Lil’ list:
IDENTIFY THREATS
REDUCE SECURITY EXPENSES
PROVIDE COMPLETE SECURITY ASSESSMENT
MAINTAIN INDUSTRY STANDARDS AND REGULATIONS
FOLLOW BEST PRACTICES
TEST SECURITY CONTROLS
IMPROVE CURRENT SECURITY INFRASTRUCTURE
PAY PARTICULAR ATTENTION TO SEVERE VULNERABILITIES
PREPARE STEPS FOR PREVENTING EXPLOITATIONS
TEST NETWORK SECURITY DEVICES
Significant side notes: