Table of contents1. Test Security Protocols and Correct2. Stay Informed3. Align Security and Business Strategy4. Design for Humans5. Get to…