## Cybersecurity Audit Process **2. Risk Assessment** - **Identify Threats and Vulnerabilities**: - Use detection tools and techniques to uncover potential security threats and vulnerabilities within the scoped environments. - **Assess Risks/Threat Modelling**: - Evaluate the impact and likelihood of risks, prioritising audit focus on higher-risk areas. ---