%PDF-1.4 % 20 0 obj <> endobj 40 0 obj <> endobj 50 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .5 .26 .09 0 k [( V)6.3(OL 5 )247.6( )247.6( )]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 0 .51599 31.289 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .5 .26 .09 0 k (1)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 35.5957 29.6464 Tm 0 0 0 1 k [( 2020 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.2275 29.6464 Tm [(www)60.5(.isaca.org)]TJ ET EMC /Artifact <>BDC 0 0 0 0 k /GS1 gs 515.27 692.116 53.716 54.884 re f EMC /Figure <>BDC Q /GS1 gs BT /F1 1 Tf 9 0 0 9 515.27 721.5889 Tm .72549 .12941 .60784 .007843 k .0249 Tc 0 Tw (FEATURE)Tj ET q 1 i 515.284 746.986 53.701 -54.87 re W n q 1 0 0 1 568.985 747 cm 0 0 m 0 -54.884 l -9.375 -54.884 l -9.375 -9.9448 l -49.977 -9.9448 l -49.977 0 l 0 0 l f Q EMC /P <>BDC Q q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 9 0 0 9 36 569.5281 Tm 0 0 0 1 k -.005 Tc [(It is time t)9.8(o)0( reassess cybersecurity because current)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.8459 569.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 557.5281 Tm -.005 Tc [(effor)-24.4(ts t)9.8(o)0( pre)6.3(vent r)19.5(ansomware e)6.3(vents are por)9.8(ous)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.9063 557.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 545.5281 Tm -.005 Tc (and are not ful)Tj /TT7 1 Tf 6.3293 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(lling their purpose. )19.5(The facts are)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.9305 545.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 533.5281 Tm -.005 Tc [(clear)60.1(. Ransomware is distributed by a v)7.3(ariety of)]TJ ET EMC /P <>BDC BT 9 0 0 9 221.9399 533.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 521.5281 Tm -.005 Tc (methods,)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 72.8091 525.303 Tm 0 Tc (1)Tj ET EMC /P <>BDC BT 9 0 0 9 75.7964 521.5281 Tm -.005 Tc ( including infected websites, online)Tj ET EMC /P <>BDC BT 9 0 0 9 213.6286 521.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 509.5281 Tm -.005 Tc [(adver)-24.4(tisements and Universal Serial Buses \(USBs\);)]TJ ET EMC /P <>BDC BT 9 0 0 9 235.4082 509.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 497.5281 Tm -.005 Tc (direct attacks; phishing)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 127.5746 501.303 Tm 0 Tc (2)Tj ET EMC /P <>BDC BT 9 0 0 9 130.562 497.5281 Tm -.005 Tc [( \(e.g., thr)9.8(ough email and)]TJ ET EMC /P <>BDC BT 9 0 0 9 225.559 497.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 485.5281 Tm -.005 Tc (more than 1.5 million unique phishing URLs)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 207.075 489.303 Tm 0 Tc (3)Tj ET EMC /P <>BDC BT 9 0 0 9 210.0623 485.5281 Tm -.005 Tc (\); and)Tj ET EMC /P <>BDC BT 9 0 0 9 231.9893 485.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 473.5281 Tm -.005 Tc [(Ransomware as a Ser)-8.8(vice)6.8()]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 144.1147 477.303 Tm 0 Tc (4)Tj ET EMC /P <>BDC BT 9 0 0 9 147.1019 473.5281 Tm -.005 Tc ( \(e.g., malware, criminal)Tj ET EMC /P <>BDC BT 9 0 0 9 240.3235 473.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 461.5281 Tm -.005 Tc [(activity\). In 2019, r)19.5(ansomware fr)9.8(om phishing emails)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.9544 461.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 449.5281 Tm -.005 Tc [(increased 109 per)9.3(cent o)7.3(ver 2017.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 167.6753 453.303 Tm 0 Tc (5)Tj ET EMC /P <>BDC BT 9 0 0 9 170.6626 449.5281 Tm -.005 Tc [( One repor)-24.4(t)]TJ ET EMC /P <>BDC BT 9 0 0 9 214.7458 449.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 437.5281 Tm -.005 Tc [(predicts that by 2021, an enterprise will fall victim t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 240.96 437.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 425.5281 Tm -.005 Tc [(a r)19.5(ansomware attack e)6.3(very 11 seconds,)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 192.1301 429.303 Tm 0 Tc (6)Tj ET EMC /P <>BDC BT 9 0 0 9 195.1174 425.5281 Tm -.005 Tc ( and)Tj ET EMC /P <>BDC BT 9 0 0 9 212.1026 425.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 413.5281 Tm -.005 Tc [(according t)9.8(o)0( another)60.1(, )29.8(only 47% of people who pay)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.7251 413.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 401.5281 Tm -.005 Tc [(r)19.5(ansom get their )]TJ /TT7 1 Tf 7.4404 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les back.)83()]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 145.3244 405.303 Tm 0 Tc (7)Tj ET EMC /P <>BDC BT 9 0 0 9 148.3118 401.5281 Tm -.005 Tc [( )19.5(The potential targets)]TJ ET EMC /P <>BDC BT 9 0 0 9 232.264 401.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 389.5281 Tm -.005 Tc [(are t)9.8(oo numer)9.8(ous t)9.8(o)0( mention, but they include local)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.0604 389.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 377.5281 Tm -.005 Tc [(go)7.3(vernments, )]TJ /TT7 1 Tf 6.2075 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(nancial ser)-8.8(vices, law enfor)9.3(cement,)]TJ ET EMC /P <>BDC BT 9 0 0 9 232.3286 377.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 365.5281 Tm -.005 Tc [(academia, E)8.3(u)0(r)9.8(opean agencies and healthcare)]TJ ET EMC /P <>BDC BT 9 0 0 9 214.9148 365.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 353.5281 Tm -.005 Tc (organizations. And this is just the tip of the iceberg. )Tj ET EMC /P <>BDC BT 9 0 0 9 242.6597 353.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 36 327.5281 Tm .72 .13 .61 .01 k -.005 Tc (Ransomware)Tj ET EMC /P <>BDC BT 11 0 0 11 99.8656 327.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 36 309.5281 Tm 0 0 0 1 k -.005 Tc (Ransomware is malicious software \(malware\))Tj ET EMC /P <>BDC BT 9 0 0 9 220.2575 309.5281 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 297.528 Tm -.005 Tc [(used in a cyber)19.5(attack t)9.8(o)0( encrypt the victim)54.7(s data)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.0726 297.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 285.528 Tm -.005 Tc [(with an encryption key that is known only t)9.8(o)0( the)]TJ ET EMC /P <>BDC BT 9 0 0 9 222.3442 285.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 273.528 Tm -.005 Tc [(attacker)60.1(, thereby rendering the data unusable until a)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.8777 273.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 261.528 Tm -.005 Tc [(r)19.5(ansom payment \(usually crypt)9.8(ocurrency, such as)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.4332 261.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 249.528 Tm -.005 Tc [(Bitcoin\) is made by the victim.)83()]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 157.0757 253.3029 Tm 0 Tc (8)Tj ET EMC /P <>BDC BT 9 0 0 9 160.063 249.528 Tm -.005 Tc ( Ransomware can)Tj ET EMC /P <>BDC BT 9 0 0 9 230.9531 249.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 237.528 Tm -.005 Tc (encrypt data )Tj /TT7 1 Tf 5.7128 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les, system )Tj /TT7 1 Tf 5.1568 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les and the entire disk.)Tj ET EMC /P <>BDC BT 9 0 0 9 232.2332 237.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 225.528 Tm -.005 Tc [(A)8.3(ttacks can st)9.8(op or delete antivirus software,)]TJ ET EMC /P <>BDC BT 9 0 0 9 213.966 225.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 213.528 Tm -.005 Tc [(pre)6.3(vent system pr)9.8(ogr)19.5(ams fr)9.8(om working, make it)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.6106 213.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 201.528 Tm -.005 Tc [(impossible t)9.8(o)0( boot fr)9.8(om safe mode, block system)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.3805 201.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 189.528 Tm -.005 Tc [(updates and remo)7.3(ve data r)9.8(ollback points. Malware)]TJ ET EMC /P <>BDC BT 9 0 0 9 235.5453 189.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 177.528 Tm -.005 Tc [(can ha)7.3(ve many v)7.3(ariations.)]TJ ET EMC /P <>BDC BT 9 0 0 9 138.5996 177.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 153.528 Tm -.005 Tc [(Infection vect)9.8(ors include email \(script )]TJ /TT7 1 Tf 16.7229 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les,)Tj ET EMC /P <>BDC BT 9 0 0 9 204.6243 153.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 141.528 Tm -.005 Tc [(malicious attachments and links t)9.8(o)0( malicious)]TJ ET EMC /P <>BDC BT 9 0 0 9 214.7238 141.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 129.528 Tm -.005 Tc (software\), drive-by downloads \(web exploit scripts)Tj ET EMC /P <>BDC BT 9 0 0 9 233.7723 129.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 117.528 Tm -.005 Tc [(and adver)-24.4(tisements or malver)-24.4(tisements\), social)]TJ ET EMC /P <>BDC BT 9 0 0 9 223.7965 117.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 105.528 Tm -.005 Tc (engineering via offers for free software \(e.g.,)Tj ET EMC /P <>BDC BT 9 0 0 9 210.9589 105.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 93.528 Tm -.005 Tc [(games, screensa)7.3(vers\), vulner)19.5(able or unpatched)]TJ ET EMC /P <>BDC BT 9 0 0 9 221.4817 93.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 81.528 Tm -.005 Tc [(software, and Remote Deskt)9.8(op Pr)9.8(ot)9.8(ocol \(RDP\).)]TJ ET EMC /P <>BDC BT 9 0 0 9 220.5949 81.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36 69.528 Tm -.005 Tc [(Threats are e)6.3(verywhere. )]TJ ET EMC /P <>BDC BT 9 0 0 9 132.7426 69.528 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 254.5 567.4324 Tm .72 .13 .61 .01 k -.005 Tc [(Cyberinsur)14.6(ance)]TJ ET EMC /P <>BDC BT 11 0 0 11 331.0794 567.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 254.5 549.4324 Tm 0 0 0 1 k -.005 Tc [(Cyberinsur)19.5(ance is a consider)19.5(ation when planning)]TJ ET EMC /P <>BDC BT 9 0 0 9 447.3668 549.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 537.4324 Tm -.005 Tc [(for contingencies and disaster reco)7.3(very, and a)]TJ ET EMC /P <>BDC BT 9 0 0 9 435.8365 537.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 525.4324 Tm -.005 Tc [(r)19.5(ansomware e)6.3(vent falls int)9.8(o this category.)]TJ ET EMC /P <>BDC BT 9 0 0 9 419.4139 525.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 513.4324 Tm -.005 Tc [(Cyberinsur)19.5(ance pr)9.8(o)7.3(vides some le)6.3(vel of security in)]TJ ET EMC /P <>BDC BT 9 0 0 9 449.2588 513.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 501.4324 Tm -.005 Tc [(that it gives the enterprise the ability t)9.8(o)0( reco)7.3(ver fr)9.8(om)]TJ ET EMC /P <>BDC BT 9 0 0 9 459.9434 501.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 489.4324 Tm -.005 Tc [(or respond t)9.8(o)0( a cybere)6.3(vent. Insur)19.5(ance can co)7.3(ver)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.4117 489.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 477.4324 Tm -.005 Tc [(investigations, priv)7.3(acy aler)-24.4(ts and noti)]TJ /TT7 1 Tf 16.2294 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cations,)Tj ET EMC /P <>BDC BT 9 0 0 9 436.3794 477.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 465.4324 Tm -.005 Tc [(lawsuits and ext)9.8(or)-24.4(tion, legal fees and expenses,)]TJ ET EMC /P <>BDC BT 9 0 0 9 442.4702 465.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 453.4324 Tm -.005 Tc [(cust)9.8(omer noti)]TJ /TT7 1 Tf 6.0962 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cation of data breaches, rest)9.8(or)19.5(ation)]TJ ET EMC /P <>BDC BT 9 0 0 9 454.5179 453.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 441.4324 Tm -.005 Tc [(of personal identities of affected cust)9.8(omers,)]TJ ET EMC /P <>BDC BT 9 0 0 9 429.2766 441.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 429.4324 Tm -.005 Tc [(reco)7.3(very of compr)9.8(omised data, and repair of)]TJ ET EMC /P <>BDC BT 9 0 0 9 429.3973 429.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 417.4324 Tm -.005 Tc (damaged computer systems.)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 370.1205 421.2073 Tm 0 Tc (9)Tj ET EMC /P <>BDC BT 9 0 0 9 373.1078 417.4324 Tm -.005 Tc ( Enterprises should)Tj ET EMC /P <>BDC BT 9 0 0 9 448.8234 417.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 405.4324 Tm -.005 Tc [(be able t)9.8(o)0( obtain insur)19.5(ance that can be used t)9.8(o)0( pay)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.0707 405.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 254.5 393.4324 Tm -.005 Tc [(for Decryption as a Ser)-8.8(vice \(DaaS\).)]TJ ET EMC /P <>BDC BT 9 0 0 9 391.6169 393.4324 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT11 1 Tf 30 0 0 30 36 660.6805 Tm .5 .26 .09 0 k -.03 Tc (Ransomware Response,)Tj ET EMC /P <>BDC BT 30 0 0 30 335.8132 660.6805 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 30 0 0 30 36 626.6805 Tm -.03 Tc (Safeguards and Countermeasures)Tj ET EMC /Figure <>BDC Q q 1 i 243.307 381.83 540 -360 re W n 254.362 380.146 349.503 -199.901 re 458.299 626.68 m W* n 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n q 351.84 0 0 202.5 252.848 178.97 cm /Im2 Do Q EMC /Artifact <>BDC Q q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n .72 .13 .61 .01 k 254.785 61.225 348.215 103.971 re f EMC /P <>BDC BT /TT9 1 Tf 11 0 0 11 268.1304 148.7188 Tm 0 0 0 0 k -.02 Tc (Larry G. Wlosinski,)Tj ET EMC /P <>BDC BT /TT2 1 Tf 11 0 0 11 356.1403 148.7188 Tm [( CISA, CRISC, CISM, CAP)158.2(, CBCP)158.2(, CCSP)158.2(, CDP)158.2(,)]TJ ET EMC /P <>BDC BT 11 0 0 11 553.5596 148.7188 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 11 0 0 11 268.1304 136.7188 Tm -.02 Tc [(CIPM, CISSP)158.2(, ITIL V3, PMP)]TJ ET EMC /P <>BDC BT 11 0 0 11 390.2214 136.7188 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 125.9188 Tm (Is a senior consultant at Coal)Tj /TT7 1 Tf 12.9003 0 TD ()Tj /TT2 1 Tf .5537 0 TD [(re-Feder)19.5(al. He has more than 20 years of)]TJ ET EMC /P <>BDC BT 9 0 0 9 551.2568 125.9188 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 115.1188 Tm [(experience in IT)19.5( security and priv)7.3(acy and has spoken at US go)7.3(vernment and)]TJ ET EMC /P <>BDC BT 9 0 0 9 568.3428 115.1188 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 104.3189 Tm [(pr)9.8(ofessional conferences on these t)9.8(opics. He has written numer)9.8(ous)]TJ ET EMC /P <>BDC BT 9 0 0 9 537.9019 104.3189 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 93.5189 Tm [(magazine and newspaper ar)-24.4(ticles, re)6.3(viewed v)7.3(arious ISACA)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 501.0581 96.4889 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 505.3033 93.5189 Tm ( publications,)Tj ET EMC /P <>BDC BT 9 0 0 9 558.1958 93.5189 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 82.7188 Tm [(and written questions for the Cer)-24.4(ti)]TJ /TT7 1 Tf 15.1128 0 TD ()Tj /TT2 1 Tf .5537 0 TD (ed Information Security Manager)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 540.064 85.6888 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 544.3091 82.7188 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 268.1304 71.9188 Tm (\(CISM)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 292.709 74.8889 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 296.9541 71.9188 Tm (\) examination.)Tj ET EMC Q endstream endobj 51 0 obj <>/XObject<>/ExtGState<>>> endobj 83 0 obj <> endobj 88 0 obj <> endobj 93 0 obj <> endobj 98 0 obj <> endobj 103 0 obj <> endobj 108 0 obj <> endobj 113 0 obj <> endobj 118 0 obj <> endobj 123 0 obj <> endobj 148 0 obj <> endobj 153 0 obj <> endobj 158 0 obj <> endobj 163 0 obj <> endobj 168 0 obj <> endobj 173 0 obj <> endobj 178 0 obj <> endobj 189 0 obj <> endobj 194 0 obj <> endobj 199 0 obj <> endobj 204 0 obj <> endobj 209 0 obj <> endobj 214 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 0 .51505 31.531 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .5 .26 .09 0 k (2)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 413.6186 28.6649 Tm 0 0 0 1 k [( 2020 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 521.2504 28.6649 Tm [(www)60.5(.isaca.org)]TJ ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 144 691.9966 Tm -.005 Tc [(Howe)6.3(ver)60.1(, cyberinsur)19.5(ance typically does not co)7.3(ver)]TJ ET EMC /P <>BDC BT 9 0 0 9 337.4678 691.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 679.9966 Tm -.005 Tc [(e)6.3(verything. Unco)7.3(vered losses and e)6.3(vents typically)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.1323 679.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 667.9966 Tm -.005 Tc (include the following:)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 227.882 671.7715 Tm -.0083 Tc (10)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 233.8565 671.7715 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 155.016 650.0206 Tm -.005 Tc [(Anything abo)7.3(ve the enterprise)39.1()54.7(s)0( limit and )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 316.5771 650.0206 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 650.0206 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 638.0206 Tm 0 0 0 1 k -.005 Tc (sublimit caps)Tj ET EMC /LBody <>BDC BT 9 0 0 9 207.9874 638.0206 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 155.016 620.0446 Tm -.005 Tc [(Loss of intellectual pr)9.8(oper)-24.4(ty or tr)19.5(ade secrets)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 329.1763 620.0446 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 620.0446 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 602.0686 Tm 0 0 0 1 k -.005 Tc [(Br)19.5(and damage)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 212.6862 602.0686 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 602.0686 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 584.0926 Tm 0 0 0 1 k -.005 Tc (Business interruption)Tj ET EMC /LBody <>BDC BT 9 0 0 9 238.8858 584.0926 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 584.0926 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 566.1166 Tm 0 0 0 1 k -.005 Tc [(Lost re)6.3(venue)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 205.8395 566.1166 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 566.1166 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 548.1406 Tm 0 0 0 1 k -.005 Tc (Negligence-induced incidents)Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.5078 548.1406 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 548.1406 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 530.1646 Tm 0 0 0 1 k -.005 Tc (Nation-state attacks)Tj ET EMC /LBody <>BDC BT 9 0 0 9 235.1295 530.1646 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 530.1646 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 512.1885 Tm 0 0 0 1 k -.005 Tc [(P)6.3(ostbreach remediation)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 249.8623 512.1885 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 512.1885 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 494.2126 Tm 0 0 0 1 k -.005 Tc (Physical damage)Tj ET EMC /LBody <>BDC BT 9 0 0 9 222.6498 494.2126 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 144 494.2126 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 144 470.2126 Tm 0 0 0 1 k -.005 Tc [(Gener)19.5(al liability is not adequate t)9.8(o)0( ensure)]TJ ET EMC /P <>BDC BT 9 0 0 9 306.496 470.