
Randy Marchany
University IT Security Officer,
Virginia Tech
OUTCOMES: Gain insight in the CM strategy * See examples of the outputs from CM sensors * Be encouraged to follow this strategy to better defend your sensitive data