exploit to pillage our entire organization and steal all our code, intellectual property, credit card numbers, and pictures of our loved ones. These are potentially valid risks, but I often can't connect the dots between their shrill, hysterical, and self- righteous demands and actually improving the defensibility of our environment.