the field of computer forensics, what types of tools and techniques
are the issues involved in protecting all of the organization’s
information. Should all digital conversations be preserved and how,
what are the legal aspects? How might an organization notify its
users that all communications are being monitored and preserved?
have been several incidents lately in which backup media containing
personal customer information were lost or stolen. How should backup
media be secured? What about off-site storage of backups?
with any recovery strategy, an organization should schedule a full
test rehearsal, what should the after-action review focus on?