
Randy Marchany
University IT Security Officer,
Virginia Tech
OUTCOMES: Learn about various encryption tools and how they can be used to protect sensitive data regardless of location * Review data breach notification laws * Incorporate elements into your own data-protection strategy