⦁ PCI DSS Compliance ⦁ External PCI Scanning (without exploitation) ⦁ Business Impact Analysis (BIA)
⦁ Internal Scanning ⦁ Web Application Testing ⦁ Penetration Testing (Pentest)
⦁ Vulnerability Management
⦁ Disaster Recovery (DR) Planning