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 458.2126 Tm -.005 Tc [(pr)9.8(otection. Additionally, there is the risk that if the)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.3238 458.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 446.2126 Tm -.005 Tc [(insur)19.5(ance is used t)9.8(o)0( pay the perpetr)19.5(at)9.8(ors, they will)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.6321 446.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 434.2126 Tm -.005 Tc [(not pr)9.8(o)7.3(vide the decryption key needed t)9.8(o)0( decrypt)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.5738 434.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 422.2126 Tm -.005 Tc (the affected data or )Tj /TT7 1 Tf 8.8916 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les.)Tj ET EMC /P <>BDC BT 9 0 0 9 242.7445 422.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 144 396.2126 Tm .72 .13 .61 .01 k -.005 Tc (Response Options)Tj ET EMC /P <>BDC BT 11 0 0 11 233.113 396.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 144 378.2126 Tm 0 0 0 1 k -.005 Tc [(During any r)19.5(ansomware e)6.3(vent, a number of actions)]TJ ET EMC /P <>BDC BT 9 0 0 9 344.3408 378.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 366.2126 Tm -.005 Tc [(need t)9.8(o)0( be per)-7.3(formed immediately t)9.8(o)0( identify the)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.9648 366.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 354.2126 Tm -.005 Tc (malware, contain the damage and determine a)Tj ET EMC /P <>BDC BT 9 0 0 9 326.9085 354.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 342.2126 Tm -.005 Tc (course of action.)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 210.4057 345.9876 Tm -.0083 Tc (11)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 216.3802 345.1826 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 218.6871 345.9876 Tm (12)Tj ET EMC /P <>BDC BT 9 0 0 9 224.6616 342.2126 Tm -.005 Tc [( )19.5(There are se)6.3(ver)19.5(al possible)]TJ ET EMC /P <>BDC BT 9 0 0 9 329.8783 342.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 330.2126 Tm -.005 Tc [(responses t)9.8(o)0( an enterprise-le)6.3(vel r)19.5(ansomware e)6.3(vent.)]TJ ET EMC /P <>BDC BT 9 0 0 9 347.2304 330.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 318.2126 Tm -.005 Tc (Any of the following options can be used alone or in)Tj ET EMC /P <>BDC BT 9 0 0 9 347.8347 318.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 306.2126 Tm -.005 Tc [(combination t)9.8(o)0( manage a r)19.5(ansomware e)6.3(vent.)]TJ ET EMC /P <>BDC BT 9 0 0 9 322.6655 306.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 144 282.2126 Tm -.005 Tc [(Rest)14.6(ore F)12.7(r)17.6(om Backups)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.5858 282.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 144 270.2126 Tm -.005 Tc [(Once a r)19.5(ansomware attack has been identi)]TJ /TT7 1 Tf 18.6741 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (ed and)Tj ET EMC /P <>BDC BT 9 0 0 9 343.7442 270.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 258.2126 Tm -.005 Tc [(contained, the typical response is t)9.8(o)0( rest)9.8(ore the)]TJ ET EMC /P <>BDC BT 9 0 0 9 330.4224 258.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 246.2126 Tm -.005 Tc (affected )Tj /TT7 1 Tf 3.9145 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les using the backups. )19.5(The pr)9.8(oblem with)]TJ ET EMC /P <>BDC BT 9 0 0 9 342.872 246.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 234.2126 Tm -.005 Tc [(this option is that the r)19.5(ansomware may ha)7.3(ve)]TJ ET EMC /P <>BDC BT 9 0 0 9 318.8315 234.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 222.2126 Tm -.005 Tc [(infected the network prior t)9.8(o)0( activ)7.3(ation, and during)]TJ ET EMC /P <>BDC BT 9 0 0 9 342.2053 222.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 210.2126 Tm -.005 Tc [(that time, the backup or ar)9.3(chive )]TJ /TT7 1 Tf 14.0079 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les may ha)7.3(ve been)]TJ ET EMC /P <>BDC BT 9 0 0 9 348.0292 210.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 198.2126 Tm -.005 Tc (encrypted as well.)Tj ET EMC /P <>BDC BT 9 0 0 9 215.0321 198.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 144 174.2126 Tm -.005 Tc (Decrypt the Files)Tj ET EMC /P <>BDC BT 9 0 0 9 211.1703 174.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 144 162.2126 Tm -.005 Tc (Decrypting the )Tj /TT7 1 Tf 6.591 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les is another response. As one)Tj ET EMC /P <>BDC BT 9 0 0 9 331.8834 162.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 150.2126 Tm -.005 Tc [(option, the enterprise can try t)9.8(o)0( do this itself using)]TJ ET EMC /P <>BDC BT 9 0 0 9 341.0079 150.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 138.2126 Tm -.005 Tc [(one of the numer)9.8(ous decryption t)9.8(ools a)7.3(v)7.3(ailable on)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.9121 138.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 126.2126 Tm -.005 Tc (the market, some of which are free.)Tj ET EMC /P <>BDC BT 9 0 0 9 283.367 126.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 102.2126 Tm -.005 Tc [(A second option is t)9.8(o)0( obtain help fr)9.8(om a security)]TJ ET EMC /P <>BDC BT 9 0 0 9 334.8607 102.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 90.2126 Tm -.005 Tc [(vendor)60.1(. Some security vendors pr)9.8(o)7.3(vide DaaS t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 329.6223 90.2126 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 691.9966 Tm -.005 Tc (decrypt )Tj /TT7 1 Tf 3.524 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les. One decryption technique is t)9.8(o)0( use a)]TJ ET EMC /P <>BDC BT 9 0 0 9 558.3652 691.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT7 1 Tf 9 0 0 9 362.5 679.9966 Tm ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(le of password v)7.3(ariations t)9.8(o)0( feed a script that uses)]TJ ET EMC /P <>BDC BT 9 0 0 9 566.7117 679.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 667.9966 Tm -.005 Tc [(them t)9.8(o)0( decrypt a sample r)19.5(ansomware )]TJ /TT7 1 Tf 17.1467 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(le back t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 559.9196 667.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 655.9966 Tm -.005 Tc (its baseline.)Tj ET EMC /P <>BDC BT 9 0 0 9 409.7321 655.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 631.9966 Tm -.005 Tc [(A third option is t)9.8(o)0( ask the go)7.3(vernment for help.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 549.8452 635.7715 Tm -.0083 Tc (13)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 555.8197 634.9666 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 558.1266 635.7715 Tm (14)Tj ET EMC /P <>BDC BT 9 0 0 9 564.101 631.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 619.9966 Tm -.005 Tc (If an enterprise chooses this option, it should be)Tj ET EMC /P <>BDC BT 9 0 0 9 551.4525 619.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 607.9966 Tm -.005 Tc [(prepared \(depending on the country\) t)9.8(o)0( pr)9.8(o)7.3(vide the)]TJ ET EMC /P <>BDC BT 9 0 0 9 562.54 607.9966 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 595.9966 Tm -.005 Tc (following information:)Tj ET EMC /P <>BDC BT 9 0 0 9 449.0978 595.9966 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 578.0206 Tm -.005 Tc (Date of infection and victim information \(e.g.,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 551.5688 578.0206 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 578.0206 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 566.0206 Tm 0 0 0 1 k -.005 Tc (industry type and business size\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 500.0453 566.0206 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 548.0446 Tm -.005 Tc [(Ransomware v)7.3(ariant \(identi)]TJ /TT7 1 Tf 12.0263 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ed on the r)19.5(ansom)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 555.6555 548.0446 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 548.0446 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 536.0446 Tm 0 0 0 1 k -.005 Tc (page by the encrypted )Tj /TT7 1 Tf 9.9154 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (le extension\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 518.2433 536.0446 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 518.0685 Tm -.005 Tc (How the infection occurred \(e.g., email link,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 543.2433 518.0685 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 518.0685 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 506.0686 Tm 0 0 0 1 k -.005 Tc [(br)9.8(owsing the Internet, social engineering\))]TJ ET EMC /LBody <>BDC BT 9 0 0 9 536.1448 506.0686 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 488.0926 Tm -.005 Tc [(Requested r)19.5(ansom amount)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 480.6924 488.0926 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 488.0926 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 470.1166 Tm 0 0 0 1 k -.005 Tc (Amount paid \(if any\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 453.8975 470.1166 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 470.1166 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 452.1406 Tm 0 0 0 1 k -.005 Tc [(A)8.3(ttacker)-7.8()54.7(s)0( Bitcoin wallet address \(which may be)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 561.5488 452.1406 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 452.1406 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 440.1406 Tm 0 0 0 1 k -.005 Tc [(listed on the r)19.5(ansom page\))]TJ ET EMC /LBody <>BDC BT 9 0 0 9 479.0984 440.1406 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 422.1646 Tm -.005 Tc [(Over)19.5(all losses associated with a r)19.5(ansomware)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 551.6653 422.1646 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 422.1646 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 410.1646 Tm 0 0 0 1 k -.005 Tc [(infection \(including the r)19.5(ansom amount and)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 545.8787 410.1646 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 398.1646 Tm -.005 Tc (victim impact statement\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 472.702 398.1646 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT15 1 Tf 9 0 0 9 362.5 374.1646 Tm -.005 Tc [(Do Not P)5.4(a)0(y)]TJ ET EMC /P <>BDC BT 9 0 0 9 406.9973 374.1646 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 362.5 362.1646 Tm -.005 Tc (The do not pay response puts the enterprise at)Tj ET EMC /P <>BDC BT 9 0 0 9 552.3818 362.1646 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 350.1646 Tm -.005 Tc [(risk of not reco)7.3(vering the data and being unable t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 560.1835 350.1646 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 338.1646 Tm -.005 Tc [(resume business oper)19.5(ations. )19.5(This option may be)]TJ ET EMC /P <>BDC BT 9 0 0 9 553.9088 338.1646 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 326.1646 Tm -.005 Tc (taken for a number of reasons:)Tj ET EMC /P <>BDC BT 9 0 0 9 483.8239 326.1646 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 308.1886 Tm -.005 Tc [(The enterprise lacks the money \(or insur)19.5(ance\) t)9.8(o)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 564.224 308.1886 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 308.1886 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 296.1886 Tm 0 0 0 1 k -.005 Tc (pay the attackers.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 443.7967 296.1886 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 278.2126 Tm -.005 Tc [(The enterprise)39.1()54.7(s)0( policy does not allow payment.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 560.103 278.2126 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 278.2126 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 260.2366 Tm 0 0 0 1 k -.005 Tc [(The board of direct)9.8(ors has decided not t)9.8(o)0( pay.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 555.0239 260.2366 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 260.2366 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 242.2606 Tm 0 0 0 1 k -.005 Tc (The enterprise fears that if it pays, the)Tj ET EMC /LBody <>BDC BT 9 0 0 9 522.4525 242.2606 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 242.2606 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 230.2606 Tm 0 0 0 1 k -.005 Tc [(perpetr)19.5(at)9.8(ors will attack again in the future.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 540.1495 230.2606 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 373.516 212.2846 Tm -.005 Tc [(The enterprise fears the perpetr)19.5(at)9.8(ors will not)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 548.6343 212.2846 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 362.5 212.2846 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 373.516 200.2846 Tm 0 0 0 1 k -.005 Tc [(pr)9.8(o)7.3(vide the key t)9.8(o)0( decrypt the system or data.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 552.9717 200.2846 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .5 .26 .09 0 k /GS1 gs 362.5 71.287 205.5 119.495 re f EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 367.1958 152.5062 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 381.103 172.5064 Tm 0 0 0 0 k .0176 Tc [( )19.6(T)-17.6(H)-17.6(E)0( )17.6(D)-17.6(O N)-17.6(O)-4.4(T)19.5( P)49.8(A)28.3(Y)]TJ ET EMC /P <>BDC BT 14 0 0 14 507.4382 172.5064 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.4419 154.5064 Tm .0352 Tc -.0176 Tw [(RESPONSE)17.6( PUT)7.9(S)17.6( )19.5(THE)]TJ ET EMC /P <>BDC BT 14 0 0 14 511.5708 154.5064 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.4419 136.5064 Tm .0352 Tc -.0176 Tw [(ENTERPRISE)17.6( A)63(T)37.2( RISK)17.6( OF)17.6( NO)13.2(T)]TJ ET EMC /P <>BDC BT 14 0 0 14 562.4918 136.5064 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.4419 118.5064 Tm .0352 Tc -.0176 Tw [(RECO)10.8(VERING)17.6( )19.5(THE)17.6( DA)63(T)38.6(A)17.6( AND)]TJ ET EMC /P <>BDC BT 14 0 0 14 560.0992 118.5064 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.4419 100.5064 Tm .0352 Tc -.0176 Tw [(BEING)17.6( UNABLE)17.6( )19.6(T)13.7(O)17.6( RESUME)]TJ ET EMC /P <>BDC BT 14 0 0 14 550.9936 100.5064 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.4419 82.5064 Tm .0352 Tc -.0176 Tw [(BUSINESS)17.6( OPERA)63(TIONS)17.6(.)35.2( )]TJ ET EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 534.4848 62.5062 Tm 0 .35 .9 0 k 0 Tc 0 Tw ()Tj ET EMC Q endstream endobj 215 0 obj <>/ExtGState<>>> endobj 236 0 obj <> endobj 241 0 obj <> endobj 276 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 0 .51599 31.289 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .5 .26 .09 0 k (3)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 36.1747 28.6649 Tm 0 0 0 1 k [( 2020 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.8065 28.6649 Tm [(www)60.5(.isaca.org)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 48.0159 691.9966 Tm -.02 Tc (The enterprise has con)Tj /TT7 1 Tf 9.6997 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(dence in its IT)19.5( oper)19.5(ations.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 237.962 691.9966 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 36.9999 691.9966 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 48.0159 674.0206 Tm 0 0 0 1 k -.005 Tc (The enterprise has contacted vendors for help.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 231.8354 674.0206 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 36.9999 674.0206 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 36.9999 650.0206 Tm 0 0 0 1 k -.025 Tc [(The decision t)9.8(o)0( take this option may be made by)]TJ ET EMC /P <>BDC BT 9 0 0 9 219.308 650.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 638.0206 Tm -.025 Tc [(enterprise management or)60.1(, in the case of)]TJ ET EMC /P <>BDC BT 9 0 0 9 191.0612 638.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 626.0206 Tm -.025 Tc [(go)7.3(vernments, by policy, law or directive. When)]TJ ET EMC /P <>BDC BT 9 0 0 9 209.9396 626.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 614.0206 Tm -.025 Tc [(choosing this option, reco)7.3(very is dif)]TJ /TT7 1 Tf 14.7462 0 TD 0 Tc ()Tj /TT2 1 Tf .5287 0 TD -.025 Tc (cult and may take)Tj ET EMC /P <>BDC BT 9 0 0 9 241.2741 614.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 602.0206 Tm -.025 Tc [(a very long time. Using cyberinsur)19.5(ance that a)7.3(v)7.3(oids)]TJ ET EMC /P <>BDC BT 9 0 0 9 225.515 602.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 590.0206 Tm -.025 Tc [(paying the attacker may also be par)-24.4(t of this option.)]TJ ET EMC /P <>BDC BT 9 0 0 9 227.7941 590.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 36.9999 566.0206 Tm -.005 Tc [(P)5.4(ay the A)8.3(ttackers)]TJ ET EMC /P <>BDC BT 9 0 0 9 107.9234 566.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 36.9999 554.0206 Tm -.005 Tc (This option entails the risk of being targeted again,)Tj ET EMC /P <>BDC BT 9 0 0 9 236.1842 554.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 542.0206 Tm -.005 Tc (being denied the decryption key despite paying the)Tj ET EMC /P <>BDC BT 9 0 0 9 236.0775 542.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 530.0206 Tm -.005 Tc [(r)19.5(ansom, being for)9.3(ced t)9.8(o)0( pay more for the pr)9.8(omised)]TJ ET EMC /P <>BDC BT 9 0 0 9 237.2563 530.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 518.0206 Tm -.005 Tc [(decryption key and encour)19.5(aging criminal beha)7.3(vior)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.3559 518.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 506.0206 Tm -.005 Tc [(Howe)6.3(ver)60.1(, for those who choose this option, there is)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.0848 506.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 494.0206 Tm -.005 Tc [(a helpful guide a)7.3(v)7.3(ailable.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 134.3294 497.7955 Tm -.0083 Tc (15)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 140.304 497.7955 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 36.9999 468.0206 Tm .72 .13 .61 .01 k -.005 Tc (Safeguards and Countermeasures)Tj ET EMC /P <>BDC BT 11 0 0 11 204.0299 468.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 36.9999 450.0206 Tm 0 0 0 1 k -.005 Tc [(Ransomware safeguards can be br)9.8(oken down int)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.8742 450.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 438.0206 Tm -.005 Tc [(the following areas: pre)6.3(vention, pr)9.8(otection,)]TJ ET EMC /P <>BDC BT 9 0 0 9 204.1794 438.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 426.0206 Tm -.005 Tc [(detection, response and reco)7.3(very. )19.5(This section)]TJ ET EMC /P <>BDC BT 9 0 0 9 219.98 426.