- • One hour rapid overview
- • What sensitive data is
- • The risks associated with managing sensitive data
- • Common methods to protect sensitive data
- • Methods to protect sensitive data that integrate the protections with the data itself
- • Basic tools for implementing the embedded protections
- • Usage notes for each of the tools
- • Sample code