This document discusses reducing risks through access controls, privilege management, and auditing. It begins with an agenda covering BeyondTrust, security concepts that are rarely implemented properly, high profile breaches in 2013-2014, and ways to reduce the attack surface. The document then discusses least privilege, need to know principles, and summarizes some high profile breaches. It concludes with recommendations for reducing the attack surface such as enforcing least privilege, controlling privileged access, auditing user activity, and patching vulnerabilities.