88739248
Dec 26, 2019
Aug 11, 2020
Active Trademark
Computer and computer network security consulting services, namely, vulnerability assessment of computer devices by running a battery of technical tests and verifying vulnerabilities using manual and automated means; outsourced CISO (Chief Information Security Officer) services comprising the management of strategic computer security programs assessed using benchmarks in the nature of a recognized cybersecurity framework, and the development of an information security risk management program; ascertaining cybersecurity and computer security compliance risks for others, determining adequate cybersecurity risk protective measures for others, computer security consulting services, namely, influencing the client organization's culture with effective communication and awareness regarding computer security risks, developing, leading and managing cybersecurity goals and developing a cybersecurity strategy; developing computer security compliance programs and developing an overall cybersecurity operational strategy; implementation and provision of managed computer and network security services; cyber threat hunting services, namely, computer network security consulting services; computer and network security testing services featuring the performance of table top exercises used to test incident response plans; computer risk assessment advisory services, namely, enumerating vulnerabilities by using a systematic review of security weaknesses, assigning severity levels to each vulnerability to prioritize remediation, and analyzing results using a variety of manual and automated tests and their validations; computer security consulting services featuring emergency response team assessments that provide vulnerability classifications of high, medium, or low and a description of vulnerability impact towards a business environment; ransomware advisory services, namely, computer security consultancy regarding ransomware threats and minimizing computer network disruption during ransomware threats; computer and network security management and administration advisory services; internal and external computer network penetration testing; computer forensics imaging and analysis; computer security consulting services in the nature of providing non-legal expert witness consulting regarding creating evidence target lists for forensics analysis, initiating a chain of custody for evidence, processing and authentication of evidence, and documenting evidence in the nature of photographs, logs from the forensic preservation process, and metadata review of computer records; digital computer forensics investigation; cyber resiliency advisory, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software code review for security vulnerabilities
Computer and Scientific