Audit of Security Programs and Governance, Evaluations against Frameworks, Security Risk Assessments, Control Testing Programs, Ransomware Preparedness, Incident Response Assessments, Technical Evaluations (e.g., Penetration Testing, Threat Hunting), Privileged Access Reviews, and Testing of Systems and Devices (e.g., IoT).