This will include the various methods of internal monitoring, attack and penetration, investigation of suspected hackers or rogue employees - and you have plenty of rogue employees - and identity protection for government employees. The review team will also remain current on the constantly evolving new methods of attack and will attempt to anticipate them and develop defenses as often as possible before breaches occur.
Identity theft, financial laundering, as well as ransom and ransomware - I mean, think of it - all involving extortion of a hacked institution are becoming increasingly common.
Incredibly, hackers were able to obtain at least 20 million identities of people who under FBI background and were under FBI background investigations.