C= Courses. Education is the primary gap with improving cybersecurity. Courses targeting all age groups who use cyber tools that are scoped and tailored for the demographic.
Y= Youth programs. Habitualize the practice of good cyber hygiene at a young age and integrate cybersecurity for youth like how sports are integrated.
B= Bot integrations. There are already tools like Ansible to run against targets to aid in adherence to standards like FIPS and STIG. Offer cybersecurity bots at the application layer for all applications.
E= Encryption. Custom encryption solutions.
R= Research. Offering research on tactics, techniques, and procedures of cyber-attacks for profit to companies and governments.
S= Social engineering focused advisement and training. Humans remain one of the largest vulnerabilities. Effective and distributed social engineering awareness and training.
E= Endpoint protection. Endpoint security tool, specifically for phones.
C= Consulting. Offering an as-required cybersecurity consulting service to businesses.
U= Uniformed security. Physical security of cyber resources for hire.
R= Red Team. Vulnerability assessments for hire.
I= IT administration. Distributed administration offering for small business and consumers.
T= Threat detection. There are many vulnerabilities and threat detection software, both hosted and self-hosted. A blended approach in which a tool is provided, initialized, and customized for a customer such as the home user or small business but then released to the customer.
Y= Yield Loss Analysis. Using cybersecurity trends to give executives insights on projected losses associated with most common cybersecurity incidents at the time.