It’s still running. It’s still costing money. Nobody owns it.

319
00:13:11,600 –> 00:13:13,120
Here’s the critical part.

320
00:13:13,120 –> 00:13:15,440
The assessment itself becomes your first engagement.

321
00:13:15,440 –> 00:13:17,880
Not a free discovery call, not a two hour workshop.

322
00:13:17,880 –> 00:13:21,920
A paid diagnostic that costs 8K to 15K and takes two to three weeks.

323
00:13:21,920 –> 00:13:25,400
It delivers a 20 page risk report that shows exactly where the entropy is

324
00:13:25,400 –> 00:13:27,240
and what it’s costing the organization.

325
00:13:27,240 –> 00:13:30,960
This report becomes your sales document for the remediation engagement.

326
00:13:30,960 –> 00:13:32,880
It becomes the justification for the investment.

327
00:13:32,880 –> 00:13:36,120
It becomes the baseline that makes your remediation work measurable.

328
00:13:36,120 –> 00:13:37,880
You can show before and after metrics.

329
00:13:37,880 –> 00:13:40,280
Roll assignments reduced by 85%.

330
00:13:40,280 –> 00:13:43,240
Privileged accounts brought under just in time control.

331
00:13:43,240 –> 00:13:44,680
Compliance gaps closed.

332
00:13:44,680 –> 00:13:46,240
Audit findings eliminated.

333
00:13:46,240 –> 00:13:49,680
The assessment positions you as the expert who sees what others miss.

334
00:13:49,680 –> 00:13:51,560
It establishes credibility.

335
00:13:51,560 –> 00:13:54,320
It demonstrates that you understand their specific situation,

336
00:13:54,320 –> 00:13:56,160
not generic best practices.

337
00:13:56,160 –> 00:13:59,040
And it creates a clear path to the remediation engagement,

338
00:13:59,040 –> 00:14:02,080
which is where the real value lives and where the real money is made.

339
00:14:02,080 –> 00:14:03,880
Most consultants give away discovery.

340
00:14:03,880 –> 00:14:05,320
They compete on the free call.

341
00:14:05,320 –> 00:14:07,560
They hope to convert it to a project.

342
00:14:07,560 –> 00:14:10,920
The 100K consultant charges for discovery because discovery is work.

343
00:14:10,920 –> 00:14:12,200
It’s valuable work.

344
00:14:12,200 –> 00:14:16,400
It’s the work that justifies everything that comes after the client scenario A,

345
00:14:16,400 –> 00:14:18,040
identity entropy collapse.

346
00:14:18,040 –> 00:14:21,360
Let’s ground this in a real scenario that shows how entropy compounds

347
00:14:21,360 –> 00:14:23,200
and how it becomes your entry point.

348
00:14:23,200 –> 00:14:27,440
A global financial services firm with 8,000 employees across 15 regions

349
00:14:27,440 –> 00:14:29,040
had grown through acquisition.

350
00:14:29,040 –> 00:14:32,080
Each acquisition brought its own active directory forest.

351
00:14:32,080 –> 00:14:35,400
Its own intratenant configuration, its own identity governance model.

352
00:14:35,400 –> 00:14:39,240
By 2025, the organization had consolidated into a single tenant.

353
00:14:39,240 –> 00:14:41,320
But the entropy never got cleaned up.

354
00:14:41,320 –> 00:14:45,600
What they actually had, 1,200 direct role assignments when best practices 50 to 100.

355
00:14:45,600 –> 00:14:49,120
23 global administrators when the number should be 3 to 5.

356
00:14:49,120 –> 00:14:50,840
No privileged identity management.

357
00:14:50,840 –> 00:14:51,840
No access reviews.

358
00:14:51,840 –> 00:14:53,120
No life cycle automation.

359
00:14:53,120 –> 00:14:57,120
Security audit flagged 847 service principles with permanent credentials

360
00:14:57,120 –> 00:14:58,520
and no rotation schedule.

361
00:14:58,520 –> 00:15:00,440
Nobody knew those service principles existed.

362
00:15:00,440 –> 00:15:02,080
Nobody knew what they had access to.

363
00:15:02,080 –> 00:15:04,160
Nobody knew when they were created or why.

364
00:15:04,160 –> 00:15:05,040
Then the breach happened.

365
00:15:05,040 –> 00:15:08,960
A compromised service account from an acquired company had access to core financial systems.

366
00:15:08,960 –> 00:15:11,320
The attacker used it for 6 months before detection.

367
00:15:11,320 –> 00:15:14,800
By the time the organization realized what happened, the damage was substantial.

368
00:15:14,800 –> 00:15:18,480
2.3 million dollars in forensics, remediation and regulatory fines.

369
00:15:18,480 –> 00:15:19,960
The breach made the board meeting.

370
00:15:19,960 –> 00:15:21,680
The CEO had to notify regulators.

371
00:15:21,680 –> 00:15:25,480
The organization faced customer notification costs and reputational damage.

372
00:15:25,480 –> 00:15:26,400
But here’s what matters.

373
00:15:26,400 –> 00:15:27,760
The breach wasn’t the root cause.

374
00:15:27,760 –> 00:15:29,160
The breach was the symptom.

375
00:15:29,160 –> 00:15:31,120
The root cause was architectural entropy.

376
00:15:31,120 –> 00:15:34,720
The organization had 1,200 identities with excessive permissions.

377
00:15:34,720 –> 00:15:37,720
847 service principles with permanent credentials.

378
00:15:37,720 –> 00:15:41,800
No automation to detect when a service account was being used inappropriately.

379
00:15:41,800 –> 00:15:44,560
No policies to revoke access when it wasn’t needed.

380
00:15:44,560 –> 00:15:48,280
No life cycle automation to retire service principles when projects ended.

381
00:15:48,280 –> 00:15:50,760
The organization realized the problem wasn’t the breach.

382
00:15:50,760 –> 00:15:53,440
It was the architectural decay that made the breach possible.

383
00:15:53,440 –> 00:15:57,640
They engaged a consultant, not you yet, to implement EntraID governance.

384
00:15:57,640 –> 00:16:01,000
That consultant built the features, access reviews, entitlement management,

385
00:16:01,000 –> 00:16:02,520
privilege identity management.

386
00:16:02,520 –> 00:16:04,440
The consultant implemented the tools.

387
00:16:04,440 –> 00:16:08,560
The organization still had entropy because the consultant didn’t address the underlying problem.

388
00:16:08,560 –> 00:16:09,600
Unclear ownership.

389
00:16:09,600 –> 00:16:10,760
No life cycle automation.

390
00:16:10,760 –> 00:16:12,800
No policy-driven access decisions.

391
00:16:12,800 –> 00:16:13,680
Enter you.

392
00:16:13,680 –> 00:16:17,280
You position this as an architectural entropy remediation engagement.

393
00:16:17,280 –> 00:16:18,640
You start with the assessment.

394
00:16:18,640 –> 00:16:20,320
Map all 1,200 roll assignments.

395
00:16:20,320 –> 00:16:22,400
Identify which are legitimate and which are drift.

396
00:16:22,400 –> 00:16:24,440
Establish a baseline risk score.

397
00:16:24,440 –> 00:16:28,560
Document the current state in the 20 page report that shows exactly where the entropy is.

398
00:16:28,560 –> 00:16:30,000
Then the remediation phase.

399
00:16:30,000 –> 00:16:31,640
Implement life cycle automation.

400
00:16:31,640 –> 00:16:35,040
So access is provisioned from HR systems, not ad hoc tickets.

401
00:16:35,040 –> 00:16:39,840
Establish roll-based access control with clear ownership so every roll has a business justification.

402
00:16:39,840 –> 00:16:42,440
Enable just in time access for privileged rolls.

403
00:16:42,440 –> 00:16:44,680
So standing admin access doesn’t exist.

404
00:16:44,680 –> 00:16:47,640
Automate access reviews with AI-driven recommendations.

405
00:16:47,640 –> 00:16:50,160
So reviews complete in two weeks instead of eight.

406
00:16:50,160 –> 00:16:53,520
After 12 weeks, roll assignments reduced to 180.

407
00:16:53,520 –> 00:16:55,160
That’s an 85% reduction.

408
00:16:55,160 –> 00:16:56,400
Global admins reduced to four.

409
00:16:56,400 –> 00:16:58,280
That’s an 82% reduction.

410
00:16:58,280 –> 00:17:01,200
100% of privileged access now time bound.

411
00:17:01,200 –> 00:17:04,840
Access reviews automated and completing in two weeks instead of eight.

412
00:17:04,840 –> 00:17:08,800
Audit result zero findings related to identity governance.

413
00:17:08,800 –> 00:17:12,520
This engagement costs 120,000 to 180,000 dollars.

414
00:17:12,520 –> 00:17:13,960
It takes 12 weeks.

415
00:17:13,960 –> 00:17:18,320
But the value is measured in risk reduction, audit compliance and incident prevention,

416
00:17:18,320 –> 00:17:19,960
not in the number of apps built.

417
00:17:19,960 –> 00:17:21,880
The organization avoided another breach.

418
00:17:21,880 –> 00:17:23,200
They passed their audit.

419
00:17:23,200 –> 00:17:24,880
They reduced their regulatory risk.

420
00:17:24,880 –> 00:17:28,240
This is the engagement model that generates 100k plus annually.

421
00:17:28,240 –> 00:17:32,120
This is what separates the commodity consultant from the architect of necessity.

422
00:17:32,120 –> 00:17:35,520
One consultant sees we need to implement EntraID governance.

423
00:17:35,520 –> 00:17:39,200
The other consultant sees you have architectural entropy that’s creating

424
00:17:39,200 –> 00:17:41,560
breach risk, audit risk and compliance risk.

425
00:17:41,560 –> 00:17:45,120
I can quantify it, remediate it and prevent the next incident.

426
00:17:45,120 –> 00:17:47,920
Same tools, different positioning, different pricing,

427
00:17:47,920 –> 00:17:51,440
different client acquisition strategy, client scenario B,

428
00:17:51,440 –> 00:17:53,960
power platform governance chaos.

429
00:17:53,960 –> 00:17:55,840
Identity is one plane.

430
00:17:55,840 –> 00:18:00,760
Productivity entropy is equally destructive and it’s where most organizations are completely blind.

431
00:18:00,760 –> 00:18:07,560
A mid-market manufacturing company with 2,000 employees adopted power platform to empower citizen developers.

432
00:18:07,560 –> 00:18:08,800
The narrative was compelling.

433
00:18:08,800 –> 00:18:11,720
Business users could build apps without IT bottlenecks.

434
00:18:11,720 –> 00:18:15,000
Operations could create automations without waiting for custom development.

435
00:18:15,000 –> 00:18:17,960
Finance could build dashboards without hiring data analysts.

436
00:18:17,960 –> 00:18:20,640
The organization enabled the platform and stepped back.

437
00:18:20,640 –> 00:18:24,160
By 2025, they had 430 unmanaged flows.

438
00:18:24,160 –> 00:18:28,760
87 unmanaged canvas apps, zero data loss prevention policies, no environment tearing,

439
00:18:28,760 –> 00:18:30,880
no solution management, no governance model.

440
00:18:30,880 –> 00:18:36,400
Citizen developers were creating flows that accessed sensitive manufacturing data without approval.

441
00:18:36,400 –> 00:18:37,600
Nobody knew what they were building.

442
00:18:37,600 –> 00:18:39,640
Nobody knew what data they were accessing.

443
00:18:39,640 –> 00:18:41,720
Nobody knew what could go wrong until it did.

444
00:18:41,720 –> 00:18:47,080
A citizen developer in operations created a flow that exported production schedules to a personal one drive,

445
00:18:47,080 –> 00:18:48,440
the flow ran every day.

446
00:18:48,440 –> 00:18:51,800
It exported the complete manufacturing schedule for the next quarter.

447
00:18:51,800 –> 00:18:56,720
When the data was accidentally shared externally, a misconfigured sharing setting, a forwarded email,

448
00:18:56,720 –> 00:19:01,720
a compromised account, the company faced compliance violations and customer notification costs.

449
00:19:01,720 –> 00:19:04,880
The breach exposed proprietary manufacturing data to competitors.

450
00:19:04,880 –> 00:19:06,800
The organization had to notify customers.

451
00:19:06,800 –> 00:19:08,200
They faced regulatory fines.

452
00:19:08,200 –> 00:19:09,400
The damage was substantial.

453
00:19:09,400 –> 00:19:11,120
But again, the breach wasn’t the root cause.

454
00:19:11,120 –> 00:19:13,280
The root cause was architectural entropy.

455
00:19:13,280 –> 00:19:17,240
The organization had empowered citizen development without establishing governance.

456
00:19:17,240 –> 00:19:19,520
430 flows with no approval process.

457
00:19:19,520 –> 00:19:21,440
87 apps with no data classification.

458
00:19:21,440 –> 00:19:24,120
No policies controlling what data could flow where.

459
00:19:24,120 –> 00:19:26,680
No visibility into what citizen developers were building.

460
00:19:26,680 –> 00:19:30,280
They hired a consultant to set up power platform governance.

461
00:19:30,280 –> 00:19:32,040
That consultant created environments.

462
00:19:32,040 –> 00:19:33,360
Set up DLP policies.

463
00:19:33,360 –> 00:19:36,000
Trained admins on the power platform admin center.

464
00:19:36,000 –> 00:19:40,480
The organization still had entropy because 200 flows were already built without governance.

465
00:19:40,480 –> 00:19:43,400
Citizen developers didn’t understand why their flows were being blocked.

466
00:19:43,400 –> 00:19:46,280
There was no clear policy for what was allowed and what wasn’t.

467
00:19:46,280 –> 00:19:48,360
No ownership model for existing apps.

468
00:19:48,360 –> 00:19:53,160
The governance was imposed from above, not integrated into the development process.

469
00:19:53,160 –> 00:19:53,920
Enter you.

470
00:19:53,920 –> 00:19:57,920
You position this as power platform entropy remediation and governance maturity.

471
00:19:57,920 –> 00:20:03,040
You start with the assessment, inventory all 430 flows, classify them by risk level, critical,

472
00:20:03,040 –> 00:20:07,720
high, medium, low, identify which ones violate data classification policies.

473
00:20:07,720 –> 00:20:09,040
Assess which ones should be retired.

474
00:20:09,040 –> 00:20:12,520
You discover 180 flows are duplicative or obsolete.

475
00:20:12,520 –> 00:20:16,080
120 flows access sensitive data without proper controls.

476
00:20:16,080 –> 00:20:17,440
80 flows are often.

477
00:20:17,440 –> 00:20:18,440
Nobody knows who owns them.

