...the breach happened and the extent of the damage
• Conduct periodic network scans to find any vulnerability, provide reporting to IT Management.
• Conduct penetration testing, simulating an attack on the system to find exploitable weaknesses
• Configuration of cloud... 
  • IT