This presentation examines the types of attacks that try to exploit privileged credentials, particular in a governmental environment, and explores defensive strategies to bring privileges, and the associated threats, under complete visibility and control.