Risk = Consequence (of a threat if occured) x Likelihood (how likely to occur)
-
Investigate a cyber attack and produce a comprehensive report documenting your findings and outline key recommendations for improving a client's cybersecurity posture
-
Identify, evaluate, and prioritize potential security threats and vulnerabilities to determine the levels of risk and develop plans to mitigate those risks