Quantifying cyber risk to justify investment or avoid spend; implementing a Zero Trust framework and with what vendors; changes to security environment to accommodate clients / customers sending questionnaires about security posture; MDR service and pen testing with a 3rd party; EDR vendors; GRC tools to manage change and improvement of cybersecurity controls; open source security software; and email security vendors.