478
00:20:18,440 –> 00:20:19,440
They’re still running.

479
00:20:19,440 –> 00:20:20,440
They’re still accessing data.

480
00:20:20,440 –> 00:20:22,000
Nobody’s responsible for them.

481
00:20:22,000 –> 00:20:23,520
Then the remediation phase.

482
00:20:23,520 –> 00:20:25,480
Retire the obsolete flows.

483
00:20:25,480 –> 00:20:26,800
Establish environment tiering.

484
00:20:26,800 –> 00:20:29,360
So sandbox is for experimentation.

485
00:20:29,360 –> 00:20:30,360
Development is for building.

486
00:20:30,360 –> 00:20:32,000
Test is for validation.

487
00:20:32,000 –> 00:20:34,360
Production is for live workloads.

488
00:20:34,360 –> 00:20:38,480
Implement data loss prevention policies that allow citizen developers to build but prevent

489
00:20:38,480 –> 00:20:40,000
data exfiltration.

490
00:20:40,000 –> 00:20:43,440
Establish a governance model with clear ownership and approval workflows.

491
00:20:43,440 –> 00:20:44,560
Automate compliance monitoring.

492
00:20:44,560 –> 00:20:47,000
So violations are detected in real time.

493
00:20:47,000 –> 00:20:50,720
For 8 weeks, flow inventory reduced from 430 to 210.

494
00:20:50,720 –> 00:20:52,200
That’s a 51% reduction.

495
00:20:52,200 –> 00:20:54,800
All remaining flows classified and governed.

496
00:20:54,800 –> 00:20:58,200
Citizen developers trained and empowered to build safely.

497
00:20:58,200 –> 00:20:59,720
Compliance monitoring automated.

498
00:20:59,720 –> 00:21:00,720
Cost.

499
00:21:00,720 –> 00:21:03,640
60,000 to 90,000 dollars for the assessment and remediation.

500
00:21:03,640 –> 00:21:09,800
But this engagement often leads to a 6-12 month advisory retainer at 8,000 to 12,000 dollars

501
00:21:09,800 –> 00:21:13,880
per month to maintain governance as citizen development continues.

502
00:21:13,880 –> 00:21:15,840
That’s recurring revenue, not project revenue.

503
00:21:15,840 –> 00:21:21,840
The three years, the retainer is worth $360,000 versus the projects one time 60 to 90,000.

504
00:21:21,840 –> 00:21:26,080
This is where the real business model lives, not in one time remediation projects, in ongoing

505
00:21:26,080 –> 00:21:29,080
advisory relationships that scale without proportional effort.

506
00:21:29,080 –> 00:21:32,800
This is how you transition from hourly billing to retainer based recurring revenue.

507
00:21:32,800 –> 00:21:37,520
This is how you build a predictable scalable consulting business that generates 100K+ annually

508
00:21:37,520 –> 00:21:38,840
without burning out.

509
00:21:38,840 –> 00:21:43,520
The consultant who sees power platform as a tool to build apps, loses to the lowest bidder.

510
00:21:43,520 –> 00:21:47,480
The consultant who sees power platform as a governance problem that requires ongoing management

511
00:21:47,480 –> 00:21:49,000
becomes indispensable.

512
00:21:49,000 –> 00:21:53,440
Same platform, different positioning, different pricing, different business model, the pricing

513
00:21:53,440 –> 00:21:55,840
shift from projects to retainers.

514
00:21:55,840 –> 00:22:00,440
Once you understand how to position governance, the pricing model changes fundamentally.

515
00:22:00,440 –> 00:22:05,800
Most consultants price by the hour or by the project, $150,000 to $250,000 per hour or

516
00:22:05,800 –> 00:22:08,880
$50,000 to $150,000 per project.

517
00:22:08,880 –> 00:22:12,560
This model commoditizes you because clients can compare your rate to others.

518
00:22:12,560 –> 00:22:15,400
They can shop, they can negotiate, they can find someone cheaper.

519
00:22:15,400 –> 00:22:18,720
You’re competing on price because that’s the only dimension that matters when the deliverable

520
00:22:18,720 –> 00:22:19,880
is generic.

521
00:22:19,880 –> 00:22:25,840
The 100K+ consultant prices by value and risk mitigation, not by hours or deliverables.

522
00:22:25,840 –> 00:22:30,000
The pricing model has three tiers and each tier builds on the previous one.

523
00:22:30,000 –> 00:22:35,200
Assessment tier 8,000 to 15,000 for a 2-3 week diagnostic that uncovers entropy across

524
00:22:35,200 –> 00:22:36,680
one or more control planes.

525
00:22:36,680 –> 00:22:38,160
This is not a free discovery call.

526
00:22:38,160 –> 00:22:41,640
This is paid work that delivers a risk report and a remediation roadmap.

527
00:22:41,640 –> 00:22:44,400
You’re charging for your expertise, your analysis and your time.

528
00:22:44,400 –> 00:22:46,600
You’re signalling that your knowledge is valuable.

529
00:22:46,600 –> 00:22:49,920
Clients understand this because the assessment is low risk and high value.

530
00:22:49,920 –> 00:22:51,240
They get a concrete deliverable.

531
00:22:51,240 –> 00:22:54,480
They understand exactly where their entropy is and what it’s costing them.

532
00:22:54,480 –> 00:23:00,600
Remediation tier 80,000 to 200,000 depending on complexity and scope typically 8 to 16 weeks.

533
00:23:00,600 –> 00:23:04,360
This is where you implement the governance model, automate the controls and establish

534
00:23:04,360 –> 00:23:05,360
the baseline.

535
00:23:05,360 –> 00:23:07,040
This is where you deliver measurable outcomes.

536
00:23:07,040 –> 00:23:09,200
Roll assignments reduced by 85%.

537
00:23:09,200 –> 00:23:11,440
Privileged accounts brought under just in time control.

538
00:23:11,440 –> 00:23:12,920
Compliance gaps closed.

539
00:23:12,920 –> 00:23:14,440
Audit findings eliminated.

540
00:23:14,440 –> 00:23:18,240
The client sees before and after metrics that justify the investment.

541
00:23:18,240 –> 00:23:23,360
Advisory retainer tier 8,000 to 15,000 per month for ongoing governance maturity, policy updates

542
00:23:23,360 –> 00:23:24,360
and optimization.

543
00:23:24,360 –> 00:23:26,120
This is where the real money lives.

544
00:23:26,120 –> 00:23:28,480
Recurring revenue that scales without additional effort.

545
00:23:28,480 –> 00:23:33,160
A $10,000 per month retainer requires maybe 20 to 30 hours per month of your time.

546
00:23:33,160 –> 00:23:37,840
That’s half an FTE, but it generates $120,000 annually in recurring revenue.

547
00:23:37,840 –> 00:23:42,840
With 3 to 4 retainers you have 360,000 to 480,000 in recurring revenue.

548
00:23:42,840 –> 00:23:48,080
That means you only need to close 1 to 2 new remediation engagements per year to hit 500 K+ annual

549
00:23:48,080 –> 00:23:49,080
revenue.

550
00:23:49,080 –> 00:23:50,520
This is the power of the retainer model.

551
00:23:50,520 –> 00:23:52,680
It creates a stable, predictable business.

552
00:23:52,680 –> 00:23:55,520
It aligns consultant incentives with client outcomes.

553
00:23:55,520 –> 00:23:59,240
If you’re on a retainer, you want the governance to work well and stay stable.

554
00:23:59,240 –> 00:24:01,920
You don’t want to create churn that requires constant rework.

555
00:24:01,920 –> 00:24:05,560
You’re invested in the client’s success, not in selling them the next project.

556
00:24:05,560 –> 00:24:09,040
You can understand this model because it aligns with their business reality.

557
00:24:09,040 –> 00:24:10,560
Governance isn’t a one-time project.

558
00:24:10,560 –> 00:24:11,920
It’s an ongoing practice.

559
00:24:11,920 –> 00:24:17,040
As the organization grows, as new tools are adopted, as policies drift, as threats evolve.

560
00:24:17,040 –> 00:24:18,600
Governance requires continuous attention.

561
00:24:18,600 –> 00:24:22,320
The advisory retainer gives them access to expertise without having to hire full-time

562
00:24:22,320 –> 00:24:23,320
staff.

563
00:24:23,320 –> 00:24:26,520
They get a trusted advisor who understands their environment and their risk profile.

564
00:24:26,520 –> 00:24:28,680
The retainer also creates customer lock-in.

565
00:24:28,680 –> 00:24:32,600
Once a client has been on a retainer for 6 months or more, they’re unlikely to switch.

566
00:24:32,600 –> 00:24:33,600
Switching costs are high.

567
00:24:33,600 –> 00:24:37,440
They’d have to find a new consultant, get them up to speed on the governance model,

568
00:24:37,440 –> 00:24:38,720
rebuild the relationship.

569
00:24:38,720 –> 00:24:41,840
This is why retainer clients are your most valuable customers.

570
00:24:41,840 –> 00:24:43,160
They’re not one-time revenue.

571
00:24:43,160 –> 00:24:46,040
They’re multi-year relationships that scale your business.

572
00:24:46,040 –> 00:24:48,400
The retainer also creates opportunities for upselling.

573
00:24:48,400 –> 00:24:52,560
As you work with the client, you will identify new problems that require remediation work.

574
00:24:52,560 –> 00:24:57,440
A client on a $10,000 per month identity governance retainer might also need productivity,

575
00:24:57,440 –> 00:24:59,360
governance or infrastructure optimization.

576
00:24:59,360 –> 00:25:03,000
You can propose follow-on remediation engagements that expand the scope and increase

577
00:25:03,000 –> 00:25:04,760
the overall relationship value.

578
00:25:04,760 –> 00:25:09,880
This is the pricing shift that separates 80k consultants from 100k+ consultants.

579
00:25:09,880 –> 00:25:11,400
One sells hours or deliverables.

580
00:25:11,400 –> 00:25:15,640
The other sells risk reduction and compliance assurance on an ongoing basis.

581
00:25:15,640 –> 00:25:16,640
One competes on cost.

582
00:25:16,640 –> 00:25:18,480
The other doesn’t compete on cost at all.

583
00:25:18,480 –> 00:25:22,520
The pricing conversation never happens because the client understands that governance is

584
00:25:22,520 –> 00:25:24,240
a necessity, not a luxury.

585
00:25:24,240 –> 00:25:26,200
They’re not asking, “Can we afford this?”

586
00:25:26,200 –> 00:25:28,640
They’re asking, “Can we afford not to do this fair?”

587
00:25:28,640 –> 00:25:32,960
The positioning shift, from builder to architect, pricing is one dimension.

588
00:25:32,960 –> 00:25:33,960
The positioning is the other.

589
00:25:33,960 –> 00:25:38,840
And positioning determines whether clients see you as a commodity or as a necessity.

590
00:25:38,840 –> 00:25:42,680
You’re linked in profile, your website and your pitch all need to reflect the shift from

591
00:25:42,680 –> 00:25:44,360
builder to architect.

592
00:25:44,360 –> 00:25:49,640
Most consultant profiles say something like, “I implement power apps, Azure solutions,

593
00:25:49,640 –> 00:25:51,040
Android ID governance.”

594
00:25:51,040 –> 00:25:55,000
This positions you as a builder competing on technical skill and delivery speed.

595
00:25:55,000 –> 00:25:58,680
You’re in a race to the bottom with every other consultant who can code or configure.

596
00:25:58,680 –> 00:26:02,920
The 100k+ positioning says, “I architect control systems that reduce architect

597
00:26:02,920 –> 00:26:05,920
control entropy and enforce governance at scale.”

598
00:26:05,920 –> 00:26:09,880
This positions you as a strategist competing on risk reduction and business impact.

599
00:26:09,880 –> 00:26:11,400
You’re not competing on technical skill.

600
00:26:11,400 –> 00:26:15,520
You’re competing on whether the client’s systems are predictable, compliant and secure.

601
00:26:15,520 –> 00:26:18,160
Your case studies need to reflect this shift too.

602
00:26:18,160 –> 00:26:22,360
Most consultant case studies say, “We build 12 power apps in three months.”

603
00:26:22,360 –> 00:26:24,680
Or, “We migrated 50 servers to Azure.”

604
00:26:24,680 –> 00:26:25,680
This is a delivery story.

605
00:26:25,680 –> 00:26:27,360
It’s about speed and volume.

606
00:26:27,360 –> 00:26:32,880
The 100k+ case study says, “We reduce identity risk by 85%, automated compliance,

607
00:26:32,880 –> 00:26:35,280
and prevented a $2 million breach.”

608
00:26:35,280 –> 00:26:36,280
This is an outcome story.

609
00:26:36,280 –> 00:26:38,960
It’s about risk mitigation and business value.

610
00:26:38,960 –> 00:26:40,880
Your speaking engagements need to shift as well.

611
00:26:40,880 –> 00:26:45,120
The commodity consultant speaks about power apps best practices or, as your governance

612
00:26:45,120 –> 00:26:46,320
frameworks.

613
00:26:46,320 –> 00:26:52,040
The 100k+ consultant speaks about why architectural entropy is the real cost of cloud adoption,

614
00:26:52,040 –> 00:26:55,040
or how to measure and mitigate control plane drift.

615
00:26:55,040 –> 00:26:57,200
You’re not teaching people how to use tools.

616
00:26:57,200 –> 00:27:00,320
You’re teaching them how to think about governance as a strategic problem.

617
00:27:00,320 –> 00:27:01,720
Your content needs to shift too.

618
00:27:01,720 –> 00:27:04,960
The commodity consultant publishes tutorials on how to use tools.

619
00:27:04,960 –> 00:27:09,920
The 100k+ consultant publishes frameworks for thinking about governance, risk and architectural

620
00:27:09,920 –> 00:27:10,920
necessity.

621
00:27:10,920 –> 00:27:12,520
You’re not competing on technical knowledge.

622
00:27:12,520 –> 00:27:14,240
You’re competing on strategic insight.

623
00:27:14,240 –> 00:27:17,160
This positioning shift is what allows you to command premium pricing.

624
00:27:17,160 –> 00:27:20,520
When you’re positioned as a builder, you’re competing against other builders on speed and

625
00:27:20,520 –> 00:27:21,520
cost.

626
00:27:21,520 –> 00:27:25,040
When you’re positioned as an architect of necessity, you’re competing against the cost

627
00:27:25,040 –> 00:27:28,080
of not having governance, and that cost is always higher than your feet.

628
00:27:28,080 –> 00:27:30,440
The positioning shift also changes who you sell to.

