SlideShare a Scribd company logo
1 of 34
Bank’s Worst PR Nightmare: Personal Information Compromised April 29, 2008
Michael Kamens, J.D., CISM ,[object Object],[object Object],[object Object],[object Object]
Joshua Neffinger, CISA ,[object Object],[object Object],[object Object],[object Object]
Your Bank’s Worst Nightmare: Personal Information Compromised ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6 Secrets to a successful IT Audit
Remember…The Six Secrets to a Successful IT Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing for the Audit ,[object Object],[object Object],[object Object],[object Object]
Post IT Audit ,[object Object],[object Object],[object Object],[object Object]
Choose your Friends carefully –  Vendor selection
Vendor Due Diligence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Banks need to focus on the risk management process of identifying, measuring, monitoring, and controlling the risks associated with outsourcing technology services.  •   Ability to evaluate and oversee outsourcing relationships. •  Importance and criticality of the services to the financial  institution. •  Defined requirements for the outsourced activity. •  Necessary controls and reporting processes. •  Contractual obligations and requirements for the service  provider. •  Objectives and service provider performance. •  Regulatory requirements and guidance for the business lines  affected and technologies used. Source: FDIC, www.fdic.gov/news/news/financial/2000/fil0081.pdf Risk Management of Outsourced Technology Services
The 5 greatest causes of  Vulnerabilities
The 5 greatest causes of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Device/Server Hardening ,[object Object],[object Object],[object Object],[object Object],[object Object]
Default Credentials ,[object Object],[object Object]
Operating System (OS) Patches ,[object Object],[object Object]
Application Patches ,[object Object],[object Object],[object Object]
Housekeeping ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking Do’s and Don’ts
Hacking Do’s and Don’ts ,[object Object],[object Object],[object Object],[object Object]
Establish Monitoring ,[object Object],[object Object],[object Object]
Encrypt Network Traffic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filter Inbound & Outbound Ports ,[object Object],[object Object]
Don’t Broadcast Network Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vulnerabilities:  Are they Created Equal?
Vulnerabilities : Are they Created Equal? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standardized names  -  CVE or CVSS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Vulnerability Scoring System (CVSS) ,[object Object],[object Object],[object Object],[object Object]
Sample Vulnerability #1: IRDP (ICMP Router Discovery Protocol) enabled (generic-irdp-enabled) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CVE-1999-0875 National Cyber-Alert System   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Vulnerability #2: MS06-060: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (924554) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CVE-2006-3647 National Cyber-Alert System   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you / Questions? ,[object Object],[object Object],[object Object]
Remember ,[object Object],[object Object]

More Related Content

What's hot

Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Sonatype
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51martinvoelk
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Blue Slate Solutions
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martindrewz lin
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security TestingSanjulika Rastogi
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample ReportOctogence
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present DangersPeter Wood
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 

What's hot (20)

Nii sample pt_report
Nii sample pt_reportNii sample pt_report
Nii sample pt_report
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security Testing
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 

Viewers also liked

Project Management Maturity Assessment
Project Management Maturity AssessmentProject Management Maturity Assessment
Project Management Maturity AssessmentDemand Metric
 
Joshua Benefield Design Resume
Joshua Benefield Design ResumeJoshua Benefield Design Resume
Joshua Benefield Design ResumeJoshua Benefield
 
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...paoyadiravivas
 
Cach Dieu Tri Viem Khop
Cach Dieu Tri Viem KhopCach Dieu Tri Viem Khop
Cach Dieu Tri Viem Khopjerlene413
 
SISE Media Kit 2016
SISE Media Kit 2016SISE Media Kit 2016
SISE Media Kit 2016Lerina Lam
 
Conceptos básicos de historia
Conceptos básicos de historia Conceptos básicos de historia
Conceptos básicos de historia aranferpra
 
Manipulacion mediatica 10 mandamientos
Manipulacion mediatica 10 mandamientosManipulacion mediatica 10 mandamientos
Manipulacion mediatica 10 mandamientosaranferpra
 
"La vieja ley cambiaria", presentado por Pere Brachfield
"La vieja ley cambiaria", presentado por Pere Brachfield"La vieja ley cambiaria", presentado por Pere Brachfield
"La vieja ley cambiaria", presentado por Pere BrachfieldEAE Business School
 
doc14599520150107134507
doc14599520150107134507doc14599520150107134507
doc14599520150107134507Nikhil Patel
 
O que vem ser a tecnologia
O que vem ser a tecnologiaO que vem ser a tecnologia
O que vem ser a tecnologiaannecarolinne
 
