
Ben Popken @bpopken
"First, your cybersecurity practices including incidence response procedures. Two, any cyberattacks you've experienced. Three, personnel policies and procedures including whether background checks and other procedures are in place to safeguard against inside attacks." — PolitiTweet.org