How to Conduct a Cybersecurity Compliance Audit in 6 Steps