Every network has high-risk users. Typically, these users have broad access to the IT infrastructure and a high degree of technical knowledge. They might be internal or outsourced IT personnel, contractors, vendors or remote application developers. They know a lot about the IT systems and how they operate and might even possess “the keys to the kingdom” because they administer servers, networks, applications or databases. In fact, I might have just described … you.