Item
5.06 Change in Shell Company Status
P3d
Pioneer Systems, Inc. (“DPSM” or the “Company”) has acquired software and computer equipment and has begun
marketing, advertising and selling its various security and data protection products that it has developed.
The
Company is now focused on Cyber Security and Data Protection with all branding and media being updated, and all documents and
plans published on our corporate profile, social media and website. The global cyber security and data protection market represents
a multi-billion-dollar market opportunity which is addressing a trillion-dollar global cyber-crime problem. Fortune Business Insights
estimates the global cyber security market to reach $366.10 Billion USD by 2028 while Cyber Security Ventures reports that cyber-crime
will cost the world $10.5 Trillion dollars annually by 2025.
The
Company’s management believes that the cyber security and data protection market presents significant opportunity given
the long-term global outlook in this sector and is positioning its resources to maximize its growth in this space.
Products
& Services
DPSM
is now able to handle complex business challenges related to cyber security and digital asset protection. The following
are some of key products and services that DPSM is offering to its retail and corporate customers.
Cyber
Security Consulting
We
help to transform your business by managing your risks. We help you create a robust security environment to protect your business
end to end. Our cyber security consulting team will assist with cyber security risk, remediation, and compliance efforts. We can
achieve this by:
|
●
|
Helping
businesses identify critical and data assets.
|
|
●
|
Conduct
risk assessments.
|
|
●
|
Establish
effective and appropriate controls.
|
|
●
|
Create
an effective incident response plan.
|
Cyber
Security Protection Tools
Attacks
and breaches are coming from all angles, compromising your electronic assets. But with the right tools, you can secure your IT
infrastructures so to prevent the loss of revenues, harm to brand reputation, and potential fines or legal liabilities. We implement
the best controls to achieve optimum security.
Cyber
Security 24×7 Monitoring – Data Center
Breaches
happen when you don’t expect the most. The times when you are least active on a business computer network are often the
times when it is most vulnerable. You can avoid the risk of unexpected downtime, slow network response, and network intrusion
with our unique layered approach to security. We can ensure that you have access to the best real-time, continuous, predictive
cyber security, quickly and without complexity. With 24×7 security monitoring, our clients can enjoy the peace of mind of
knowing that their data and systems are safe at all times.
Cyber
Security Insurance
We
are able to respond to a variety of cyber risk exposures not covered under conventional insurance policies. We provide innovative
protection to help businesses safeguard against sensitive data breaches (personal and corporate data), computer hacking, dumpster
diving, computer viruses, employee sabotage or error, pilferage of information, security failures, business interruption and identity
theft. Our new Cyber Security Insurance Policy can protect our client’s business assets against the complexity of cyber
threats.
Cyber
Security Education
Cybercrime
is on the rise, so the need of people to combat it is also growing. The Company is proud to contribute to developing the talent
and tools to make digital space safer. Our programs will equip our clients with the skills needed to become experts in this rapidly
growing domain. Our training is based on a comprehensive approach to protecting network infrastructure, including securing data
and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance.
Cyber
Security Audit and Investigation
With
the Industrial IoT, Cloud technology, and Industry 4.0 transformation processes, cyber security vulnerabilities pose higher risks
for safety and business continuity. Our software programs can uncover threats and vulnerabilities, exposing weaknesses and security
gaps that may exist throughout a client’s organization. Depending on the type of audit and review engagement, our team will
provide a framework and guidance for a structured approach and risk-based decision making.
In
connection with the acquisition of software and hardware asset and the development and marketing of the Company’s cyber
security and training products, the Company no longer meets the definition of a “shell company” as defined in Rule
12b-2 under the Securities Exchange Act of 1934, as amended, in that the Company has operations, and assets, other than cash or
cash equivalents. As such, the Company has changed its status from being a shell company to being a fully operating entity.