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 414.0206 Tm -.005 Tc [(co)7.3(vers current and new recommendations, vendors)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.2447 414.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 402.0206 Tm -.005 Tc [(that can help, and guidance a)7.3(v)7.3(ailable online.)]TJ ET EMC /P <>BDC BT 9 0 0 9 210.7746 402.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 36.9999 378.0206 Tm -.005 Tc [(Pre)6.3(vention)]TJ ET EMC /P <>BDC BT 9 0 0 9 80.4559 378.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 36.9999 366.0206 Tm -.005 Tc [(Pre)6.3(vention inv)7.3(olves implementing safeguards)]TJ ET EMC /P <>BDC BT 9 0 0 9 216.9598 366.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 354.0206 Tm -.005 Tc [(viewed as best cyberpr)19.5(actices in the areas of)]TJ ET EMC /P <>BDC BT 9 0 0 9 214.343 354.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 342.0206 Tm -.005 Tc [(network ar)9.3(chitecture, con)]TJ /TT7 1 Tf 11.1031 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(gur)19.5(ation and oper)19.5(ations.)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.1254 342.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT19 1 Tf 9 0 0 9 36.9999 318.0206 Tm -.005 Tc [(Ar)9.3(chitecture)]TJ ET EMC /P <>BDC BT 9 0 0 9 85.6833 318.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 36.9999 306.0206 Tm -.005 Tc [(Impr)9.8(o)7.3(vements in network ar)9.3(chitecture include)]TJ ET EMC /P <>BDC BT 9 0 0 9 217.6927 306.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 294.0206 Tm -.005 Tc [(categorizing data based on v)7.3(alue and physically and)]TJ ET EMC /P <>BDC BT 9 0 0 9 242.3211 294.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 282.0206 Tm -.005 Tc [(logically separ)19.5(ating networks and data accordingly.)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.0297 282.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 270.0206 Tm -.005 Tc [(Reducing the attack sur)-7.3(face by means of network)]TJ ET EMC /P <>BDC BT 9 0 0 9 232.4594 270.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 258.0206 Tm -.005 Tc [(segmentation results in better pr)9.8(otection of high-)]TJ ET EMC /P <>BDC BT 9 0 0 9 36.9999 246.0206 Tm [(v)7.3(alue assets. Data can be pr)9.8(otected either by not)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.9902 246.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 234.0206 Tm -.005 Tc [(connecting sensitive data t)9.8(o)0( the Internet or by)]TJ ET EMC /P <>BDC BT 9 0 0 9 217.1095 234.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 222.0206 Tm -.005 Tc [(creating a hidden st)9.8(or)19.5(age area. )19.5(T)48.3(o)0( back up data)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.299 222.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 210.0206 Tm -.005 Tc [(twice, consider opening a tempor)19.5(ary por)-24.4(t and)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.2273 210.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 198.0206 Tm -.005 Tc [(making secondary backups fr)9.8(om primary backups.)]TJ ET EMC /P <>BDC BT 9 0 0 9 236.6837 198.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 186.0206 Tm -.005 Tc [(Cloud st)9.8(or)19.5(age may be a good option.)]TJ ET EMC /P <>BDC BT 9 0 0 9 182.1327 186.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 162.0206 Tm -.005 Tc [(Install and maintain software-based pr)9.8(otection and)]TJ ET EMC /P <>BDC BT 9 0 0 9 237.9451 162.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 150.0206 Tm -.005 Tc (detection, such as antivirus, antispam, and)Tj ET EMC /P <>BDC BT 9 0 0 9 204.3694 150.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 138.0206 Tm -.005 Tc (antiphishing software and )Tj /TT7 1 Tf 11.6371 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (lters, and multiple)Tj ET EMC /P <>BDC BT 9 0 0 9 216.715 138.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT7 1 Tf 9 0 0 9 36.9999 126.0206 Tm ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(rewalls \(t)9.8(o handle the v)7.3(olume\). De)6.3(velop)]TJ ET EMC /P <>BDC BT 9 0 0 9 197.2094 126.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 114.0206 Tm -.005 Tc [(containment str)19.5(ategies t)9.8(o)0( make it dif)]TJ /TT7 1 Tf 16.1261 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cult t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 211.7678 114.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 102.0206 Tm -.005 Tc (ex)Tj /TT7 1 Tf 1.0154 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ltr)19.5(ate data. One option is t)9.8(o)0( implement a )]TJ ET EMC /P <>BDC BT 9 0 0 9 211.4514 102.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.9999 90.0206 Tm (z)Tj ET EMC /P <>BDC BT 9 0 0 9 41.4155 90.0206 Tm -.02 Tc [(er)9.8(o-trust envir)9.8(onment for data egress. Also, consider)]TJ ET EMC /P <>BDC BT 9 0 0 9 241.5178 90.0206 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 692.0039 Tm -.02 Tc [(executing oper)19.5(ating systems or speci)]TJ /TT7 1 Tf 15.8225 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(c pr)9.8(ogr)19.5(ams in)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.1667 692.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 680.0039 Tm -.02 Tc [(a vir)-24.4(tualized envir)9.8(onment that has pr)9.8(otections not)]TJ ET EMC /P <>BDC BT 9 0 0 9 444.6243 680.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 668.0039 Tm -.02 Tc [(a)7.3(v)7.3(ailable t)9.8(o)0( dedicated hardware de)6.3(vices.)]TJ ET EMC /P <>BDC BT 9 0 0 9 410.2394 668.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 644.0039 Tm -.005 Tc [(Local go)7.3(vernments can standardize software within)]TJ ET EMC /P <>BDC BT 9 0 0 9 459.4829 644.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 632.0039 Tm -.005 Tc [(a jurisdiction so that if a r)19.5(ansomware attack occurs)]TJ ET EMC /P <>BDC BT 9 0 0 9 457.7747 632.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 620.0039 Tm -.005 Tc (at one location, it can obtain a copy of the software)Tj ET EMC /P <>BDC BT 9 0 0 9 457.1541 620.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 608.0039 Tm -.005 Tc [(fr)9.8(om another site. )19.5(This, howe)6.3(ver)60.1(, is only a par)-24.4(tial)]TJ ET EMC /P <>BDC BT 9 0 0 9 445.1195 608.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 596.0039 Tm -.005 Tc [(solution; although the go)7.3(vernment would be able t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 457.2669 596.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 584.0039 Tm -.005 Tc [(continue oper)19.5(ations, data reco)7.3(very is a separ)19.5(ate)]TJ ET EMC /P <>BDC BT 9 0 0 9 444.0591 584.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 572.0039 Tm -.005 Tc (concern \(discussed later\). Other institutions \(e.g.,)Tj ET EMC /P <>BDC BT 9 0 0 9 449.68 572.0039 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 560.0038 Tm -.005 Tc (healthcare enterprises\) can implement similar types)Tj ET EMC /P <>BDC BT 9 0 0 9 460.2981 560.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 548.0038 Tm -.005 Tc [(of ar)9.3(chitecture. )19.5(The E)8.3(u)0(r)9.8(opean Union,)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 398.8035 551.7788 Tm -.0083 Tc (16)Tj ET EMC /P <>BDC BT 9 0 0 9 404.778 548.0038 Tm -.005 Tc ( the Center)Tj ET EMC /P <>BDC BT 9 0 0 9 447.7495 548.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 536.0038 Tm -.005 Tc (for Internet Security \(CIS\),)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 356.8923 539.7788 Tm -.0083 Tc (17)Tj ET EMC /P <>BDC BT 9 0 0 9 362.8669 536.0038 Tm -.005 Tc [( K)11.2(nowBe4)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 402.5632 539.7788 Tm -.0083 Tc (18)Tj ET EMC /P <>BDC BT 9 0 0 9 408.5377 536.0038 Tm -.005 Tc ( and the)Tj ET EMC /P <>BDC BT 9 0 0 9 440.236 536.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 524.0038 Tm -.005 Tc (National Cyber Security Centre)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 375.98 527.7788 Tm -.0083 Tc (19)Tj ET EMC /P <>BDC BT 9 0 0 9 381.9546 524.0038 Tm -.005 Tc [( can pr)9.8(o)7.3(vide)]TJ ET EMC /P <>BDC BT 9 0 0 9 429.9041 524.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 512.0038 Tm -.005 Tc (guidance and assistance.)Tj ET EMC /P <>BDC BT 9 0 0 9 356.0747 512.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT19 1 Tf 9 0 0 9 255.5 344.0038 Tm -.005 Tc (Con)Tj /TT20 1 Tf 1.7262 0 TD 0 Tc ()Tj /TT19 1 Tf .5902 0 TD -.005 Tc [(gur)14.6(ation)]TJ ET EMC /P <>BDC BT 9 0 0 9 309.0349 344.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 255.5 332.0038 Tm -.02 Tc (Con)Tj /TT7 1 Tf 1.7129 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(gur)19.5(ation safeguards include not mapping drives)]TJ ET EMC /P <>BDC BT 9 0 0 9 457.7198 332.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 320.0038 Tm -.02 Tc [(and hiding network shares so perpetr)19.5(at)9.8(ors cannot)]TJ ET EMC /P <>BDC BT 9 0 0 9 445.1467 320.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT7 1 Tf 9 0 0 9 255.5 308.0038 Tm ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (nd key assets. Con)Tj /TT7 1 Tf 7.9916 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (gure access and account)Tj ET EMC /P <>BDC BT 9 0 0 9 433.0212 308.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 296.0038 Tm -.02 Tc [(contr)9.8(ols t)9.8(o)0( work on the principle of least privilege.)]TJ ET EMC /P <>BDC BT 9 0 0 9 444.4886 296.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 272.0038 Tm -.005 Tc (Implement software restriction policies \(use)Tj ET EMC /P <>BDC BT 9 0 0 9 429.4997 272.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 260.0038 Tm -.005 Tc [(whitelists instead of blacklists\) and a zer)9.8(o-trust)]TJ ET EMC /P <>BDC BT 9 0 0 9 441.829 260.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 248.0038 Tm -.005 Tc [(access policy \(with access based on user r)9.8(ole and)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.2163 248.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 236.0038 Tm -.005 Tc [(de)6.3(vice, not Internet Pr)9.8(ot)9.8(ocol [IP] address\). )19.5(The latter)]TJ ET EMC /P <>BDC BT 9 0 0 9 460.0875 236.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 224.0038 Tm -.005 Tc [(is a fairly new concept, but it has the adv)7.3(antages of)]TJ ET EMC /P <>BDC BT 9 0 0 9 457.2595 224.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 212.0038 Tm -.005 Tc [(limiting access t)9.8(o)0( only those who ha)7.3(ve been vetted)]TJ ET EMC /P <>BDC BT 9 0 0 9 456.1552 212.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 200.0038 Tm -.005 Tc [(and restricting access t)9.8(o)0( only appr)9.8(o)7.3(ved and)]TJ ET EMC /P <>BDC BT 9 0 0 9 427.3958 200.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 188.0038 Tm -.005 Tc [(registered de)6.3(vices. If would-be attackers cannot get)]TJ ET EMC /P <>BDC BT 9 0 0 9 459.3874 188.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 176.0038 Tm -.005 Tc [(in, they may not be able t)9.8(o)0( encrypt data )]TJ /TT7 1 Tf 17.3746 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les or)Tj ET EMC /P <>BDC BT 9 0 0 9 438.5396 176.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 164.0038 Tm -.005 Tc (application software.)Tj ET EMC /P <>BDC BT 9 0 0 9 338.6536 164.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 140.0038 Tm -.005 Tc (Restrict the ex)Tj /TT7 1 Tf 6.2717 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ltr)19.5(ation of high-v)7.3(alue data, such as)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.886 140.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 128.0038 Tm -.005 Tc [(monit)9.8(oring egress activity and requiring a manual)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.3906 128.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 116.0038 Tm -.005 Tc [(appr)9.8(o)7.3(v)7.3(al response. Block adver)-24.4(tisements, pr)9.8(o)10.2(x)0(y)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.9382 116.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 104.0038 Tm -.005 Tc [(ser)-8.8(vices, NoScript br)9.8(owser add-ons and known)]TJ ET EMC /P <>BDC BT 9 0 0 9 440.3938 104.0038 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.5 92.0038 Tm -.005 Tc [(malicious IP addresses. Disabling macr)9.8(o scripts)]TJ ET EMC /P <>BDC BT 9 0 0 9 445.2027 92.0038 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .5 .26 .09 0 k /GS1 gs 253.553 363.123 205.5 135.676 re f EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 258.2487 460.5227 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 272.1559 480.523 Tm 0 0 0 0 k .0352 Tc -.0176 Tw [( AN)17.6( ENTERPRISE)17.6()17.6(S)]TJ ET EMC /P <>BDC BT 14 0 0 14 396.0914 480.523 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 462.523 Tm .0352 Tc -.0176 Tw [(INFORMA)63(TION)17.6( SECURIT)-7.8(Y)]TJ ET EMC /P <>BDC BT 14 0 0 14 426.8297 462.523 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 444.523 Tm .0352 Tc -.0176 Tw [(POSTURE)17.6( CAN)17.6( BE)17.6( IMPRO)10.8(VED)]TJ ET EMC /P <>BDC BT 14 0 0 14 453.1617 444.523 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 426.523 Tm .0352 Tc -.0176 Tw [(B)26.9(Y)17.6( IMPLEMENTING)]TJ ET EMC /P <>BDC BT 14 0 0 14 387.5435 426.523 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 408.523 Tm .0352 Tc [(BEH)-8.7(A)42.5(VIOR)17.6(-)17.6(MONIT)13.7(ORING)]TJ ET EMC /P <>BDC BT 14 0 0 14 422.6119 408.523 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 390.523 Tm .0352 Tc -.0176 Tw [(SOF)-9.7(T)-7.3(W)21(ARE)17.6( AND)17.6( NEW)]TJ ET EMC /P <>BDC BT 14 0 0 14 402.8218 390.523 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 258.4948 372.523 Tm .0352 Tc [(TECHNOL)31.8(OGIES)17.6(.)35.2( )]TJ ET EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 372.6343 352.5227 Tm 0 .35 .9 0 k 0 Tc ()Tj ET EMC Q endstream endobj 277 0 obj <>/ExtGState<>>> endobj 315 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 0 .51505 31.531 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .5 .26 .09 0 k (4)Tj ET EMC /P <>BDC /GS2 gs BT 9 0 0 9 141.4976 548.0233 Tm 0 0 0 1 k -.005 Tc [(reduces the ability t)9.8(o)0( use utility pr)9.8(ogr)19.5(ams or)]TJ ET EMC /P <>BDC BT 9 0 0 9 314.0231 548.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 536.0233 Tm -.005 Tc [(r)9.8(outines in memory. Disabling the RDP eliminates)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.0157 536.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 524.0233 Tm -.005 Tc (another potential means of entry. Con)Tj /TT7 1 Tf 16.5509 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (gure )Tj ET EMC /P <>BDC BT 9 0 0 9 315.2214 524.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 512.0233 Tm -.005 Tc [(the network t)9.8(o)0( block )]TJ /TT7 1 Tf 9.1592 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (le extensions in email )Tj ET EMC /P <>BDC BT 9 0 0 9 316.2346 512.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 500.0233 Tm -.005 Tc (\(e.g., .js, .wsf, .zip\). Also consider password-)Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 488.0233 Tm [(pr)9.8(otecting ar)9.3(chived )]TJ /TT7 1 Tf 8.6852 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les.)Tj ET EMC /P <>BDC BT 9 0 0 9 238.3842 488.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT19 1 Tf 9 0 0 9 141.4976 464.0233 Tm -.005 Tc [(Oper)14.6(ations)]TJ ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 184.4613 464.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 141.4976 452.0233 Tm -.005 Tc [(Oper)19.5(ational safeguards should include patching)]TJ ET EMC /P <>BDC BT 9 0 0 9 330.0631 452.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 440.0233 Tm -.005 Tc [(oper)19.5(ating systems, software and )]TJ /TT7 1 Tf 14.5685 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (rmware. An)Tj ET EMC /P <>BDC BT 9 0 0 9 322.9427 440.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 428.0233 Tm -.005 Tc [(enterprise)39.1()54.7(s)0( information security posture can be)]TJ ET EMC /P <>BDC BT 9 0 0 9 329.1426 428.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 416.0233 Tm -.005 Tc [(impr)9.8(o)7.3(ved by implementing beha)7.3(vior-monit)9.8(oring)]TJ ET EMC /P <>BDC BT 9 0 0 9 327.9031 416.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 404.0233 Tm -.005 Tc [(software and new technologies \(e.g., ar)-24.4(ti)]TJ /TT7 1 Tf 17.795 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cial)Tj ET EMC /P <>BDC BT 9 0 0 9 320.3863 404.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 392.0233 Tm -.005 Tc [(intelligence\) and by using secure Hyper)-24.4(text )19.5(T)36.6(r)19.5(ansfer)]TJ ET EMC /P <>BDC BT 9 0 0 9 346.3079 392.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 380.0233 Tm -.005 Tc [(Pr)9.8(ot)9.8(ocol Secure \(H)14.2(T)-7.8(TPS\) )]TJ /TT7 1 Tf 11.2555 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ltering on all web tr)19.5(af)]TJ /TT7 1 Tf 9.1985 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (c.)Tj ET EMC /P <>BDC BT 9 0 0 9 342.4507 380.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 368.0233 Tm -.005 Tc [(The Host Intrusion Pre)6.3(vention Ser)-8.8(vice \(HIPS\) and)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.2422 368.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 356.0233 Tm -.005 Tc [(other signatureless technologies are essential t)9.8(o)0( a)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.1082 356.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 344.0233 Tm -.005 Tc [(str)9.8(ong cyberdefense, along with re)6.3(viewing and)]TJ ET EMC /P <>BDC BT 9 0 0 9 324.048 344.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 332.0233 Tm -.005 Tc [(exer)9.3(cising the enterprise)39.1()54.7(s)0( incident response plan)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.4159 332.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 320.0232 Tm -.005 Tc [(\(IRP\) and pr)19.5(acticing good cyberhygiene.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 298.566 323.7981 Tm -.0083 Tc (20)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 304.5406 323.7981 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 296.0233 Tm -.005 Tc [(The user inter)-7.3(face should ne)6.3(ver be o)7.3(verlooked)]TJ ET EMC /P <>BDC BT 9 0 0 9 323.5339 296.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 284.0233 Tm -.005 Tc (because users may be the weakest link when it)Tj ET EMC /P <>BDC BT 9 0 0 9 326.4825 284.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 272.0233 Tm -.005 Tc [(comes t)9.8(o)0( security. Pr)9.8(o)7.3(vide security awareness)]TJ ET EMC /P <>BDC BT 9 0 0 9 324.5973 272.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 260.0233 Tm -.005 Tc [(tr)19.5(aining combined with simulated phishing attacks)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.2158 260.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 248.0233 Tm -.005 Tc [(on a regular basis, and tr)19.5(ain users t)9.8(o)0( connect only)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.9441 248.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 236.0233 Tm -.005 Tc [(t)9.8(o)0( sites that use crypt)9.8(ogr)19.5(aphy \(H)14.2(T)-7.8(TPS\) and t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 321.7014 236.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 224.0233 Tm -.005 Tc [(employ a vir)-24.4(tual priv)7.3(ate network \()-9.8(VPN\) connection)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.5698 224.