42 Security operations management in the field of cybersecurity, namely, computer network security incident response management, enterprise security network architecture design, digital forensic services in the nature of computer security threat analysis for protecting data, vulnerability and risk assessments of computer networks, configuration design and management of computer networks for others, social engineering, namely, conducting computer network vulnerability and risk assessments, Information technology (IT) risk management and compliance, namely, restricting unauthorized access to computer systems; Cybersecurity compliance services in the nature of establishing risk-based controls to categorize and protect information from vulnerabilities and unauthorized access; Developing cybersecurity organizational, system-specific, and issue-specific policies, namely, antivirus software, password protection, social engineering, remote access, disaster recovery, information security, incident response, and access control policies and standards for others; Data mining; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Design of information graphics and data visualization materials; Data security consultancy; Cybersecurity consulting services, namely, security operations oversight in the nature of technology consulting in the field of cybersecurity, threat mitigation consulting, namely, Information technology [IT] threat mitigation consulting, incident response computer security consulting, computer security vulnerability management consulting, computer network security architecture consulting, computer security risk management, security policy development, and security threat assessments for protecting data and information from unauthorized access; Information technology consulting services