A risk evaluation need to be carried out to detect vulnerabilities and threats, utilization policies for important systems must be formulated and all personnel security duties has to be outlined Someone that can get involved in technical discussions, implementation, and execution all around PGP and info encryption for file transfer https://www.chicagoheadlines.us/nathan-labs-expands-cyber-security-services-in-saudi-arabia