The Strategic Value of AI-Driven Physical Identity and Access Management
IEEE ICSSAS 2026 • International Conference on Smart Systems and Advanced Security
Hello, I'm
Identity Governance • Regulatory Compliance • IEEE & ACM Reviewer • CISM, CISA
US Head of IAM Operations at Santander Bank, N.A. Building identity and access management programs that meet the highest bar of regulatory scrutiny in global banking. IEEE & ACM peer reviewer, published author, and awards judge.
I build identity and access management programs that meet the highest bar of regulatory scrutiny in global banking — spanning 200,000+ digital identities across workforce, privileged, and non-human accounts.
As US Head of IAM Operations at Santander Bank, N.A., I lead enterprise identity governance within one of the most complex regulated environments in financial services. The work spans Federal Reserve, OCC, FDIC, and FFIEC oversight, and has consistently delivered clean audit outcomes since 2017. At the center of my work is the Zero-Defect IAM Policy Framework — a methodology that embeds compliance directly into control design. PwC recognized elements of the framework as industry-leading.
Beyond operations, I contribute as an IEEE and ACM peer reviewer, published author, and cybersecurity awards judge. MS in Computer Science and Information Systems from the University of Michigan. 15+ years across banking, telecom, and aviation.
View Full ProfileSailPoint IdentityIQ engineering, Joiner-Mover-Leaver lifecycle management, and access recertification at enterprise scale.
Designing and operating PAM solutions for privileged accounts, service accounts, and API credentials across hybrid infrastructure.
Federal Reserve, OCC, FDIC, and FFIEC regulatory readiness. Zero-Defect IAM Policy Framework for audit-grade control design.
Implementing Zero Trust controls for workforce and machine identities across hybrid cloud and on-premises environments.
Governance programs for service accounts, API credentials, and machine identities that traditional IAM overlooks.
Leveraging AI for identity risk detection, access anomaly identification, and intelligent governance automation.
Enterprise platforms, commercial products, published apps, and passion projects — systems I designed, built, and shipped across my career.
Designed and built a real-time executive dashboard for a top-10 US bank, providing leadership and regulators instant visibility into hundreds of applications, hundreds of thousands of accounts, and compliance posture across multiple business entities. Features multiple analytical views including application inventory, certification status, owner analysis, data quality scoring, compliance matrix, and workgroup directory — replacing weeks of manual report generation with one-click compliance intelligence for SOX, GLBA, and risk oversight.
Created a SailPoint IdentityIQ plugin that transforms the certification review experience — enabling batch decision updates, enhanced workflows, and streamlined reviewer actions that dramatically reduced certification completion time. The plugin's effectiveness led to it being commercially adopted as a product and offered to other SailPoint customers. Original intellectual property that evolved from an internal efficiency tool into a revenue-generating solution.
Developed a methodology that embeds regulatory compliance directly into control architecture — eliminating last-minute audit scrambles. A Big Four firm formally recognized elements as "industry-leading." The framework anchors how a major financial institution delivers examiner confidence at scale across Federal Reserve, OCC, FDIC, and FFIEC oversight.
Led the full SailPoint IdentityIQ implementation from scratch at a major financial institution — building Joiner-Mover-Leaver lifecycle workflows, access recertification campaigns, and governance reporting across hundreds of thousands of digital identities. The platform directly addressed regulatory enforcement actions and delivered consistently clean audit outcomes.
Engineered delta aggregation and partition tuning for Azure AD identity synchronization, achieving 80–90% runtime reduction. Optimized API pagination to reduce cloud API calls by 10x and eliminated database connection leaks from long-running search operations.
Built a multi-component monitoring platform tracking hundreds of applications across multiple business entities — with automated vendor alerting, file pre-validation, KRI compliance reporting, and an email-integrated feed loader that eliminated manual data handling from IAM operations entirely.
Architected automated certification campaigns for SOX and GLBA compliance — dynamic configuration, intelligent exclusion logic, and multi-certifier workflows that eliminated manual audit preparation across hundreds of regulated applications.
Pioneered governance programs for service accounts, API credentials, and machine identities — closing a critical gap that regulators flagged across the industry. This operational experience directly informed published research on NHI threats and Zero Trust.
