Secure the unsecurable, contain the uncontainable, protect the unprotectable, and do some data and sysadmin stuff along the way.