Recorded and downloadable computer software for assessing third party cybersecurity and computer risks; recorded and downloadable computer mobile applications for assessing third party cybersecurity and computer risks; recorded and downloadable software to assess and rate company's performance in terms of cybersecurity and prevention of computer risks; recorded and downloadable software for monitoring and detecting cybersecurity threats; downloadable and recorded computer software for providing notifications and response tracking of notifications regarding cybersecurity threats to users and organizations; recorded and downloadable collaborative software platform for assessing third party cybersecurity and computer risks; recorded and downloadable mobile applications for assessing third party cybersecurity risks; recorded and downloadable blog software for uploading, posting, displaying, blogging, and sharing electronic media and information; recorded computer program for data processing; downloadable electronic publications in the nature of books, magazines, journals, manuals, reports, and written articles in the field of cybersecurity and computer risks; downloadable electronic questionnaires, scorecards and guidelines for benchmarking being written data sheets in the field of cybersecurity and computer risks; downloadable electronic tutorials being videos in the field of cybersecurity and computer risks; downloadable electronic reports in the field of cybersecurity and computer risks; downloadable training guides in electronic format in the field of cybersecurity and computer risks; downloadable images and video files in the field of cybersecurity; downloadable computer software for providing information in the field of cybersecurity, namely, prescriptive best-practice security guidance for protecting and securing computer networks and applications; data processing apparatus; computer platforms in the nature of recorded and downloadable software related to cybersecurity, threats, virus, and attacks against computer networks for ensuring the security of computer systems and electronic data
Electrical and Scientific ApparatusAdvertising; commercial business management; operational business assistance for companies; consulting in business advice and queries being business consulting services; providing business information; professional business consultancy; business strategy development services in the field of cybersecurity and computer risks; business risk assessment in the field of cybersecurity and computer risks; business investigations; business management and organization consultancy; commercial analyses, namely, company audits being business auditing; business auditing of commercial management systems; market research; market study; compilation of statistics; market and public opinion polling; news clipping services; market research, namely, collection of market data in a central file; systematization of data in a central file being a computer database; computer file management; compilation of information into computer databases; database management and compilation of business information being data into computer databases; business advising being business consulting on strategic, managerial, and operational issues related to cybersecurity for businesses; providing business assistance by means of providing cybersecurity business risk management and compliance assessments to businesses and organizations
Advertising and BusinessEducational services, namely, providing seminars, non-downloadable webinars, tutorial sessions, workshops, and conferences, in the field of cybersecurity and computer risks; training services in the field of cybersecurity and computer risks; organizing and conducting conferences, seminars, non-downloadable webinars, lectures, and workshops in the fields of cybersecurity and computer risks; cybersecurity training services; organization of exhibitions for educational purposes; arranging and conducting of conferences, congresses and symposiums in the field of cybersecurity and computer risks; providing online training seminars in the field of cybersecurity and computer risks; publication of printed matter and printed publications in the nature of books, magazines, journals, manuals, reports, questionnaires, scorecards and guidelines being written data sheets in the fields of computer and network security, information technology and cybersecurity; online publication of non-downloadable electronic books, reports, manuals, magazines, journals, newspapers; providing on-line non-downloadable publications in the nature of books, magazines, journals, manuals, reports, questionnaires, scorecards and guidelines being written data sheets in the fields of computer and network security, information technology and cybersecurity; electronic publishing services, namely, electronic publishing of non-downloadable electronic publications
Education and EntertainmentComputer programming and software design; computer software and hardware development; design, development, updating, maintenance and programming of software; design, development, updating, maintenance and programming of software related to cybersecurity and computer risks; design, development, updating, and maintenance of a collaborative platform being software to facilitate sharing of information and communication; hosting for others of a collaborative platform being software to facilitate sharing of information and communication; engineering services, namely, evaluation, assessment and research in the fields of technology and cybersecurity provided by engineers; quality control for others, namely, quality control and quality control auditing; engineering services and technology research in the field of computer security and computer quality; computer system analysis; database design and development; software as a service (SaaS) services featuring software for assessing third party cybersecurity and computer risks; platform as a service (PaaS) featuring computer software platforms for assessing third party cybersecurity and computer risks; technical recommendation and advice being technology consultation in the field of cybersecurity; technical project study being computer project management services; technology consultation in the field of cybersecurity, namely, qualitative evaluation and assessment of company performance relating to cybersecurity; quality auditing being quality control relating to information security management systems; consultancy services with respect to data security; cybersecurity ratings and rankings being the evaluation of the cybersecurity services of others to assure compliance with industry standards ; cybersecurity monitoring, namely, monitoring of computer systems for detecting unauthorized access or data breach; company performance assessments and appraisals with regard to protection of personal information in the field of computing, namely, technology consultation in the field of cybersecurity; threat analysis of computer security for the protection of data; computer cybersecurity diagnostics; technology consultation in the field of cybersecurity, namely, cybersecurity audits; providing technology information in the fields of risk assessment, computer security attacks, computer security threat mitigation, computer security vulnerabilities and new technologies; cybersecurity assessment services in the nature of computer security threat analysis for protecting data and information from unauthorized access; technology consultation in the field of cybersecurity, namely, providing plans and recommendations to improve cybersecurity and security practices; technical support services, namely, troubleshooting computer software problems
Computer and Scientific