Tushar Pansare

Tushar Pansare

@tusharopeniam
Joined May 2025 Mumbai, India
31 Writeups
Popular WriteUps
View all →
Recent Activity
Tushar Pansare posted a new writeup in Technology 4h ago
The Hidden Cost of Treating IAM as a Governance Platform
Technology The Hidden Cost of Treating IAM as a Governance Platform

Many enterprises mistakenly believe that their Identity and Access Management (IAM) systems can govern access as effectively as they enforce it. However, this assumption leads to governance programs that may appear functional at first glance but ultimately fail under scrutiny. Discover the critical differences between enforcement and oversight that can expose significant governance gaps in your organization.


Tushar Pansare posted a new writeup in Cybersecurity Apr 22, 2026
What Actually Breaks Access Certification Programs (It's Not What You Think)
Cybersecurity What Actually Breaks Access Certification Programs (It's Not What You Think)

Despite timely reviews and clean reports, many organizations still struggle with risky access issues. The core problem isn't process failure but rather a lack of informed decision-making during access reviews. Discover the hidden flaws in IGA program designs that prevent effective governance and learn how to transform access reviews into meaningful evaluations.


Tushar Pansare posted a new writeup in Cybersecurity Apr 15, 2026
Manufacturing Identity Security Is No Longer an IT Problem — It's a Business Risk
Cybersecurity Manufacturing Identity Security Is No Longer an IT Problem — It's a Business Risk

Infographic mapping a complex manufacturing ecosystem, highlighting vulnerability points created by unmanaged, accumulated digital access keys of suppliers and contractors.


Tushar Pansare started following
Apr 15, 2026
Business
637 followers · 1442 new writeups this week
Tushar Pansare posted a new writeup in Technology Apr 9, 2026
Why Role Changes Between Quarterly Access Reviews Create Hidden Risk
Technology Why Role Changes Between Quarterly Access Reviews Create Hidden Risk

Infographic illustrating access drift and the accumulation of legacy permissions during employee role changes.


Tushar Pansare posted a new writeup in Cybersecurity Apr 3, 2026
Why Access Reviews Don’t Fail During Certification — They Fail After
Cybersecurity Why Access Reviews Don’t Fail During Certification — They Fail After

A split-screen illustration titled 'Before vs After Certification.' The left side shows a clean 'Complete' status on an audit dashboard (The Illusion). The right side shows a chaotic web of broken gears, ticket systems, and active user permissions labeled 'The Reality' of failed remediation.


Tushar Pansare posted a new writeup in Business Mar 30, 2026
The Governance Illusion: Why Enterprise Access Reviews Are Failing in the SaaS Era
Business The Governance Illusion: Why Enterprise Access Reviews Are Failing in the SaaS Era

Why Your Access Review Is Lying to You (& How SaaS Made It Worse)


Tushar Pansare posted a new writeup in Cybersecurity Mar 24, 2026
Your Governance Program Does Not Need to Wait for IAM Modernization
Cybersecurity Your Governance Program Does Not Need to Wait for IAM Modernization

Improving Identity Governance Controls Without Platform Modernization


Tushar Pansare posted a new writeup in Legal Mar 17, 2026
Access Review Fatigue Is Not a People Problem. It Is a Design Problem
Legal Access Review Fatigue Is Not a People Problem. It Is a Design Problem

Why Access Review Completion Rates Don't Equal Risk Reduction: Solving the Fatigue Problem


Tushar Pansare posted a new writeup in Cybersecurity Mar 16, 2026
When Identity Governance Becomes an Audit Ritual
Cybersecurity When Identity Governance Becomes an Audit Ritual

Is your IGA program reducing risk or just passing audits? Discover why identity governance often becomes a "compliance ritual" and how to shift from binary checkpoints to longitudinal risk reduction.


Tushar Pansare posted a new writeup Feb 24, 2026
Audit-Driven Identity Governance: How to Transition to a Risk-Based Model
Audit-Driven Identity Governance: How to Transition to a Risk-Based Model

In financial services, healthcare systems, and government agencies, identity governance often begins with a familiar objective: Pass the audit.&n

Tushar Pansare
Tushar Pansare · 10 min read
Read More →

Tushar Pansare posted a new writeup in Business Feb 17, 2026
Incomplete Access Reviews: A Growing Enterprise Security Risk and How to Resolve It
Business Incomplete Access Reviews: A Growing Enterprise Security Risk and How to Resolve It

Access reviews are a foundational control in enterprise security and compliance programs. They are designed to ensure that users have only the access


Tushar Pansare posted a new writeup in Cybersecurity Feb 13, 2026
Why Access Reviews Keep Failing in Regulated, Hybrid Environments
Cybersecurity Why Access Reviews Keep Failing in Regulated, Hybrid Environments

Access reviews are a required control in regulated organizations, but they are also one of the least trusted. In hybrid environments, reviews often be


Tushar Pansare posted a new writeup in Cybersecurity Feb 6, 2026
Your Access Reviews Are Lying to You (and Auditors Know It)
Cybersecurity Your Access Reviews Are Lying to You (and Auditors Know It)

Manual access reviews, Audit risk, Identity governance.


Tushar Pansare posted a new writeup in Cybersecurity Feb 3, 2026
What Identity Governance Really Means in Modern Enterprises
Cybersecurity What Identity Governance Really Means in Modern Enterprises

Identity governance has become a critical security and compliance topic for enterprises, yet it remains widely misunderstood. Often reduced to access


Tushar Pansare posted a new writeup in Cybersecurity Jan 19, 2026
How to Make Keycloak Truly Enterprise Ready
Cybersecurity How to Make Keycloak Truly Enterprise Ready

 Keycloak is powerful. It gives developers an open source platform for authentication, federation, social login, and single sign-on. But open sou


Tushar Pansare posted a new writeup in Business Jan 6, 2026
Workday Knows Your Workforce—But Who Controls Access?
Business Workday Knows Your Workforce—But Who Controls Access?

Workday has become the backbone of workforce operations for modern enterprises. It tracks who is hired, promoted, transferred, or exits the organizati


Tushar Pansare posted a new writeup in Technology Dec 22, 2025
  One Identity to Rule Them All? It’s Closer Than You Think.
Technology One Identity to Rule Them All? It’s Closer Than You Think.

Most modern enterprises have grown into two distinct ecosystems. One is built in the cloud, Microsoft 365, SaaS platforms, and apps protected by Micro


Tushar Pansare posted a new writeup in Finance Dec 20, 2025
Oracle Fusion Integrations Don’t Fail Because of Tech — They Fail Because of Access
Finance Oracle Fusion Integrations Don’t Fail Because of Tech — They Fail Because of Access

Oracle Fusion Applications are built to run the nerve center of your enterprise. HR lives in Fusion HCM. Finance depends on Fusion ERP. Supply chain o

Tushar Pansare
Tushar Pansare · 11 min read
Read More →

Tushar Pansare posted a new writeup in Business Dec 16, 2025
Automating SQL Server Access: The Smarter Way to Manage Database Security
Business Automating SQL Server Access: The Smarter Way to Manage Database Security

Picture this: A former employee who left your company three months ago still has active credentials to your SQL Server production database. Your team&

Tushar Pansare
Tushar Pansare · 11 min read
Read More →