88846970
Mar 25, 2020
Dec 8, 2020
Active Trademark
Business data analysis; Business management analysis; Business project management services; Business management consultancy as well as development of processes for the analysis and the implementation of strategy plans and management projects; Analyzing and compiling business data; Data processing services; Compiling and analyzing statistics, data and other sources of information for business purposes; Business risk management in the field of cybersecurity
Advertising and BusinessProviding cybersecurity awareness education, namely, conducting non-downloadable webinars, on-demand courses, and in-person training classes in the field of cybersecurity awareness; providing on-line newsletters in the field of cybersecurity awareness; security awareness training
Education and EntertainmentSecurity operations management in the field of cybersecurity, namely, computer network security incident response management, enterprise security network architecture design, digital forensic services in the nature of computer security threat analysis for protecting data, vulnerability and risk assessments of computer networks, configuration design and management of computer networks for others, social engineering, namely, conducting computer network vulnerability and risk assessments, Information technology (IT) risk management and compliance, namely, restricting unauthorized access to computer systems; Cybersecurity compliance services in the nature of establishing risk-based controls to categorize and protect information from vulnerabilities and unauthorized access; Developing cybersecurity organizational, system-specific, and issue-specific policies, namely, antivirus software, password protection, social engineering, remote access, disaster recovery, information security, incident response, and access control policies and standards for others; Data mining; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Design of information graphics and data visualization materials; Data security consultancy; Cybersecurity consulting services, namely, security operations oversight in the nature of technology consulting in the field of cybersecurity, threat mitigation consulting, namely, Information technology [IT] threat mitigation consulting, incident response computer security consulting, computer security vulnerability management consulting, computer network security architecture consulting, computer security risk management, security policy development, and security threat assessments for protecting data and information from unauthorized access; Information technology consulting services
Computer and Scientific