Your contribution:o Identify and analyze the challenges of an IT security architectureo List recommendations for removing, containing or recovering a security architecture issueo Present, popularize and argue recommendations in front of a teamo Demonstrate diplomacy in order to manage and maintain b...