For CIOs and CISOs: every user is a privileged user, learn how to deal with.
Seen at InfoSec Europe 2015: Spot your Snowden!
3 Pros and Cons of using IT Contractors