Computer security threat analysis for protecting data; Computer consultation in the field of security, namely, identifying, assessing, and developing strategies for others in the fields of data security and the prevention of cyber threats; Design and development of electronic data security systems; Development of computer security systems and contingency planning for enterprise information systems, for the purpose of protecting against cyber threats; Development of customized enterprise software for others for use in cyber risk assessment and information security; Development of customized enterprise software for secure network operations, namely, for preventing unauthorized network access, in the field of cybersecurity; Updating of enterprise computer software relating to computer security and prevention of computer risks; Computer security consultancy, namely, designing custom IT security policies for others, training corporate and governmental employees on security practices, and facilitating the implementation of IT security policies; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, in the field of cybersecurity; Computer security consultancy in the field of cybersecurity, namely, analyzing cyber threat intelligence and cyber threats to information systems; Internet security consultancy, namely, detecting and analyzing unauthorized or improper use of intellectual property and brand elements on the Internet; Maintenance of enterprise computer software relating to computer security and prevention of computer risks, namely, cyber threats
Computer and Scientific