Conduct penetration tests (network, social, physical, adjacent, and more) Assess the security posture of applications (mobile, web / cloud, core networks, etc.) Review the security maturity of edge systems (IoT, kiosk terminals, operator terminals, etc.) Conduct targeted research for vendor-specific technology security Document and present security risks & mitigation recommendations