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 212.0233 Tm -.005 Tc (for remote access.)Tj ET EMC /P <>BDC BT 9 0 0 9 215.7245 212.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 188.0233 Tm -.005 Tc [(Penetr)19.5(ation testers can determine whether)]TJ ET EMC /P <>BDC BT 9 0 0 9 309.5898 188.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 176.0233 Tm -.005 Tc [(attackers will be able t)9.8(o)0( )]TJ /TT7 1 Tf 10.5981 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (nd backups \(regular and)Tj ET EMC /P <>BDC BT 9 0 0 9 337.3407 176.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 164.0233 Tm -.005 Tc (hidden\). Backup data )Tj /TT7 1 Tf 9.5391 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les are targets for)Tj ET EMC /P <>BDC BT 9 0 0 9 302.0005 164.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 152.0233 Tm -.005 Tc [(r)19.5(ansomware attacks, but if they cannot be found, an)]TJ ET EMC /P <>BDC BT 9 0 0 9 345.742 152.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 140.0233 Tm -.005 Tc [(enterprise will be able t)9.8(o)0( reco)7.3(ver fr)9.8(om an attack.)]TJ ET EMC /P <>BDC BT 9 0 0 9 331.3026 140.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 116.0233 Tm -.005 Tc (Enterprises should consider increasing the security)Tj ET EMC /P <>BDC BT 9 0 0 9 342.5647 116.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 141.4976 104.0233 Tm -.005 Tc [(requirements of business par)-24.4(tners and any entity)]TJ ET EMC /P <>BDC BT 9 0 0 9 334.5874 104.0233 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 664.482 Tm -.005 Tc [(with which they ex)9.8(change high-v)7.3(alue data.)]TJ ET EMC /P <>BDC BT 9 0 0 9 526.0288 664.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 652.482 Tm -.005 Tc [(Sometimes the business par)-24.4(tner is the weakest)]TJ ET EMC /P <>BDC BT 9 0 0 9 547.1623 652.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 640.482 Tm -.005 Tc (security link.)Tj ET EMC /P <>BDC BT 9 0 0 9 409.3687 640.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 616.4819 Tm -.005 Tc [(De)6.3(velopers and maintainers of oper)19.5(ating systems)]TJ ET EMC /P <>BDC BT 9 0 0 9 555.7822 616.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 604.4819 Tm -.005 Tc (should consider adding a new feature whereby)Tj ET EMC /P <>BDC BT 9 0 0 9 543.6125 604.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 592.4819 Tm -.005 Tc (sample )Tj /TT7 1 Tf 3.4821 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les are created in the same space as the)Tj ET EMC /P <>BDC BT 9 0 0 9 555.0782 592.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 580.4819 Tm -.005 Tc [(pr)9.8(oduction envir)9.8(onment. )19.5(These sample )]TJ /TT7 1 Tf 17.3751 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les ser)-8.8(ve)]TJ ET EMC /P <>BDC BT 9 0 0 9 556.3888 580.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 568.4819 Tm -.005 Tc [(as baselines with known nonpr)9.8(oduction data that)]TJ ET EMC /P <>BDC BT 9 0 0 9 553.8311 568.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 556.4819 Tm -.005 Tc [(can be used t)9.8(o)0( break the r)19.5(ansomware)39.1()54.7(s)0( encryption)]TJ ET EMC /P <>BDC BT 9 0 0 9 557.7192 556.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 544.4819 Tm -.005 Tc [(code. )19.5(T)48.3(o)0( suppor)-24.4(t this feature, software vendors)]TJ ET EMC /P <>BDC BT 9 0 0 9 546.5273 544.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 532.4819 Tm -.005 Tc [(need t)9.8(o)0( create software scripts that can try)]TJ ET EMC /P <>BDC BT 9 0 0 9 529.3743 532.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 520.4819 Tm -.005 Tc [(unlimited v)7.3(ariations of a decryption key t)9.8(o)0( unlock)]TJ ET EMC /P <>BDC BT 9 0 0 9 553.0458 520.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 508.4819 Tm -.005 Tc (the sample )Tj /TT7 1 Tf 5.1169 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les. Once the key is found, the)Tj ET EMC /P <>BDC BT 9 0 0 9 528.325 508.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 496.482 Tm -.005 Tc (enterprise is informed.)Tj ET EMC /P <>BDC BT 9 0 0 9 448.9717 496.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 472.482 Tm -.005 Tc [(Ransomware pre)6.3(vention software can monit)9.8(or for)]TJ ET EMC /P <>BDC BT 9 0 0 9 556.1129 472.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 460.482 Tm -.005 Tc (unauthorized/hidden use of encryption software on)Tj ET EMC /P <>BDC BT 9 0 0 9 562.0731 460.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT7 1 Tf 9 0 0 9 359.9976 448.482 Tm ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les and direct)9.8(ories, deactiv)7.3(ation of de)6.3(vice)]TJ ET EMC /P <>BDC BT 9 0 0 9 527.8977 448.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 436.482 Tm -.005 Tc [(pr)9.8(otective software, and for changes t)9.8(o)0( the master)]TJ ET EMC /P <>BDC BT 9 0 0 9 559.286 436.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 424.482 Tm -.005 Tc (boot record and master )Tj /TT7 1 Tf 10.5584 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (le table.)Tj ET EMC /P <>BDC BT 9 0 0 9 490.9423 424.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 400.482 Tm -.005 Tc [(Guidance is a)7.3(v)7.3(ailable fr)9.8(om BackBlaze)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 507.8757 404.2569 Tm -.0083 Tc (21)Tj ET EMC /P <>BDC BT 9 0 0 9 513.8503 400.482 Tm -.005 Tc (and Cisco)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 553.1368 404.2569 Tm -.0083 Tc (22)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 559.1115 404.2569 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 388.482 Tm -.005 Tc [(t)9.8(o)0( help safeguard enterprises fr)9.8(om r)19.5(ansomware)]TJ ET EMC /P <>BDC BT 9 0 0 9 548.2961 388.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 376.482 Tm -.005 Tc [(attacks. One document fr)9.8(om Cisco co)7.3(vers Domain)]TJ ET EMC /P <>BDC BT 9 0 0 9 558.8024 376.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 364.482 Tm -.005 Tc [(Name System \(DNS\)le)6.3(vel security, email security,)]TJ ET EMC /P <>BDC BT 9 0 0 9 560.3021 364.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 352.482 Tm -.005 Tc [(malware pr)9.8(otection for endpoints and IRPs.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 531.1078 356.2569 Tm -.0083 Tc (23)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 537.0823 356.2569 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 359.9976 328.482 Tm -.005 Tc [(Pr)17.6(otection)]TJ ET EMC /P <>BDC BT 9 0 0 9 401.722 328.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 359.9976 316.4819 Tm -.005 Tc [(Cybersoftware is one type of pr)9.8(otection that can be)]TJ ET EMC /P <>BDC BT 9 0 0 9 561.6844 316.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 304.4819 Tm -.005 Tc [(implemented. Subscription ser)-8.8(vices are a)7.3(v)7.3(ailable)]TJ ET EMC /P <>BDC BT 9 0 0 9 552.9907 304.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 292.4819 Tm -.005 Tc [(that can supplement an enterprise)39.1()54.7(s)0( cybersecurity)]TJ ET EMC /P <>BDC BT 9 0 0 9 555.4243 292.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 280.4819 Tm -.005 Tc [(safeguards. Software as a Ser)-8.8(vice \(SaaS\) is a)]TJ ET EMC /P <>BDC BT 9 0 0 9 539.1246 280.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 268.4819 Tm -.005 Tc [(gr)9.8(owing industry in which enterprises \(e.g., payr)9.8(oll)]TJ ET EMC /P <>BDC BT 9 0 0 9 556.7966 268.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 256.4819 Tm -.005 Tc [(systems, aler)-24.4(t noti)]TJ /TT7 1 Tf 8.0466 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cation systems\) subscribe t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 551.5493 256.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 244.4819 Tm -.005 Tc [(these ser)-8.8(vices, which can be viewed as enterprise-)]TJ ET EMC /P <>BDC BT 9 0 0 9 359.9976 232.4819 Tm [(le)6.3(vel systems. F)10.2(or some industries, subscription)]TJ ET EMC /P <>BDC BT 9 0 0 9 549.4971 232.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 220.4819 Tm -.005 Tc [(ser)-8.8(vices that can monit)9.8(or and screen for malicious)]TJ ET EMC /P <>BDC BT 9 0 0 9 559.9671 220.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 208.4819 Tm -.005 Tc [(activity at the perimeter)60.1(, can be an alternative t)9.8(o)0( a)]TJ ET EMC /P <>BDC BT 9 0 0 9 555.3982 208.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 196.4819 Tm -.005 Tc [(zer)9.8(o-trust envir)9.8(onment.)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.7842 196.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 172.4819 Tm -.005 Tc [(Enterprises should de)6.3(velop business continuity)]TJ ET EMC /P <>BDC BT 9 0 0 9 545.3287 172.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 160.4819 Tm -.005 Tc [(plans and disaster reco)7.3(very plans because)]TJ ET EMC /P <>BDC BT 9 0 0 9 527.7074 160.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 148.4819 Tm -.005 Tc [(r)19.5(ansomware is a viable threat with potentially)]TJ ET EMC /P <>BDC BT 9 0 0 9 538.214 148.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 136.4819 Tm -.005 Tc [(catastr)9.8(ophic consequences. A r)19.5(ansomware e)6.3(vent)]TJ ET EMC /P <>BDC BT 9 0 0 9 554.8967 136.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 124.4819 Tm -.005 Tc [(that is not handled pr)9.8(operly can cause an)]TJ ET EMC /P <>BDC BT 9 0 0 9 522.122 124.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 112.482 Tm -.005 Tc [(enterprise)39.1()54.7(s)0( demise. Disaster reco)7.3(very goals and)]TJ ET EMC /P <>BDC BT 9 0 0 9 550.3188 112.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 100.482 Tm -.005 Tc [(pr)9.8(ocedures need t)9.8(o)0( be re)6.3(viewed and v)7.3(alidated with)]TJ ET EMC /P <>BDC BT 9 0 0 9 559.6475 100.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 359.9976 88.482 Tm -.005 Tc [(executives t)9.8(o)0( ensure business continuity.)]TJ ET EMC /P <>BDC BT 9 0 0 9 522.223 88.482 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .5 .26 .09 0 k /GS1 gs .12 576.391 346.878 102.325 re f EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 33.9117 640.4402 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 47.819 660.4405 Tm 0 0 0 0 k .0352 Tc -.0176 Tw [( FOR)17.6( SOME)17.6( INDUSTRIES)17.6(,)35.2( SUBSCRIPTION)]TJ ET EMC /P <>BDC BT 14 0 0 14 316.7379 660.4405 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 34.1578 642.4405 Tm .0352 Tc -.0176 Tw [(SER)9.3(VICES)17.6( )19.5(TH)-8.7(A)63(T)37.2( CAN)17.6( MONIT)13.7(OR)17.6( AND)17.6( SCREEN)]TJ ET EMC /P <>BDC BT 14 0 0 14 334.3513 642.4405 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 34.1578 624.4405 Tm .0352 Tc -.0176 Tw [(FOR)17.6( MALICIOUS)17.6( AC)14.2(TIVIT)-7.8(Y)17.6( A)63(T)37.1( )19.6(THE)]TJ ET EMC /P <>BDC BT 14 0 0 14 260.8307 624.4405 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 34.1578 606.4405 Tm .0352 Tc -.0176 Tw [(PERIME)-9.7(TER)17.6(,)35.2( CAN)17.6( BE)17.6( AN)17.6( AL)134.3(TERNA)63(TIVE)17.6( )19.6(T)13.7(O)17.6( A)]TJ ET EMC /P <>BDC BT 14 0 0 14 324.316 606.4405 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 34.1578 588.4405 Tm .0352 Tc -.0176 Tw [(ZERO)17.6(-)17.6(TRUST)37.1( ENVIRONMENT)124.1(.)35.2( )]TJ ET EMC /P <>BDC BT /TT17 1 Tf 47 0 0 47 231.1559 568.4402 Tm 0 .35 .9 0 k 0 Tc 0 Tw ()Tj ET EMC Q endstream endobj 316 0 obj <>/ExtGState<>>> endobj 368 0 obj <> endobj 372 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 0 .51599 31.289 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .5 .26 .09 0 k (5)Tj ET EMC /P <>BDC /GS2 gs BT 9 0 0 9 34.4975 664.482 Tm 0 0 0 1 k -.005 Tc [(A notewor)-24.4(thy US Depar)-24.4(tment of Justice document)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.2188 664.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 652.482 Tm -.005 Tc [(that offers guidance on pr)9.8(otecting networks fr)9.8(om)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.6026 652.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 640.482 Tm -.005 Tc [(r)19.5(ansomware contains descriptions of r)19.5(ansomware,)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.8217 640.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 628.4819 Tm -.005 Tc [(t)9.8(o)0( help determine what the actual malware is. It)]TJ ET EMC /P <>BDC BT 9 0 0 9 221.3383 628.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 616.4819 Tm -.005 Tc [(also contains guidance on what t)9.8(o)0( do if an)]TJ ET EMC /P <>BDC BT 9 0 0 9 201.3495 616.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 604.4819 Tm -.005 Tc [(organization is infected with r)19.5(ansomware and how)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.419 604.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 592.4819 Tm -.005 Tc [(law enfor)9.3(cement can help. )]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 140.9764 596.2568 Tm -.0083 Tc (24)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 146.9509 596.2568 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 568.4819 Tm -.005 Tc (The US National Institute of Standards and)Tj ET EMC /P <>BDC BT 9 0 0 9 202.7162 568.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 556.4819 Tm -.005 Tc (Technology \(NIST\) has issued Special Publication)Tj ET EMC /P <>BDC BT 9 0 0 9 230.5669 556.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 544.4819 Tm -.005 Tc (\(SP\) 1800-25, which contains identi)Tj /TT7 1 Tf 15.473 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cation and)Tj ET EMC /P <>BDC BT 9 0 0 9 220.2374 544.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 532.4819 Tm -.005 Tc [(pr)9.8(otection guidance related t)9.8(o)0( network ar)9.3(chitecture)]TJ ET EMC /P <>BDC BT 9 0 0 9 236.4173 532.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 520.4819 Tm -.005 Tc [(\(v)7.3(olume a\), handling of attack scenarios \(v)7.3(olume b\))]TJ ET EMC /P <>BDC BT 9 0 0 9 236.8391 520.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 508.4819 Tm -.005 Tc [(and how-t)9.8(o pr)9.8(oduct installation guides \(v)7.3(olume c\).)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 232.0062 512.2568 Tm -.0083 Tc (25)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 237.9809 512.2568 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 34.4975 484.482 Tm -.005 Tc (Detection)Tj ET EMC /P <>BDC BT 9 0 0 9 72.9622 484.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 34.4975 472.482 Tm -.02 Tc [(It is critical t)9.8(o)0( detect attacks quickly and respond)]TJ ET EMC /P <>BDC BT 9 0 0 9 220.3921 472.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 460.482 Tm -.02 Tc [(immediately. Activities and t)9.8(ools t)9.8(o)0( impr)9.8(o)7.3(ve the)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.2146 460.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 448.482 Tm -.02 Tc (detection of malware include identifying, inspecting)Tj ET EMC /P <>BDC BT 9 0 0 9 230.2358 448.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 436.482 Tm -.02 Tc [(and tr)19.5(acking incoming and outgoing network tr)19.5(af)]TJ /TT7 1 Tf 20.6069 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(c t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.9679 436.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 424.482 Tm -.02 Tc [(see who is attempting t)9.8(o)0( gain access and fr)9.8(om)]TJ ET EMC /P <>BDC BT 9 0 0 9 213.1837 424.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 412.482 Tm -.02 Tc [(where. )19.5(This can be par)-24.4(t of a zer)9.8(o-trust envir)9.8(onment,)]TJ ET EMC /P <>BDC BT 9 0 0 9 230.2931 412.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 400.482 Tm -.02 Tc [(or ar)-24.4(ti)]TJ /TT7 1 Tf 2.4923 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (cial intelligence \(AI\) software can be deployed)Tj ET EMC /P <>BDC BT 9 0 0 9 236.8239 400.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 388.482 Tm -.02 Tc [(t)9.8(o)0( pre)6.3(vent unknown or suspicious network tr)19.5(af)]TJ /TT7 1 Tf 19.6332 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (c.)Tj ET EMC /P <>BDC BT 9 0 0 9 222.7205 388.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 364.482 Tm -.005 Tc [(An e)6.3(vent logging pr)9.8(ogr)19.5(am can be implemented.)]TJ ET EMC /P <>BDC BT 9 0 0 9 221.1623 364.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 352.482 Tm -.005 Tc [(This includes re)6.3(viewing the log repor)-24.4(ts daily and)]TJ ET EMC /P <>BDC BT 9 0 0 9 223.9696 352.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 340.482 Tm -.005 Tc (con)Tj /TT7 1 Tf 1.6305 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(guring them t)9.8(o)0( send aler)-24.4(ts for intrusive and)]TJ ET EMC /P <>BDC BT 9 0 0 9 223.9532 340.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 328.482 Tm -.005 Tc [(suspicious activity. )19.5(The e)6.3(vent aler)-24.4(t requirements)]TJ ET EMC /P <>BDC BT 9 0 0 9 225.187 328.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 316.4819 Tm -.005 Tc [(should not be set so high that aler)-24.4(ts are issued only)]TJ ET EMC /P <>BDC BT 9 0 0 9 237.4171 316.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 304.4819 Tm -.005 Tc (after network entry has been gained. Unusual and)Tj ET EMC /P <>BDC BT 9 0 0 9 229.5957 304.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 292.4819 Tm -.005 Tc (suspicious activity can include long network)Tj ET EMC /P <>BDC BT 9 0 0 9 208.1676 292.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 280.4819 Tm -.005 Tc [(connections, spikes in centr)19.5(al pr)9.8(ocessing unit \(CPU\))]TJ ET EMC /P <>BDC BT 9 0 0 9 239.4661 280.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 268.4819 Tm -.005 Tc (activity, types of )Tj /TT7 1 Tf 7.3313 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les downloaded and network)Tj ET EMC /P <>BDC BT 9 0 0 9 218.7081 268.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 256.4819 Tm -.005 Tc [(tasks not run by the system administr)19.5(at)9.8(or)60.1(. It is)]TJ ET EMC /P <>BDC BT 9 0 0 9 216.5703 256.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 244.4819 Tm -.005 Tc [(always better t)9.8(o)0( pre)6.3(vent a network intrusion than t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 236.7898 244.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 232.4819 Tm -.005 Tc [(reco)7.3(ver fr)9.8(om an attack, although both should be)]TJ ET EMC /P <>BDC BT 9 0 0 9 223.3432 232.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 220.4819 Tm -.005 Tc [(par)-24.4(t of a comprehensive plan.)]TJ ET EMC /P <>BDC BT 9 0 0 9 152.109 220.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 196.4819 Tm -.005 Tc [(Deploy AI software for monit)9.8(oring, analysis and)]TJ ET EMC /P <>BDC BT 9 0 0 9 220.7461 196.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 184.4819 Tm -.005 Tc (response, and conduct regular and frequent)Tj ET EMC /P <>BDC BT 9 0 0 9 206.535 184.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 172.4819 Tm -.005 Tc [(vulner)19.5(ability scanning of key assets t)9.8(o)0( identify)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.7442 172.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 160.4819 Tm -.005 Tc (weaknesses that require immediate resolution.)Tj ET EMC /P <>BDC BT 9 0 0 9 219.3332 160.