Information security analyst using tablet analyzing cyber threats and protection growth. Risk assessment, encryption methods, intrusion detection, compliance monitoring, and vulnerability testing