We know how to secure the identity layer. Actually doing it, however, continues to challenge organizations of all sizes.