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 148.4819 Tm -.005 Tc [(Conducting annual penetr)19.5(ation testing can identify)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.14 148.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 136.4819 Tm -.005 Tc [(weaknesses that other t)9.8(ools may not unco)7.3(ver)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.6032 136.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 124.4819 Tm -.005 Tc (Additionally, security teams should periodically)Tj ET EMC /P <>BDC BT 9 0 0 9 219.2334 124.4819 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 112.482 Tm -.005 Tc [(sear)9.3(ch for malware hiding places \(e.g., ar)9.3(chived)]TJ ET EMC /P <>BDC BT 9 0 0 9 222.3579 112.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 100.482 Tm -.005 Tc (data, email\), and conduct annual security and)Tj ET EMC /P <>BDC BT 9 0 0 9 212.9787 100.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 34.4975 88.482 Tm -.005 Tc [(priv)7.3(acy assessments.)]TJ ET EMC /P <>BDC BT 9 0 0 9 120.0602 88.482 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 664.4811 Tm -.005 Tc [(NIST)54.7(s SP 1800-26 contains similar guidance t)9.8(o)0( SP)]TJ ET EMC /P <>BDC BT 9 0 0 9 452.8013 664.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 652.4811 Tm -.005 Tc [(1800-25 but is oriented t)9.8(oward detecting and)]TJ ET EMC /P <>BDC BT 9 0 0 9 429.9504 652.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 640.4811 Tm -.005 Tc [(responding t)9.8(o)0( adverse e)6.3(vents.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 371.5452 644.2561 Tm -.0083 Tc (26)Tj ET EMC /P <>BDC BT 9 0 0 9 377.5197 640.4811 Tm -.005 Tc [( )19.5(This guidance can)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.5532 640.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 628.4811 Tm -.005 Tc (also be consulted for secure con)Tj /TT7 1 Tf 14.3063 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(gur)19.5(ation settings.)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.6072 628.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 616.4811 Tm -.005 Tc [(Administr)19.5(at)9.8(ors sometimes miss them during)]TJ ET EMC /P <>BDC BT 9 0 0 9 429.29 616.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 604.4811 Tm -.005 Tc [(installation, and they may be unaware of upgr)19.5(ades)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.85 604.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 592.4811 Tm -.005 Tc [(t)9.8(o)0( software.)]TJ ET EMC /P <>BDC BT 9 0 0 9 300.3493 592.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 568.4811 Tm -.005 Tc [(T)48.3(ools t)9.8(o)0( help detect malware e)6.3(vents may ha)7.3(ve)]TJ ET EMC /P <>BDC BT 9 0 0 9 435.5666 568.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 556.4811 Tm -.005 Tc [(scanners designed t)9.8(o)0( locate systems on a network)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.1582 556.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 544.4811 Tm -.005 Tc [(that are vulner)19.5(able t)9.8(o)0( attack.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 365.3038 548.256 Tm -.0083 Tc (27)Tj ET EMC /P <>BDC BT 9 0 0 9 371.2783 544.4811 Tm -.005 Tc [( )19.5(They may also)]TJ ET EMC /P <>BDC BT 9 0 0 9 430.4055 544.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 532.4811 Tm -.005 Tc [(aut)9.8(omate the pr)9.8(ocess of )]TJ /TT7 1 Tf 10.9987 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (nding )Tj /TT7 1 Tf 2.6887 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les encrypted by)Tj ET EMC /P <>BDC BT 9 0 0 9 450.2797 532.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 520.4811 Tm -.005 Tc [(r)19.5(ansomware and pr)9.8(o)7.3(vide the option of copying or)]TJ ET EMC /P <>BDC BT 9 0 0 9 446.5983 520.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 508.4811 Tm -.005 Tc [(mo)7.3(ving the )]TJ /TT7 1 Tf 5.1266 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les t)9.8(o)0( a new location.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 387.4833 512.256 Tm -.0083 Tc (28)Tj ET EMC /P <>BDC BT 9 0 0 9 393.4577 508.4811 Tm -.005 Tc ( Victims who)Tj ET EMC /P <>BDC BT 9 0 0 9 444.501 508.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 496.4811 Tm -.005 Tc [(ha)7.3(ve been impacted by a v)7.3(ariant for which there is)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.3788 496.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 484.4811 Tm -.005 Tc [(no free decryption t)9.8(ool could use another pr)9.8(ogr)19.5(am)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.6083 484.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 472.4811 Tm -.005 Tc [(t)9.8(o)0( locate and st)9.8(ore encrypted )]TJ /TT7 1 Tf 13.0405 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les until a later date,)Tj ET EMC /P <>BDC BT 9 0 0 9 454.1803 472.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 460.4811 Tm -.005 Tc [(when a decryption solution may become a)7.3(v)7.3(ailable.)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.8398 460.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 252.9975 436.4811 Tm -.005 Tc (Response)Tj ET EMC /P <>BDC BT 9 0 0 9 292.562 436.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 252.9975 424.4811 Tm -.005 Tc [(Responses t)9.8(o)0( a r)19.5(ansomware attack include ha)7.3(ving)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.2828 424.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 412.4811 Tm -.005 Tc (multiple versions of data; testing backups of data,)Tj ET EMC /P <>BDC BT 9 0 0 9 449.3494 412.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 400.4811 Tm -.005 Tc (system images and con)Tj /TT7 1 Tf 10.4497 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(gur)19.5(ations; and st)9.8(oring)]TJ ET EMC /P <>BDC BT 9 0 0 9 437.799 400.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 388.4811 Tm -.005 Tc [(backups on a separ)19.5(ate of)]TJ /TT1 1 Tf 11.0865 0 TD 0 Tc <0005>Tj /TT2 1 Tf .5629 0 TD -.005 Tc [(ine de)6.3(vice.)]TJ ET EMC /P <>BDC BT 9 0 0 9 399.6716 388.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 364.4811 Tm -.005 Tc [(It is impor)-24.4(tant t)9.8(o)0( know the system)54.7(s baseline for)]TJ ET EMC /P <>BDC BT 9 0 0 9 442.0038 364.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 352.4811 Tm -.005 Tc [(reco)7.3(very and t)9.8(o)0( test its reliability. )19.5(The contingency)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.0241 352.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 340.4811 Tm -.005 Tc [(plan for functional testing should be expanded t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 446.1522 340.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 328.4811 Tm -.005 Tc (include veri)Tj /TT7 1 Tf 4.9884 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cation that data )Tj /TT7 1 Tf 7.1431 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les are usable, not)Tj ET EMC /P <>BDC BT 9 0 0 9 443.4926 328.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 316.4811 Tm -.005 Tc [(just rest)9.8(or)19.5(able, and that their integrity has not been)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.0377 316.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 304.4811 Tm -.005 Tc [(compr)9.8(omised. Increasing the testing frequency)]TJ ET EMC /P <>BDC BT 9 0 0 9 439.2261 304.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 292.4811 Tm -.005 Tc [(\(e.g., quar)-24.4(terly or e)6.3(ven monthly\) may be a good)]TJ ET EMC /P <>BDC BT 9 0 0 9 438.1211 292.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 280.4811 Tm -.005 Tc [(pr)19.5(actice, especially for high-v)7.3(alue data. Conducting)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.3913 280.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 268.4811 Tm -.005 Tc [(simulated attacks t)9.8(o)0( )]TJ /TT7 1 Tf 9.2051 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (nd weaknesses and)Tj ET EMC /P <>BDC BT 9 0 0 9 418.8638 268.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 256.4811 Tm -.005 Tc [(identifying lessons learned are impor)-24.4(tant when)]TJ ET EMC /P <>BDC BT 9 0 0 9 437.8673 256.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 244.4811 Tm -.005 Tc [(responding t)9.8(o)0( all types of cyber)19.5(attacks and for)]TJ ET EMC /P <>BDC BT 9 0 0 9 435.9985 244.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 232.4811 Tm -.005 Tc [(implementing appr)9.8(opriate countermeasures.)]TJ ET EMC /P <>BDC BT 9 0 0 9 428.912 232.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 208.4811 Tm -.005 Tc (If the enterprise cannot determine how the)Tj ET EMC /P <>BDC BT 9 0 0 9 420.4207 208.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 196.4811 Tm -.005 Tc [(r)19.5(ansomware was able t)9.8(o)0( enter the network, help)]TJ ET EMC /P <>BDC BT 9 0 0 9 441.6246 196.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 184.4811 Tm -.005 Tc [(fr)9.8(om outside exper)-24.4(ts who specialize in threat)]TJ ET EMC /P <>BDC BT 9 0 0 9 430.4327 184.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 172.4811 Tm -.005 Tc (hunting and forensic analysis can be obtained.)Tj ET EMC /P <>BDC BT 9 0 0 9 436.2633 172.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 160.4811 Tm -.005 Tc [(There are websites that pr)9.8(o)7.3(vide guidance in the)]TJ ET EMC /P <>BDC BT 9 0 0 9 439.4702 160.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 148.4811 Tm -.005 Tc (areas of response planning,)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 362.0066 152.256 Tm -.0083 Tc (29)Tj ET EMC /P <>BDC BT 9 0 0 9 367.9812 148.4811 Tm -.005 Tc ( understanding the)Tj ET EMC /P <>BDC BT 9 0 0 9 441.8258 148.4811 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 136.4811 Tm -.005 Tc [(malware and r)19.5(ansomware remo)7.3(v)7.3(al.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 392.0392 140.256 Tm -.0083 Tc (30)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 398.0136 140.256 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT9 1 Tf 9 0 0 9 252.9975 112.481 Tm -.005 Tc [(Reco)7.3(very)]TJ ET EMC /P <>BDC BT 9 0 0 9 290.1758 112.481 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 252.9975 100.481 Tm -.005 Tc [(Reco)7.3(very fr)9.8(om a r)19.5(ansomware attack is not always)]TJ ET EMC /P <>BDC BT 9 0 0 9 449.3053 100.481 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 88.481 Tm -.005 Tc [(cer)-24.4(tain. Howe)6.3(ver)60.1(, there are some actions an)]TJ ET EMC /P <>BDC BT 9 0 0 9 425.8997 88.481 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 252.9975 76.481 Tm -.005 Tc (enterprise can take:)Tj ET EMC /P <>BDC BT 9 0 0 9 330.6457 76.481 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .5 .26 .09 0 k /GS1 gs 468.994 359.418 130.553 314.494 re f EMC /P <>BDC BT /TT9 1 Tf 13 0 0 13 474.2844 660.2897 Tm 0 0 0 0 k ( )Tj ET EMC /P <>BDC BT 13 0 0 13 474.2844 647.2897 Tm (Enjoying)Tj ET EMC /P <>BDC BT 13 0 0 13 524.2786 647.2897 Tm ( )Tj ET EMC /P <>BDC BT 13 0 0 13 474.2844 634.2897 Tm [(this ar)-24.4(ticle?)]TJ ET EMC /P <>BDC BT 13 0 0 13 542.9089 634.2897 Tm ( )Tj ET EMC /P <>BDC BT /TT19 1 Tf 13 0 0 13 474.2844 621.2897 Tm ( )Tj ET EMC /P <>BDC BT /TT13 1 Tf 10 0 0 10 474.2844 609.2897 Tm ()Tj ET EMC /P <>BDC BT /TT15 1 Tf 10 0 0 10 480.6748 609.2897 Tm -.02 Tc ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.2554 609.2897 Tm 0 Tc (Read )Tj ET EMC /P <>BDC BT /TT6 1 Tf 10 0 0 10 510.4068 609.2897 Tm (State of)Tj ET EMC /P <>BDC BT 10 0 0 10 544.9379 609.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 597.2897 Tm (Cybersecurity)Tj ET EMC /P <>BDC BT 10 0 0 10 545.4328 597.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 585.2897 Tm [(2020 P)5.4(a)0(r)-24.4(t)0( 2:)]TJ ET EMC /P <>BDC BT 10 0 0 10 538.9924 585.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 573.2897 Tm -.02 Tc (Threat Landscape)Tj ET EMC /P <>BDC BT 10 0 0 10 560.8857 573.2897 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 561.2897 Tm (and Security)Tj ET EMC /P <>BDC BT 10 0 0 10 539.6418 561.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 549.2897 Tm [(Pr)14.6(actices)]TJ ET EMC /P <>BDC BT /TT15 1 Tf 10 0 0 10 526.3801 549.2897 Tm (.)Tj ET EMC /P <>BDC BT 10 0 0 10 529.173 549.2897 Tm ( )Tj ET EMC /P <>BDC BT /TT6 1 Tf 10 0 0 10 485.1594 537.2897 Tm [(www)60.5(.isaca.org/)]TJ ET EMC /P <>BDC BT 10 0 0 10 553.6018 537.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 525.2897 Tm (go/state-of-)Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 513.2897 Tm (cybersecurity-)Tj ET EMC /P <>BDC BT 10 0 0 10 547.4103 513.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 501.2897 Tm (2020)Tj ET EMC /P <>BDC BT 10 0 0 10 507.4055 501.2897 Tm ( )Tj ET EMC /P <>BDC BT /TT13 1 Tf 10 0 0 10 474.2844 489.2897 Tm ()Tj ET EMC /P <>BDC BT /TT15 1 Tf 10 0 0 10 480.6748 489.2897 Tm -.02 Tc ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.2554 489.2897 Tm 0 Tc (Learn more)Tj ET EMC /P <>BDC BT 10 0 0 10 536.2856 489.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 477.2897 Tm (about, discuss)Tj ET EMC /P <>BDC BT 10 0 0 10 549.9348 477.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 465.2897 Tm [(and collabor)14.6(ate)]TJ ET EMC /P <>BDC BT 10 0 0 10 554.5051 465.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 453.2897 Tm (on information)Tj ET EMC /P <>BDC BT 10 0 0 10 551.0188 453.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 441.2897 Tm (and)Tj ET EMC /P <>BDC BT 10 0 0 10 501.7757 441.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 429.2897 Tm (cybersecurity in)Tj ET EMC /P <>BDC BT 10 0 0 10 555.9602 429.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 417.2897 Tm [(ISACA)58.6()113.3(s)0( Online)]TJ ET EMC /P <>BDC BT 10 0 0 10 550.4572 417.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 405.2897 Tm [(F)10.3(orums. )]TJ ET EMC /P <>BDC BT 10 0 0 10 524.4612 405.2897 Tm ( )Tj ET EMC /P <>BDC BT /TT6 1 Tf 10 0 0 10 485.1594 393.2897 Tm [(https:/)121.1(/engage.)]TJ ET EMC /P <>BDC BT 10 0 0 10 551.9953 393.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 381.2897 Tm (isaca.org/online)Tj ET EMC /P <>BDC BT 10 0 0 10 556.4436 381.2897 Tm ( )Tj ET EMC /P <>BDC BT 10 0 0 10 485.1594 369.2897 Tm (forums)Tj ET EMC /Figure <>BDC Q q 1 i 393.52 361.339 272.017 -172.676 re W n 468.963 360.145 130.553 -128 re 516.658 369.29 m W* n 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS1 gs q 133.484 0 0 130.49 467.61 230.849 cm /Im4 Do Q EMC Q endstream endobj 373 0 obj <>/XObject<>/ExtGState<>>> endobj 390 0 obj <> endobj 395 0 obj <> endobj 400 0 obj <> endobj 415 0 obj <> endobj 420 0 obj <> endobj 425 0 obj <> endobj 430 0 obj <> endobj 435 0 obj <> endobj 440 0 obj <> endobj 445 0 obj <> endobj 450 0 obj <> endobj 455 0 obj <> endobj 460 0 obj <> endobj 465 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 0 .51505 31.531 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .5 .26 .09 0 k (6)Tj ET EMC /LBody <>BDC /GS2 gs BT 9 0 0 9 151.9631 661.4116 Tm 0 0 0 1 k -.005 Tc (Obtain DaaS, if possible. Some software vendors)Tj ET EMC /LBody <>BDC BT 9 0 0 9 343.9906 661.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 140.9471 661.4116 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 151.9631 649.4116 Tm 0 0 0 1 k -.005 Tc [(pr)9.8(o)7.3(vide this ser)-8.8(vice, which decrypts a sample)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 330.1938 649.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 637.4116 Tm -.005 Tc [(r)19.5(ansomware )]TJ /TT7 1 Tf 5.7331 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(le back t)9.8(o)0( its baseline.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 296.0753 637.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 619.4355 Tm -.005 Tc [(Remember that cloud pr)9.8(o)7.3(viders may ha)7.3(ve )]TJ /TT7 1 Tf 18.4701 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (les)Tj ET EMC /LBody <>BDC BT 9 0 0 9 334.5904 619.4355 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 140.9471 619.4355 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 151.9631 607.4355 Tm 0 0 0 1 k -.005 Tc [(fr)9.8(om a pre)6.3(vious state. Make sure that system)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 330.5816 607.4355 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 595.4355 Tm -.005 Tc [(reco)7.3(very and data reco)7.3(very are co)7.3(vered in the)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 330.6421 595.4355 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 583.4355 Tm -.005 Tc [(ser)-8.8(vice agreement.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 227.3943 583.4355 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 565.4596 Tm -.005 Tc (In an emergency or crisis, key data may be found)Tj ET EMC /LBody <>BDC BT 9 0 0 9 344.218 565.4596 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT13 1 Tf 12 0 0 12 140.9471 565.4596 Tm 0 .35 .9 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 151.9631 553.4596 Tm 0 0 0 1 k -.005 Tc [(in email attachments that are cloud based. )19.5(This)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 339.3368 553.4596 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 541.4596 Tm -.005 Tc [(type of st)9.8(or)19.5(age can help sa)7.3(ve par)-24.4(t of the)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 310.6248 541.4596 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 151.9631 529.4596 Tm -.005 Tc (business \(e.g., critical clients\).)Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.1119 529.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 140.9471 363.4596 Tm .72 .13 .61 .01 k -.005 Tc (Conclusion)Tj ET EMC /P <>BDC BT 11 0 0 11 195.7357 363.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 140.9471 345.4596 Tm 0 0 0 1 k -.005 Tc (Despite all the safeguards and countermeasures)Tj ET EMC /P <>BDC BT 9 0 0 9 332.3647 345.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 333.4596 Tm -.005 Tc [(put in place t)9.8(o)0( pre)6.3(vent r)19.5(ansomware attacks, one of)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.394 333.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 321.4595 Tm -.005 Tc (the biggest threats is social engineering. One weak)Tj ET EMC /P <>BDC BT 9 0 0 9 341.3464 321.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 309.4595 Tm -.005 Tc [(link can allow an attacker t)9.8(o)0( cir)9.3(cumvent cyber)]TJ ET EMC /P <>BDC BT 9 0 0 9 320.9874 309.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 297.4595 Tm -.005 Tc [(safeguards and gain a foothold in an enterprise)39.1()54.7(s)]TJ ET EMC /P <>BDC BT 9 0 0 9 332.8231 297.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 285.4595 Tm -.005 Tc [(envir)9.8(onment. It is critical t)9.8(o)0( implement a social-)]TJ ET EMC /P <>BDC BT 9 0 0 9 140.9471 273.4595 Tm [(engineering awareness pr)9.8(ogr)19.5(am that co)7.3(vers ways)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.8383 273.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 261.4595 Tm -.005 Tc [(t)9.8(o)0( recognize suspicious email links and)]TJ ET EMC /P <>BDC BT 9 0 0 9 295.9019 261.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 249.4595 Tm -.005 Tc [(attachments and t)9.8(o)0( test staff frequently. Opening)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.2577 249.