IAM Governance & Strategy
Analyse the full IAM landscape, define governance models and improve alignment between policy, process and technology.
Cybersecurity consultancy
Awakened Path provides strategic Identity & Access Management advisory for organisations that need strong governance, implementable controls and credible assurance across complex enterprise environments.
Services
Help organisations strengthen Identity & Access Management by aligning CISO policy, engineering realities and operational evidence requirements.
Analyse the full IAM landscape, define governance models and improve alignment between policy, process and technology.
Identify gaps between security requirements and implementation capabilities, then sharpen policies so they are both effective and achievable.
Assess identity-related risks, control maturity and process weaknesses, then define practical improvement roadmaps.
Support engineering teams with IAM and MFA-related control implementation guidance without taking over the coding or platform work.
Provide strategic advice to CISO functions and leadership teams on how to translate security strategy into consistent execution.
Develop detailed, audit-ready instructions so teams know what good evidence looks like and where to obtain it across their platforms.
Specialist profile
An experienced security professional with a background that combines engineering, delivery leadership and IAM risk expertise. That combination enables a rare perspective: understanding both the control intent of second-line and CISO functions and the operational reality faced by engineering teams.
He operates across the full IAM landscape, identifying gaps between policy requirements and the tooling and technical possibilities available to engineers. He works closely with tooling owners, engineering teams and CISO stakeholders to improve both implementation quality and policy realism.
Core capabilities and expertise areas
Determines the gaps between CISO policy requirements and the evidence engineering teams can realistically provide, then translates those findings into workable control guidance.
Supports teams that are blocked in IAM-related implementation topics such as MFA, explaining what is tested, why it matters and what evidence is sufficient for compliance.
Writes detailed engineering instructions that standardise the execution of IAM controls and improve audit readiness.
Brings practical knowledge of environments including OpenShift containers, Linux, Oracle, Sybase and Windows to identify exactly where required control evidence can be obtained.
Trains FLM teams and other stakeholders on how IAM technologies work and how to assess the quality of implementation evidence.
Communicates effectively with engineering teams, tooling owners, CISO functions, management and board-level stakeholders.
Approach
Review policy, governance, tooling and operational practices to understand the current state.
Map the differences between security expectations, technical possibilities and the evidence needed for compliance.
Work with CISO teams, tooling owners and engineers to sharpen policy, remove ambiguity and define practical next steps.
Provide guidance, evidence standards, training and improvement roadmaps that increase maturity over time.
Measuring first-time-right delivery and reducing evidence cycle time
Professional background
Led IAM task-force activities for ING Daily Banking, aligned security controls with audit requirements and built IAM improvement plans.
Hosted make-athons and awareness sessions, helping large groups of engineers evidence controls and understand IAM requirements.
Earlier roles included chapter lead, product owner, integration leadership and software engineering, creating a broad delivery perspective.
Contact
Available for project-based consultancy and temporary IAM support.
|
Email Location |
|