The ability to plan, develop and execute security policies and procedures for insuring privacy, confidentiality,
authentication, authorization, appropriate access, auditing of data and information assets, and monitoring and
management of security breaches.