Find and classify your data. Monitor for data exposures. Prioritize risks and vulnerabilities. Remediate and respond to threats.