Information Security Architectures, mapping business functions into the cyber security and IT environment; Defining action plans... in concertation with internal and external stakeholders; Assisting in reaching or maintaining compliance to information security...