629
00:27:30,440 –> 00:27:35,680
Instead of selling to IT operations managers, you’re selling to CSOs, CFOs and chief risk

630
00:27:35,680 –> 00:27:36,680
officers.

631
00:27:36,680 –> 00:27:38,160
These buyers have bigger budgets.

632
00:27:38,160 –> 00:27:39,800
They have longer decision cycles.

633
00:27:39,800 –> 00:27:41,960
They have higher tolerance for consulting fees.

634
00:27:41,960 –> 00:27:43,280
They’re not buying implementation.

635
00:27:43,280 –> 00:27:45,880
They’re buying risk mitigation and compliance assurance.

636
00:27:45,880 –> 00:27:46,880
This is critical.

637
00:27:46,880 –> 00:27:50,840
The IT operations manager is asking, “Can we afford to hire this consultant?”

638
00:27:50,840 –> 00:27:54,000
The CSO is asking, “Can we afford not to hire this consultant?”

639
00:27:54,000 –> 00:27:55,000
One is a cost center.

640
00:27:55,000 –> 00:27:57,200
The other is a risk management investment.

641
00:27:57,200 –> 00:27:58,640
The conversation is completely different.

642
00:27:58,640 –> 00:28:01,720
Your positioning also determines how you talk about competitors.

643
00:28:01,720 –> 00:28:04,640
The commodity consultant compares themselves to other consultants.

644
00:28:04,640 –> 00:28:08,240
The 100K+ consultant compares themselves to the cost of inaction.

645
00:28:08,240 –> 00:28:09,720
You’re not cheaper than the other guy.

646
00:28:09,720 –> 00:28:11,160
You’re cheaper than a breach.

647
00:28:11,160 –> 00:28:12,720
You’re cheaper than an audit failure.

648
00:28:12,720 –> 00:28:14,600
You’re cheaper than a failed migration.

649
00:28:14,600 –> 00:28:19,320
This is the mindset shift that separates commodity consultants from architects of necessity.

650
00:28:19,320 –> 00:28:20,520
You’re not selling hours.

651
00:28:20,520 –> 00:28:21,840
You’re not selling deliverables.

652
00:28:21,840 –> 00:28:24,440
You’re selling the prevention of architectural decay.

653
00:28:24,440 –> 00:28:28,960
You’re selling the ability to keep systems predictable, compliant and secure at scale.

654
00:28:28,960 –> 00:28:33,880
That’s worth whatever you charge because the alternative is exponentially more expensive.

655
00:28:33,880 –> 00:28:36,080
The client acquisition strategy inbound.

656
00:28:36,080 –> 00:28:39,640
Once your position as an architect inbound leads start to come naturally.

657
00:28:39,640 –> 00:28:40,720
You don’t have to chase them.

658
00:28:40,720 –> 00:28:44,320
They come to you because you’ve articulated their problem better than they could articulated

659
00:28:44,320 –> 00:28:45,320
themselves.

660
00:28:45,320 –> 00:28:49,960
Inbound client acquisition happens through thought, leadership, content and community presence.

661
00:28:49,960 –> 00:28:51,320
The mechanism is straightforward.

662
00:28:51,320 –> 00:28:56,400
You publish content about architectural entropy, governance frameworks and control plane maturity.

663
00:28:56,400 –> 00:29:00,720
This content attracts IT architects and security leaders who are struggling with the same problems.

664
00:29:00,720 –> 00:29:03,520
They reach out to you because you’ve named the disease.

665
00:29:03,520 –> 00:29:05,960
You’ve given them language for what they’re experiencing.

666
00:29:05,960 –> 00:29:07,200
You’ve shown them a path forward.

667
00:29:07,200 –> 00:29:09,400
The content types that work are specific.

668
00:29:09,400 –> 00:29:13,960
Long form articles on architectural entropy and how it compounds over time.

669
00:29:13,960 –> 00:29:19,160
Frameworks for assessing control plane maturity across identity, productivity and infrastructure.

670
00:29:19,160 –> 00:29:23,360
Case studies showing before and after metrics that prove the value of remediation.

671
00:29:23,360 –> 00:29:27,320
Videos explaining why feature work is commoditized but governance is premium.

672
00:29:27,320 –> 00:29:31,880
LinkedIn posts that challenge conventional thinking about cloud adoption and governance.

673
00:29:31,880 –> 00:29:33,120
Distribution channels matter.

674
00:29:33,120 –> 00:29:34,400
But you don’t need to be everywhere.

675
00:29:34,400 –> 00:29:38,560
You need to be authoritative in the niche of Microsoft architectural governance.

676
00:29:38,560 –> 00:29:42,640
LinkedIn is your primary channel because your target buyers, CISOs, IT directors, chief

677
00:29:42,640 –> 00:29:44,320
risk officers are active there.

678
00:29:44,320 –> 00:29:45,880
Your strategy is straightforward.

679
00:29:45,880 –> 00:29:50,880
Two to three times per week about architectural governance, identity, entropy, control plane maturity

680
00:29:50,880 –> 00:29:52,760
and the business case for governance.

681
00:29:52,760 –> 00:29:55,160
Engage with other architects and security leaders.

682
00:29:55,160 –> 00:29:56,680
Comment thoughtfully on their posts.

683
00:29:56,680 –> 00:29:57,920
Build relationships.

684
00:29:57,920 –> 00:29:59,840
Share your case studies and frameworks.

685
00:29:59,840 –> 00:30:04,920
Make them specific enough to be useful but abstract enough to be applicable across industries.

686
00:30:04,920 –> 00:30:09,000
The inbound mechanism takes three to six months to build momentum, but once it’s working,

687
00:30:09,000 –> 00:30:11,200
it generates 30 to 50% of your pipeline.

688
00:30:11,200 –> 00:30:15,440
This is high quality pipeline because the leads are already educated about the problem.

689
00:30:15,440 –> 00:30:17,120
They’re actively seeking a solution.

690
00:30:17,120 –> 00:30:19,640
They’ve self-qualified by engaging with your content.

691
00:30:19,640 –> 00:30:24,600
Conversion rates on inbound leads are typically 20 to 30% because they’re not cold prospects.

692
00:30:24,600 –> 00:30:27,600
They’re warm prospects who already understand the value of governance.

693
00:30:27,600 –> 00:30:29,640
They’ve already decided they need to do something.

694
00:30:29,640 –> 00:30:31,080
They’re just deciding who to hire.

695
00:30:31,080 –> 00:30:32,800
The sales process is shorter too.

696
00:30:32,800 –> 00:30:37,680
Cold outreach might take 12 weeks or more to move from first contact to signed engagement.

697
00:30:37,680 –> 00:30:42,360
Inbound leads often move from first conversation to assessment engagement in 4 to 6 weeks.

698
00:30:42,360 –> 00:30:44,160
They’re already convinced of the problem.

699
00:30:44,160 –> 00:30:46,880
They just need to understand your specific approach and your pricing.

700
00:30:46,880 –> 00:30:47,880
Here’s what matters.

701
00:30:47,880 –> 00:30:50,440
Inbound leads don’t require you to be a salesperson.

702
00:30:50,440 –> 00:30:52,160
They require you to be a thought leader.

703
00:30:52,160 –> 00:30:53,160
You’re not selling.

704
00:30:53,160 –> 00:30:54,160
You’re educating.

705
00:30:54,160 –> 00:30:55,160
You’re sharing frameworks.

706
00:30:55,160 –> 00:30:56,440
You’re publishing case studies.

707
00:30:56,440 –> 00:30:58,000
You’re building authority in a niche.

708
00:30:58,000 –> 00:31:00,840
The sales happen naturally because people reach out to you.

709
00:31:00,840 –> 00:31:02,720
This is also how you build defensibility.

710
00:31:02,720 –> 00:31:06,520
If you’re the person who publishes the framework for measuring architectural entropy, you’re

711
00:31:06,520 –> 00:31:09,120
the person everyone calls when they need to measure it.

712
00:31:09,120 –> 00:31:12,880
If you’re the person who articulates why control plane governance matters, you’re the

713
00:31:12,880 –> 00:31:15,040
person everyone calls when they need governance.

714
00:31:15,040 –> 00:31:16,480
You’ve made yourself the obvious choice.

715
00:31:16,480 –> 00:31:17,800
The content also compounds.

716
00:31:17,800 –> 00:31:21,880
A linked in post you published today might generate a lead 6 months from now.

717
00:31:21,880 –> 00:31:25,880
A framework you share might be referenced in an article someone writes next year.

718
00:31:25,880 –> 00:31:29,760
Your thought leadership becomes an asset that generates leads long after you’ve created it.

719
00:31:29,760 –> 00:31:31,720
This is why inbound is so valuable.

720
00:31:31,720 –> 00:31:34,840
The effort you put in upfront generates returns for years.

721
00:31:34,840 –> 00:31:36,480
But inbound takes time to build.

722
00:31:36,480 –> 00:31:38,320
You need to establish credibility.

723
00:31:38,320 –> 00:31:39,800
You need to publish consistently.

724
00:31:39,800 –> 00:31:41,360
You need to engage authentically.

725
00:31:41,360 –> 00:31:44,400
You need to build relationships with other architects and security leaders.

726
00:31:44,400 –> 00:31:48,960
This is a 3 to 6 month play before you see meaningful pipeline generation.

727
00:31:48,960 –> 00:31:50,720
Most consultants don’t have the patience for it.

728
00:31:50,720 –> 00:31:52,240
They want leads immediately.

729
00:31:52,240 –> 00:31:53,960
So they do outbound instead.

730
00:31:53,960 –> 00:31:55,240
Outbound works faster.

731
00:31:55,240 –> 00:31:56,560
But it’s also more exhausting.

732
00:31:56,560 –> 00:32:00,520
It requires constant prospecting, constant rejection, constant follow-up.

733
00:32:00,520 –> 00:32:02,600
The optimal strategy is to run both.

734
00:32:02,600 –> 00:32:06,000
Do outbound to generate immediate pipeline while you’re building inbound.

735
00:32:06,000 –> 00:32:09,120
As inbound builds momentum, it gradually replaces outbound.

736
00:32:09,120 –> 00:32:11,080
By month 12, you might be 50/50.

737
00:32:11,080 –> 00:32:14,640
By month 18, inbound is generating more pipeline than outbound.

738
00:32:14,640 –> 00:32:18,480
By month 24, you’re mostly inbound with selective outbound to fill gaps.

739
00:32:18,480 –> 00:32:19,800
This is the long term play.

740
00:32:19,800 –> 00:32:23,200
You’re building a business that generates leads without constant prospecting.

741
00:32:23,200 –> 00:32:26,520
You’re building authority that makes you the obvious choice when someone needs governance

742
00:32:26,520 –> 00:32:27,520
remediation.

743
00:32:27,520 –> 00:32:32,520
You’re building a moat around your consulting practice that competitors can’t easily replicate.

744
00:32:32,520 –> 00:32:36,600
The client acquisition strategy outbound inbound takes time to build.

745
00:32:36,600 –> 00:32:39,800
Outbound fills the pipeline while you’re establishing thought leadership.

746
00:32:39,800 –> 00:32:44,040
The acquisition is targeted, direct outreach to companies that have entropy signals.

747
00:32:44,040 –> 00:32:48,400
Entropy signals are indicators that a company is struggling with architectural decay.

748
00:32:48,400 –> 00:32:53,960
Recent breaches, failed audits, migration delays, high-cloud spend without corresponding value.

749
00:32:53,960 –> 00:32:56,040
Rapid adoption of new tools without governance.

750
00:32:56,040 –> 00:33:00,040
These are all signals that the organization has exceeded its entropy budget somewhere.

751
00:33:00,040 –> 00:33:02,480
You find these signals through multiple channels.

752
00:33:02,480 –> 00:33:05,480
News monitoring for breach announcements and regulatory fines.

753
00:33:05,480 –> 00:33:09,160
Linked in research for company announcements about new cloud initiatives, industry reports

754
00:33:09,160 –> 00:33:11,920
from analyst firms tracking cloud adoption.

755
00:33:11,920 –> 00:33:15,160
Direct research on company websites, earnings calls and job postings.

756
00:33:15,160 –> 00:33:19,120
A company that’s hiring five security engineers is dealing with a security problem.

757
00:33:19,120 –> 00:33:23,080
A company that’s announcing a co-pilot rollout is about to discover governance gaps.

758
00:33:23,080 –> 00:33:27,120
A company that’s migrating to Azure is going to face cost and compliance challenges.

759
00:33:27,120 –> 00:33:29,040
The outbound approach is specific.

760
00:33:29,040 –> 00:33:31,280
Identify a target company with entropy signals.

761
00:33:31,280 –> 00:33:33,320
Research the CISO or IT director.

762
00:33:33,320 –> 00:33:36,400
Craft a personalized email that references their specific situation.

763
00:33:36,400 –> 00:33:37,880
The email doesn’t pitch a solution.

764
00:33:37,880 –> 00:33:42,440
It asks a question that forces them to think about their control plane maturity.

765
00:33:42,440 –> 00:33:43,440
Example.

766
00:33:43,440 –> 00:33:48,080
I noticed your company announced a Microsoft 365 co-pilot rollout last month.

767
00:33:48,080 –> 00:33:52,280
Most organizations deploying co-pilot without first establishing data, loss prevention governance

768
00:33:52,280 –> 00:33:54,560
end up with significant compliance risk.

769
00:33:54,560 –> 00:34:00,240
Have you established DLP policies for co-pilot interactions with proprietary information?

770
00:34:00,240 –> 00:34:02,000
This email works because it’s specific.

771
00:34:02,000 –> 00:34:03,600
It references their situation.

772
00:34:03,600 –> 00:34:05,720
It raises the concern they might not have considered.

773
00:34:05,720 –> 00:34:06,720
It’s not salesy.

774
00:34:06,720 –> 00:34:07,720
It’s consultative.

775
00:34:07,720 –> 00:34:10,080
It’s asking a question that makes them think.

776
00:34:10,080 –> 00:34:14,000
Response rates on personalized outbound are typically 5 to 10%.

777
00:34:14,000 –> 00:34:18,320
From those responses, 20 to 30% convert to a discovery conversation.

778
00:34:18,320 –> 00:34:19,480
The math is straightforward.

779
00:34:19,480 –> 00:34:21,240
Send 100 personalized emails.

780
00:34:21,240 –> 00:34:23,160
Get 5 to 10 responses.

781
00:34:23,160 –> 00:34:25,760
Convert one to three of those to discovery conversations.

782
00:34:25,760 –> 00:34:28,120
The discovery conversation is where you pitch the assessment.

