A root of modern threat involves compromise or misuse of identities. Users have multiple accounts and entitlements often in excess providing an opportunistic environment for cyber crime, insiders and advanced attacks. CIOs desire widespread data access and enablement while CISOs contend with declarative defenses and controls. The outcome is data breaches and escalating costs as preventive defenses decline in effectiveness. The volume of security data needs data science.