5.1 Summarize elements of effective security governance. 5.2 Explain elements of the risk management process. 5.3 Explain the processes associated with third-party risk assessment and management. 5.4 Summarize elements of effective security compliance. 5.5 Explain types and purposes of audits and assessments. 5.6 Given a scenario, implement security awareness practices.