Utilizing Technological ComplexityManaging Custom SystemsContinuity Planning and Disaster RecoveryLooking at RegulationsDeeper Pockets — and InsuredConsidering Employees, Consultants, and PartnersLooking at the Chief Information Security Officer’s Role