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 237.4595 Tm -.005 Tc (links and attachments in email and accessing)Tj ET EMC /P <>BDC BT 9 0 0 9 320.9235 237.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 225.4595 Tm -.005 Tc (infected websites are two common methods)Tj ET EMC /P <>BDC BT 9 0 0 9 317.245 225.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 213.4595 Tm -.005 Tc [(criminals use t)9.8(o)0( gain access int)9.8(o the enterprise)39.1()54.7(s)]TJ ET EMC /P <>BDC BT 9 0 0 9 332.3782 213.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 201.4595 Tm -.005 Tc [(digital infr)19.5(astructure. )]TJ ET EMC /P <>BDC BT 9 0 0 9 225.2577 201.4595 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 177.4596 Tm -.005 Tc [(Social-engineering tricks that can be used t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 315.5699 177.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 165.4596 Tm -.005 Tc [(motiv)7.3(ate an individual t)9.8(o)0( unknowingly install)]TJ ET EMC /P <>BDC BT 9 0 0 9 315.0074 165.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 153.4596 Tm -.005 Tc (malicious software include email noti)Tj /TT7 1 Tf 16.3702 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cations)Tj ET EMC /P <>BDC BT 9 0 0 9 322.3726 153.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 141.4596 Tm -.005 Tc [(about antivirus pr)9.8(otection expiring, popups and)]TJ ET EMC /P <>BDC BT 9 0 0 9 326.2026 141.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 129.4596 Tm -.005 Tc [(email concerning the need t)9.8(o)0( install an update, and)]TJ ET EMC /P <>BDC BT 9 0 0 9 341.3728 129.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 117.4596 Tm -.005 Tc (email requests for package delivery con)Tj /TT7 1 Tf 17.43 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (rmation.)Tj ET EMC /P <>BDC BT 9 0 0 9 335.8168 117.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 105.4596 Tm -.005 Tc (Enterprises should implement )Tj /TT7 1 Tf 13.3477 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ltering pr)9.8(ogr)19.5(ams)]TJ ET EMC /P <>BDC BT 9 0 0 9 331.1431 105.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 140.9471 93.4596 Tm -.005 Tc [(that can minimize this threat vect)9.8(or)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 282.215 93.4596 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 362.001 659.3159 Tm .72 .13 .61 .01 k -.005 Tc (Endnotes)Tj ET EMC /P <>BDC BT 11 0 0 11 407.8063 659.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.3645 641.3159 Tm 0 0 0 1 k -.005 Tc [(Eichner)60.1(, J.; St)9.8(op Ransomware 2Where Does)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 560.9645 641.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 641.3159 Tm 0 .35 .9 0 k (1)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 629.3159 Tm 0 0 0 1 k -.005 Tc [(Ransomware Come F)12.7(r)9.8(om? K)13.2(ogo, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 513.6984 629.3159 Tm [(https:/)109.4(/kogo.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 563.5057 629.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 617.3159 Tm -.005 Tc [(co.uk/st)9.8(op-r)19.5(ansomware-2-where-does-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 605.3159 Tm [(r)19.5(ansomware-come-fr)9.8(om/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 476.1071 605.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 593.3159 Tm -.005 Tc [(MacDougall, M.; 2018: A Re)6.3(verse-Course for)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 555.712 593.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 593.3159 Tm 0 .35 .9 0 k (2)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 581.3159 Tm 0 0 0 1 k -.005 Tc [(Ransomware,)83( Cofense, 5 December 2018,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 545.9318 581.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 569.3159 Tm -.005 Tc [(https:/)109.4(/cofense.com/2018-re)6.3(verse-course-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 557.3159 Tm [(r)19.5(ansomware/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 430.9505 557.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 545.3159 Tm -.005 Tc [(Webr)9.8(oot, 2019 Webr)9.8(oot )19.5(Threat Repor)-24.4(t )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 534.4312 545.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 545.3159 Tm 0 .35 .9 0 k (3)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 533.3159 Tm 0 0 0 1 k -.005 Tc [(Mid-Year Update,)83( September 2019,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 518.3085 533.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 521.3159 Tm -.005 Tc [(https:/)109.4(/mypage.webr)9.8(oot.com/rs/557-FSI-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 509.3159 Tm [(195/images/Threat_Repor)-24.4(t_Mid-Year_Update_)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 558.6025 509.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 497.3159 Tm -.005 Tc (Sept_US.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 426.4768 497.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 485.3159 Tm -.005 Tc (Unter)Tj /TT7 1 Tf 2.37 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ngher)60.1(, V)109.9(.; Ransomware as a Ser)-8.8(vice)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 547.6238 485.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 485.3159 Tm 0 .35 .9 0 k (4)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 473.3159 Tm 0 0 0 1 k -.005 Tc [(\(RaaS\)Contempor)19.5(ary Mal du Sicle? )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 533.3918 473.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 461.3159 Tm -.005 Tc [(Heimdal Security, 11 No)7.3(vember 2019,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 527.1746 461.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 449.3159 Tm -.005 Tc [(https:/)109.4(/heimdalsecurity.com/blog/r)19.5(ansomware-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 437.3159 Tm [(as-a-ser)-8.8(vice/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 429.0983 437.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 425.3159 Tm -.005 Tc (Cofense, Ransomware Delivered by 97% of)Tj ET EMC /LBody <>BDC BT 9 0 0 9 550.7668 425.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 425.3159 Tm 0 .35 .9 0 k (5)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 413.3159 Tm 0 0 0 1 k -.005 Tc [(Phishing Emails by End of Q3 Suppor)-24.4(ting)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 540.0376 413.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 401.3159 Tm -.005 Tc [(Booming Cyber)9.3(crime Industry,)83( Phishme, )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 541.0132 401.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 389.3159 Tm -.005 Tc [(17 No)7.3(vember 2016, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 458.3256 389.3159 Tm [(https:/)109.4(/phishme.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 543.049 389.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 377.3159 Tm -.005 Tc [(r)19.5(ansomware-delivered-97-phishing-emails-end-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 365.3159 Tm -.025 Tc [(q3-2016-suppor)-24.4(ting-booming-cyber)9.3(crime-industry/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 566.0243 365.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 353.3159 Tm -.005 Tc (Morgan, S.; The 2019 Of)Tj /TT7 1 Tf 10.8844 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cial Annual)Tj ET EMC /LBody <>BDC BT 9 0 0 9 525.8145 353.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 353.3159 Tm 0 .35 .9 0 k (6)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 341.3159 Tm 0 0 0 1 k -.005 Tc [(Cyber)9.3(crime Repor)-24.4(t,)83( Herja)7.3(vec Gr)9.8(oup,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 521.576 341.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 329.3159 Tm -.005 Tc [(https:/)109.4(/www)60.5(.herja)7.3(vecgr)9.8(oup.com/the-2019-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 317.3159 Tm (of)Tj /TT21 1 Tf .8899 0 TD 0 Tc ()Tj /TT4 1 Tf .537 0 TD -.005 Tc [(cial-annual-cyber)9.3(crime-repor)-24.4(t/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 508.746 317.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 305.3159 Tm -.005 Tc [(Symantec, Internet Security )19.5(Threat Repor)-24.4(t)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 546.6471 305.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 305.3159 Tm 0 .35 .9 0 k (7)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 293.3159 Tm 0 0 0 1 k -.005 Tc [(\(ISTR\) Go)7.3(vernment,)83( v)7.3(ol. 22, June 2017,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 533.9161 293.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 281.3159 Tm -.005 Tc [(https:/)109.4(/www)60.5(.symantec.com/content/dam/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 543.6609 281.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 269.3159 Tm -.005 Tc [(symantec/docs/repor)-24.4(ts/gistr22-go)7.3(vernment-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 257.3159 Tm [(repor)-24.4(t.pdf)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 417.623 257.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 245.3159 Tm -.005 Tc [(Miller)60.1(, L.; )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 415.8442 245.3159 Tm (Ransomware Defense for Dummies,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 554.9605 245.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 245.3159 Tm 0 .35 .9 0 k (8)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 379.001 233.3159 Tm 0 0 0 1 k (2)Tj ET EMC /LBody <>BDC BT 5.4 0 0 5.4 383.9041 236.2858 Tm -.0083 Tc (nd)Tj ET EMC /LBody <>BDC BT 9 0 0 9 389.7101 233.3159 Tm -.005 Tc ( Edition)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 418.6309 233.3159 Tm (, Cisco, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 448.7416 233.3159 Tm [(https:/)109.4(/learn-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 221.3159 Tm [(umbrella.cisco.com/ebooks/r)19.5(ansomware-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 541.7975 221.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 209.3159 Tm -.005 Tc (defense-for-dummies-2nd-edition)Tj ET EMC /LBody <>BDC BT 9 0 0 9 508.0538 209.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.3645 197.3159 Tm -.005 Tc [(Lindr)9.8(os, K.; E. )19.5(Tittel; What Is Cyber Insur)19.5(ance)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 557.1306 197.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.0009 197.3159 Tm 0 .35 .9 0 k (9)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 185.3159 Tm 0 0 0 1 k -.005 Tc [(and Why Y)31.7(ou Need It,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 467.15 185.3159 Tm (CIO)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 481.205 185.3159 Tm (, 4 May 2016,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 533.1174 185.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.001 173.3159 Tm -.005 Tc [(https:/)109.4(/www)60.5(.cio.com/ar)-24.4(ticle/3065655/what-is-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 161.3159 Tm [(cyber-insur)19.5(ance-and-why-you-need-it.html)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 539.9619 161.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.5281 149.3159 Tm -.005 Tc [(Chickowski, E.; 10 )19.5(Things Cyber Insur)19.5(ance)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 547.9709 149.3159 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 362.001 149.3159 Tm 0 .35 .9 0 k (10)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.001 137.3159 Tm 0 0 0 1 k -.005 Tc [(W)15.1(o)0(n)39.1(t Co)7.3(ver)60.1(,)83()0( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 431.9494 137.3159 Tm (Information Week Dark Reading)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 554.5003 137.3159 Tm 0 Tc (,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 556.2219 137.3159 Tm ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 125.3159 Tm -.005 Tc (14 April 2016, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 435.4331 125.3159 Tm [(https:/)109.4(/www)60.5(.darkreading.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 554.3113 125.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 113.3159 Tm -.005 Tc [(vulner)19.5(abilities-threats/10-things-cyber-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.001 101.3159 Tm [(insur)19.5(ance-wont-co)7.3(ver/d/d-id/1325123?image_)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 558.5751 101.3159 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.001 89.3159 Tm -.005 Tc (number=1)Tj ET EMC /LBody <>BDC BT 9 0 0 9 418.4424 89.3159 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .5 .26 .09 0 k /GS1 gs q 1 0 0 1 138.577 516.108 cm 0 0 m 205.5 .0411 l 205.527 -135.634 l .0271 -135.675 l h f* Q EMC /P <>BDC BT /TT17 1 Tf 47 .0094 -.0094 47 143.2814 477.8331 Tm 0 .35 .9 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 .0028 -.0028 14 157.1846 497.8361 Tm 0 0 0 0 k .0352 Tc -.0176 Tw [( ONE)17.6( WEAK)17.6( LINK)17.6( CAN)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 302.1134 497.8651 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5271 479.8334 Tm .0352 Tc -.0176 Tw [(ALL)31.8(OW)17.6( AN)17.6( A)63(T)-7.8(T)38.6(ACKER)17.6( )19.5(T)13.7(O)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 312.6003 479.8672 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5307 461.8334 Tm .0352 Tc -.0176 Tw [(CIRCUMVENT)37.1( CYBER)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 283.8247 461.8615 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5343 443.8334 Tm .0352 Tc -.0176 Tw [(SAFEGU)10.8(ARDS)17.6( AND)17.6( GAIN)17.6( A)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 319.2658 443.8685 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5379 425.8334 Tm .0352 Tc -.0176 Tw [(FOO)13.2(THOLD)17.6( IN)17.6( AN)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 260.5075 425.8568 Tm 0 Tc 0 Tw ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5415 407.8334 Tm .0352 Tc [(ENTERPRISE)17.6()17.6(S)]TJ ET EMC /P <>BDC BT 14 .0028 -.0028 14 240.2016 407.8527 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 .0028 -.0028 14 143.5451 389.8334 Tm .0352 Tc [(ENVIRONMENT)124.1(.)35.2( )]TJ ET EMC /P <>BDC BT /TT17 1 Tf 47 .0094 -.0094 47 251.7688 369.8548 Tm 0 .35 .9 0 k 0 Tc ()Tj ET EMC Q endstream endobj 466 0 obj <>/ExtGState<>>> endobj 481 0 obj <> endobj 486 0 obj <> endobj 491 0 obj <> endobj 496 0 obj <> endobj 501 0 obj <> endobj 506 0 obj <> endobj 511 0 obj <> endobj 516 0 obj <> endobj 521 0 obj <> endobj 526 0 obj <> endobj 531 0 obj <> endobj 536 0 obj <> endobj 541 0 obj <> endobj 546 0 obj <> endobj 551 0 obj <> endobj 556 0 obj <> endobj 561 0 obj <> endobj 566 0 obj <> endobj 571 0 obj <> endobj 576 0 obj <> endobj 577 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.56 391.68 m W n .12 783.12 603.12 -783.12 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .5 .26 .09 0 k [( V)6.3(OL 5)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 0 .51599 31.289 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .5 .26 .09 0 k (7)Tj ET EMC /LBody <>BDC /GS2 gs BT 9 0 0 9 53.8575 673.2284 Tm 0 0 0 1 k -.005 Tc [(K)11.2(nowBe4, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 95.2754 673.2284 Tm (Ransomware Hostage Rescue)Tj ET EMC /LBody <>BDC BT 9 0 0 9 211.8628 673.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 673.2284 Tm 0 .35 .9 0 k (11)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 53.3303 661.2284 Tm 0 0 0 1 k -.005 Tc (Manual)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 82.1918 661.2284 Tm (, 2019, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 110.036 661.2284 Tm [(https:/)109.4(/info.knowbe4.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 213.8001 661.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 649.2284 Tm -.005 Tc [(r)19.5(ansomware-hostage-rescue-manual-0)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 202.586 649.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 637.2284 Tm -.005 Tc (ID Ransomware, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 120.2915 637.2284 Tm [(https:/)109.4(/id-r)19.5(ansomware.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 208.6165 637.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 637.2284 Tm 0 .35 .9 0 k (12)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 53.3303 625.2284 Tm 0 0 0 1 k -.005 Tc [(malwarehunter)-24.4(team.com/index.php)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 192.4774 625.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 613.2284 Tm -.005 Tc [(US Feder)19.5(al Bureau of Investigation, High-)]TJ ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 613.2284 Tm 0 .35 .9 0 k 0 Tc (13)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 601.2284 Tm 0 0 0 1 k -.005 Tc [(Impact Ransomware A)8.3(ttacks )19.5(Threaten U.S.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 222.888 601.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 589.2284 Tm -.005 Tc [(Businesses and Organizations,)83( 2 Oct)9.8(ober 2019,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 241.7114 589.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.3303 577.2284 Tm -.005 Tc [(https:/)109.4(/www)60.5(.ic3.go)7.3(v/media/2019/191002.aspx)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 235.5764 577.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 565.2284 Tm -.005 Tc [(US Feder)19.5(al Bureau of Investigation,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 191.638 565.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 565.2284 Tm 0 .35 .9 0 k (14)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 553.2284 Tm 0 0 0 1 k -.005 Tc [(Ransomware Victims Urged t)9.8(o)0( Repor)-24.4(t)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 205.1163 553.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 541.2284 Tm -.005 Tc [(Infections t)9.8(o)0( Feder)19.5(al Law Enfor)9.3(cement,)83( )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 212.1469 541.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 529.2284 Tm -.005 Tc (15 September 2016, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 134.8644 529.2284 Tm [(https:/)109.4(/www)60.5(.ic3.go)7.3(v/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 216.0501 529.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 517.2283 Tm -.005 Tc (media/2016/160915.aspx)Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.3905 517.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 505.2284 Tm -.005 Tc [(Zelonis, J.; )19.5(T)106.4(.)0( Lyness; S. Balaour)19.5(as; M. Cyr; )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 221.4831 505.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 505.2284 Tm 0 .35 .9 0 k (15)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 493.2284 Tm 0 0 0 1 k -.005 Tc [(P)158.2(.)0( Dostie; F)10.2(orrester)-7.8()54.7(s)0( Guide t)9.8(o)0( P)5.4(aying)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 200.3617 493.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 481.2284 Tm -.005 Tc [(Ransomware,)83( F)10.2(orrester)60.1(, 5 June 2019,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 201.5822 481.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.3303 469.2284 Tm -.005 Tc [(https:/)109.4(/reprints.forrester)60.1(.com/#/assets/2/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 216.3678 469.