El origen del titere
El origen del titereEl origen del titere
El origen del titereruth pacheco
 
Metabolic syndrome and preventive strategies
Metabolic  syndrome and preventive strategiesMetabolic  syndrome and preventive strategies
Metabolic syndrome and preventive strategiesdeepika vellore shankar
 
Introducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentIntroducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentCollections Trust
 

Viewers also liked (20)

Project Management Maturity Assessment
Project Management Maturity AssessmentProject Management Maturity Assessment
Project Management Maturity Assessment
 
Cuerpo 39
Cuerpo 39Cuerpo 39
Cuerpo 39
 
Cuerpo 77
Cuerpo 77Cuerpo 77
Cuerpo 77
 
Joshua Benefield Design Resume
Joshua Benefield Design ResumeJoshua Benefield Design Resume
Joshua Benefield Design Resume
 
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...
permisos, requisitos y obligaciones que debe de tener una empresa hotelera y ...
 
Contenido
ContenidoContenido
Contenido
 
Cach Dieu Tri Viem Khop
Cach Dieu Tri Viem KhopCach Dieu Tri Viem Khop
Cach Dieu Tri Viem Khop
 
SISE Media Kit 2016
SISE Media Kit 2016SISE Media Kit 2016
SISE Media Kit 2016
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Conceptos básicos de historia
Conceptos básicos de historia Conceptos básicos de historia
Conceptos básicos de historia
 
Cuerpo 53
Cuerpo 53Cuerpo 53
Cuerpo 53
 
Manipulacion mediatica 10 mandamientos
Manipulacion mediatica 10 mandamientosManipulacion mediatica 10 mandamientos
Manipulacion mediatica 10 mandamientos
 
"La vieja ley cambiaria", presentado por Pere Brachfield
"La vieja ley cambiaria", presentado por Pere Brachfield"La vieja ley cambiaria", presentado por Pere Brachfield
"La vieja ley cambiaria", presentado por Pere Brachfield
 
Cuerpo 79
Cuerpo 79Cuerpo 79
Cuerpo 79
 
doc14599520150107134507
doc14599520150107134507doc14599520150107134507
doc14599520150107134507
 
O que vem ser a tecnologia
O que vem ser a tecnologiaO que vem ser a tecnologia
O que vem ser a tecnologia
 
El origen del titere
El origen del titereEl origen del titere
El origen del titere
 
Metabolic syndrome and preventive strategies
Metabolic  syndrome and preventive strategiesMetabolic  syndrome and preventive strategies
Metabolic syndrome and preventive strategies
 
Introduction to Oleo Misr
Introduction to Oleo MisrIntroduction to Oleo Misr
Introduction to Oleo Misr
 
Introducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk AssessmentIntroducing the Securitas Security & Safety Risk Assessment
Introducing the Securitas Security & Safety Risk Assessment
 

Similar to Bank World 2008 Kamens 04 29 08

Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
It For Dummies Kamens 081107
It For Dummies Kamens 081107It For Dummies Kamens 081107
It For Dummies Kamens 081107kamensm02
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec TrainingMike Spaulding
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxCouronne1
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...MohamedOmerMusa
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive PresentationNormShield, Inc.
 

Similar to Bank World 2008 Kamens 04 29 08 (20)

Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
It For Dummies Kamens 081107
It For Dummies Kamens 081107It For Dummies Kamens 081107
It For Dummies Kamens 081107
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptx
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 

Bank World 2008 Kamens 04 29 08

  • 1. Bank’s Worst PR Nightmare: Personal Information Compromised April 29, 2008
  • 2.
  • 3.
  • 4.
  • 5. 6 Secrets to a successful IT Audit
  • 6.
  • 7.
  • 8.
  • 9. Choose your Friends carefully – Vendor selection
  • 10.
  • 11. The Banks need to focus on the risk management process of identifying, measuring, monitoring, and controlling the risks associated with outsourcing technology services. • Ability to evaluate and oversee outsourcing relationships. • Importance and criticality of the services to the financial institution. • Defined requirements for the outsourced activity. • Necessary controls and reporting processes. • Contractual obligations and requirements for the service provider. • Objectives and service provider performance. • Regulatory requirements and guidance for the business lines affected and technologies used. Source: FDIC, www.fdic.gov/news/news/financial/2000/fil0081.pdf Risk Management of Outsourced Technology Services
  • 12. The 5 greatest causes of Vulnerabilities
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Hacking Do’s and Don’ts
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Vulnerabilities: Are they Created Equal?
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.

Editor's Notes

  1. Randy