783
00:34:28,120 –> 00:34:32,560
I can spend two weeks understanding your identity, productivity and infrastructure control

784
00:34:32,560 –> 00:34:36,760
planes and deliver a risk report that shows you exactly where your entropy is and

785
00:34:36,760 –> 00:34:38,200
what it’s costing you.

786
00:34:38,200 –> 00:34:41,040
The assessment is $10,000 and takes two weeks.

787
00:34:41,040 –> 00:34:44,200
Most companies will say yes to this because it’s low risk.

788
00:34:44,200 –> 00:34:48,320
Small investment, short timeline, high value, they get a risk report and a remediation road

789
00:34:48,320 –> 00:34:49,320
map.

790
00:34:49,320 –> 00:34:52,880
The assessment almost always leads to a remediation engagement because the report shows

791
00:34:52,880 –> 00:34:54,760
them problems they didn’t know they had.

792
00:34:54,760 –> 00:34:56,320
You’ve quantified the entropy.

793
00:34:56,320 –> 00:34:57,320
You’ve shown them the risk.

794
00:34:57,320 –> 00:34:58,520
You’ve given them a road map.

795
00:34:58,520 –> 00:35:02,600
The decision to remediate is almost inevitable because the alternative is to leave the entropy

796
00:35:02,600 –> 00:35:04,840
in place and hope nothing bad happens.

797
00:35:04,840 –> 00:35:08,000
That’s not a business decision that’s gambling.

798
00:35:08,000 –> 00:35:12,280
Outbound works best when you’re targeting 20 to 30 companies per month, personalizing

799
00:35:12,280 –> 00:35:14,880
each email and following up systematically.

800
00:35:14,880 –> 00:35:18,280
This approach generates two to four discovery conversations per month.

801
00:35:18,280 –> 00:35:23,440
That converts to one assessment engagement and 0.3 to 0.5 remediation engagements.

802
00:35:23,440 –> 00:35:28,760
At 120,000 average remediation value that’s 40 to 60,000 per month in closed business from

803
00:35:28,760 –> 00:35:29,760
outbound.

804
00:35:29,760 –> 00:35:32,960
This is the foundation of a predictable pipeline while inbound is building.

805
00:35:32,960 –> 00:35:34,720
You’re not dependent on inbound leads.

806
00:35:34,720 –> 00:35:37,680
You’re generating your own pipeline through systematic outreach.

807
00:35:37,680 –> 00:35:41,440
You’re not competing on price because you’re reaching out to companies with specific problems.

808
00:35:41,440 –> 00:35:44,680
You’re competing on your ability to diagnose and remediate those problems.

809
00:35:44,680 –> 00:35:47,680
The key to outbound is consistency and personalization.

810
00:35:47,680 –> 00:35:49,480
Generic emails get deleted.

811
00:35:49,480 –> 00:35:50,800
Personalized emails get responses.

812
00:35:50,800 –> 00:35:54,640
You need to research each company, find the specific entropy signal, reference it in

813
00:35:54,640 –> 00:35:56,640
your email, ask a specific question.

814
00:35:56,640 –> 00:35:59,240
Make it about their situation, not about your services.

815
00:35:59,240 –> 00:36:00,560
You also need to follow up.

816
00:36:00,560 –> 00:36:02,640
Most people won’t respond to the first email.

817
00:36:02,640 –> 00:36:06,760
Follow up after one week, follow up again after two weeks, after three touches, move on.

818
00:36:06,760 –> 00:36:08,240
But don’t give up on the company.

819
00:36:08,240 –> 00:36:09,520
Revisit them in three months.

820
00:36:09,520 –> 00:36:10,600
Something will have changed.

821
00:36:10,600 –> 00:36:13,640
A new announcement, a new hire, a new entropy signal.

822
00:36:13,640 –> 00:36:15,440
Your persistence will eventually connect.

823
00:36:15,440 –> 00:36:19,040
The combination of inbound and outbound creates a diversified pipeline.

824
00:36:19,040 –> 00:36:22,760
Inbound generates high quality warm leads that convert quickly.

825
00:36:22,760 –> 00:36:26,080
Outbound generates volume and fills gaps while inbound is building.

826
00:36:26,080 –> 00:36:30,280
Together they create a predictable scalable client acquisition engine that generates consistent

827
00:36:30,280 –> 00:36:31,920
pipeline month after month.

828
00:36:31,920 –> 00:36:33,920
The assessment, a sales tool.

829
00:36:33,920 –> 00:36:37,360
The assessment is not just a diagnostic, it’s your most powerful sales tool.

830
00:36:37,360 –> 00:36:39,480
And most consultants completely misunderstand this.

831
00:36:39,480 –> 00:36:41,120
Most consultants give away discovery.

832
00:36:41,120 –> 00:36:43,720
They offer a free assessment or a two hour discovery call.

833
00:36:43,720 –> 00:36:45,000
They think this builds trust.

834
00:36:45,000 –> 00:36:46,000
It doesn’t.

835
00:36:46,000 –> 00:36:49,160
It signals that your expertise isn’t valuable enough to charge for.

836
00:36:49,160 –> 00:36:52,760
Free discovery attracts tire kickers and budget constrained prospects.

837
00:36:52,760 –> 00:36:57,000
Pay discovery attracts serious buyers who understand that diagnosis costs money.

838
00:36:57,000 –> 00:36:59,280
Pay assessments, signal three things.

839
00:36:59,280 –> 00:37:00,600
First that you’re serious.

840
00:37:00,600 –> 00:37:02,000
You’re not desperate for work.

841
00:37:02,000 –> 00:37:03,800
You’re selective about who you work with.

842
00:37:03,800 –> 00:37:05,360
Second that your time is valuable.

843
00:37:05,360 –> 00:37:08,040
You’re not giving away analysis that took years to develop.

844
00:37:08,040 –> 00:37:10,720
Third that the output will be worth the investment.

845
00:37:10,720 –> 00:37:12,320
You’re not doing a generic assessment.

846
00:37:12,320 –> 00:37:15,320
You’re doing a specific diagnostic tailored to their environment.

847
00:37:15,320 –> 00:37:19,040
The assessment costs $8 to $15,000 and takes two to three weeks.

848
00:37:19,040 –> 00:37:21,040
It’s scoped to one or more control planes.

849
00:37:21,040 –> 00:37:24,200
Identity governance, productivity governance, infrastructure governance.

850
00:37:24,200 –> 00:37:30,080
The output is a 20 to 30 page risk report with current state analysis, entropy quantification,

851
00:37:30,080 –> 00:37:33,840
risk scoring, compliance gaps and a remediation roadmap.

852
00:37:33,840 –> 00:37:34,840
Here’s what makes it work.

853
00:37:34,840 –> 00:37:37,920
The assessment is designed to uncover problems the client didn’t know they had.

854
00:37:37,920 –> 00:37:42,680
If the assessment only confirms what they already know, it won’t drive a remediation engagement.

855
00:37:42,680 –> 00:37:46,040
You need to find the hidden entropy, the drift that’s accumulated over years.

856
00:37:46,040 –> 00:37:47,840
The policies that are no longer enforced.

857
00:37:47,840 –> 00:37:49,520
The often resources creating risk.

858
00:37:49,520 –> 00:37:52,200
The service accounts with permanent credentials.

859
00:37:52,200 –> 00:37:54,240
The unmanaged flows accessing sensitive data.

860
00:37:54,240 –> 00:37:55,920
The Azure subscriptions nobody owns.

861
00:37:55,920 –> 00:38:00,160
The assessment establishes you as the expert who understands their specific situation.

862
00:38:00,160 –> 00:38:03,640
By the time you present the report, the client has already decided you’re the right person

863
00:38:03,640 –> 00:38:04,880
to fix the problem.

864
00:38:04,880 –> 00:38:07,480
The remediation engagement is almost a foregone conclusion.

865
00:38:07,480 –> 00:38:08,760
You’ve diagnosed the disease.

866
00:38:08,760 –> 00:38:09,880
You’ve shown them the cost.

867
00:38:09,880 –> 00:38:11,040
You’ve given them a roadmap.

868
00:38:11,040 –> 00:38:14,760
The decision to remediate is inevitable because the alternative is to leave the entropy in

869
00:38:14,760 –> 00:38:15,840
place.

870
00:38:15,840 –> 00:38:19,480
The assessment also creates a baseline that makes the remediation work measurable.

871
00:38:19,480 –> 00:38:21,280
You can show before and after metrics.

872
00:38:21,280 –> 00:38:26,400
All assignments reduced by 85% privileged accounts brought under just in time control.

873
00:38:26,400 –> 00:38:27,400
Compliance gaps closed.

874
00:38:27,400 –> 00:38:30,080
Flow inventory reduced by 50%.

875
00:38:30,080 –> 00:38:33,960
These metrics are what justify the remediation investment to the CFO and the board.

876
00:38:33,960 –> 00:38:35,520
You’re not asking them to trust you.

877
00:38:35,520 –> 00:38:37,400
You’re showing them measurable outcomes.

878
00:38:37,400 –> 00:38:40,840
The assessment should be structured to take two to three weeks of work, not eight weeks.

879
00:38:40,840 –> 00:38:43,240
You’re not doing the full remediation in the assessment.

880
00:38:43,240 –> 00:38:46,720
You’re doing enough work to understand the problem and recommend a solution.

881
00:38:46,720 –> 00:38:50,880
The remediation is where the real work happens and where the real value is captured.

882
00:38:50,880 –> 00:38:53,920
Think about the assessment as the sales conversation that happens on paper.

883
00:38:53,920 –> 00:38:55,240
You’re asking questions.

884
00:38:55,240 –> 00:38:56,680
You’re analyzing responses.

885
00:38:56,680 –> 00:38:57,880
You’re quantifying risk.

886
00:38:57,880 –> 00:38:59,200
You’re presenting findings.

887
00:38:59,200 –> 00:39:00,560
You’re recommending next steps.

888
00:39:00,560 –> 00:39:04,120
By the time the client finishes reading the report, they understand exactly what’s wrong,

889
00:39:04,120 –> 00:39:06,160
why it matters and what needs to happen next.

890
00:39:06,160 –> 00:39:08,200
The pricing of the assessment is also strategic.

891
00:39:08,200 –> 00:39:12,920
Eight to 15,000 is enough to signal seriousness, but not so much that it’s a barrier to entry.

892
00:39:12,920 –> 00:39:17,200
Most companies with entropy problems can justify eight to 15,000 for a diagnostic.

893
00:39:17,200 –> 00:39:21,800
They can’t justify 120,000 for remediation without first understanding the problem.

894
00:39:21,800 –> 00:39:23,360
The assessment gets you in the door.

895
00:39:23,360 –> 00:39:25,800
The remediation is where you capture the real value.

896
00:39:25,800 –> 00:39:28,520
The assessment also creates a natural upsell path.

897
00:39:28,520 –> 00:39:31,920
Once you’ve completed the identity plane assessment, the client often wants to address

898
00:39:31,920 –> 00:39:34,320
the productivity plane or the infrastructure plane.

899
00:39:34,320 –> 00:39:37,080
One assessment often leads to two or three follow-on assessments.

900
00:39:37,080 –> 00:39:38,760
Each one expands the relationship.

901
00:39:38,760 –> 00:39:41,960
Each one identifies new remediation opportunities.

902
00:39:41,960 –> 00:39:46,160
By the time you’re done with assessments, you’ve got a clear roadmap for multiple remediation

903
00:39:46,160 –> 00:39:48,640
engagements that will occupy you for the next year.

904
00:39:48,640 –> 00:39:51,920
This is how you build a predictable, scalable consulting business.

905
00:39:51,920 –> 00:39:53,560
Assessments lead to remediation.

906
00:39:53,560 –> 00:39:55,720
Remediation leads to advisory retainers.

907
00:39:55,720 –> 00:39:58,480
Advisory retainers lead to follow-on remediation.

908
00:39:58,480 –> 00:40:00,360
Each engagement expands the relationship.

909
00:40:00,360 –> 00:40:02,760
Each one increases the lifetime value of the client.

910
00:40:02,760 –> 00:40:07,320
Each one makes you more indispensable because you understand their environment better than anyone else.

911
00:40:07,320 –> 00:40:10,360
The assessment is the bridge between positioning and pricing.

912
00:40:10,360 –> 00:40:13,960
It’s how you move from being a commodity consultant to being an architect of necessity.

913
00:40:13,960 –> 00:40:17,080
It’s how you demonstrate value before asking for the big investment.

914
00:40:17,080 –> 00:40:20,280
It’s how you make the case that governance isn’t a cost.

915
00:40:20,280 –> 00:40:23,880
It’s insurance against catastrophic failure.

916
00:40:23,880 –> 00:40:26,440
The remediation engagement scope and delivery.

917
00:40:26,440 –> 00:40:30,880
Once the assessment is sold, the remediation engagement is where you deliver measurable value.

918
00:40:30,880 –> 00:40:33,440
This is where you move from diagnosis to treatment.

919
00:40:33,440 –> 00:40:35,880
And it’s where you prove that governance isn’t theoretical.

920
00:40:35,880 –> 00:40:36,960
It’s operational.

921
00:40:36,960 –> 00:40:41,800
The remediation engagement is typically 8 to 16 weeks and costs $80,000 to $200,000,

922
00:40:41,800 –> 00:40:43,320
depending on scope and complexity.

923
00:40:43,320 –> 00:40:44,720
It’s structured in phases.

924
00:40:44,720 –> 00:40:46,280
Planning takes weeks one and two.

925
00:40:46,280 –> 00:40:48,880
Implementation takes weeks three through 12.

926
00:40:48,880 –> 00:40:51,280
Optimization takes weeks 13 through 16.

927
00:40:51,280 –> 00:40:52,720
Planning phase is critical.

928
00:40:52,720 –> 00:40:54,720
You finalize the remediation roadmap.

929
00:40:54,720 –> 00:40:56,240
You establish governance models.

930
00:40:56,240 –> 00:40:58,400
You define ownership and approval workflows.

931
00:40:58,400 –> 00:40:59,880
You set up the technical environment.

932
00:40:59,880 –> 00:41:00,960
You’re not building yet.

933
00:41:00,960 –> 00:41:01,760
You’re planning.

934
00:41:01,760 –> 00:41:02,760
You’re getting alignment.

935
00:41:02,760 –> 00:41:06,120
You’re making sure everyone understands what’s happening and why it matters.

936
00:41:06,120 –> 00:41:07,720
This is where you prevent scope creep.

937
00:41:07,720 –> 00:41:10,280
This is where you establish clear success criteria.

938
00:41:10,280 –> 00:41:12,440
Implementation phase is where the real work happens.

