The document discusses key challenges in defending against insider threats, specifically the problem of information leakage. It notes that once sensitive data is leaked online through means like file sharing networks, it can circulate forever on the internet. Technological solutions for tracking data spread, like provable data possession, and legal approaches around "right to be forgotten" are discussed. Examples of data leaks from government and healthcare organizations in Japan that occurred through peer-to-peer networks are also provided.