Last updated 3 months ago
Sensite information
Common risk
Regulations
General IT architecture
Control breach
Sensitive information
Policies and procedures
Business practices
IT architecture
Outsource?
Interview key managers
Tour key organization facility
Prior audit report
Environment change