SECURITY THREAT INTELLIGENCE TRAINING

Brand Owner (click to sort) Address Description
ORBIS OPERATIONS Orbis Operations Suite 370 6849 Old Dominion Drive McLean VA 22101 Security threat intelligence training; situational awareness training in the field of human behavior pattern recognition and analysis; training services to support operational requirements, namely, training regarding national security and intelligence;Security threat analysis for protecting personal and public safety and property;OPERATIONS;Computer security consultancy, namely, providing information, advice, consultation and analysis related to cyber security; software engineering and computer systems integration services; computer security consultancy for intelligence operations support, namely, consultation in the fields of secure systems and infrastructures; information technology (IT) consulting services, namely, computer network operations consulting; computer security threat and risk analysis and consulting for protecting data;
ORBIS OPERATIONS Orbis Operations Suite 370 6849 Old Dominion Drive McLean VA 22101 Security threat intelligence training; situational awareness training in the field of human behavior pattern recognition and analysis; training services to support operational requirements, namely, training regarding national security and intelligence;The mark consists of the word ORBIS stacked on top of the word OPERATIONS with the stylized O in ORBIS in black with two white highlights.;Color is not claimed as a feature of the mark.;Security threat analysis for protecting personal and public safety and property;OPERATIONS;Computer security consultancy, namely, providing information, advice, consultation and analysis related to cyber security; software engineering and computer systems integration services; computer security consultancy for intelligence operations support, namely, consultation in the fields of secure systems and infrastructures; information technology (IT) consulting services, namely, computer network operations consulting; computer security threat and risk analysis and consulting for protecting data;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of active detection of at least one threat to the homeland security. Each such threat is either hidden inside at least one cargo container before transit, or is placed inside at least one cargo container while in transit; each such threat while interacting with its surrounding generates a unique threat signature. The method comprises the following steps: (A) substantially continuously probing each cargo container; (B) detecting at least one threat signature; (C) processing each detected threat signature to determine a likelihood of at least one threat to become a threat to the homeland security; (D) identifying at least one container that includes such threat to the homeland security; and (E) eliminating such threat to the homeland security.