Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or what failed a control check. That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be