Topics: "risk assessment", "Attack Surface Management", "Shadow IT", Attack Surface, cyber risk management, IT RISK ASSESSMENT