36
Cyber insurance brokerage; insurance underwriting in the field of electronic and cyber risk, liability, and network security; insurance services, namely, the provision of underwriting and claims management in the field of cyber insurance; providing information in the field of cyber insurance and cyber insurance premiums
41
Provision of targeted employee training regarding cyber risk exposure
42
Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field of cyber security and cyber risk assessment; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerabilities; cybersecurity assessment services, namely, computer security threat analysis for protecting data security, data privacy and managing cybersecurity regulations and standards; providing temporary use of non-downloadable cyber security software to reduce risk of cyber threats; providing temporary use of non-downloadable software for cyber security and cyber risk assessment; providing temporary use of non-downloadable cyber security software to detect and mitigate against cyber risks, threats and vulnerabilities; providing temporary use of non-downloadable cyber security software for preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing customizable training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others how to identify, report, and avoid cybersecurity threats; providing temporary use of non-downloadable software for use in analyzing and measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; providing temporary use of non-downloadable software for use in monitoring and tracking compliance with laws and regulations in the fields of data privacy and data security; providing temporary use of non-downloadable software for cybersecurity training; design, development, and implementation of software in the fields of cyber security and information assurance; software development and product development consulting in the field of cyber security and cyber risk assessment; design, development and implementation of strategies to address cyber risk exposure, namely, continuous cyber risk monitoring, automated web vulnerability testing, cybersecurity regulation and standards tracking and management, cybersecurity compliance and control tracking, application security management and monitoring, and cloud application security monitoring; conducting computer security threat assessments of information technology IT security policies and procedures for protecting data; providing a website featuring information on cyber risk management and computer security