COO NCC - NATIONAL CYBERSECURITY CENTER
Mark Identification

COO NCC - NATIONAL CYBERSECURITY CENTER

Serial Number

87143595

Filing Date

Aug 18, 2016

Registration Date

Apr 11, 2017

Trademark by

NATIONAL CYBER INTELLIGENCE CENTER

Classification Information

Continuing education services, namely, providing live and on-line continuing professional education seminars in the field of computer and internet security; educational and training services, namely, developing, arranging and conducting educational and training seminars, conferences, courses, and workshops in the field of cybersecurity, including cybersecurity systems, policies and procedures, how to identify and defend external cyber-attacks and how to evaluate, test and solve cybersecurity problems

Education and Entertainment

Providing information in the field of computer security; Technology consultation and research in the field of cyber security, data and information security, and network security; computer security consultation services, namely, consulting services in the field of computer security purposes and cyber security purposes; technical consulting services in the field of cyber security, namely, consulting regarding security architecture and information architecture; managed computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to managing and responding to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, network devices, and mobile device security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services to assist others in identifying and managing network security risks; computer network security services to assist others in locating and mitigating network security breaches; providing computer cyber security consultancy services; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes

Computer and Scientific

Computer network security services, namely, providing surveillance, monitoring, character recognition, search, review and replay capability of all activities and movement in a computer network in real-time and reordered for non-real-time review and replay for purposes of ensuring proper use for security purposes; consulting services in the field of maintaining the security and integrity of databases; Security services, namely, providing security risk assessments of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, network devices, databases and applications, and providing security in the nature of monitoring of the foregoing, for devices, online accounts and e-commerce transactions, and reporting of risk assessment levels related thereto, relating to property and personnel; security services, namely, providing security assessments for businesses and governmental agencies

Personal