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 457.2284 Tm -.005 Tc [(1666/RES154595/repor)-24.4(ts)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 153.0458 457.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 445.2284 Tm -.005 Tc [(E)8.3(u)0(r)9.8(opean Union, Cr)19.5(acking Code: How the EU)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 231.1772 445.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 445.2284 Tm 0 .35 .9 0 k (16)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 433.2284 Tm 0 0 0 1 k -.005 Tc [(Pr)9.8(otects Our Computers, Cyber)9.3(criminals,)83()]TJ ET EMC /LBody <>BDC BT 9 0 0 9 216.0536 433.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.3303 421.2284 Tm -.005 Tc [(https:/)109.4(/eur)9.8(opa.eu/eupr)9.8(otects/our-safety/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 211.6063 421.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 409.2284 Tm -.005 Tc [(cr)19.5(acking-code-how-eu-pr)9.8(otects-our-computers-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 397.2284 Tm [(cyber)9.3(criminals_en)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 123.3791 397.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 385.2284 Tm -.02 Tc (Center for Internet Security \(CIS\), Ransomware:)Tj ET EMC /LBody <>BDC BT 9 0 0 9 236.5697 385.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 385.2284 Tm 0 .35 .9 0 k (17)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 373.2284 Tm 0 0 0 1 k -.02 Tc [(F)16.6(acts, )19.5(Threats, and Countermeasures,)83()]TJ ET EMC /LBody <>BDC BT 9 0 0 9 199.7899 373.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.3303 361.2284 Tm -.005 Tc [(https:/)109.4(/www)60.5(.cisecurity.org/blog/r)19.5(ansomware-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 349.2284 Tm (facts-threats-and-countermeasures/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 193.6696 349.2284 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 337.2284 Tm -.005 Tc [(K)11.2(nowBe4, Ransomware,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 156.8238 337.2284 Tm [(https:/)109.4(/www)60.5(.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 206.4873 337.2284 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 337.2284 Tm 0 .35 .9 0 k (18)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 53.3303 325.2283 Tm 0 0 0 1 k -.005 Tc [(knowbe4.com/r)19.5(ansomware)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 159.9759 325.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 313.2283 Tm -.005 Tc (National Cyber Security Centre, Mitigating)Tj ET EMC /LBody <>BDC BT 9 0 0 9 221.1785 313.2283 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 313.2283 Tm 0 .35 .9 0 k (19)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 301.2283 Tm 0 0 0 1 k -.005 Tc [(Malware and Ransomware A)8.3(ttack,)83( 13 February)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 239.6007 301.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 289.2283 Tm -.005 Tc (2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 77.2699 289.2283 Tm [(https:/)109.4(/www)60.5(.ncsc.go)7.3(v)52.2(.uk/guidance/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 215.4832 289.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 277.2283 Tm -.005 Tc [(mitigating-malware-and-r)19.5(ansomware-attacks)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 226.9553 277.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 265.2283 Tm -.005 Tc [(Wlosinski, L. G.; Cybersecurity )19.5(T)55.2(akedowns: )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 226.2269 265.2283 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 265.2283 Tm 0 .35 .9 0 k (20)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 253.2283 Tm 0 0 0 1 k -.005 Tc [(A Primer for Success,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 142.9945 253.2283 Tm (ISACA)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 5.4 0 0 5.4 167.6162 256.1984 Tm 0 Tc ()Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 171.8164 253.2283 Tm -.005 Tc ( Journal)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 203.2158 253.2283 Tm [(, v)7.3(ol. 6,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 229.833 253.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 241.2283 Tm -.005 Tc (2019, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 77.2699 241.2283 Tm [(https:/)109.4(/www)60.5(.isaca.org/ar)9.3(chives )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 200.9614 241.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.8575 229.2283 Tm -.005 Tc [(Bauer)60.1(, R.; Ransomware: How t)9.8(o)0( Pre)6.3(vent Being)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 236.7914 229.2283 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.3304 229.2283 Tm 0 .35 .9 0 k (21)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.3303 217.2283 Tm 0 0 0 1 k -.005 Tc [(A)8.3(ttacked and Reco)7.3(ver After an A)8.3(ttack,)83()]TJ ET EMC /LBody <>BDC BT 9 0 0 9 205.333 217.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 205.2283 Tm -.02 Tc (BackBlaze, 18 April 2019, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 151.4346 205.2283 Tm [(https:/)109.4(/www)60.5(.backblaze.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 239.7823 205.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.3303 193.2283 Tm -.005 Tc [(com/blog/complete-guide-r)19.5(ansomware/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 209.0582 193.2283 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 661.4116 Tm -.005 Tc [(Cisco, SAFE Design Guide,)83( A)5.4(ugust 2017,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 434.3612 661.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 661.4116 Tm 0 .35 .9 0 k (22)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 270.5 649.4116 Tm 0 0 0 1 k -.005 Tc [(https:/)109.4(/www)60.5(.cisco.com/c/dam/en/us/solutions/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 270.5 637.4116 Tm [(collater)19.5(al/enterprise/design-z)7.8(one-security/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 435.804 637.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 625.4116 Tm -.005 Tc [(r)19.5(ansomware-defense-dig.pdf)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 381.8831 625.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 613.4116 Tm -.005 Tc [(Cisco, Ransomware Galore: )19.5(The F)10.2(our Y)31.7(o)0(u)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 436.9154 613.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 613.4116 Tm 0 .35 .9 0 k (23)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 601.4116 Tm 0 0 0 1 k -.005 Tc [(Shouldn)39.1(t Ignore,)83( 2018, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 364.6841 601.4116 Tm [(https:/)109.4(/www)60.5(.cisco.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 458.1724 601.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 589.4116 Tm -.005 Tc [(c/dam/en/us/solutions/collater)19.5(al/enterprise-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 270.5 577.4116 Tm [(networks/r)19.5(ansomware-defense/r)19.5(ansomware-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 446.0475 577.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 565.4116 Tm -.005 Tc (four-shouldnt-ignore.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 364.4169 565.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 553.4116 Tm -.02 Tc [(Justice.go)7.3(v)52.2(,)0( How t)9.8(o)0( Pr)9.8(otect Y)31.7(our Networks)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 437.0521 553.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 553.4116 Tm 0 .35 .9 0 k (24)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 541.4116 Tm 0 0 0 1 k -.02 Tc [(F)12.7(r)9.8(om Ransomware,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 349.324 541.4116 Tm [(https:/)109.4(/www)60.5(.justice.go)7.3(v/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 441.2316 541.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 529.4116 Tm -.02 Tc (criminal-ccips/)Tj /TT21 1 Tf 6.1913 0 TD 0 Tc ()Tj /TT4 1 Tf .522 0 TD -.02 Tc (le/872771/download)Tj ET EMC /LBody <>BDC BT 9 0 0 9 409.8837 529.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 517.4116 Tm -.005 Tc [(National Institute of Standards and )19.5(Technology)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 456.9209 517.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 517.4116 Tm 0 .35 .9 0 k (25)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 505.4116 Tm 0 0 0 1 k -.005 Tc (\(NIST\), Data IntegrityIdentifying and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 421.315 505.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 493.4116 Tm -.005 Tc [(Pr)9.8(otecting Against Ransomware and Other)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 438.902 493.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 481.4116 Tm -.005 Tc [(Destructive E)12.7(vents,)83( Special Publication \(SP\))]TJ ET EMC /LBody <>BDC BT 9 0 0 9 444.7536 481.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 469.4116 Tm -.02 Tc (1800-25, USA, January 2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 381.7268 469.4116 Tm [(https:/)109.4(/www)60.5(.nccoe.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 454.8114 469.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 457.4116 Tm -.005 Tc [(nist.go)7.3(v/pr)9.8(ojects/building-blocks/data-integrity/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 456.4961 457.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 445.4116 Tm -.005 Tc [(identify-pr)9.8(otect)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 329.1459 445.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 433.4116 Tm -.005 Tc [(National Institute of Standards and )19.5(Technology,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 458.6425 433.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 433.4116 Tm 0 .35 .9 0 k (26)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 421.4116 Tm 0 0 0 1 k -.005 Tc [(Detecting and Responding t)9.8(o)0( Ransomware and)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 458.8841 421.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 409.4116 Tm -.005 Tc [(Other Destructive E)12.7(vents,)83( SP 1800-26, USA,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 442.1321 409.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 397.4116 Tm -.02 Tc (January 2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 326.4056 397.4116 Tm [(https:/)109.4(/www)60.5(.nccoe.nist.go)7.3(v/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 432.4905 397.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 385.4116 Tm -.02 Tc [(pr)9.8(ojects/building-blocks/data-integrity/detect-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 270.5 373.4116 Tm (respond)Tj ET EMC /LBody <>BDC BT 9 0 0 9 301.241 373.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 361.4116 Tm -.005 Tc [(Erez, E.; Eternal Blues,)83( Omerez, 28 June 2017,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 455.1257 361.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 361.4116 Tm 0 .35 .9 0 k (27)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 270.5 349.4116 Tm 0 0 0 1 k -.005 Tc [(http:/)109.4(/omerez.com/eternalblues/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 397.7511 349.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 337.4116 Tm -.005 Tc [(Cimpanu, C.; Crypt)9.8(osear)9.3(ch Finds Files)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 422.832 337.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 337.4116 Tm 0 .35 .9 0 k (28)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 325.4116 Tm 0 0 0 1 k -.005 Tc [(Encrypted by Ransomware, Mo)7.3(ves )19.5(Them )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 433.0603 325.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 313.4116 Tm -.005 Tc [(t)9.8(o)0( New Location,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 341.3432 313.4116 Tm (BleepingComputer)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 413.3133 313.4116 Tm (, )Tj ET EMC /LBody <>BDC BT 9 0 0 9 417.218 313.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 301.4116 Tm -.005 Tc (15 January 2017, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 340.496 301.4116 Tm [(https:/)109.4(/www)60.5(.bleeping)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 423.1497 301.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 289.4116 Tm -.005 Tc [(computer)60.1(.com/news/security/crypt)9.8(osear)9.3(ch-)]TJ ET EMC /LBody <>BDC BT /TT21 1 Tf 9 0 0 9 270.5 277.4116 Tm 0 Tc ()Tj /TT4 1 Tf .537 0 TD -.005 Tc (nds-)Tj /TT21 1 Tf 1.8492 0 TD 0 Tc ()Tj /TT4 1 Tf .537 0 TD -.005 Tc [(les-encrypted-by-r)19.5(ansomware-mo)7.3(ves-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 441.7529 277.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 265.4116 Tm -.005 Tc [(them-t)9.8(o-new-location/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 356.1628 265.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 253.4116 Tm -.005 Tc (New Jersey Cybersecurity and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 390.27 253.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 253.4116 Tm 0 .35 .9 0 k (29)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 270.5 241.4116 Tm 0 0 0 1 k -.005 Tc [(Communications Integr)19.5(ation Cell, Cyber )19.5(Threat)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 457.5714 241.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 270.5 229.4116 Tm -.005 Tc [(Pr)9.8(o)]TJ /TT7 1 Tf 1.5148 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(les,)83( USA, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 327.6705 229.4116 Tm [(https:/)109.4(/cyber)60.1(.nj.go)7.3(v/threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 270.5 217.4116 Tm [(center/threat-pr)9.8(o)]TJ /TT21 1 Tf 7.3345 0 TD 0 Tc ()Tj /TT4 1 Tf .537 0 TD -.005 Tc [(les/#r)19.5(ansomware)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 409.9043 217.4116 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.027 205.4116 Tm -.005 Tc [(A)24.4(v)7.3(ast, Ransomware,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 358.6762 205.4116 Tm [(https:/)109.4(/www)60.5(.a)7.3(v)7.3(ast.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 452.3757 205.4116 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 253.5 205.4116 Tm 0 .35 .9 0 k (30)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 270.5 193.4116 Tm 0 0 0 1 k -.005 Tc [(c-t)9.8(opic-r)19.5(ansomware)]TJ ET EMC Q endstream endobj 578 0 obj <>/ExtGState<>>> endobj 6 0 obj <> endobj 5 0 obj <> endobj 42 0 obj <>stream AdobedC         #"""#'''''''''' " s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjz?f͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf endstream endobj 43 0 obj <>stream Adobed         #"""#''''''''''     !! !!''''''''''""  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz?홲Vv:VI5-zSZ)ۦVlxJU;SNd\o,ٳ LcǍ~23e$0(VlkǸa+/6lBR9k, G/*$./Z\x3f͒,.㕰eW6Ur6 '0~v5X;2ȕ 1߫͘"ME{ev*SC?*7*GN|q„x 3eu3S$$(n/( 4a'PcIDkN`rzc'Uiu=I|%[#n&W R`eژe ,esczcWdm1`)\ 놳%pxr`u2A^O0p#.bH6Z[(Ip7Lf*ˉL\Я u8J퉱Ǟ׶QPs\1뀦;bNwqgkuԗi\,ɏ\ !뀦;3` #9\򽡐 +ucgਜ਼q΋Đ)Ns:i}f6lʢbr~_َ&i:1;6lR]M,W;0s0 w+fͅ7 Ȟg+3~YFٳ`6zm1(GcWf͛o6lY7X'}b͛676]OnGvlٲc|qWf͛+6_#1vlٲe>9Uٳf͗ɼrٛvlٱ8&#!#8f͋[`xUS"|G'6l"V@dcnzb͛6 0SA+n}I(.͛6 a`0$KQ.A{VXD6ji\0z΃J鴱Vэ`(H&en1e8!FģpBֹ(F*a!A0Fa bRMwT2@"S0|cEצ=N+1^ |ȃm")JbLMb:|s*e^\P/eP1U)(㚧. 2de͍|rh#lg+ AW.g!i9_o04(y1S"vd &aLъ+rsf9K$BkF=M6W#bġ]jkbEHLA>ٳf͔)N]1jqYeHU^+\Pfa0t8X8/(eBzeEMq(e ]TG|vlBI48`M0(8G3+GT'\u]뉫)E*r͚rU5`S/5c]NG ISBAU]b45_LI#* TS-(޻tG,~x0TCmB?Q%fZ1æn9\-pjmmq`9cNJb LXiSCဤ-ڽFcOPKJNQC_xHFφ"DI:`Y"/l $¶B;bLh{TbMQRiOlMm\.ؚ&C7)shҲH+D$sߕrWf͛`[qq+#W$mĄ/@ 5jٳaf[}[^z3³0q;}vpSH€Εٳfѥp};ភ*jO-iţ*.Fh 0vlٰJ8?V zbAMWoDmGuvlٰeÈd]W͛6 jF4mӕ06l q@~I hvgӧ bc΄w;@a@˽0!&;68 nG!Mٷo|I(hʨZnyn'ŘVu0FN(=a 1$b:LqqBX#p`x#0Őlq7ƨQJѮcZj9/\12b9}b} 8e(eW/ 5GzWlܻcG_P倔RһT׎zl=|R͍tƷR+N<aMߌVl()r:e:К핔rr"~Wl8;W(t9Qj-p=S"Џ)6=N\Hٌ0ҍSᗛ6lƗ6*'zw6QeFUNآx83f9f@;f9Luv#0͐F0ŚĎ0ȱ*-;f3H\1A+qyG&,T_`8re"=i_}XsqdžQ-`k!}T5jcCbRqHu ӶS?IO#E- QpFt툺T`VZW!E" f5-P@Ah&]뛏,@>`ݾ27KQٰW"0ڑGTS#je#&9-Xqe}|.)&ЩfȐ$`6k.b+WA'b |AN="l<F ` L-ܞ[Bz(؋5 ,}Bʢ@O3 aUΘhh2U* u_Fg2XTjtN34ڰ'l[\XNk 9od:̃٘lI0K0ȩ9B5jfREIr_"A5k9yNڎʅ'pRqU]6lI[=4g21_&60B$x BBO~^8Pz8QWf͛į D+Aٻ0Kn(IʧA6->jٳdi7֦ʏn}E~8^#q i)QĎ*.:WK6lߎ;`1[BAZH.*ٳ`r~ЖG _9zWf͛ ߇vܩUi)v:M;e ]f(7=SJmW#>}{okemڳ>0~ ~ q)BǶ&8F;?~K4-h {;Pfa/ BKmYؑ/+/+c%&čNس"j6͛0́+Y'sz Zv^lK%pqE4U@w"Ӿ[vYHjSwV5ӓHlbѝ5#{''\`$n1m r%O|5 Tpp|8*Cw󑂯#sye/Ȇ݇lviĂDuä2 (E*8m k4/3Q]&-?:u#3;{u tcQ.zϬt&\וGr9}929|!0\C $9Y<& ׌zd21LOi@;/NT\5=qXd`Aɿ/R8PҽqIB AƓA%|N`eS0rdPV7;b?QvP<0${p{|͜Fؒp4\mļA^GvEIjjYv.7!`ߖ[o>cy?fcwp…-Ơ]|@k/!%꧊яC3qxR浾eHq HB.eqI5=sa֣I5k9/@?*`;I؟Uqzqўy92dI䑔2\Mw9f˽兌݊I+bUof;6l\[韄Rޙ͛6&#o?qLjOq×*O߁]6l?z,dƭ=|Qi]6l dت7{`F?~-Lyn~af̈́nO݉4?d^ݼO߈xvlٰ(_O~ل/(ncs߿Xp+fͅ쟻([75OQSN ı$N;\N~_S'K);o&z؏^Y;cGF_&>RPmvM|ma.,1(+ɣQF2(0RF<7kB1|"ɵwu;z f3l8h{eRhv5Uu <݊r>lŏP'͟%ʪ:?N+U?&E1*Eq2;eM#jw 2&rȶ?j{`!Wt{1'sMDU|u]M my_[Z(#s enғF"^Ԟf޵ oR<-^ ԏ#`f Ե xmdI[ə݉͛\5XjE޽'<ϿC$ZD&ncdKXٳdII=sz9nZEb6Ι6랝feHze Lq˲Xdˊc#8v83D]z- QÊ[B~clJvK41繍b2,qӒ;;I'|/_ABoI[,OEpB+\3j#ЍH4]6uݣ8"F˯;"qY#SՃT)!zO!afpT#:S.,IȝjldɖDH]=US^+Ǻ:.͛ g)Z~,"B툵ħ9rH.ٳfI\߿}8vs4nȄ);9,Uvlٱ3&jzCޜqٳcH8OM~{F(vlٱ0? dq?hv®͛6$cpTv8@*ٳc#o0Tp?A![dٳb(ğko8嶓qx`O=dc6lc ;ރ,͛6$8Emm +}߷C?vVFܕٳf~cfo?v$+|' Wf͛FSŪ~eU^ٳc4\ePY TI_V,G?! NFOMOBy0qLٳfm Im0n.Xv =-!_7iڀu4;QFsXt35vlٲ5a+U'>ДL.o([ Լ'^Kd֮eDH يs?iٳfÁmLkVQN)@ )Asť~aH]6lZ4Xדlk:c KTՍ %@ 5'ހvk3_h.)[nàƓ\Yu2(/#ヮ^i%OS=9#QYg]+f͒-ğ1K>|YJUOQ;e@Z՞$';k 5o }ŏYɷ.Dvnl; xl3dQ(8TE?,cC پ z{O㋯ ء loX.zd|G!޼G=SfGGl~8Wn }k|i85-$䏏^ㄱ _->q?ٸ格^a=7z k$Dc8gj`pkn8ě%ME+pb 0,*~X̱q0X v@Ŕl?ƌPeY<|F$`7<IZcG\t;)curm\M8u͕5+%zt˭U2Y&V~Vlft)|OQoP V\Nf6LԨAҸuA*q xޣ%Mi*޾9'|mjw!epYʔT\(,xod5?323 dKQ3AGs%Xܜp-5o05ļ GW|c}V=z ׮y紝8$V}ڒ8~O/t'=p>D{ω;H\_ܖbǿL%g&ڜr'ݛ6le'gZS#T5e'iSm2?;s)f͒Ɯ=M 0KOI >UI>hCG>yX ܋x# sZamXQ?r%yӈ眯YמIF~%~WH˴vZxcr']LR 010i.]\J`` |£ /uҵr;rq9xeVlchsRon\gN+CSlj[Ed#~8_5bIlk=]r2֬wf͆CG痙58]3>hCd͛69ؑX+f͘? |8s9SY.͛6brcsbf͛-XcPٳfTqw~͛6 Jh LB6l*/GS?e̘6lتT)_Ꜳ<ٳfǃTRIĚ@ n2Wf͛+zs|Q{f46l^ƻ${`~Tm]6lw(rL!]Jw{=bGRh>dͮ4O4䡦q:/Ҁ8X,]6l&:Vr?9.fn?Vu*^(K,> u^DY +vystvjf\Y~ 5-Y :}' Ɔiav6d5$o z󎷵DOzu>ٳcM N#jKN"9e9Y. f͌o31,Y31#vlٲE~>]߫8qAz|wd/GRC8irpML'|p D\Ƥr>8{819g>8_r2{ٌi׷}c/?'S ل~XdO~|rڇG|i8az^f>9^7}NiMB}=o|&557xooƛWozi>8ϯ3r|rsYƒw@83$J^J1X,v)64ď\{xaDB*֛`lJ$mm7őv1(.? ӿw u7S^Y3Q͘$Jd=i\͛ Z:fq> 92N빟 Lm;Le+kBLo \m2͉Ap6g12/scrOf$s!!-,'^P1LdA;ғwk*\s8ƙi1SQnHT2PG| Zp +'oS\jEuH+Lp{caƫ xaPkCR1O ~c$ޔZmv#ۈMZ ;G#%r3.j7w}1 smr#-vpSJ~ $ykj\`AWmrAQP}ߛt:nļ^2{ a0#3aM.Dc3@&룳f͜ї/ICT=p4_qhrXPW1cf͛ $vS 蒕QFe"!ٳeEUjxՆZfBO_ $qjFA8Ӏc3;H'-N!e}ݷI@{;6lr6{@HZS,2q_' oXKrzF hO9!,"~eIvlٰG 4R)"픘;6lؓE'OS13qwOݯ HDvlٰGG>sB,n9&4Us3N?-u9t]lI <?<4][ʥvwpc8.)V1m?F0f"{qrX,kS, ²5Iq^MʦTγEh1IsӍG@n'mqNE\x9m&P_ƃ5@ILr ❩3ey6 6p4'J$bI˯l )+/+1d֠&i8lP ć=6nX12]7h=ƖNlٲ5.W9# r X|H5` $Bԭڵ8E:BoJ4TwNbP[yt }> pq)H$ K|o |yTQx}1S {E@}]~YvY@6O[;ɖ^N==rOaΜۃ3tq>\Nv\/oB8.(]U1Nlo !*eᛆ70e;䘅"eŸ 9G27G]xzgWqߍ8C^L`( sS1DyOM3zm ^L[9,q-gߺ8c!(S+z&|0rJXSq&lٲol sf?N=Lfr3#W͛*rOjf͛E.ic\թ'6k^8BNI(T#xrvVQi\B&^VV sf-)YrAS͛6s0Ldvr}-q)*ݿV򐭿\nGK[,wu2$O2ٳ`8`^R|0D&s NJCf̓4k?Q:Ǘۉ=23m 2? |BQWί;#&B2d觛 h{ݘ miaTW1+ɖ"aWkccR_tBz|NK)`W|P#le#?N>0PFu?~Az 5N8^//7zo ^!Wy7hL'Hșd6lT(tI@ ֡ٳf:6lܢ1eSvlٱ2121Wf͛#*.0*ٳcq>sSOgvlٰ"9f1r*ٳckC2X1Wf͛!&"8 0BWf͛FS`)ˡ%vlٰtO?~`8Gn]6lnh1d%!ٳfe(rĖݛ6lljy}u#DV5|È۳fͅ zc3~cqĿ1>"ٳf79apOX';6l.426T%V+b~yd0n,nvlٲEiuvXiΌe'2KqpyO+|]~%r|h}a Ӑ]6lNl!es W+|CL|<{c2;Q[hN` ؠ E` O2CST>1QAU=?ln;>wlYgo¬\%OE|qAGN"Ǿс>㾤|2@T,7~1J?7Oa7i,#V.:gՏ?