939
00:41:12,440 –> 00:41:16,160
You deploy the controls for identity that means conditional access policies,

940
00:41:16,160 –> 00:41:20,400
data loss prevention rules, life cycle, automation, access reviews.

941
00:41:20,400 –> 00:41:22,680
For productivity that means environment tearing,

942
00:41:22,680 –> 00:41:27,680
DLP policies, governance models, for infrastructure that means subscription organization,

943
00:41:27,680 –> 00:41:30,000
tagging standards, cost management policies.

944
00:41:30,000 –> 00:41:31,440
You’re not just configuring tools,

945
00:41:31,440 –> 00:41:34,600
you’re building systems that enforce policy at scale.

946
00:41:34,600 –> 00:41:36,320
Migration is part of implementation.

947
00:41:36,320 –> 00:41:39,280
You migrate existing configurations to the new model.

948
00:41:39,280 –> 00:41:41,840
You move role assignments from direct to role-based.

949
00:41:41,840 –> 00:41:44,680
You migrate flows from unmanage to governed environments.

950
00:41:44,680 –> 00:41:48,600
You move subscriptions from ad hoc organization to governance-based structure.

951
00:41:48,600 –> 00:41:49,920
Migration is the risky part.

952
00:41:49,920 –> 00:41:51,240
It’s where things can break.

953
00:41:51,240 –> 00:41:53,960
It’s where you need careful planning and extensive testing.

954
00:41:53,960 –> 00:41:55,840
Training happens during implementation too.

955
00:41:55,840 –> 00:41:57,920
Admins need to understand the new governance model.

956
00:41:57,920 –> 00:42:00,000
Users need to understand why policies exist.

957
00:42:00,000 –> 00:42:03,360
Citizen developers need to understand how to build within guardrails.

958
00:42:03,360 –> 00:42:06,640
Training is how you prevent the new governance from being circumvented.

959
00:42:06,640 –> 00:42:10,160
If people don’t understand why a policy exists, they’ll find ways around it.

960
00:42:10,160 –> 00:42:12,840
If they understand the business case, they’ll work within it.

961
00:42:12,840 –> 00:42:15,280
Optimization phase is weeks 13 through 16.

962
00:42:15,280 –> 00:42:17,120
You monitor and refine the controls.

963
00:42:17,120 –> 00:42:18,440
You address edge cases.

964
00:42:18,440 –> 00:42:20,280
You establish ongoing governance processes.

965
00:42:20,280 –> 00:42:22,600
You’re not done when implementation is complete.

966
00:42:22,600 –> 00:42:25,320
You’re done when the governance is stable and sustainable.

967
00:42:25,320 –> 00:42:27,440
When admins can operate it without your help.

968
00:42:27,440 –> 00:42:29,880
When the organization has the skills to maintain it.

969
00:42:29,880 –> 00:42:34,640
The key to a successful remediation is clear ownership and decision-making authority.

970
00:42:34,640 –> 00:42:37,640
You need a sponsor, usually the CSO or IT director,

971
00:42:37,640 –> 00:42:40,560
who has budget authority and can make decisions quickly.

972
00:42:40,560 –> 00:42:45,240
You need a working group with identity architect, security engineer and compliance officer

973
00:42:45,240 –> 00:42:48,200
who can provide input and execute the technical work.

974
00:42:48,200 –> 00:42:51,240
You need executive alignment on what success looks like.

975
00:42:51,240 –> 00:42:55,240
The remediation should be delivered by you with heavy involvement from the client’s team.

976
00:42:55,240 –> 00:42:57,840
This is not a “we’ll do it and hand it off” engagement.

977
00:42:57,840 –> 00:42:59,600
It’s a “we’ll do it together” engagement.

978
00:42:59,600 –> 00:43:01,040
The client’s team does half the work.

979
00:43:01,040 –> 00:43:02,160
You guide and oversee.

980
00:43:02,160 –> 00:43:06,480
This approach builds client capability so they can maintain the governance after your gone.

981
00:43:06,480 –> 00:43:07,960
It also creates accountability.

982
00:43:07,960 –> 00:43:10,760
The client’s team is invested in the success of the remediation.

983
00:43:10,760 –> 00:43:14,680
The remediation should produce measurable outcomes, role assignments reduced,

984
00:43:14,680 –> 00:43:17,560
privileged accounts brought under control, compliance gaps closed,

985
00:43:17,560 –> 00:43:18,800
audit readiness improved.

986
00:43:18,800 –> 00:43:21,880
These outcomes should be documented and presented to the CSO and board.

987
00:43:21,880 –> 00:43:23,560
This is what justifies the investment.

988
00:43:23,560 –> 00:43:26,800
This is what creates the foundation for the advisory retainer.

989
00:43:26,800 –> 00:43:29,400
The remediation also creates opportunities for upselling.

990
00:43:29,400 –> 00:43:33,920
Once you’ve fixed identity governance, you can remediate productivity or infrastructure governance.

991
00:43:33,920 –> 00:43:36,880
Most organizations need work across all three planes.

992
00:43:36,880 –> 00:43:41,000
So the initial remediation often leads to two or three follow-on engagements.

993
00:43:41,000 –> 00:43:42,640
Each one expands the relationship.

994
00:43:42,640 –> 00:43:45,040
Each one increases the lifetime value of the client.

995
00:43:45,040 –> 00:43:48,280
This is the engagement model that generates consistent revenue.

996
00:43:48,280 –> 00:43:50,080
Assessments at 8 to 15,000,

997
00:43:50,080 –> 00:43:52,320
remediation at 80 to 200,000,

998
00:43:52,320 –> 00:43:54,960
advisory retainers at 8 to 15,000 monthly.

999
00:43:54,960 –> 00:43:59,960
Each client generates 50 to 300,000 annually in revenue across all three tiers.

1000
00:43:59,960 –> 00:44:05,160
With three to five clients, you’re at 150,000 to 1.5 million in annual revenue.

1001
00:44:05,160 –> 00:44:08,080
The remediation engagement is where you prove your value.

1002
00:44:08,080 –> 00:44:10,640
It’s where you show that governance isn’t a cost.

1003
00:44:10,640 –> 00:44:14,200
It’s a risk management investment that prevents catastrophic failure.

1004
00:44:14,200 –> 00:44:16,720
It’s where you demonstrate that you’re not just an implementer.

1005
00:44:16,720 –> 00:44:20,360
You’re an architect who understands how systems work at scale.

1006
00:44:20,360 –> 00:44:23,040
The advisory retainer building recurring revenue.

1007
00:44:23,040 –> 00:44:25,320
The remediation is one-time revenue.

1008
00:44:25,320 –> 00:44:29,680
The advisory retainer is recurring revenue that scales your business without proportional effort.

1009
00:44:29,680 –> 00:44:33,640
The advisory retainer is typically 8,000 to 15,000 per month

1010
00:44:33,640 –> 00:44:35,880
and is structured as an ongoing engagement.

1011
00:44:35,880 –> 00:44:37,920
It includes quarterly governance reviews

1012
00:44:37,920 –> 00:44:41,480
where you assess the current state of the control planes and identify drift.

1013
00:44:41,480 –> 00:44:45,160
Policy updates as the organization adopts new tools or faces new threats.

1014
00:44:45,160 –> 00:44:48,680
Optimization recommendations to improve efficiency and reduce cost.

1015
00:44:48,680 –> 00:44:51,880
Emerging threat monitoring to stay ahead of new attack vectors

1016
00:44:51,880 –> 00:44:55,840
and access to you for questions and escalations when governance issues arise.

1017
00:44:55,840 –> 00:44:58,600
The retainer is sold at the end of the remediation engagement.

1018
00:44:58,600 –> 00:44:59,840
The pitch is straightforward.

1019
00:44:59,840 –> 00:45:02,480
We’ve built this governance model and established the baseline.

1020
00:45:02,480 –> 00:45:06,480
To keep it working and evolving, we recommend an ongoing advisory engagement.

1021
00:45:06,480 –> 00:45:10,160
Most clients will say yes because they understand that governance isn’t a one-time project.

1022
00:45:10,160 –> 00:45:11,600
It’s an ongoing practice.

1023
00:45:11,600 –> 00:45:14,600
As the organization grows as new tools are adopted,

1024
00:45:14,600 –> 00:45:17,000
as policies drift, as threats evolve,

1025
00:45:17,000 –> 00:45:19,200
governance requires continuous attention.

1026
00:45:19,200 –> 00:45:24,000
The retainer is attractive to clients because it gives them predictable access to expertise

1027
00:45:24,000 –> 00:45:25,880
without having to hire full-time staff.

1028
00:45:25,880 –> 00:45:30,080
When they get a trusted advisor who understands their environment and their risk profile,

1029
00:45:30,080 –> 00:45:34,080
they get someone who knows where the entropy is and how to prevent it from accumulating,

1030
00:45:34,080 –> 00:45:37,480
they get peace of mind knowing that governance is being actively managed,

1031
00:45:37,480 –> 00:45:39,080
not just implemented and forgotten.

1032
00:45:39,080 –> 00:45:44,080
For you, the retainer is valuable because it’s recurring revenue that scales without proportional effort.

1033
00:45:44,080 –> 00:45:48,880
A $10,000 per month retainer requires maybe 20 to 30 hours per month of your time.

1034
00:45:48,880 –> 00:45:53,680
That’s half an FTE, but it generates $120,000 annually in recurring revenue.

1035
00:45:53,680 –> 00:45:58,480
With three to four retainers, you have 360,000 to 480,000 in recurring revenue.

1036
00:45:58,480 –> 00:46:02,680
That means you only need to close one to two new remediation engagements per year

1037
00:46:02,680 –> 00:46:05,080
to hit 500 K+ annual revenue.

1038
00:46:05,080 –> 00:46:06,680
This is the power of the retainer model.

1039
00:46:06,680 –> 00:46:08,680
It creates a stable, predictable business.

1040
00:46:08,680 –> 00:46:10,080
The revenue is predictable.

1041
00:46:10,080 –> 00:46:11,280
The workload is predictable.

1042
00:46:11,280 –> 00:46:13,880
You’re not dependent on constant prospecting and closing.

1043
00:46:13,880 –> 00:46:17,680
You’ve got a base of recurring revenue that pays the bills and funds your business growth.

1044
00:46:17,680 –> 00:46:21,080
The retainer also aligns consultant incentives with client outcomes.

1045
00:46:21,080 –> 00:46:24,880
If you’re on a retainer, you want the governance to work well and stay stable.

1046
00:46:24,880 –> 00:46:27,880
You don’t want to create churn that requires constant rework.

1047
00:46:27,880 –> 00:46:31,480
You’re invested in the client’s success, not in selling them the next project.

1048
00:46:31,480 –> 00:46:34,880
This is different from the project model where you might be incentivized to create problems

1049
00:46:34,880 –> 00:46:36,280
so you can sell solutions.

1050
00:46:36,280 –> 00:46:38,280
The retainer also creates customer lock-in.

1051
00:46:38,280 –> 00:46:42,280
Once a client has been on a retainer for six months or more, they’re unlikely to switch.

1052
00:46:42,280 –> 00:46:43,480
Switching costs are high.

1053
00:46:43,480 –> 00:46:47,880
They’d have to find a new consultant to get them up to speed on the governance model, rebuild the relationship.

1054
00:46:47,880 –> 00:46:50,680
This is why retainer clients are your most valuable customers.

1055
00:46:50,680 –> 00:46:51,880
They’re not one-time revenue.

1056
00:46:51,880 –> 00:46:54,680
They’re multi-year relationships that scale your business.

1057
00:46:54,680 –> 00:46:57,280
The retainer also creates opportunities for upselling.

1058
00:46:57,280 –> 00:47:01,480
As you work with the client, you’ll identify new problems that require remediation work.

1059
00:47:01,480 –> 00:47:06,280
A client on a $10,000 per month identity governance retainer might also need productivity governance

1060
00:47:06,280 –> 00:47:07,880
or infrastructure optimization.

1061
00:47:07,880 –> 00:47:11,280
You can propose follow-on remediation engagements that expand the scope

1062
00:47:11,280 –> 00:47:13,280
and increase the overall relationship value.

1063
00:47:13,280 –> 00:47:15,680
The retainer is also how you build defensibility.

1064
00:47:15,680 –> 00:47:19,680
If you’re the person managing a client’s governance, you’re the person they call when something breaks.

1065
00:47:19,680 –> 00:47:22,080
You’re the person they trust with their risk management.

1066
00:47:22,080 –> 00:47:26,080
You’ve made yourself indispensable because you understand their environment better than anyone else.

1067
00:47:26,080 –> 00:47:29,480
This is the business model that generates sustainable, scalable revenue.

1068
00:47:29,480 –> 00:47:31,680
Assessments generate initial engagement.

1069
00:47:31,680 –> 00:47:35,880
Remediation generates substantial upfront revenue and establishes credibility.

1070
00:47:35,880 –> 00:47:39,880
Advisory retainers generate predictable recurring revenue that funds the business

1071
00:47:39,880 –> 00:47:42,080
and allows you to be selective about new projects.

1072
00:47:42,080 –> 00:47:44,880
By year two or three, most of your revenue comes from retainers.

1073
00:47:44,880 –> 00:47:47,880
You’re no longer dependent on closing new projects every month.

1074
00:47:47,880 –> 00:47:51,080
You’ve got a base of recurring revenue that’s stable and predictable.

1075
00:47:51,080 –> 00:47:53,680
You’re running a business, not trading time for money.

1076
00:47:53,680 –> 00:47:55,680
Positioning against competitors.

1077
00:47:55,680 –> 00:47:57,680
You’re not competing against other consultants.

1078
00:47:57,680 –> 00:48:00,680
You’re competing against the cost of inaction.

1079
00:48:00,680 –> 00:48:03,680
Most of your competitors are positioned as builders or implementers.

1080
00:48:03,680 –> 00:48:05,880
They sell hours, projects or deliverables.

1081
00:48:05,880 –> 00:48:08,080
They compete on speed, cost and delivery quality.

1082
00:48:08,080 –> 00:48:11,080
They’re racing to the bottom because that’s the only dimension that matters

1083
00:48:11,080 –> 00:48:12,480
when the deliverable is generic.

1084
00:48:12,480 –> 00:48:17,280
A client comparing your $50,000 remediation to another consultant’s 30,000 remediation

1085
00:48:17,280 –> 00:48:18,680
is making the wrong comparison.

1086
00:48:18,680 –> 00:48:21,480
The real comparison is what’s the cost of not having governance.

1087
00:48:21,480 –> 00:48:25,280
If a breach costs $2 million, a failed audit cost $500,000 in fines

1088
00:48:25,280 –> 00:48:27,880
or a failed migration cost $1 million in rework,

1089
00:48:27,880 –> 00:48:31,680
then $150,000 for governance remediation is a bargain.

