"Foreign nation states, shadowy hackers, and cyber-terrorists aren't the only ones trying to steal or destroy our data. They all have something in common; namely, they all sit outside an organization's perimeter defenses. However, insider threats are just as likely to be guilty of wrongdoing as these external malefactors. A thorough defense-in-depth program needs to account for all potential bad actors, and insider threats require a different type of approach to detect and counter."