Scott Geye, IT Audit Manager and Phil Howard review IT due diligence Malware causing iron spills Lost Laptops Storing data on behalf of others Battle scars Multi-factor authentication Pen testing User training Articulating risks specifically