Audit in Information Security
Audit in Information Security
Checks adherence to
Compliance Audit GDPR, HIPAA, PCI DSS
laws/regulations
Penetration Testing (Pen Simulates cyberattacks to find Ethical hacking, red team
Test) weaknesses exercises
Log Analysis Splunk, ELK Stack, Graylog Monitor and analyze security logs
Compliance
RSA Archer, SolarWinds Ensure regulatory adherence
Management