- Scientific and state of the art
- Investigations
- Analyses
- Technology assessments
- Expert opinions
- Security policies, strategies, architectures, recommendations, and implementation guidelines
- Expert monitoring and support
- Education, training, and awareness raising
- Chief information security officer (CISO) on time