Continuous monitoring and insider threat detection are both underway. Now comes the hard part: Securing that information.