Big Data and Cloud Computing are popular phrases to describe practices which have been in use for many years. Thanks to vast improvements in computational resources and data analytics, big data and the cloud is available to many institutions and entities. It is no surprise security researchers have rapidly adopted cloud computing and big data to detect insider threats. In this presentation, the suitability to detect cloud-based insider threats will be briefly discussed. Along the way, one will learn how to avoid detection.