How to transform your users into an information security asset.