team manages the implementation and evaluation of our security protocols. The second team collaborates with external