1090
00:48:31,680 –> 00:48:35,280
Your job in the sales process is to make this comparison explicit.

1091
00:48:35,280 –> 00:48:36,880
You quantify the cost of entropy.

1092
00:48:36,880 –> 00:48:38,280
You say it clearly.

1093
00:48:38,280 –> 00:48:42,480
Your current identity governance posture creates a breach risk of $2 million or more.

1094
00:48:42,480 –> 00:48:47,080
Our remediation costs $150,000 and reduces that risk by 85%.

1095
00:48:47,080 –> 00:48:49,680
This is how you position against lower cost competitors.

1096
00:48:49,680 –> 00:48:51,080
You’re not more expensive.

1097
00:48:51,080 –> 00:48:52,080
You’re more valuable.

1098
00:48:52,080 –> 00:48:53,880
You’re not charging more for the same work.

1099
00:48:53,880 –> 00:48:57,480
You’re charging appropriately for work that prevents catastrophic failure.

1100
00:48:57,480 –> 00:49:00,280
You’re also positioned differently from the big consulting firms,

1101
00:49:00,280 –> 00:49:02,680
Deloitte, Accenture, McKinsey.

1102
00:49:02,680 –> 00:49:06,480
These firms are generalists who sell broad transformation programs.

1103
00:49:06,480 –> 00:49:10,480
You’re a specialist who focuses on architectural governance in the Microsoft ecosystem.

1104
00:49:10,480 –> 00:49:13,480
Specialists are more valuable than generalists for specific problems

1105
00:49:13,480 –> 00:49:16,480
because they have deeper expertise and faster execution.

1106
00:49:16,480 –> 00:49:18,880
A client with a specific identity governance problem

1107
00:49:18,880 –> 00:49:23,680
would rather hire a specialist than pay a generalist $500 per hour to learn the domain.

1108
00:49:23,680 –> 00:49:25,280
Specialists also move faster.

1109
00:49:25,280 –> 00:49:26,680
You know the Microsoft ecosystem.

1110
00:49:26,680 –> 00:49:27,680
You know the tools.

1111
00:49:27,680 –> 00:49:28,480
You know the patterns.

1112
00:49:28,480 –> 00:49:29,880
You know what works and what doesn’t.

1113
00:49:29,880 –> 00:49:31,680
A generalist is learning as they go.

1114
00:49:31,680 –> 00:49:33,880
A specialist is executing from experience.

1115
00:49:33,880 –> 00:49:36,080
This speed difference is worth money to the client.

1116
00:49:36,080 –> 00:49:40,480
It means faster remediation, faster time to value, faster risk reduction.

1117
00:49:40,480 –> 00:49:43,080
You’re also positioned differently from the Microsoft partners.

1118
00:49:43,080 –> 00:49:46,880
Microsoft partners are incentivized to sell Microsoft licenses and services.

1119
00:49:46,880 –> 00:49:51,480
You’re incentivized to help the client optimize their existing Microsoft investments.

1120
00:49:51,480 –> 00:49:53,280
This creates a natural differentiation.

1121
00:49:53,280 –> 00:49:57,080
You’re the trusted advisor who helps them get value from what they’ve already bought.

1122
00:49:57,080 –> 00:50:01,080
Not the vendor trying to sell them more partners also have conflicts of interest.

1123
00:50:01,080 –> 00:50:04,280
If a partner recommends a solution that requires buying more licenses,

1124
00:50:04,280 –> 00:50:08,480
are they recommending it because it’s the best solution or because it generates revenue?

1125
00:50:08,480 –> 00:50:09,680
You don’t have that conflict.

1126
00:50:09,680 –> 00:50:11,480
You’re recommending what’s best for the client.

1127
00:50:11,480 –> 00:50:14,080
You’re not making money if they buy more licenses.

1128
00:50:14,080 –> 00:50:17,680
You’re making money if their governance improves and their risk decreases.

1129
00:50:17,680 –> 00:50:20,680
This positioning also changes how you talk about your competitors.

1130
00:50:20,680 –> 00:50:22,680
You don’t compare yourself to other consultants.

1131
00:50:22,680 –> 00:50:26,480
You don’t say I’m cheaper than that guy or I’m faster than that firm.

1132
00:50:26,480 –> 00:50:28,680
You compare yourself to the cost of inaction.

1133
00:50:28,680 –> 00:50:33,880
You say the cost of not having governance is exponentially higher than the cost of implementing it.

1134
00:50:33,880 –> 00:50:36,280
Your positioning also determines your pricing power.

1135
00:50:36,280 –> 00:50:40,680
When you’re positioned as a builder, you’re competing against other builders on speed and cost.

1136
00:50:40,680 –> 00:50:45,080
When you’re positioned as an architect of necessity, you’re competing against the cost of inaction.

1137
00:50:45,080 –> 00:50:46,680
The conversation is completely different.

1138
00:50:46,680 –> 00:50:48,680
The client isn’t asking can we afford this?

1139
00:50:48,680 –> 00:50:51,280
They’re asking can we afford not to do this?

1140
00:50:51,280 –> 00:50:54,080
This is the positioning that generates premium pricing.

1141
00:50:54,080 –> 00:50:56,480
This is the positioning that makes you indispensable.

1142
00:50:56,480 –> 00:51:02,480
This is the positioning that separates commodity consultants from architects of necessity.

1143
00:51:02,480 –> 00:51:06,080
The pricing negotiation went to hold, went to bend.

1144
00:51:06,080 –> 00:51:10,880
Pricing is a negotiation. You need principles for when to hold firm and when to be flexible.

1145
00:51:10,880 –> 00:51:13,880
Without principles, you’ll discount yourself into poverty.

1146
00:51:13,880 –> 00:51:16,280
With the wrong principles, you’ll price yourself out of deals.

1147
00:51:16,280 –> 00:51:21,880
Your baseline pricing is 8 to 15,000 for assessments, 80 to 200,000 for remediation,

1148
00:51:21,880 –> 00:51:24,280
and 8 to 15,000 per month for retainers.

1149
00:51:24,280 –> 00:51:27,280
This pricing is not arbitrary. It’s based on the value you deliver.

1150
00:51:27,280 –> 00:51:28,680
But pricing is also contextual.

1151
00:51:28,680 –> 00:51:35,880
A $500 million enterprise with 10,000 employees has a different risk profile than a $50 million company with 1,000 employees.

1152
00:51:35,880 –> 00:51:38,680
Your pricing should scale with the scope and complexity.

1153
00:51:38,680 –> 00:51:42,480
For large enterprises with high complexity, price at the top of your range,

1154
00:51:42,480 –> 00:51:47,680
15,000 assessments, 200,000 remediation, 15,000 monthly retainers.

1155
00:51:47,680 –> 00:51:49,680
These organizations have substantial budgets.

1156
00:51:49,680 –> 00:51:53,080
They have regulatory requirements. They have complex environments.

1157
00:51:53,080 –> 00:51:55,880
The entropy they are dealing with is correspondingly complex.

1158
00:51:55,880 –> 00:51:59,480
The risk is higher. The value of remediation is higher, price accordingly.

1159
00:51:59,480 –> 00:52:02,880
For mid-market companies with moderate complexity, price in the middle,

1160
00:52:02,880 –> 00:52:09,480
10 to 12,000 assessments, 120 to 150,000 remediation, 10 to 12,000 monthly retainers.

1161
00:52:09,480 –> 00:52:13,280
These organizations have meaningful budgets, but tighter constraints than enterprises.

1162
00:52:13,280 –> 00:52:17,680
They have compliance requirements, but not the regulatory intensity of financial services or health care.

1163
00:52:17,680 –> 00:52:21,880
Price in the middle. For smaller companies with lower complexity, price at the bottom.

1164
00:52:21,880 –> 00:52:27,080
8 to 10,000 assessments, 80 to 100,000 remediation, 8 to 10,000 monthly retainers.

1165
00:52:27,080 –> 00:52:30,480
These organizations have smaller budgets. They have fewer compliance requirements.

1166
00:52:30,480 –> 00:52:33,280
Their environments are less complex, price accordingly.

1167
00:52:33,280 –> 00:52:38,080
The key principle. Never discount based on the client’s budget constraints.

1168
00:52:38,080 –> 00:52:41,880
If a client says we can only afford 60,000 for remediation,

1169
00:52:41,880 –> 00:52:44,680
the answer is not “Okay, I’ll do it for 60,000 there.”

1170
00:52:44,680 –> 00:52:46,880
That’s how you end up under delivering and overworking.

1171
00:52:46,880 –> 00:52:49,480
The answer is “That scope won’t work for 60,000.”

1172
00:52:49,480 –> 00:52:53,280
Let’s reduce the scope to fit the budget, or let’s phase the engagement over time

1173
00:52:53,280 –> 00:52:54,880
so you can spread the cost.

1174
00:52:54,880 –> 00:52:56,880
This maintains your pricing integrity.

1175
00:52:56,880 –> 00:52:58,480
It ensures you’re not under delivering.

1176
00:52:58,480 –> 00:53:00,680
It ensures you’re not burning out on low margin work.

1177
00:53:00,680 –> 00:53:03,480
It also signals to the client that you’re serious about your pricing.

1178
00:53:03,480 –> 00:53:05,880
You’re not desperate. You’re not willing to work for less.

1179
00:53:05,880 –> 00:53:07,680
This actually increases their respect for you.

1180
00:53:07,680 –> 00:53:10,480
However, there are situations where you should be flexible.

1181
00:53:10,480 –> 00:53:13,680
If a client is in a regulated industry with high compliance risk,

1182
00:53:13,680 –> 00:53:15,480
you can justify premium pricing.

1183
00:53:15,480 –> 00:53:17,280
Top of range, they have more to lose.

1184
00:53:17,280 –> 00:53:20,880
If a client is a nonprofit or government agency with genuine budget constraints,

1185
00:53:20,880 –> 00:53:22,880
you can offer a modest discount.

1186
00:53:22,880 –> 00:53:27,280
10 to 15% in exchange for a longer engagement or retainer commitment.

1187
00:53:27,280 –> 00:53:29,080
You’re not discounting because they’re broke.

1188
00:53:29,080 –> 00:53:32,080
You’re adjusting price in exchange for something valuable to you.

1189
00:53:32,080 –> 00:53:35,480
If a client is a good cultural fit and has potential for multi-year,

1190
00:53:35,480 –> 00:53:38,680
multi-plane remediation, you can offer a package discount.

1191
00:53:38,680 –> 00:53:42,680
Bundle assessment plus remediation plus retainer for 10 to 15% off.

1192
00:53:42,680 –> 00:53:45,280
You’re discounting because the lifetime value is high.

1193
00:53:45,280 –> 00:53:49,080
You’re betting on a long-term relationship that will generate substantial revenue.

1194
00:53:49,080 –> 00:53:53,280
The principle, discounts are okay if they’re tied to value or relationship duration,

1195
00:53:53,280 –> 00:53:55,280
not to the client’s budget constraints.

1196
00:53:55,280 –> 00:53:58,880
Another principle always position the price in terms of value, not cost.

1197
00:53:58,880 –> 00:54:01,080
Don’t say the assessment costs $10,000.

1198
00:54:01,080 –> 00:54:07,480
Say the assessment costs $10,000 and typically identifies $500,000 to $1,000,000 in risk that needs to be addressed.

1199
00:54:07,480 –> 00:54:11,680
Most clients recover the cost of the assessment in the first month of remediation.

1200
00:54:11,680 –> 00:54:15,080
This reframes the price as an investment with a clear return.

1201
00:54:15,080 –> 00:54:16,680
Pricing also signals quality.

1202
00:54:16,680 –> 00:54:19,880
Premium pricing signals that you are the best, that you have high standards,

1203
00:54:19,880 –> 00:54:22,080
and that you’re selective about who you work with.

1204
00:54:22,080 –> 00:54:25,880
Low pricing signals that you’re a commodity and that you’re desperate for work.

1205
00:54:25,880 –> 00:54:27,480
Hold your pricing with confidence.

1206
00:54:27,480 –> 00:54:29,880
The clients who are serious about governance will pay it.

1207
00:54:29,880 –> 00:54:32,480
The clients who are shopping on price aren’t your clients anyway.

1208
00:54:32,480 –> 00:54:34,680
Building a team went to higher.

1209
00:54:34,680 –> 00:54:37,280
At some point you’ll have more work than you can do alone.

1210
00:54:37,280 –> 00:54:38,880
This is when you need to build a team.

1211
00:54:38,880 –> 00:54:40,880
And most consultants get this timing wrong.

1212
00:54:40,880 –> 00:54:43,680
The first hire is typically a junior consultant or engineer

1213
00:54:43,680 –> 00:54:46,480
who can handle implementation work under your supervision.

1214
00:54:46,480 –> 00:54:49,880
This person allows you to take on larger remediation engagements

1215
00:54:49,880 –> 00:54:52,480
and freeze you up to focus on sales and strategy.

1216
00:54:52,480 –> 00:54:54,280
You’re not hiring because you’re overworked.

1217
00:54:54,280 –> 00:54:57,680
You’re hiring because you have a pipeline of work that justifies the investment.

1218
00:54:57,680 –> 00:55:00,480
You should hire when you have two to three months of backlogged work,

1219
00:55:00,480 –> 00:55:01,680
not when you’re fully booked.

1220
00:55:01,680 –> 00:55:05,280
If you wait until you’re fully booked, you’ll be stretched thin and won’t have time to sell.

1221
00:55:05,280 –> 00:55:08,280
You’ll be so focused on delivery that you’ll miss the next opportunity.

1222
00:55:08,280 –> 00:55:11,680
If you hire too early, you’ll have bench time and wasted payroll.

1223
00:55:11,680 –> 00:55:14,280
The ideal timing is when you have a pipeline of work

1224
00:55:14,280 –> 00:55:17,280
that would keep the person 60 to 70% utilized.

1225
00:55:17,280 –> 00:55:21,080
That gives you room for training and ramp up without wasting money on idle capacity.

1226
00:55:21,080 –> 00:55:25,080
The second hire is typically a subject matter expert in one of the control planes.

1227
00:55:25,080 –> 00:55:28,880
An identity architect, a security engineer, a data governance specialist.

1228
00:55:28,880 –> 00:55:31,880
This person brings deep expertise that allows you to take on

1229
00:55:31,880 –> 00:55:34,680
more complex engagements and command higher pricing.

1230
00:55:34,680 –> 00:55:36,380
You’re not hiring another generalist.

