In this MailBag episode, Jeff Steadman and Jim McDonald tackle eight questions submitted by listeners from around the world, including Munich, Sao Paulo, Singapore, Toronto, Hanoi, London, Sydney, and Chicago. The conversation covers governing AI and non-human identities, practical first steps toward passwordless adoption, what a mature IAM program actually looks like, who should own identity within an organization, building credibility with leadership as a new IAM practitioner, enforcing least privilege in practice, rethinking access reviews beyond checkbox compliance, and how to make the business case for identity security investment before a breach occurs. The episode wraps up with some lighter listener questions about sports analogies for IAM roles and whether anyone in their personal lives actually understands what they do for a living. Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com TIMESTAMPS 00:00 - Introduction and RSA Conference debate 03:41 - Conference plans for 2026: EIC, Identiverse, and Authenticate 05:17 - MailBag intro and how questions get selected 06:51 - Q1 (Hans, Munich): Governing AI access vs. human access — same principles or a different approach? 12:32 - Q2 (Gabriela, Sao Paulo): Realistic first steps toward passwordless without disrupting everything 18:34 - Q3 (Wei, Singapore): What does a mature identity program actually look like? 30:26 - Q4 (Marcus, Toronto): When IT and security both claim to own identity, how do you sort it out? 39:33 - Q5 (Linh, Hanoi): Building credibility and influence as someone new to the IAM space 42:53 - Q6 (Claire, London): Enforcing least privilege in practice without slowing down the business 46:14 - Q7 (James, Sydney): Are access reviews just a checkbox exercise, and is there a better way? 49:18 - Q8 (Darnell, Chicago): Making the case to a CFO or CEO for identity security investment before a breach 52:38 - Lighter note: If IAM was a sport, what position would you play? 1:00:27 - Lighter note: Does your family actually understand what you do? 1:03:06 - Wrap-up and how to submit future questions KEYWORDS IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, identity and access management, MailBag, non-human identity, AI governance, agentic AI, passwordless, passkeys, IAM program maturity, identity ownership, RACI, least privilege, zero standing privilege, access reviews, security theater, identity security budget, business case for IAM, ISPM, IGA, IDPro, Identiverse, EIC, Authenticate conference, RSA conference, cybersecurity podcast, identity security, identity community