Potential Topics: PreventionPolicies and exit proceduresInvestigations, monitoring and privacy issuesComputer Fraud and Abuse issuesEndpoint devices – thumb drives- how to thwart theft using devicesand more.