1231
00:55:36,380 –> 00:55:38,880
You’re hiring a specialist who can handle the hard problems

1232
00:55:38,880 –> 00:55:41,280
while you focus on client relationships and strategy.

1233
00:55:41,280 –> 00:55:43,880
The third hire is typically a business operations person

1234
00:55:43,880 –> 00:55:46,280
who handles sales proposals and delivery management.

1235
00:55:46,280 –> 00:55:49,880
This person frees you up to focus on the technical and strategic work.

1236
00:55:49,880 –> 00:55:51,680
You’re no longer spending time on admin.

1237
00:55:51,680 –> 00:55:53,280
You’re not writing proposals.

1238
00:55:53,280 –> 00:55:54,480
You’re not managing schedules.

1239
00:55:54,480 –> 00:55:57,080
You’re focusing on the work that generates the most value.

1240
00:55:57,080 –> 00:55:59,880
As you grow, you’ll need to decide on your business model.

1241
00:55:59,880 –> 00:56:04,080
Stay as a solo consultant, build a small boutique firm with 5 to 10 people.

1242
00:56:04,080 –> 00:56:06,880
Or scale to a larger firm with 20 or more people.

1243
00:56:06,880 –> 00:56:09,880
The solo consultant model is the most profitable in terms of margins,

1244
00:56:09,880 –> 00:56:12,280
70 to 80% but has a ceiling on revenue.

1245
00:56:12,280 –> 00:56:16,480
You can probably generate 300 to 500,000 annually working alone.

1246
00:56:16,480 –> 00:56:18,080
You’re constrained by your own capacity.

1247
00:56:18,080 –> 00:56:19,680
You can only take on so many clients.

1248
00:56:19,680 –> 00:56:21,080
You can only work so many hours.

1249
00:56:21,080 –> 00:56:25,680
The boutique firm model with 5 to 10 people has lower margins, 40 to 50%,

1250
00:56:25,680 –> 00:56:28,680
but higher revenue potential, 1 to 3 million annually.

1251
00:56:28,680 –> 00:56:29,680
You’ve got leverage.

1252
00:56:29,680 –> 00:56:30,680
You’ve got team capacity.

1253
00:56:30,680 –> 00:56:32,280
You can take on larger engagements.

1254
00:56:32,280 –> 00:56:33,680
You can serve more clients.

1255
00:56:33,680 –> 00:56:35,880
You’re building a business that’s bigger than yourself.

1256
00:56:35,880 –> 00:56:39,080
The larger firm model with 20 or more people has even lower margins,

1257
00:56:39,080 –> 00:56:42,480
20 to 30%, but much higher revenue potential.

1258
00:56:42,480 –> 00:56:45,880
5 million or more annually, you’re running a full service consulting firm.

1259
00:56:45,880 –> 00:56:47,280
You’ve got multiple service lines.

1260
00:56:47,280 –> 00:56:48,480
You’ve got geographic reach.

1261
00:56:48,480 –> 00:56:52,880
You’ve got the ability to serve enterprise clients with complex multi-year engagements.

1262
00:56:52,880 –> 00:56:54,280
The choice depends on your goals.

1263
00:56:54,280 –> 00:56:57,680
If you want to maximize personal income, stay solo or build a small boutique.

1264
00:56:57,680 –> 00:57:01,480
If you want to build a scalable business that can be sold or scaled further,

1265
00:57:01,480 –> 00:57:03,680
invest in building a team and systems.

1266
00:57:03,680 –> 00:57:06,680
The key principle, higher for leverage, not to reduce your workload.

1267
00:57:06,680 –> 00:57:09,480
Each hire should allow you to take on more valuable work,

1268
00:57:09,480 –> 00:57:15,080
not just reduce your hours, a junior consultant should allow you to take on 2 to 3 times more remediation work.

1269
00:57:15,080 –> 00:57:18,880
A subject matter expert should allow you to take on more complex engagements

1270
00:57:18,880 –> 00:57:20,280
that command higher pricing.

1271
00:57:20,280 –> 00:57:23,280
A business operations person should allow you to focus on the work

1272
00:57:23,280 –> 00:57:24,680
that generates the most value.

1273
00:57:24,680 –> 00:57:27,880
This is the difference between hiring to reduce stress and hiring to scale.

1274
00:57:27,880 –> 00:57:29,880
One is tactical, the other is strategic.

1275
00:57:29,880 –> 00:57:31,680
You’re not hiring because you’re tired.

1276
00:57:31,680 –> 00:57:33,680
You’re hiring because you’ve identified leverage

1277
00:57:33,680 –> 00:57:36,280
that will increase your revenue and impact.

1278
00:57:36,280 –> 00:57:39,680
Specialization versus generalization, the strategic choice.

1279
00:57:39,680 –> 00:57:43,280
As you grow, you’ll face a choice that determines the trajectory of your business.

1280
00:57:43,280 –> 00:57:46,080
Go deeper in one domain or broader across domains.

1281
00:57:46,080 –> 00:57:49,280
This is the specialization versus generalization question

1282
00:57:49,280 –> 00:57:53,480
and it has profound implications for your positioning, pricing and market opportunity.

1283
00:57:53,480 –> 00:57:56,680
The specialist path means you focus on one control plane

1284
00:57:56,680 –> 00:57:59,080
and become the world’s expert in that domain.

1285
00:57:59,080 –> 00:58:00,920
Identity governance, for example, you know,

1286
00:58:00,920 –> 00:58:02,280
enter ID inside and out.

1287
00:58:02,280 –> 00:58:04,680
You understand every nuance of conditional access.

1288
00:58:04,680 –> 00:58:07,480
You can architect complex access models that others can’t.

1289
00:58:07,480 –> 00:58:09,880
You command premium pricing for identity work

1290
00:58:09,880 –> 00:58:12,080
because there are fewer specialists than generalists.

1291
00:58:12,080 –> 00:58:15,680
Specialists have less competition because there are fewer people willing to go deep enough

1292
00:58:15,680 –> 00:58:17,480
to become world class in one domain.

1293
00:58:17,480 –> 00:58:20,280
Most consultants stay generalists because it feels safer.

1294
00:58:20,280 –> 00:58:24,080
Browder market, more opportunities, less risk of market saturation,

1295
00:58:24,080 –> 00:58:25,480
but that safety comes at a cost.

1296
00:58:25,480 –> 00:58:28,480
You’re competing against everyone else who’s also a generalist.

1297
00:58:28,480 –> 00:58:31,480
You’re competing on price because you’re not differentiated.

1298
00:58:31,480 –> 00:58:34,480
The specialist path also gives you deeper expertise and faster execution.

1299
00:58:34,480 –> 00:58:36,880
You’ve solved identity governance problems a hundred times.

1300
00:58:36,880 –> 00:58:40,680
You know what works, you know what doesn’t, you know the edge cases, you know the gotchas.

1301
00:58:40,680 –> 00:58:42,480
A generalist is learning as they go.

1302
00:58:42,480 –> 00:58:44,480
A specialist is executing from experience.

1303
00:58:44,480 –> 00:58:46,680
This speed difference is worth money to the client.

1304
00:58:46,680 –> 00:58:50,880
It means faster remediation, faster time to value, faster risk reduction.

1305
00:58:50,880 –> 00:58:54,680
The downside of specialization is that you have a smaller addressable market.

1306
00:58:54,680 –> 00:58:56,080
You’re dependent on one domain.

1307
00:58:56,080 –> 00:59:00,280
If identity governance becomes commoditized or if the market shifts, you are vulnerable.

1308
00:59:00,280 –> 00:59:02,280
You’ve built your entire business around one thing.

1309
00:59:02,280 –> 00:59:04,680
If that thing changes, you have to change with it.

1310
00:59:04,680 –> 00:59:08,880
The generalist path means you offer comprehensive governance across all control planes.

1311
00:59:08,880 –> 00:59:11,880
Identity, productivity, infrastructure.

1312
00:59:11,880 –> 00:59:14,080
You can help clients with any governance problem.

1313
00:59:14,080 –> 00:59:18,080
You have a larger addressable market because you can serve clients with any governance need.

1314
00:59:18,080 –> 00:59:21,280
You have more opportunities for upselling because you can fix identity,

1315
00:59:21,280 –> 00:59:23,880
then sell productivity, then sell infrastructure.

1316
00:59:23,880 –> 00:59:28,280
The downside of generalization is that you’re competing against specialists in each domain

1317
00:59:28,280 –> 00:59:29,480
and you’re less differentiated.

1318
00:59:29,480 –> 00:59:31,880
You need deeper expertise across multiple domains.

1319
00:59:31,880 –> 00:59:33,080
Which is harder to build.

1320
00:59:33,080 –> 00:59:34,680
You’re a mile wide and an inch deep.

1321
00:59:34,680 –> 00:59:36,880
Specialists are an inch wide and a mile deep.

1322
00:59:36,880 –> 00:59:39,480
Clients with specific problems prefer the specialist.

1323
00:59:39,480 –> 00:59:43,080
The optimal path for most consultants is specialist with adjacent expertise.

1324
00:59:43,080 –> 00:59:46,680
You specialize in one control plane, identity governance, for example,

1325
00:59:46,680 –> 00:59:49,480
and develop adjacent expertise in the others.

1326
00:59:49,480 –> 00:59:51,480
This allows you to be the expert in your primary domain,

1327
00:59:51,480 –> 00:59:53,880
while also being able to handle related work.

1328
00:59:53,880 –> 00:59:56,680
Your primary expertise is identity governance,

1329
00:59:56,680 –> 01:00:00,080
but you understand how identity connects to productivity governance

1330
01:00:00,080 –> 01:00:04,080
through co-pilot access control and infrastructure governance through Azure R-Back.

1331
01:00:04,080 –> 01:00:08,080
This positioning allows you to be the primary consultant for identity work

1332
01:00:08,080 –> 01:00:12,080
while also being a trusted advisor for broader governance questions.

1333
01:00:12,080 –> 01:00:14,480
As you grow, you can hire specialists in the adjacent domains

1334
01:00:14,480 –> 01:00:17,680
and position yourself as the orchestrator of comprehensive governance.

1335
01:00:17,680 –> 01:00:20,280
This is the path that leads to a million plus business.

1336
01:00:20,280 –> 01:00:21,880
You become known for one domain.

1337
01:00:21,880 –> 01:00:24,880
You build a team of specialists in other domains.

1338
01:00:24,880 –> 01:00:27,680
You position yourself as the architect who brings it all together.

1339
01:00:27,680 –> 01:00:29,680
The client’s primary relationship is with you.

1340
01:00:29,680 –> 01:00:31,080
You understand their business.

1341
01:00:31,080 –> 01:00:32,880
You understand their risk profiles.

1342
01:00:32,880 –> 01:00:34,080
You coordinate the specialists.

1343
01:00:34,080 –> 01:00:36,480
You ensure consistency across all control planes.

1344
01:00:36,480 –> 01:00:38,480
This is also how you build a responsibility.

1345
01:00:38,480 –> 01:00:41,680
If you’re the identity governance expert in the Microsoft ecosystem,

1346
01:00:41,680 –> 01:00:44,280
you’re the obvious choice when someone needs identity working.

1347
01:00:44,280 –> 01:00:46,880
If you’ve built a team of specialists in other domains,

1348
01:00:46,880 –> 01:00:49,680
you’re also the obvious choice for comprehensive governance.

1349
01:00:49,680 –> 01:00:52,280
You’ve made yourself indispensable because you’re the only person

1350
01:00:52,280 –> 01:00:55,080
who understands all the pieces and how they fit together.

1351
01:00:55,080 –> 01:00:58,680
The specialist with adjacent expertise path also allows you to scale

1352
01:00:58,680 –> 01:00:59,880
without losing focus.

1353
01:00:59,880 –> 01:01:01,480
You’re not trying to be everything to everyone.

1354
01:01:01,480 –> 01:01:02,880
You’re the expert in one domain.

1355
01:01:02,880 –> 01:01:04,880
You’re the coordinator of comprehensive governance.

1356
01:01:04,880 –> 01:01:07,880
You’re the architect who understands how systems work at scale.

1357
01:01:07,880 –> 01:01:11,280
This is the positioning that generates sustainable, scalable revenue.

1358
01:01:11,280 –> 01:01:14,280
This is the positioning that allows you to command premium pricing.

1359
01:01:14,280 –> 01:01:17,480
This is the positioning that separates commodity consultants

1360
01:01:17,480 –> 01:01:19,480
from architects of necessity.

1361
01:01:19,480 –> 01:01:21,880
The 12-month plan to 100 K-plus.

1362
01:01:21,880 –> 01:01:25,080
Let’s put this all together into a concrete plan for the next 12 months.

1363
01:01:25,080 –> 01:01:28,880
This is how you move from commodity consultant to architect of necessity.

1364
01:01:28,880 –> 01:01:32,680
This is how you build a business that generates consistent premium revenue.

1365
01:01:32,680 –> 01:01:33,880
Months 1 and 2.

1366
01:01:33,880 –> 01:01:35,880
Positioning and content foundation.

1367
01:01:35,880 –> 01:01:37,880
Start by rewriting your LinkedIn profile.

1368
01:01:37,880 –> 01:01:39,480
Remove the builder language.

1369
01:01:39,480 –> 01:01:41,280
Replace it with architect language.

1370
01:01:41,280 –> 01:01:43,880
You’re not implementing power apps and Azure solutions.

1371
01:01:43,880 –> 01:01:47,680
You’re architecting control systems that reduce architectural entropy

1372
01:01:47,680 –> 01:01:49,480
and enforce governance at scale.

1373
01:01:49,480 –> 01:01:51,080
Your headline isn’t about tools.

1374
01:01:51,080 –> 01:01:52,280
It’s about outcomes.

1375
01:01:52,280 –> 01:01:54,280
Your about section isn’t about your certifications.

1376
01:01:54,280 –> 01:01:57,080
It’s about the problems you solve and the frameworks you’ve developed.

1377
01:01:57,080 –> 01:02:00,080
Create a 10-point framework for assessing control plane maturity.

1378
01:02:00,080 –> 01:02:01,880
This is your intellectual property.

1379
01:02:01,880 –> 01:02:04,080
This is what differentiates you from everyone else.

1380
01:02:04,080 –> 01:02:05,480
It doesn’t have to be complicated.

1381
01:02:05,480 –> 01:02:06,280
It’s a checklist.

1382
01:02:06,280 –> 01:02:09,080
10 questions that assess the maturity of identity governance,

1383
01:02:09,080 –> 01:02:11,480
productivity governance and infrastructure governance.

1384
01:02:11,480 –> 01:02:13,480
You’ll use this framework in assessments.

