A risk assessment must be carried out to discover vulnerabilities and threats, use policies for essential technologies have to be designed and all staff security responsibilities needs to be defined Someone that can get involved in complex discussions, implementation, and execution close to PGP and knowledge encryption for file transfer https://nookexplorer.com/nathan-labs-expands-cyber-security-services-in-saudi-arabia