In this session we will discuss the changes that have occurred in the last 18 months that have rendered traditional IAM tools such as PAM, IGA, and AM obsolete or ineffective. To understand why we need to have a close look at the expanding enterprise attack surface and the current threat landscape. Organizations that have deployed these solutions in a fragmented fashion are at risk, and the risk continues to grow with organizations trying to cope with a lack of cyber skills and cloud initiatives. We will discuss not only why organizations are at risk with these tools, but how overcome them.