1385
01:02:13,480 –> 01:02:14,280
You’ll publish it.

1386
01:02:14,280 –> 01:02:16,280
You’ll build your entire positioning around it.

1387
01:02:16,280 –> 01:02:20,080
Publish your first five long-form pieces on architectural entropy and governance.

1388
01:02:20,080 –> 01:02:21,280
These are LinkedIn articles.

1389
01:02:21,280 –> 01:02:22,280
Block posts.

1390
01:02:22,280 –> 01:02:23,280
Medium pieces.

1391
01:02:23,280 –> 01:02:24,680
The titles are provocative.

1392
01:02:24,680 –> 01:02:28,080
Why your cloud migration is creating more risk than it’s solving?

1393
01:02:28,080 –> 01:02:31,080
The hidden cost of unmanaged power platform flows.

1394
01:02:31,080 –> 01:02:32,280
Identity drift.

1395
01:02:32,280 –> 01:02:35,080
The invisible tax on your security budget.

1396
01:02:35,080 –> 01:02:36,680
You’re not writing tutorials.

1397
01:02:36,680 –> 01:02:38,080
You’re writing thought leadership.

1398
01:02:38,080 –> 01:02:39,080
You’re naming problems.

1399
01:02:39,080 –> 01:02:40,080
You’re offering frameworks.

1400
01:02:40,080 –> 01:02:42,080
You’re building authority.

1401
01:02:42,080 –> 01:02:45,080
Identify 50 target companies with entropy signals.

1402
01:02:45,080 –> 01:02:48,080
These are companies that have announced cloud initiatives,

1403
01:02:48,080 –> 01:02:50,880
suffered breaches or are facing regulatory pressure.

1404
01:02:50,880 –> 01:02:52,280
You’re going to reach out to them.

1405
01:02:52,280 –> 01:02:54,280
You’re going to start the outbound process.

1406
01:02:54,280 –> 01:02:56,080
You’re going to begin building your pipeline.

1407
01:02:56,080 –> 01:02:58,280
Start personalized outbound outreach.

1408
01:02:58,280 –> 01:02:59,680
Five to 10 emails per week.

1409
01:02:59,680 –> 01:03:01,080
These are not generic emails.

1410
01:03:01,080 –> 01:03:03,680
These are personalized to the company’s situation.

1411
01:03:03,680 –> 01:03:05,880
You’re referencing their specific entropy signal.

1412
01:03:05,880 –> 01:03:07,480
You’re asking a specific question.

1413
01:03:07,480 –> 01:03:08,680
You’re starting conversations.

1414
01:03:08,680 –> 01:03:10,080
You’re planting seeds.

1415
01:03:10,080 –> 01:03:11,480
Months three and four.

1416
01:03:11,480 –> 01:03:13,280
Thought leadership and pipeline.

1417
01:03:13,280 –> 01:03:14,880
Continue publishing content.

1418
01:03:14,880 –> 01:03:16,480
Two to three LinkedIn posts per week.

1419
01:03:16,480 –> 01:03:18,680
Engage with other architects and security leaders.

1420
01:03:18,680 –> 01:03:19,880
Comment on their posts.

1421
01:03:19,880 –> 01:03:20,880
Build relationships.

1422
01:03:20,880 –> 01:03:22,680
Share your case studies and frameworks.

1423
01:03:22,680 –> 01:03:24,680
Make them specific enough to be useful,

1424
01:03:24,680 –> 01:03:27,480
but abstract enough to be applicable across industries.

1425
01:03:27,480 –> 01:03:29,480
Your outbound is generating responses now.

1426
01:03:29,480 –> 01:03:30,880
You’re getting discovery conversations.

1427
01:03:30,880 –> 01:03:32,280
You’re pitching assessments.

1428
01:03:32,280 –> 01:03:35,080
Summer saying, yes, you’re closing your first assessment engagement.

1429
01:03:35,080 –> 01:03:36,480
This is your proof of concept.

1430
01:03:36,480 –> 01:03:37,680
This is your first case study.

1431
01:03:37,680 –> 01:03:39,480
This is your first opportunity to prove

1432
01:03:39,480 –> 01:03:40,480
that the framework works.

1433
01:03:40,480 –> 01:03:41,880
Continue outbound outreach.

1434
01:03:41,880 –> 01:03:43,680
You’re now running a systematic process.

1435
01:03:43,680 –> 01:03:44,680
Research companies.

1436
01:03:44,680 –> 01:03:46,080
Identify entropy signals.

1437
01:03:46,080 –> 01:03:47,280
Personalize emails.

1438
01:03:47,280 –> 01:03:48,080
Follow up.

1439
01:03:48,080 –> 01:03:50,880
You’re getting two to four discovery conversations per month.

1440
01:03:50,880 –> 01:03:53,480
That’s converting to one assessment engagement per month.

1441
01:03:53,480 –> 01:03:54,880
You’re building pipeline.

1442
01:03:54,880 –> 01:03:56,080
Months five and six.

1443
01:03:56,080 –> 01:03:57,880
First assessment and remediation.

1444
01:03:57,880 –> 01:03:59,480
Your first assessment is underway.

1445
01:03:59,480 –> 01:04:00,880
You’re in the client’s environment.

1446
01:04:00,880 –> 01:04:02,480
You’re analyzing their control planes.

1447
01:04:02,480 –> 01:04:03,680
You’re identifying entropy.

1448
01:04:03,680 –> 01:04:04,680
You’re quantifying risk.

1449
01:04:04,680 –> 01:04:05,880
You’re building the report.

1450
01:04:05,880 –> 01:04:07,280
This is where you prove your value.

1451
01:04:07,280 –> 01:04:09,280
This is where you show that the framework works.

1452
01:04:09,280 –> 01:04:11,280
You’re also closing your second assessment.

1453
01:04:11,280 –> 01:04:12,480
Your outbound is working.

1454
01:04:12,480 –> 01:04:13,880
Your positioning is working.

1455
01:04:13,880 –> 01:04:15,280
You’re getting inbound inquiries now.

1456
01:04:15,280 –> 01:04:16,880
People who’ve engaged with your content.

1457
01:04:16,880 –> 01:04:18,680
People who understand the problem.

1458
01:04:18,680 –> 01:04:20,080
People who are ready to buy.

1459
01:04:20,080 –> 01:04:21,280
By the end of month six,

1460
01:04:21,280 –> 01:04:22,680
your first assessment is complete.

1461
01:04:22,680 –> 01:04:24,080
You’re presenting the report.

1462
01:04:24,080 –> 01:04:25,080
The client is shocked.

1463
01:04:25,080 –> 01:04:26,680
They didn’t know they had this much entropy.

1464
01:04:26,680 –> 01:04:28,680
They didn’t know the risk was this high.

1465
01:04:28,680 –> 01:04:29,880
They’re ready to remediate.

1466
01:04:29,880 –> 01:04:31,880
You’re closing your first remediation engagement.

1467
01:04:31,880 –> 01:04:34,480
This is 120 to 150,000 dollars.

1468
01:04:34,480 –> 01:04:36,280
This is your first big deal.

1469
01:04:36,280 –> 01:04:37,680
Months seven through nine.

1470
01:04:37,680 –> 01:04:40,080
Remediation execution and pipeline building.

1471
01:04:40,080 –> 01:04:41,680
Your first remediation is underway.

1472
01:04:41,680 –> 01:04:42,880
Your deploying controls.

1473
01:04:42,880 –> 01:04:43,680
Your training teams.

1474
01:04:43,680 –> 01:04:44,880
Your building governance.

1475
01:04:44,880 –> 01:04:46,080
This is the real work.

1476
01:04:46,080 –> 01:04:48,280
This is where you prove that you can execute.

1477
01:04:48,280 –> 01:04:51,280
This is where you build the case study that changes everything.

1478
01:04:51,280 –> 01:04:52,880
Your outbound is still running.

1479
01:04:52,880 –> 01:04:54,080
Your closing assessments.

1480
01:04:54,080 –> 01:04:55,880
Your closing your second remediation.

1481
01:04:55,880 –> 01:04:57,280
Your building pipeline.

1482
01:04:57,280 –> 01:04:58,680
You’re getting inbound leads now.

1483
01:04:58,680 –> 01:04:59,880
People who’ve seen your content.

1484
01:04:59,880 –> 01:05:01,680
People who’ve engaged with your framework.

1485
01:05:01,680 –> 01:05:02,880
People who are ready to buy.

1486
01:05:02,880 –> 01:05:04,080
By the end of month nine,

1487
01:05:04,080 –> 01:05:05,680
your first remediation is complete.

1488
01:05:05,680 –> 01:05:06,880
You’re presenting the outcomes.

1489
01:05:06,880 –> 01:05:09,680
Roll assignments reduced by 85%.

1490
01:05:09,680 –> 01:05:11,680
Prove-ledged accounts brought under control.

1491
01:05:11,680 –> 01:05:12,680
Compliance gaps closed.

1492
01:05:12,680 –> 01:05:13,680
The client is impressed.

1493
01:05:13,680 –> 01:05:15,480
They’re ready for the advisory retainer.

1494
01:05:15,480 –> 01:05:18,280
Your closing your first ten thousand dollar per month retainer.

1495
01:05:18,280 –> 01:05:20,880
Months ten through twelve retainer and scaling.

1496
01:05:20,880 –> 01:05:22,280
You’ve got your first retainer.

1497
01:05:22,280 –> 01:05:24,280
You’ve got two remediation engagements in flight.

1498
01:05:24,280 –> 01:05:26,280
You’ve got three to four assessments in your pipeline.

1499
01:05:26,280 –> 01:05:28,280
Your generating consistent revenue.

1500
01:05:28,280 –> 01:05:29,880
Your building a predictable business.

1501
01:05:29,880 –> 01:05:31,680
Your thought leadership is paying dividends.

1502
01:05:31,680 –> 01:05:34,080
Your getting inbound leads without prospecting.

1503
01:05:34,080 –> 01:05:36,280
Your getting referrals from satisfied clients.

1504
01:05:36,280 –> 01:05:38,280
Your getting speaking opportunities.

1505
01:05:38,280 –> 01:05:39,680
Your getting media inquiries.

1506
01:05:39,680 –> 01:05:43,080
You’re becoming known as the architect of necessity in the Microsoft ecosystem.

1507
01:05:43,080 –> 01:05:44,280
By the end of month twelve,

1508
01:05:44,280 –> 01:05:47,080
you’ve generated one hundred to one hundred fifty thousand in revenue.

1509
01:05:47,080 –> 01:05:48,280
You’ve got one retainer.

1510
01:05:48,280 –> 01:05:50,880
You’ve got two remediation engagements completed.

1511
01:05:50,880 –> 01:05:52,480
You’ve got a pipeline of assessments.

1512
01:05:52,480 –> 01:05:55,680
You’re on track to hit two hundred to three hundred thousand in year two.

1513
01:05:55,680 –> 01:05:57,080
This is the twelve month plan.

1514
01:05:57,080 –> 01:06:00,880
This is how you move from commodity consultant to architect of necessity.

1515
01:06:00,880 –> 01:06:04,080
This is how you build a business that generates consistent premium revenue.

1516
01:06:04,080 –> 01:06:06,280
This is how you hit one hundred K plus.

1517
01:06:06,280 –> 01:06:07,280
The real work.

1518
01:06:07,280 –> 01:06:08,480
You now have the framework.

1519
01:06:08,480 –> 01:06:09,480
You have the positioning.

1520
01:06:09,480 –> 01:06:10,680
You have the pricing model.

1521
01:06:10,680 –> 01:06:12,680
You have the client acquisition strategy.

1522
01:06:12,680 –> 01:06:17,480
You know how to position yourself as an architect of necessity instead of a feature builder.

1523
01:06:17,480 –> 01:06:19,480
You know how to price governance instead of projects.

1524
01:06:19,480 –> 01:06:23,080
You know how to build a business around risk mitigation instead of hours.

1525
01:06:23,080 –> 01:06:24,080
But here’s what matters.

1526
01:06:24,080 –> 01:06:26,080
This only works if you actually execute.

1527
01:06:26,080 –> 01:06:30,080
If you stay positioned as a builder, if you compete on cost, if you give away discovery,

1528
01:06:30,080 –> 01:06:31,080
nothing changes.

1529
01:06:31,080 –> 01:06:32,880
The framework only works if you apply it.

1530
01:06:32,880 –> 01:06:37,080
Start small, run one assessment, charge for it, get a risk report into a client’s hands,

1531
01:06:37,080 –> 01:06:40,680
see what happens, see how they react when you quantify the entropy they didn’t know they had.

1532
01:06:40,680 –> 01:06:44,080
See how fast they want to remediate once they understand the cost of inaction.

1533
01:06:44,080 –> 01:06:46,280
That’s when you’ll understand that this isn’t theory.

1534
01:06:46,280 –> 01:06:48,880
This is how consulting actually works at the top level.

1535
01:06:48,880 –> 01:06:52,480
The consultants making one hundred K plus aren’t smarter than you.

1536
01:06:52,480 –> 01:06:54,280
They’re not better at coding or configuring.

1537
01:06:54,280 –> 01:06:55,880
They’re just positioned differently.

1538
01:06:55,880 –> 01:06:59,880
They sell necessity, not features and necessity always beats cost.

1539
01:06:59,880 –> 01:07:03,480
If this episode helped you think differently about your consulting business,

1540
01:07:03,480 –> 01:07:05,280
please leave a review wherever you’re listening.

1541
01:07:05,280 –> 01:07:06,680
Reviews tell us what resonates.

1542
01:07:06,680 –> 01:07:08,480
They tell us what you want to hear more about.

1543
01:07:08,480 –> 01:07:10,680
They help other architects find this conversation.

1544
01:07:10,680 –> 01:07:12,880
If you want to share your own entropy story,

1545
01:07:12,880 –> 01:07:15,480
discuss how you’re repositioning your consulting practice

1546
01:07:15,480 –> 01:07:21,480
or suggest a future episode topic, connect with Mirko Peters on LinkedIn at M365 show.

1547
01:07:21,480 –> 01:07:22,480
He reads every message.

1548
01:07:22,480 –> 01:07:27,480
He’s building this community of architects who understand that governance is where the premium revenue lives.

1549
01:07:27,480 –> 01:07:30,680
Until next time, stop building features, start architecting control.



Source link

0 Votes: 0 Upvotes, 0 Downvotes (0 Points)

Leave a reply

Follow
Search
Loading

Signing-in 3 seconds...

Signing-up 3 seconds...

Discover more from 365 Community Online

Subscribe now to keep reading and get access to the full archive.

Continue reading