42
Certification of individuals as professionals in governance, risk and compliance within the field of security; compliance management and consulting services in the fields of cybersecurity and information systems security; policy and governance management and consulting services in the fields of cybersecurity and information systems security; risk management and consulting services in the fields of cybersecurity and information systems security; security risk assessment; security services in the field of cybersecurity and information systems security; provision of information systems security and cybersecurity services, including in information, administration, computing, security risks and security requirements of information systems, and computer networks, for individuals, in telecommunications, and for the protection of domestic and commercial premises; monitoring of cybersecurity, information systems security, security risks and security requirements of information systems, and security control apparatus and equipment; advisory and consultancy services relating to information systems security, security risks and security requirements of information systems, and cybersecurity; professional advisory and consultancy services provided in the field of cybersecurity, security risks and security requirements of information systems, and information systems security, including in administration of cybersecurity, security risks and security requirements of information systems, and information systems security, access control, audit and monitoring, risk, response and recovery, cryptography; security and cybersecurity services provided in relation to data communications, security risks and security requirements of information systems, and the operation of data communications; consulting services in the field of cybersecurity, information systems security, security risks and security requirements of information systems, and in the field of managing and optimizing information systems security to prevent unauthorized access to and misuse of computer systems, identify and detect viruses, worms, trojans, spyware, adware, malware, ransomware and to identify malicious websites