The recent Twitter hack is the latest reminder that even top companies with the best security teams are not immune against bad actors and data breaches, so why let them handle our sensitive data when we don’t need to? In this article I introduce concept of operational security and how you might begin to identify the information that is out there about you, analyze the risk of this exposure, and deny adversaries from exploiting this data.