for Information Security, create threat and risk analyses Initiating, implementing, and monitoring Information Security...