Skip to main content
Advisory & Strategy

Clear direction before you start. Clarity before you build.

CEO-led advisory engagements that start with understanding your business, not recommending a product. We help you see where you are, define where you need to be, and build a roadmap you can actually deliver.

Advisory at Modern 42

CEO-led. Technically rigorous. Vendor-neutral.

Our CEO has decades of experience working alongside CISOs, IAM architects, and executive stakeholders in some of the most complex and secure environments in Australia. That experience is not behind a desk. She is directly involved in every advisory engagement, which means you get someone who can translate business pain points into technical direction and hold both conversations at the same time.

Advisory engagements don't begin with a product recommendation. They begin with a rigorous understanding of the current state, the business objectives, and the constraints: budget, compliance, team capability, and existing technology investment.

The output is a clear picture of where you are, where you need to be, and a prioritised path to get there. Recommendations are grounded in the platforms you already have wherever possible.

What advisory engagements include

  • Advisory backed by decades of experience
  • Current state assessment
  • Gap analysis against frameworks (Essential Eight, ISO 27001, NIST)
  • Target architecture definition
  • Prioritised roadmap
  • Business case support
  • Assistance with FinOps and Chargeback models where required
  • IGA project interventions if required
When to engage advisory

Common triggers for an advisory engagement.

These are the situations we most commonly see when organisations first reach out. If any apply to you, it's worth a conversation.

  • New CISO or security lead establishing a baseline
  • Upcoming APRA, IRAP, or ISO 27001 audit
  • Post-incident review requiring identity control assessment
  • Board or executive requesting a security posture report
  • Planning a major platform migration (Entra ID, BeyondTrust)
  • Merger or acquisition requiring identity consolidation
  • An IGA or PAM project has stalled and requires an intervention.
  • Your IAM tooling is legacy and needs to be replaced.
Case Studies

Advisory that shaped real outcomes

Strategy, architecture and roadmap engagements that gave organisations clarity and direction.

Federal Government01

IAM Strategy and Architecture for a Federal Department

Conducted a thorough current state analysis, developed the IAM strategy, roadmap, target architecture and high-level design, giving the department a clear, sequenced plan for transformation aligned to ASD ISM and Essential Eight.

Multi-year partnershipStrategy through engineeringASD ISM aligned
Financial Services02

Digital Identity Blueprint for a Major Bank

Delivered seven interconnected architecture and strategy artefacts for a major Australian bank undergoing digital transformation, including CIAM reference architecture, cyber strategy, and the technology blueprint for a Digital Front Door.

7 strategy artefactsCross-stakeholder alignmentAPRA CPS 234 aligned
Healthcare03

IAM Strategy and Conditional Access Uplift for a National Health Organisation

Defined the IAM strategy and three-year roadmap for a national critical infrastructure health organisation. Delivered Conditional Access uplift, CIAM blueprint, and data-driven insights via Apporetum to inform prioritisation.

Critical infrastructure3-year roadmapCA uplift delivered
FAQ

Questions about advisory engagements

It depends on scope. An Identity Maturity Assessment typically takes two to three weeks end-to-end. A full IAM & PAM Strategy and Roadmap usually takes four to six weeks. Architecture advisory can be a single workshop or a multi-week engagement, depending on complexity.
Our CEO leads many strategic advisory engagements, supported by her senior consultants with deep Microsoft, BeyondTrust and enterprise compliance expertise. This means you get direct access to the person accountable for the consultancy's delivery quality.
Often, yes. Advisory defines what should be built, and our engineering team delivers it. You are never obligated to use our engineering services after an advisory engagement, but many clients choose to because the advisory team has already built deep context about the environment.
Yes. We regularly collaborate with other firms on complex programmes. Our advisors bring specific IAM and PAM depth that generalist security firms typically don't have.
Yes. We don't like to reinvent the wheel. Where we have existing frameworks, assessment templates, or strategy blueprints that cater for your needs, we use them and the price reflects that. We would rather start from a proven foundation than waste time rebuilding the same document from scratch.

Understand your identity posture

A structured advisory engagement gives you the baseline and the roadmap. Start with a conversation about your current environment.

We use cookies

We use cookies and similar technologies to help personalise content, measure the performance of our site, and provide a better experience. By clicking Accept, you consent to the use of all cookies.
Learn more.