COURSE AUTHOR –
John Courtenay
1. Physical and logical security and the relevant methods with which this can be achieved.
2. Auditing and accountability so that any actions are monitored and tracked.
3. File and folder permissions to help keep sensitive data from falling into the wrong hands
4. Dealing with external staff and contractors, who can often start working for an organisation on short notice
5. Reporting obligations and what information you would need to provide on such a report