42 Developing and implementing voluntary corporate and security policies, procedures and standards for meeting compliance standards and regulations while protecting the digital data and information technology environments from known information security threats and risk; Security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure for protecting data and information from unauthorized access, namely, desktops or laptops, servers, routers, networked devices, digital devices, mobile devices, virtual environments, cloud based environments, databases, and applications; Security services, namely, providing information security risk assessments for protecting data and information from unauthorized access}; Cyber security being information technology, computer, data consultancy services; Security consultancy services in the nature of information technology, computer, data security consultancy; Computer security threat analysis for protecting data, namely, mitigating and resolving cyber incidents and security breach incidents; Intrusion detection management being technical support services, namely, providing onsite and remote monitoring of network infrastructure and network activity for information technology, computer, data security purposes; Identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber being information technology, computer, data security; Security threat analysis for protection of Internet security, namely, for protecting data and information systems