Built an intelligent email automation system that works completely offline with no LLM dependency. Detects email categories from subject/sender patterns, extracts context (ticket numbers, names, dates), generates context-aware responses, and learns from rejected drafts to improve over time. Privacy-first AI that runs locally without sending data to external APIs. Designed for potential commercial use.
Published mobile app that intelligently identifies duplicate photos, screenshots, social media downloads, and large videos to reclaim phone storage. Features timestamp-based duplicate grouping, device-aware screenshot detection, low-resolution social media identification, and resolution-based video bitrate estimation. A free tool built to help people — no monetization, just impact.
A comprehensive Python toolkit for scanning markets, analyzing stocks with 12+ technical indicators, generating ranked trade signals, managing risk, backtesting strategies, and practicing with paper trading. Built to explore quantitative finance and algorithmic trading concepts. Educational purposes only — not financial advice.
IEEE ICSSAS 2026 • International Conference on Smart Systems and Advanced Security
Trade Publication • Cybersecurity & Regulatory Compliance
Trade Publication • Non-Human Identity & Zero Trust
Authored paper on leveraging AI for physical identity governance — bridging logical and physical access controls in enterprise environments.
Published analysis of non-human identity threats — service accounts, API keys, and machine credentials that bypass traditional IAM controls.
Methodological analysis of translating ambiguous federal regulatory mandates into binary engineering controls that deliver zero-defect audit results.
Evaluated cybersecurity products and innovations for one of the industry's most recognized award programs.
Assessed enterprise cybersecurity solutions and recognized excellence in security innovation.
TPC Reviewer for 10 papers at IEEE International Conference on Smart Computing and AI (Technically Sponsored by IEEE UP Section).
Peer reviewer for IEEE International Conference on Smart Systems and Advanced Security.
Contributing to the academic community through conference management, peer review, and technical program committee roles via CMT (Conference Management Toolkit).
IEEE UP Section • Int'l Conference on Smart Computing and AI
TPC Reviewer evaluating paper submissions and shaping the conference technical program. Technically sponsored by IEEE UP Section.
IEEE • Int'l Conference on Smart Systems and Advanced Security
Reviewed research submissions on smart systems and security, providing detailed technical feedback to authors.
Association for Computing Machinery (ACM)
Peer reviewer for ACM TKDD, evaluating manuscripts on knowledge discovery, data mining, and analytics.
Association for Computing Machinery (ACM)
Peer reviewer for ACM TOIT, assessing research on internet systems, protocols, and security technologies.
Association for Computing Machinery
April 2026
Earned ACM Certified Reviewer credential recognizing expertise in scholarly peer review for TKDD and TOIT journals.
IEEE UP Section
2026
Selected as Technical Program Committee Reviewer for 10 papers at IEEE International Conference on Smart Computing and AI.
PwC Recognition
2021
PwC formally recognized the Zero-Defect IAM Policy Framework controls as "industry-leading" during regulatory audit engagement.
ISACA
Active
ISACA
Active
SANS / (ISC)²
Active
GIAC / SANS
Active
Association for Computing Machinery
April 2026
Mentoring junior and mid-level IAM engineers on SailPoint IdentityIQ development, BeanShell scripting, governance design, and navigating regulatory audit processes in banking.
2017 — PresentGuiding emerging researchers on writing rigorous academic papers and navigating IEEE/ACM peer review standards as an ACM Certified Reviewer.
2026 — PresentBuilt IAM knowledge transfer programs across multiple employers and consulting engagements — enabling enterprise teams in banking, telecom, and aviation to operate their IAM programs independently post-engagement.
2013 — PresentService accounts outnumber employees 10:1 in most enterprises. This article examines the growing NHI threat landscape and proposes governance frameworks for machine identity sprawl.
Read MoreFederal regulators write in prose; engineers need Boolean logic. This piece breaks down a systematic approach to translating compliance mandates into audit-ready engineering controls.
Read MoreRegular insights on Zero Trust transformation, non-human identity governance, AI in identity analytics, and building IAM programs that regulators trust.
Follow on LinkedInInterested in collaboration, speaking opportunities, or mentoring? I'd love to hear from you.