Discuss how a move to the cloud will affect your e-mail security plan.
Describe threats and vulnerabilities that are specific the organization’s secure e-mail management system.
Explain the role that anti-malware software will play in securing e-mail. What software would you use? Why?
Describe the technical controls that you will employ to enforce e-mail security policy.
Describe personnel controls that are available to enforce e-mail security policy.