Logs and netflows, oh my! We do want to know who is probulating our servers and other devices. We centralize this collected data, analyze it, and act upon it. Things get exciting when our organization has offices all over the world. Things get even more exciting when our organization is composed of international organizations joined together for a project. How can we defend something if we do not know it is under attack? Those pesky international privacy laws are hampering our style. Or, are they? Let's see if we make enough sense of them so we can keep our security monitoring stack well fed.