Business consulting services in the fields of computer and information security management and compliance, cyber risk assessment, cyber risk management, cybersecurity monitoring, advanced threat detection, incident response, and strategic security planning; business administration services for others, namely, virtual chief information officer services and virtual chief technology officer services; consultancy services regarding business strategies in the field of cybersecurity
Advertising and BusinessSoftware for cybersecurity; software used for cybersecurity monitoring, advanced cyber threat detection, and cyber incident response
Electrical and Scientific ApparatusSoftware as a service (SaaS) services featuring software for cyber risk assessment and management, information risk management, and reporting, and for management of information technology and cybersecurity; Software as a service (SaaS) services for cyberseresponse; providing advanced cybersecurity threat detection, and cybersecurity incident response; providing on-line non-downloadable software for cybersecurity, namely, cybersecurity monitoring, advanced cybersecurity threat detection, and cybersecurity incident response; technology consultation in the field of cybersecurity; technology consultation in the field of cybersecurity risk management; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer and internet security services, namely, providing managed cybersecurity services in the nature of monitoring digital assests, threat detection, response to cybersecurity threats, and strategic cybersecurity planning; technology leadership services for others, namely, Chief Information Security Officer (CISO) services, virtual Chief Information Security Officer (vCISO) services, Chief Privacy Officer (CPO) services, Virtual Chief Privacy Officer (vCPO) services; encryption services for hardware and information technology systems to make data impervious to cyber threats; data encryption services; design, development and monitoring cybersecurity programs for others
Computer and Scientific