Identify and manage IT technology risks Monitor intrusions, system processes and network Implement enterprise systems securely Develop audit system and active system monitoring Vulnerability assessment and testing Manage security incidents and forensic analysis