35
Organizational and professional business consultancy regarding data protection and privacy protection requirements and the practical implementation thereof; Outsourced administrative management, namely outsourced data protection officer (DPO) service management; Outsourced administrative management, namely outsourced chief information security officer (CISO) service management; Outsourced administrative management, namely outsourced Chief Security Officer (CSO) service management; Outsourced administrative management, namely outsourced Chief Regulatory Officer (CRO) service management; Business risk management services related to cybersecurity
41
Training in the field of cybersecurity; Training in the field of data protection; Training relating to compliance with regulations, legislation and standards, in the fields of personal privacy and data protection; Educational and training programs in the field of risk management; Training on product design, development, testing, authentication and quality control, all related to cybersecurity
42
Internet security consulting; Computer security services that protect against unauthorized use of the network; Monitoring services for information security systems; Information security services; Consultancy relating to the testing of application systems; provision of information, advisory and consultancy services in the field of computer software; Research and consultancy services relating to computer software; Consultancy in the field of computer security; Consulting services relating to computer networks with various software environments; Technology consultancy in the field of artificial intelligence; Consulting services related to the analysis of information systems; Consulting services related to the design of information systems; Research and consultancy services relating to computer hardware; Professional consultancy services relating to computer security; Expert consulting services relating to computer networks; Consulting services relating to computer networks; Technical consulting services related to information technology; Cybersecurity services; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; cybersecurity risk assessment services; cybersecurity risk management services; managed cybersecurity services to identify, protect, detect, respond, and recover from cybersecurity and reputation events in the fields of information security and cybersecurity; cybersecurity monitoring; cybersecurity services (testing and risk assessment of computer networks); cybersecurity diagnostics; cybersecurity audits; Cloud-based data protection services; computer technical support services, namely, monitoring of technological functions of computer network systems in the nature of computer infrastructure for security purposes delivered through security operations centers; security operations center as a service; Product development; Evaluation of product development; Product design, development, testing, authentication and quality control, all related to cybersecurity
45
Consultation in relation to data protection compliance; Regulatory compliance auditing; Reviewing standards and practices to assure compliance with laws and regulations