Trademark Overview
On Monday, July 22, 2024, a trademark application was filed for CYSPOT with the United States Patent and Trademark Office. The USPTO has given the CYSPOT trademark a serial number of 98659517. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Monday, July 22, 2024. This trademark is owned by Bedel Technology, LLC. The CYSPOT trademark is filed in the Advertising, Business and Retail Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:
Consulting services in the field of cybersecurity risk management and information security program training; Providing education to help organizations manage cybersecurity and information security programs
Strategic advisory services, namely, providing methodologies, templates, technologies, and platforms used to build and maintain an information security program; Cyber risk strategic advisory services, namely, computer security; Business risk assessment services; Business consulting services in the fields of cyber risk management, risk analysis, compliance with security, privacy, breach notification statutes and regulations, and information security; Providing assessments of information security programs; Providing services and tool to help organizations manage cybersecurity and information security programs; Advisory services in the field of planning, design, operation, and management of information security programs, privacy, and cyber risk management
Technology consultation in the field of cybersecurity; Computer security consultancy in the areas of planning, design, and management of information security programs, privacy, and cyber risk management; Computer security consultancy, namely, virtual chief information security officer services; Computer security consultancy, namely, vCISO services; Management of information security programs; Providing computer information security assessments regarding cybersecurity controls, governance structure, policies, incident response plans and preparedness, business continuity plans, cyber monitoring capabilities, risk assessment, legal and regulatory compliance, vendor management, audit and penetration testing scope and results, and user awareness; Software as a service (SAAS) and services featuring software for planning, design, operation, and management of information security programs, privacy, and cyber risk management; Software as a service (SAAS) services featuring software for legal an...