Traverses techniques for minimizing IT related risks through security and control