Your presentation was ideal for anyone serious about operational and procedural IT security. I found your examples very helpful, and your overall program logical and quite informative. I especially liked the portion devoted to additional security considerations, devices, and software.