Perform a full assessment of the security environment to detect any mess and to reduce the information security. Propose relevant, effective and practical solutions by conducting a series of penetration testing, vulnerability and risk assessments, compliance standards, and forensic assessment.