One of the most sensational breaches of US NSA networks in history was performed not by a Department of Defense employee but by Edward Snowden, a subcontractor for consultancy Booz Allen Hamilton. Many large organizations allow vendors, partners and suppliers various levels of privileged access to their internal IT networks. This constitutes perhaps the most acute source of threat exposure inside an organization. Real-time monitoring of what trusted third parties are doing on your network is the first step toward securing your supply chain.