< x$G7φH`f Hx6l\yH6 [qL֡ٳf3q8 4*ٳb ~Sa0l#N46lز!x3>:`fnۑYٳby ~悫~@V/邴̈́p9;lxxٳawk}]Qh)C?v>Sf́nOJ}zE67j4c2)e@ (+͛, p3JxiZmȏz?u&+BAվ7׷߹21~@>~'93 x9)pGU@{T+jamzBґ Se]g`sӇapS=cJVpR@a1(GE"wuͶje7~]xǫhh>NT {l`Ӕgჯ`֢p;NH 1o +s⧨#hEʖҠto~LQcH|BeD[v;Yoa)y"=Tsc鍦IhxS{`Wxx $@;f6]4{<(56l_uڇ:`@zdGʶdSL4le{>8|gǰ4fխ"i#EI#lvR*jvw%c*;\p*ۏ}\{e2as:oN_䟻>ñc/+W# m2|pMTeO~ؠv^Kq.%>&U }yGeGv@nQ$~ 8~,In4-+HJl+ظX۱R~ϋ=X)܏5#~[8|Ђ)?F_GʨG^ʪPk8|85k~iA'o|x_?v^X4`^2}'#Zn:{Zx`S8WdžCxH4Ҡ]۩ߍ>~P}[{\=Jӵ+&?`^z+lyNUs6lU]r63f͈z3WC,W/6l0Y|s͚6l*}Cc^OS.!I|n $ /\(j)/ǥwۥ1CuĚUr>;ЏFJq"޸2we<"A X@6N&h^VlV.n9Cr1Au8T4ey1 l-*7B*)2B>IHH6-=TƁtwPu +@7䴇ۮq1Sg (Y;|9jzQWa;aޱqV_|"5r%~V>p$vT4bW~? | pJi$V91M y<|1$`84+ͬٲK0U'`2'#ΫP6whd FOb-`cpUgEj? > AR؋hL%<l8MC\-]὆mo5i$݁Jcu`UH xd:VwMik zMɷCZDd{?cIc8LHS2Y;W]U,5r!qi脒>dm੐A\6ıEfvFY/'ODٯ'W.qdLDTs]=A|a1TuViyL9fz29\%Sf9vQ,p]52>bLc]+"fw$ƨ4뚘vLCf͉SF/Lc. Wf͛0vlٳf;51Wf͛FQe6l؃  |Xfd&lz4͛6#W1ez/)]6lHc7G?ݯĽO4F?~ƕٳfĀǮ(Äm糉o!yOO>4-\F yՍ]YKlc<Z[dk{+f̀#F0h=9Krj-# vOBA )bĩ*T(pj6l3HڇO8GYc'JtR#Kw̬Qqٳal.&/'C>h ,_ @[a]Kv`KsgașV;9^X$PŸGq#s lu16(JF=Ss̈ĹlfS0n|}]R]o߉ 0"UX0#Վ|G81\2ԤKK '"Waj V!sinǸӏ>Kܯg Ӷ`~5B,)d*G$wRƕSA?:Tዧ7O|b)Hn*zby)+I~!R"j:a:݅/7DCM#W3W3B=WH+# 8(#cOfV˯lH}Ac:7эvʧ[V;I'WCяf8{D%K8"K0 (oԶU/ :2b:{aGMGk,Xkoum؜ @2fFU=DV`mOrqƖ'~ 1ܮ_yaq}~~(M/^xDOqϯ+O bH3Bǒ@0ISۦ%5qeyr6=*i2,<6$>f0onnQ+9-%"+̰̽ 3+ \urg%j|x{m 9}j@O0=; X7yPƘkkIlq`A雨gAp>>3W, mkyޘ1fGH#+6Z&Sjώ8?݈r +6LM6/C/*[U/Uref*ez[(:EsT%[3Waz48wo1l2$^\XT me]9E>_ePSs lUw댡ƅƃJFEhNc\/;8u$c}ee\_NWaoƼ k7&y´nIM_M z.EW u9w'ژr^]9ڑ,r2>zEw$(MkDP釆HB*T=]OZa:JNC]ǹ`0s8fSa*_!ؽ7h ˽0c~{ _EH&*AQ<y>B8 n; ڵE1iv&>9g1d)NFwsE!__ w"yS~rꞌ;L-REIs¦x45/G&qF>gGp%`!Rrvu%=/5%H$`EH=NDդUzd{TNyC C2zy/_ ٳb'qe͛6Q~g n(WcWi]6l1IBƜ17|T%e/Pw]/X#P9 ljWY #(@È #9۟!]>*ٳ`!%PpT{~Tƥȷd,E+^կ5;PjDKnrY8҂=GV~" ^ ٳ`MYegӀ'W.u`q!`/F<_?^=[9>vlٰ/2 ߋ,+Ա} /si!V&zP DM9 #M6ltڽը |%p*)}D܍f͛ O1N }?g˰stj6lBe϶+ Kgd8ٳfg-:Z|:C(#X1Fs{ ߗTc,E(qr#KO ga"BTPE64 (z~rX84OQ3(=q?R,ǂ3ᝄ.@⣫~rel9U"0 NCu>T$곰?UGV5:#^"c|m8$=B9rGp_ׁuKK]H~K$)쇏©oo&$b=+zW-mo..5 YeB{9q?4f'gc\S2Qke^!者܉z4y~_A>coXW}/*S8Nl8T>sgB>*d%ee%ώ n͛6u+3Z'H41^:;mbXȩ˱j3b7f5YrHĻ6l+2JH5j|U8j[\18K՘Ӧ"NEji]Jv4sM/>-xT@=-}v_=BƄU.sqU[ruX<8Iu; 2 yr }`0jzI㊱=LXbp^\b'ЂOB@qh-Xig"y:i'#jUA~)`W-Bƣ' >0/o•=Onn8r䚂RQ b"6z-.FD"1+?vnzub(7 p.rMJbtoxcR\j-1pr0S]0T$LNv `ws-k=yğ PΤgW jj K+Z)ȕ?<{z2*/'0q$F'7ƨxf͛rA]6l͗Zb͛640(MrٳficNDvlٱƜqƚJٳc dVc־'h4w/S M}8ZٟOӃ]6lXqLi  \7ې/qVbN6lسMd'mχč~'UO(#Ex(fq6͛6 KXc9Ȳq!<ȡ4!]f2J[S)e$UVFaD|U .[{sq+ڌP8QJRFU4+fͅ#;1℅fN~L "ࡃ}f7. w=1%$A;+f͎YD%j@ P?~?OG Wf͛dL ŢNY͛6 ^?οe?T,+D͛6 >!O~? o|8*6̜sg Q͛6Wo?Nk`0`Xi̘҄) /Pvlٰd(H'' ZVBiS SZv(b_J#.X$Y`b#6-D1D8iΎC7c䶐8㱭. }ZPAI?0z} e%.)eʹ0 FHyBc0`vl_p1Pq`?%?i>u?&wSlȆW {vxrbXݎ]cbzS]&5mru!F(uA R>?C"0♹ ;.(1_9#j7Y70K4lϨ~5b{7>kӴ}KxeK<8ý}VO͐cؓ"㙓|+TwD Xjxli|M1coipxg 2^#+Gu> Vj*$Վ7=Zf-V p\ 5懓 H4jOyӳ|9bYjgeGiaB\S?xa۽lbҞv.԰QUkZ,dRY((G1ɳgy⨳cر?Q熤VqF;߯9jE1E?N?hsOLp>ڷ[ھͰ#45 x(‹?0QG?ʵ?{<.}`K==5G+~ SS nf?hvcYwY$GvmhU`_$O0[f>.ſ^'SrW7Սz2FanRór6ltWQLUtG1 p!#wf͛o pX`;-g1s#KT?)#?8Q٧bcb؀~r0ٳa(7"l~?W5rx;6l6lٌ6l`;/\K6*ٳ`p|'F,zvlٲakȄUy֕ztG\߁f͝~ RO$6^fONp)#Ŷ[k) ï7,ŷlvlٳv~cl?#p>,󽟛hEMaנ,DA[9@ 9SGI,ĭO;nM^I|&hk}Z6}DBd:`o,iLoJ4)Ǯv:>j+7wuo Δ ȍA&YjP8鈹j|ENٻ"d0FʏN, zJUw5,h;%+C;ݽ4-{ ĻSXjg"ä1`"ZƢnj`v_Wԟ퐛F$, 4$Aj!г(8f%RL9J4I $OWPt>1O;L:Hb&GGp$58c\?"_p+Wrڤlu"R4bY l?J4&akiz-h){&!AK?< +S8a(pa2%! mmN:9OEqjpp~'ٰb)U刐֋qU=x_$^;`Ixj9&CM F4@^M+H;rV۶C?,&9/r#OT8OjcX̯l5eaήG3 e偶ly%6lfl2͛6Vlfƕٳf˦XʒXNr0D4͛6U1sv  K׸yCuU:0IARn`͛6'kX̃ }sm#WpaWf͛Qv_ߚA|ŚJ6;Pi]6lB1Jq_#"͛6[av54?v'^#4:c(LUٳfVE E;)ΠvlٰpZ =OlCӕQڄR8.mJ7(CO጖p,0ymVxl*ٳ`HFk*Wj+lpCq1v>9j:GWf͛)e1h(,UC8i'8|ٳf n)ccA*MLE$q$qGeqR-6l2܂QC߶ Y&q*]aX "xO1khZVG4Y.FzҸOR|lQqH͛6!fo%?>xՖIHŘRVE}4"VWo]ܸ."aSdb\"c 'f͛ P0Pa|aI}Pᅸ^> 0hN͛609ءRF/f?#yoձ/ؘnjwTy)Ǘw5v,}^@(>/י3#p¾ i0B@|)1M|Qc]$N~0j"*qFqn4j2p,s Q!E@Y2]S*)PiR"QS:[D'!Sǣ̛ɶ$yUm{Zy PwE'хA8cːJiBomv #ˊPw&!w8$2;u8fn"4EK~p]3͡ zP=TǓSo}r/+Cu: oVyj٩9ɦ>%nq#ç8w]Cf͑qE,|_Iёpr>ᘜDmTÊ;6lرq*qEaEx˳f͊ }͏|/nEo$"ٳe-N#*߁Po۳f͍^j/7qWf͛ ,O1wFXW(Bߐ>=c#/~.ɾD}͛6V]sQ9>1vlٱ ٳemN͛6lٳb͛6lٳb͛6lH镛vlٱA3C=eC#VlUٳf史ʃ4hyGX_%pHYqM6l* eQ\ ii0'aчb#- DB#Qz IvlٳXyRJ|J,|69mbT',GǛ 'k4CB\Nx}3Tb36z._WT+ȯOW =>5ڼN;>rY<ǽt ua[Ȓ2K*Sel'%أ( ~`J d(#1޸NUJEvW1 =spvS1GжY6\ԑ#8"Hj+%/&)v$Q7wZġ!+z.B -*O/_ņ:t-BFܲSPq&|Y 3IsB%XRv87 SL1.S'zfMU_*b! zalgp*L ʤߌ'|cbNæ7S $Z`+ʲ\UfXA95Q ȅ<|)~GXk'5¬LtƜ}6DgvlٱȐ͛6Vj*MN%5pMZF.q!o% x~O??Cuvlٲ$Ǎ ʹc8bfߠUz (p͛6l1e1n|JWf͛Lk,z{E^ 6lؙz 19cMv$cfeTVb:5vlٰ Jt7 u ҟG,cŏ# evlٱR2dIvPvz֥y?vlٱc5币%Ŋ@8 ۩⪠S1qw,9QcSHM:(=NH z ٳb3ͧF&pK1Gp:2:|j3~.C%x7Nkti͏1b$:,jy,199>n͛6.+sFSM5ӤRљ^j~Nq ?X5 qWmk3\z\e0ȫ]}g]٘,f8u :ٳٽx҅W"ڣCq G_{t|иS551u?|[u~E{WR2d?d˧j#wڿcvlٲ[ =M:Ǡ -?sp?݄V$?)gR.ыN<#f5a˼sarbf<ٳf4+v,ƤF#sal..5^:RG|UNU5ces1@Һ5zb&ńmQ]|^97KPEP%JHh 1=%jOOs_ܯ^Ok&{keэ>9~Uqc3䰿Åe(Xvnرp -L+BXBaQ } 8\ 9G|^6lى+Not}[98;?FRLHFŪٳfɺ]~kCxU@0 1?1C_@iWԷ 8S:dIeŴBRԞ% M`͇Qxy:ex(i?Kf͑/ݎ C_]O ҴȻ20O @q29<ٳcGorok.͛6^ZoM@$l>B6lٳc"z.=oZݢkݛ6l1r2R#'Ҏ)M G ӧ[yq-H;[jH=EEiP8?LOLsGٳfV)|\?x7(:5N_)۽f͛͛6Aٳf͛6lUٳf͛5_6lYNQZ ͛6VlٱWf͛6lٱWf͛6jʾثf͏IX`8c֕T0"6l9.A@[* 'A]6l=YF/k,ƀT ('N2 USEƧ.H4;r1d:]6lm]+V Oi挐CqwAa3{&!LE.`J.lodjdI֋ ݳC}̨@P>Oᇏw{OsOBInO?a3oK/#SzG+\i,%ATO347sgir]1'in;ƟghKrGO34egYoLK,S"::dhwU?N77ȿGiťLkq?'rk6Ydk|a4nE?N3S*4&"7/p,5Gi-e#Y~Ju7|{;Fss?p~%(~c4&IjJMP]Jc$榸 kώW3sztcB@32yf͛p+ܼaa~Sz^8O< @DTlݫf͏ m-\G1@rA]6lPS,3$a@=XٳfO]?ylb@fz/ӄܫf͏#Mu M¼}߇L dLV8#xD; !^vlٰ)ۧeJqiYr:w:`;bs *W i=N1ڮ͛6$0(v * iI!4?'>G)ٳfHF*;{JꞷSU-Akmm+ͪj\v`SaJmSknWWf͛]$I )ZQGsSՎ-pSh9ufط1 N䒮͛6"~Gfhg`T qL,Œqx'qMďqg$\r1$%bQ6;6l،vFD#bjew  Q׈;Rl:^YɫlُL.۫5^If͚\Y2K꜏RٳbirrA#zr~6?F LR2K)H#2v;6lq4w(|1N>AoqG0Y1k cd6l>Nc튪FG5ZG;!fקKw t q)͛6 M6ۗ;yOaJڲV:'lk}k#'sux|Fe$.rr'f͛aY]HaYLsJ$[чv+{a}o]%BDjr>$Qen˯/^6D[\GK5fv x//;&8œeoٳaJ+`ƨ@WeW'};Y};Oqx*sXg D-yy!$$79x\.lEN&}5Mahմr}}kvS>TQSe?V UW׷Ypw,9*F?a_YHHtx%>y,SyvIޅ}'[ $[@,r䓽FEoUB'쟑v&7$FkGMh$杇u8| Gh {}OHZ|[quQ_K_G2IjP'V Z3?9(ewHly! o)T%;Q4lr ؽ>%X`DM0 yŎ45>~s,D.{|`֧dOW~jBȤ2q5:lKXuZp?| v]a$#y5K ,I#J#uc\nķ#_2OY&˦ٳc^#{|_231 f͛,o5`Cf͂lt߸U%0/[MU}#l+CBV_U<@Ƅy[Pc0yvlٰVޖU&{]zu׷ϦQ#v \aŏƣ{{14n#{ȱe˥aǥ>gT 8^.}by;ݛ6l*s`jO+# IMϲ uռ mCðSaX [dG?mGa9(Ns.(͛6|u<{Sv52OD~pM6 51\j,[ ٜx?Ve> <Iyf/ǣ36#~ٳdٔDQZr')O;VेEW}cp(`;6l2ǖ5_P7zg.㸖&_?O!Z_Hͽ"uy iqDo 2IB->=8!Kvlٰ`=8iSxg`_'7e5L-N_'f͛8&)흉|GW2_z2j?vl٩lhQtIcgd_'W? #u2h')|52|3E ҠlNYa 7)A>;x6廍6_ mE@Vk}]FMd=d:Z-LE|Oj wz-8E_5 ѐyf"eeBe# *24 <* א 1^v~ɶe'n sA=vT\O4-/M`ܥ%a'|&)?lw9b)E9֣(Vuh~Я BkhIVX,Ɵ|-4YxhT'NS\ёS;6vA '5=V 9QA^$xlpVfǘdh=AUvZ/m9Sm퓍@nOr-r+Y"ٳf ''*o !ٳfˆ ΃؍X P 6\bG`s/ͪnj m q"ٳ\i@u0R$DqmOws\1p,PzaK:3E뛯2@1ԜM1!YYg׮oWlLI0Glliη&gfjޡHZh^AkiXl+e)OTv.Ƈ4]-,% >`yPqiy #Sl sw噽UJ>Aj#VFg=dn; ٳf|dApL0BO|pe$ěNKaf͋[ȑq4=2qDG8N1D6O-ٳ`RSo+#ݾ?DTݎUAQnD2׃/=|請6lٜFL c*{Df͈X moQY>Trcu>mŅN 9JmNٳ`L"?)f2A@GNCJٳf@(a.͛6=>--Sve}=GZc/͛6:5Q1U Wo9@%<1Gj5A54f͛7@~ pMƲ?a4=:ӓ~-/ Wd|ٳc-}?|l!C,-e 6lΡ'E|Wkrpcj/pR7a K ?O^\k%pffB`+`۸7OIگ~{6l8ƤLOuId7-xe]8<3un-d|2! ǩl|0h45Ƃ(A~H}&fM[.*ZfVJ鰟áǓ&ZC7^{l=͛6z +(#O eU;jzd{bJ=Jߊ&`d֡636+iO%'Z7/I$4ߪ 6y)FǦ@dqzlOa&L=}C%7Ln "QEIڌمU#ØJ%ޑ}zfԩ d&tX)}OP?TI;dDlq[cM Rl%rⱞ'qۊT 7(qø?z$f :F:֙»'_ yؤ0W=#S0W:"ivT] mj4p"'?Jycj\12AcF= E6E?=ؒ7]ݤr~l=B-IcvGI WG^m^%Sl277ϚD^+aG2p6lط$ /d2X / 45H~%{-|2:34_{f͉>gcqY;DI<vmCK2hE;6lY LJ_ǿ_ٳbyǏ)vlٳF/eq=XFWO'hz|"fnJ$$ ٳfɆ[y>ڇ5 pz3Ꞵߣmk`S0G+=TqWGmȿ ř,w'ܜglqyE\`>\%D☲zN͛636_sٳf^/|Uٳf͗}Wf͛="~;Mf3ѥҏ#b2cƙ1ct=#LѶ 2pikpS:d#qCv#op ӠLw` ꁆ8tއ "\Ytz}H^ƗH#B*(za\B=0K ?$B ͅۀğNCr'(. ۾A@hrOu#3nx-c˧ΠLHSTl~ /th"'>Iet0ʋ"a]G/il!6R#B%Z|6sxM<#'6YA8X#&G;WU'?j cUd]bsPW^]7ɸ&8q1>͉QBxۿo'T^M^a*S%峓d1r&^p?0~'ۍiavA~ ">`Cb撌 O yāPqLQQ +Tf@ʏ TLL@*WWٔLISdU`;b 0 a[=+-[XHj3M9Pu==DcnnH^8G='lv1LFܻJK?\.|0ݖ]*5H#9 ^NO;&Q7޷6lSpN‡_T#w#F!]6lL74fƝ\N?xL܈&4zma|ٳfX'e\A ߽?Lr :V('s19%ٳfދDTҽL1 )uOb;*E4 JٳescS5N Wf͛YdNݽD4pƞ$`T= V~;VVY\.%.͛6P b$¦I}bDu$I"X(-$ǥ*?_ OwHvlٱ&ydy9,ܚC7P pnw)vlٱX*|V;JdWe$ƥz{en'F_;o_l 2ٳftJڐ5m*m>.` 9 6 ¨tVT|lt"}9m$1iҶ?FmF.` Č RH~#f qQGeҘ;cfZj@I42q^Yjkđ6=Tear d6 Ey26=Rꨖᔓyxc;&G0p}U蟑Z?  6@2=cӹLeҽr}[]l!FivqR$d)&k#F9<0M-N%eۖ(D8Qv(MxgI 0bG鍞t$|f͈J>aMMrۢq7n ͒]6lm|zf#5{wȰvlٰmM,v҆@^%'U5_> __|2,?dתO7f͛<1_՟ۏ|>x_}?#?5ٳf>_VOq4ٳb~8ݽ84~6!,?Q8;]hۻf͒yAꠊ j7Q咈|" IbQȸ̝ffg6lٳfCf͖~땊6lٳf͊6lCrЁLk[o޻x9݁(]r?>;{c"^뿎W8l-'jpQD~-L!־ԍ^ M+Nw^㇁Td.RrS/WYwʖڴQj6ݮn\(&>9'<.v*'>`=֩t8HݿQxJ:rj2e) NVl=|=Lr9qP+rf0L.H9n)41C'N17&cycJHz(`E|U[q&51Ę䄛m(OW,BXj9 \_P4jq04|G.j@Ȗ\ 2ם̃ g'iֆPČ!eDae6뷭{pޭ!?^<3GG>OڇYb??|FA FO@K,1If+ ]:|VoĜeS}k^(>X[++3  Uw=Xѳ͛6:byjC`6Ab)]6l20#b@Wf͛*큮x>8$LL+]6ljZjt9l :7^]6lpZ6J$ E/RIvlٰ5P's+':`£6AB)D]6l x1H-eҿ*'Zr~w)*:rK?j1 ;W5.f͛ 45MJ5ZFpI9S@`.ZHVS@% a Ļ6lUK3q;-ktU{VwyuMF,V4- 3aŧ>5&EI†􃁴"Ը?趪gD7j(vW-s6JTæf촟PvlٰB*s޿@PֿF(: ͎4r{;6lw R:Lr:+t? j0Hh{7(jVڅШqUbZnO^(+K*\aj2C'Dl Z}{->kPv?.9}[RPHŘ|a槃t>Xj5豟jObҫ;uŝitPո3 TS\`KĎ@ns?80O F⹚8m!4F 뜾Yq}͛6%Li zHyENi aE<.Y-QMĴk)75˜IM8zzt fE}pǼw8B룳f͜1xFnJ6h fdema(̯z'G̒w=I6JgCٳcI *Ė$ʢFػ6l٨_ÿ_o !iٳf>oJ碠, ''Or#y?3!y |ݛ6l.hz6WC;`uZ--MÊ~}&yjw &!_)h0./(Qߐn͛6HVq\G#\}ۙ]X|=;W"Vgs5+3E,W1@~(t>#zj) ΋IbHWe2jxl2!&>*X;vlٲ)}f ٳc{|>ߕ]6l76l?֛7-؜9ޮ͛6.n#lz6lرc㜮jӮԵhl#cr'Ra'~vlٰf$Hԍ$k֡/cR8uiȎG`V~nYd(EƧ5r$w*ٳb kKQTa=޹7 Q;L5m(ϦEmkgxFhT͛6HA"Tp ҧ6w[ƪ݅h{xtm"b͛6 Ă`itԎ>n1Ksqe=Oě8B@:E%P(B:q#Ijcvj @irgnI#qjp=A&ƖW>)2OvN'{<9G/?3G|X s [́o²Yr#2_Z+807c??p8Ԁ䞀{Y$7ܿ#Oy4>_(PcSG5H~9>3> Hry)ͪ8r&ar1ԫ"9g. O=a:kHyA!Z28p$1PH#EU*63}0iqc)ș䗧Ւ\>]":#,PFRɞIz}s3r;RJnVb @ 9:p! %Wz.^Iqey ~}:x/m;˯tQ=zx{˽6=0̓1*\v|:c$V?p]ޚM9s $a&wVyr9RAj %0||[Nr}ٞ&Y=-w vcepc crڸ+Ҽؼ`lrq^ԦaCA-F!*xaD̂tk7% Q f͛ipm޽T𿪡dh kgCeXhbٳdzu@!3Pz`V ScC]6lh|Z(eY$!C$R=*A5[93Q]UpFdWf͛Li=viipH oU\-QWc$=?\ynUٳf#f_}9Pm-^$).͛6!L2y~uI-oo3~c,j Z ~B6lٚ1;}r~WE{J[H `if ^S퉲~ȟp>6lak:8h( y6>(?ʹKs^$@{ IQL{%`N#S!.1/w-ٳfKKP*2ܕ3zӑU"i;c3U+ZS'];6l փzJԎ?Q8 }7c6M;6ly&X鬎CLl}ZUx$n;чp{NfDUؘ/-Nq|ٳfcnQ{ws5j+UrD4.+W6mGh}&Rl>glU5كoXf͛/=gLq}kvV6P"W 42OCIbxr\ Cfdɶ6ll ]6D`e"詭TA{V#FcH]Q3+sϛf̓@?ai|#M9IJD;T~r K8Cf͒K1ҸpʼnZ߃k];M3 ENoDGL"O {qi!"dI;v:ഏ960µsyS]ſb!q~QNF3 m,=ˡW]̲M M8&MVSj#b:sj2@yy58l٬f;Oq0vP:;^^򖙠ia̗+iFCasj7UZ T(R)=t'gUTiiQ* u~!duٳfgԗɣڴ&C~ $eG/ݶ69|3\ՃOrva / "5Sv67Z:}-=B@ܚaN!!$t}ߩaü6lӷlgf,M>Xp.nc(/ق?s~TchR2츯C Xz wvlٰ|~naTz{ 'YTR-Amo.8F*?w8~k}G}s"vlٳ&tIxeG_$'V?~,]RGӎ'G}>;f͛M^Ȟl-}[|gwC<'f͛ 驻oN3Cھ8&XӮ 6{nWzG/!fvܱ5'ǫFV@v R=یfbAxHzz7#f͒+.]r,wy#;}drɸ]B1 7LtM5< Gٖ6~m|0ON\'v)?0AS6/ # y7]\OٳfʍՍɀɬF65NYĖËGQ5oLN$+]6lC#6EPI0/}XEߍ7ߥ}uD[hq(z1~06ܗ:l=#gxqG&~92D )G3fǓ&y3GL1#8Y7vlVbAf;7' ÚGvޟڧѝ|qLu^lٱ<:Jh%'Wf͛5n2=E? mdBIU4>9drՍk~]6lI/ ͫ!@o`GC b}.mC"/?]6ln8N&ثfͅ1^c}nNגi>Z7=zokS_UٳfGLzdO˚v]>h$Z~ ֶL>/s#?db}ٳbz>u˖ش)on-Z$*߫{Xٳftw3_vlٲ20/L ٳfu5M]JUٳf+W|b zKo!Y`@4v].`ZcM>AS3y=r2'{乜*nsWro2O:?vLJY h<08US2I<3w2քD +ֹl1|Ie&8~f@F/u&z8ӟ&8/' \O(u12ƱkUsELc=iPME%P"K:/B6b(dv j^F=~1 z2zL&o2,H=>{b|zx8O#/䗪R׾s-8pr>#;9eꔲ9@xyvn-T$IG=?8_۲:t<9(dz)*"n-ĀnzrM%Glva9J]C)ĠE+76@ ֬LTڎUljveDUic$a!D*yf,dz=Qeu |qȃS[]Mi &~yV,&͛6jڹ HC!٘cLUqPWC4}4a3*1&BB@iٳfʱH=K{dgE@Tw4Jr8woZi>`+m=M& 6lO7awKkDakeEs6x63)ueqڵΪѬc洈q. ӹ? Uiٳf*7͘۳f̓`Gp+o Yjԯʉ.cIqi'8R5@^Q ⑨Dʁ]6l7 Cj6I7TOBI\)LC( 6}zJri&yH"S_/ ]{i$OS*o[aL7¹[+ͪ\HhG;+ĝ*OEQ8]]z<3I?F켎Qx!l:X"6l,!AA펧|6m28(u aXc+N7vw&<FGy|j8yٳb_;N=;u#׻p}4gQZ6Kksnz+{k9ށKFԅԮ8\ZJ(>ʲ|mKsoJMaBx.iф qdNۊht Cf͆f{jB;YB񻹌}?~BndZyY9$:VhxxP@#pD~QvٳbrHI\N*W`riێ+࿂F;؍ٳf̤n:cOJ}7l }0\L &ٳfr~/ł`kIgbw#eQSa"#I=8ie9O 9f&T`H +aF+_q Y$-a=^NvNt"hoqJnԁ#?>p%#O.cf7Z֤rOe xͨN?gDns^YuiX#׫FQM7(˫? gENX1hK4Ncޜ?z'S1h_1I`z}'e =Had{~63 LYb``RD/_ČC\#:L]Z]rJK4lP~>MRkL8%k] 7"iiǎ& Fˑ߽OxDn& 9 0pѢjQB;bW:mpgbtX̀ o7͛6V#9{wq)0ܮ͛6ybV1wfy9 x"PW_.b]6lč$N1/)WAHOKyCB7VȡٳfI5&*e6&X2G5Ceߤ#GoSu͛6 )ͨH2@ç0`;\PjV ߲@C pvlٱMFL0ܸ䧰U*6!r roSqC/c ¢[7zFܥxHW$G_=/l9+f͌ddOՏw'HC f"s/ Jٳatژ8I I>1O6l؝7X> Q-BpCp12}|Ϳ>O[|ݛ6l,Mɴ>SVNgGa[lp|O?y9Qgٳg?H.%?уaеI<865 2K)W/z@k.@6C#٫S ח^K%۴Hj"n%H)2F8G c2ݛ6l@ĥBT(;uup(i?:aMCHh2ls(vlٱ[!5'#dyBgg㉴Z¸>qie*ElÈo#Dhj=":ٱȼ$$e€fӀMm¤!@$mZ_6s/d2Zlbf|\vfDrR~Yf)SV"DF|%m! {d$ianLV'2;غT;妷jIMP~j<hig9G,e! =>nAth3'Q͓HG1%(T RS#POrr퇩X%RvLܽ~rAtL*u:EHs OѰTXV}z]4yZmD5>N,#˂${i+S[d}pFEE%RUFMjnV(ȱPV]KVf,()Zǡ?GE +DtTyhdV%{O{W O|{`!^Ҟ4sa iܯ?FaS㽩,=B1s_` fRD,]/sy_{`L:Vq!q6r[xERK]޲,*UJR0m1HVXȽ=>9䕪ILǰ]NKTj!I9;M3;=N9Ieef͌/q  Oϼ6BQDNٳfd(Mhk'>0Lee$V Y^b`,Lr4 GDe@)}'ٳc"2UB19>6 g$,Eߋ-c_s27ھ9)B4@SG6lC㸯8h$Œ'((dKovdd{(/vvXxteD\fm>d ȁP;fUf!TcrrA7X ,,H&?~^-w=/˚l׼QTҼi`3og<5A%lv;򾃧2j218uHTED,Hl_PGM^~MliN DS8wΣGٚ- ?tƴ!8 Xk0A7lYi^Aaj wH9!T]eW+6g9dy5Bq>)',0İu`|qFMEB)X5 _Ub5]A78?zqQZ_nLT?ܚp}L258Î8,wvlٲ. U$(rz ] &w9ϮW!L;(ٳdpM; dg(~kwTdi9ZЂkٳbQ{ȧLaŋf͉2RB;O?qc~f͉, w)>&1_׃aFtʀ/ĐoӮ oN(Wf͛ƪҽOs' v@͎B@N͛6ç]_I"t>g$-GWd;;M6  9h}ͪXz|gv]L||;ݘvMxQs`a8 vJDԟ\0zV)jw8+YD*UŐ!jr ؄?eϢKb9^Jl>ݱ9s η[ M;}iwwDZh!if:28zcvlٰwdxjçS-fa윒 噗.n?Vivlca$zS~ijpb(ffcv.Q̰ V:KUN tP׵-NΚm?yr a{.*-i`>ZVHb`9zVYY)㧉bǷ0sO;ds>,@`wapI6B!o0[mROz`{GObwwz3s J0uQ00m\¸H67 =c  L\-G>g4|U#TvQ_0@(0]Nn+of3Jx'r74GP4puF֓F pjci P#LD|&P1b<3!s!H/Jlӱ"Wƒ킄Up2q? Z=6 H)nYIҥXڷEVY%NHkWX,2l2aόG=&/GX_Y@vǣk k1Dz "c7ʺ,bO&<~POlF!?8:8"^0‚8() ͞8ŌF"1rr ıE DT"e2RSpqj f+\DV[٠= Q2\UW5Q=#lfJmG\D*7 i`nQWfSþGÔO#X=<+k6h@d{9$Uvf·@y|<^͖Pp ]Ǘϣ͂,֌H(d~=.crn1޾me]WS"B|^I\_L}܏>5ז/ffĖQ110i0Ą#xK4]6l?uY蛻rGy>֚J#PoMTy m '44"Vkbh{>~#\Yֳ,:E͓BXI_,iI&Pe:yDQ<ۡ,JZBRP%+xՕ7Z["(B[KB֑ŸnCZasnå= E#SƧ#[‹A߯ fxE%E$JGGĜ[)mx<<&KAI9YNpx8H)qFϴ]ٙ}굙| ~/Lg.(?Ew1`M>^!%6xv=̡I1ai,"@IjC{W ۰-N喲x2'_L|ըpcGĪG͊XL#OCŨq C<$='@G F6G>U4=T#q){; / +q߇Q4mR}~& y\kf3 bsum>.m\"a\[FǦpa)[F[n[uSnc*( "\7Qw(b߯Kmi݇k$0d߱A "XtV@yIϿZdKz{t)D{*USC{vU͟DP1YHt,;eh91WDqHzkxGPFH0E{mb?Ql':4UAQijnZ+ Zז Mٳf(]MŮZM^U_ׁgF3 qA9.Yqvlٳ;".~iEAJw51Xt BOQG|\1< cn'71</e1]WO9peOQ~@Nkh{ȠCYFyFLa#]Z޺6)SF(roY]^Ԓ1Esݒ"t1_i#%j:EvaN7=CU>XPrg(h{7]ǭ34da1Ft G~^:lcrScX!SokGoH~W Bݏ]DvTd"N"zg[Ei6LyUw2{ %JeYQz cn#ꆏuOCpʬiS'~;wbe΋#P=DlF##./!P kN8zXTF\]þP1]ޕn"k'[z⧥:3/$YWP~m bI"$Ӑ}ƿFKt}m:V5>(Sz偊Pl8Cl `0ǁ(ᘩ?62Y]M; Fw͕\ؠۮ;qՏቚҼVaN]G5"Ko=iθǯ_av_:VNz:iz^?{G? w(r3c/Er9_kF>Vxd-[OմeqFrWSiۻG 49>Jo| ͛'fU/u9(UGV#kH݀D`єRņ ,M qRO,;6lmͮgay#X[zj ]׵Xݮ2H}X GR_8f͆L8l qR+&ٳfLo vf͗w`xql 0 *~Yd6l6-V}2jW nH|y\t,)ch6v^4ژ ݍ:;ӬG Ok[i/.!VsOrU[. >'RVmDsW1;-u K'Nv? P =ldm:#->m=ȵ"*՚2v-#|E=M8< `H|^89` 5j=ry<,b1@1@26DtwxDTblpAr#ą1ɵJZ P e3e-[< ܚV7j}bJQ<sHQQX8< XimUE<1uHG,t>&o) 8m&1ĵ9~ˏ7*Q6wvۆn J8vdE3~GEy[u*+Jv M9c<v=F'Vu(J$J>n`}/Km/MoHҷ+Rk_Fѧuw )U1|0Y\}"x+|mV\@ 20{\7uYs0a<ĤL0{]ym$J((?K3oodUw8RileJ lÕ7Q3ip3۲̈́`G0c`jN|@n hF&,PQUTǬdvBW%JJӧ|V&<0e~3 olKQ(FIޜn~z@1n##_VޱTtQB4|XJdS3[*P|#h׵s{| ,?ZZXkP7?GS]?ZB}z^$ A$Ϙ3y`h ]@ϾxK6Z)WMQPKDԴ q\Gt?<P+\j9':VkKE"qGxq5 av}yt$@$Dͱ*\5g4~+K{#'RүH.31t 8>0ť 1eq.'LWuŪCQ2Bɜ u1USȃ΄aŢ '%VdvDK IGgPileU-ԄJ"S %i,x&Q*o×zx`]:%R?#hG(yPZWG%pޣIFY+2J>n(^[G"ORۋY*w- ?=7\_:Db[TMFJYfn?O4coZ̋y֟5h: І/ \\Y4bpnR}6NŖPi3qKoOZ$^\зthfV>`Ǫ~9 ]=9eDIիLyz` qЉ\FqȎ85 fVFdqFRC،44ka79uOj-^*+^= r p:RSOU@$,>4:E%1<@C۷8W,>e.- TPt9vs"Lbh}ϩ8ee)XmfDg` 1\ƼJ7jB7,_xnj#UM?YK@L{=:W,[53hZHd\F'lKU,Z8W}ǕDtֵ-)cruzV)v"Tpqӣ9-0}<\R]4cmopP,;[ǯ"/ljH&8эr{2c *;<!)`0❀d+{sXd+]>WayT}_<ܲ2RM7 ?8ǭLGpנ \Tf^vAN)e R^~v1X)n>ٰU9Aav IZ U$шPg2mTq?mtyHQc/K lD?{f́}Y-Eu MCK!mnr-h~oLNH^(t?_<7ȋ6O=l]6l/., 7A8iH`6IiVDPPޝB03FYT d|9H v]00uy=*B\ 1 pO*ۙ)߫N4-iZx''y񺢄Q*(>jrWaz='`ƄǟĠp]enFIMKn+D`v j>2Kgv0,F8;r`:t΀vNt 'k4y1 }Clx&sw}?̞\e%Kȃg rGc@w$rVXB0 E78IG O@sm%vjzZ \қ( ;#b\ѵqs;iwgՕ),=#>7' B FďxLG8gOH !9pxmvg:9/MDf(hr>C:0Zp~էс5tztIX\e'W%&].ۿnF- SU4*|ArlbqXpT(O[Cpkubas^_@9x4O|\`Y?xfI6nQҽgv5?cj1qf_*2gKC[&ӴK"+~FNcUfVSUewq.l㺷AL|q¿-JiP7& q [؏cɰTLvWh$͉B!]MǥA/ލcl=͇8qG5#C/珊?WF|#iE} [|g4d6~FĆ7Ho }rBzcN:3K:%VQb VSUmQENVc,c[|u7SqG m$_Mǿ"Mr5;sD |#PoSx۶!3Pz*f9W5gX}<}B]Aas{8>uԡÉQoٳakqO=4N6䆆Gl+!]6l.*kr|p~ы9?i9. (?$8tb7  f͒Ҁl6Eq_ۆ1jvspz}O͛640=Jb~Ni]6lhrEشW 6BDjgh#3]6l64a^dɐCnP`(U%=ڽO&" f(~7K@fRrwl)ф7@OE_Rb~OEjdy,3}Yݗh<я07)U&G'9%מb{ܓ@5\7'֜32sE`2=FP i͎0.pJ1@2ʵ xWBM;}^ eQ rI 6e9r$ s;*aO 5C/Wy  P;>#Ma8{q:YMw.Y^3%ɛ$/D,4Hɛ$/D` 4? %p}[XW7q RL#Rh湪9#-Z| ,%v &K3̞́\se,t7vtOqB|B>T_^몫 xQ1Ø X=:_n@eXpN+,Q\co 5aFU1eKe"u]F1lN5'o`S#/ Ě0Q2EA2CyPIqr QRJƀuKsVMvC<'HfC JvRtO쳂zo6O]K& dkWݩΚGl8p̧F6ڿgwmP4SG2mZZ5:IifeCa2#mVHm' V61rω_Yî\rfq4=O<+γ[k?&xčA0RiskzoջB?ݿSdW2Xʭ#q*Kb=4ڭaUƽUUF޴Oh;W&V%\A\N.cc,qD2KzgR~YVfGcu٭}564y©5S`QV۝CJ45y>y3]=G?O%]ىfcV'ē:r~}mjaat`=_yyQۚ~qX$x˱'g}v<.S"~ ,Ēw$Nn>2_ƊQ P F$SLk ̩df,{Iɦ@=.o6ly.$c О=h~ 0ڼc0JؠqPzr RH]#ZOO1ho~& 9CSc쟉t o}1\#Q!+P[-Olj <|kʎ2Fx|J+ 6ڛ{ॊI> bJC A5̬81PZLpqWGEglAM7knc$>G v8EC(aW:Tmp_ZYxSJ"fiQs|_3a6j1G'r%Ch.>>X%HI 'A'YҴ@XДԟlh63$T 92IZS:`u|\鄓ڬ{!(K$$c<>y`%)c&`sA$N>%44Nf& ~>ǔBdW2n-MkQsצ2J;dnoMoN65S]VXf>@#PzuN(M惜nAU5ŵ]fX$T_L6>shYyJԊjIM؟.UljQ{qz|sX",Eqq*Ā3hz&i2g]d{g;]B Dn#b+s&}(xLb1㉄ 2_2otD]v4@la;1cS2SQ|(Ѽ\~!D3ۙ;}ðsvv+PZZwͨy5a_WS[ߑL.CPTTl7t {.>ǟ56HJ'D:;ݛ6XVcE'9!1RM8oeJăCa˸wRO3hms";6e2*GC[,FR?s*صi));o9P䧡ec]ސ ;0y{MӐK]$]Jj%T,xFm8&e>v[>XA[)fǧp˧Y"V@Iazo痵Yum8M;q|"w\j(cT$ve%|ӛX:T~9˩1"6Ǵxowg8\N}Q1Q#1蟯oU@"I&*掲5_E?w?~ Չ~1] 끗kLqzTb*'nk -sZ )?k| msi6@Cn?2to4SI8J hM~6K#C,8].CoF_шKUbf1Ê Ia}L/=k(5-Yr׏ا@}hFy Fkb:"xdtTC}qyG6,g䄠}[bl90 @(A`{2zt/-?pl9Tw MMONc7p8f ^gtt !/8qO(ޒzW?? f%Λ)*y%=6W/1xYe;8'_ޫ\DO1jU\,ww'0kՙcBQFegQn;rni0TnĬퟧI YJ_>O4q^z cL7K{wN,!Ƴ准B>|gvwGLܱ gxO3%)Фk"ݏamP /i֩d]\ aR'*U3$dmJM>1'sa$u M1ӾDbGz E78P|5eW&nAڙTnghRޣV8cߗ>Y{z\mV!GpB.'v<_|= /EGm.6Qt$R%.)V';7;.2H1H'Ep>q=Q 68>6㉘DŽ<#Y@Zs_3EeYǏGt? |}n$vy-K7'cL@<ѥ~dTu\irhī0QA-ٙA*XG04֛X͢ǜCY a|'wqj8|2ŒX|P骢@}J4o2[1{HH '}8/QFGVJ: ~9uE#dPE~,E.*14xr!~divRM!w >ɪ fǔFy&zpNGNQ,FǘC&IˠD|c+yW-T:rZjаVY;+ç(,H 7$=GO:XZ**#nɵB"ZY3jwօC畾W"kǧm4*t79Ieo UOveYKY2?^hetqDq_m]f?՚ Ωi}jwۦ DZU>"& Vآoڿ#7nŌ}MjyN)xTQvKL,7 4 _[SI CWbvyuyG OQrWk{4sH9L 7Uڒwjxu~qڻ֋ᇂhؕR6OzbIihml)q1ؓf1΂D=U W sø7rQI&qєG1oˆ]tY$i$rZJ}7PCs=E؝!(k\VNi Amηv{ً_m:ȝxƯ_ER{.ey9ڸlh:WNOHVp-n$WJ%CcӮ-Z/E$U h>npqpF5t8Xbj0wF"'Xp5h]Ԣ'^[lS'_G1#rN|Oo뒛fx&~ ;A-ͫg1w|rMyX+hm4:>K#pޙ_I==gMd٬WFCAԮ<@ JlFY!p1VXnHqnkV\0|\ ;QUq1ea:.̢ KDu?lEOS?Go6Le;"ſK[ihQZQ=OjV,-bWA aSb ie\%8E݈Yth=exjB7=G1=:w@)'Fm1?i>/bpF2PR>*Ae-GzH''p A@5z |Te}.'沂EFca6:, #YZR4S|@Z;ol ۘ4B|C/h֑Gs_-OΩc=i#\ֶpY1K]o p92LF1܎&iN&Y8 Xu>iRڸIH"F?%J %ʿǠ`sFεuD_ՑO4yIӑZ}zqvg :E(Q|{!ZzxT8Κ(=oSVC#g.~4]l{7S#),Nഠ)}{n}IE+zCP/vMV8#?,tcRѴ*ř#Y^js i}5=Ol N6y+Pr2AΛ"#붩GEoZ[>=j:܃j[լdq 5R:/ڽ<<ڐg<^F:B6P1ڝsf<^wxB=#P/~9d^.ȧ߀Ǒ$E#HP|$WEO9WHVKB7 srahŒxFFғˣ6LZlt}rc|JLoTvEch clbgaJ(NNJ#{/iq 1+_!L(O2uAwuXuXG"FV)lF*Z2MO5՜yTOFhbokJVrLM<% Ft5&,9CUٲxܱ@W-kiq0k;&QD✮س:m$4'9P]'Nk P#bY^~04]&q_/]kM^*~_` F,0]? :>c\xa-1bߠ9#bFqD6 ~h+ =[X__qg[N #OV5%q0FӉMsmjfd`"1~8z}\5['s ;:_|o7| &,#1(8Vr&߉&o(7A#e[VG3 DHbÒl~j̭5K|#D^<c|IZK`a\tr+ $ SlK藻>,8OBJuAFlZqAOϗOW܇>YCkn͘ W Cо^_< AO1 bx>B͞'3T? %wfd_όb9^lY>_n\=g#~+CLsޛeS6fW4.~|y?jϛSG'wVȸ?,l_ן/_W<??_˂ \UኌsI4_9ld_:Nk淖Ř#^RZض:/)If9lyp*O_?>~y?̮Iđ@HwZK5e?z_ ghx?T֔HUR? fcQq2/jҿw6g_U_>.ﻋL*zƠ .>_o)! Ov%g5)6鉧aNXd^Tb]8m'W龿;,r\%>n=?c0$uo:xDžww;U֨ʽ\2PRBdḵ{œܠq,!cho2XǨdnt]r='5N\^ pnOW2qx7%=5zUA-%qg!>wI§ez-sI$m=J?YT GI $?aW1f538?g'Ȼg/?_g$+ 8O40>; l￘-xSH\Q;yVF܊Ƽ :ffoEMwzmW fM_ʽ|?/_rp{.?#_}>kol1KN>=>ϹΣ/|[ \$M,dEjhNlү߁\_#^j ^W|s19@ҝΐ4ThHp86I/fy6nr'l'oߧag)>Ov'_/>JrA$P|O6lNFck)6QҰ48T]2XI*He>.sgg'cpp~~۹c_W81xWn_{zce7y4TwHB63}JEGj̵h>uy6zt#evmX,.lY q`$l?e?= ~`͐?u}>/*=>XIFC ;uQ_RJ\yWxi7÷_Uw{fw2[W}hj QlNoiR$kK\)b~yهGG]\yCGϧ>`On4 5յFU=vW==z(c4@ ~gc5.c NN@fr󺼇w(!|_ؼ-)J~I~$ wE 5O*xsgrLXx}Ɖ?:d[1x %@bz<._:zyw< 5|=~͜\&.%yj< N/iki/*8VZfR΃W*F}ϵ*zxdR5KPٴOw=>.Cw+fW.hŘ.T>stream AdobedC         #"""#'''''''''' " s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjz?f͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛6lٳf͛? endstream endobj 371 0 obj <>stream Adobed         #"""#''''''''''     !! !!''''''''''""  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz?å;wsͿRN8j ҝj4i֌zb#xL^$4赹ru-@oq½qָWjǮ^52<*%)S}8pن ?T1[MP)s.{R3#n1ٵӐ"&M{CU x@-1k=M|8KX҇9.FsLPRܶR^c~ۃ *$jh˧)1Fϊ v{,:#lt}w%UOדh:7_tEj1CQ)<*k/L|C HJPJP0,ֳUTЏ@Mc!傏&QPT'aƪ9FlFHʡFQ$x ~ؙ$|5*Ǐ((Fbzbds/ƕT91jbFv銩crޣ(9ft.P#5iS6n9|]^ٰ͚s+(Ia ̎ Φ݆ 3'^s*KEA<T@ez``9":Y y9Q\r''"7^L |)̋ʧ#||YBk`hi|ˏ2FkĸNSBլ#9~ZxŖNnF} d{.TF%Qp :һjwP0̺<@~dL$bz j k=V;}wOu%jѨp}I٫R\;ċζHh|Ko!hꌭU8 Ͼ]pBp1oq[+_C{U\yypD]\W핛&R;YAa^dXx|Bw-ȶrO\4};@9Goie9eN#c5@6lLmVϬDTȌA5+ S]7h XHVXsvlٰLN@A•rX7፳90sC~^ޓzp[gf͛ agRp]|j W|Z4;snjc=A}?rŠrS>7 $#5'禇eq)ie`ҵ9#rƽvnWSi1b;2H-{Cڱbpĥf@6g\hGǠDBMCRf5^D(.XHb)Z)Ljh5͊0a Tk1oރ  w}tc9{+u6YcO:z78wfXvBEl0=L#S[ek@`L4 2264@OHTO2;.dEȉyc[ wB7\4QYK]-kLZ++1Dv54Li_ cnedž@ùfWN.T>gɰ87Юt|*2oE#-C ~XÒ|hwܳaO(^c6 649ĄPR@dc=e}}Pψ>o:sN>m8!)=NEcA\IXOYyi7[Kɧ&MOo=Ǥ́d 2qq3 /cy~/;O9m>uMi8?N]*|0 z &f=n[8y]I\Hau΍O^v|Tk}(20~I#e?K 1̓ͥG]ޘY>Z 5MxE.n'2!ɵk~ r/,k_צyoJAwMOeQ>_e5<f^8GJJWEdYTڅ]@E,5F)ʙ`ı=N],r5W;*]gj?usC1`u88f(޳6l]oK`$@A&??\8S}R>GKF'N͛6BgooXIEVCGqJgCu5qֈ2/}-c@{R~f͛ &gccizu8c7ݝ얳&Hh~?܇ vvBD|?[f OL0oIEMrI[5 "kXPRΓm-W|M㎧TrN~53<4O[+\EAu KofW`wdUM#l_yFSm{]XYaRwQ}0x8ДLddh{۵7 QrL-"vIJU=R|Am=6 +I<1=!# .XB[k2cx~;zpr Fp&2!/fφFbQ%!![v4c I4qkmFT0>gNOB>]C8|[zRn1e/AqǑc4Z>0Zio& xKkC+hGȏfǾ_2HY]#PX.~%t#Ղ9"^M@ğ'zJSLM>u9Mk7M<2! -b+^[M:m6IBq7u1m$=;r, 7 >凞LF}cu߷|FhGl.S4֝lmy䪰]5yTZA7Fls|&`䌮\n"% On]P{a8>5Xs e$Zצ{ZtN嚧 FDi!ܑIh*p$֫8Hiփ*.\G&䶕)e4ГP>p;%c^?;ܙ܍NyrZć)K9jYI<i4>lWVf}&TEUO7ť[Vt\;Lצ9$˄ V{t`@flss՘Qe┠& o3H L|F[lBZ6J@Xl:cŠu9Tޞ9jNX mY9cmfS A9to*>*Wck7ƒV()PGїTRU*7de1VQ"`(04F8p!OCpI͎ @ތmز"uAN+BqM*22sv#Z 0KhJËf Luk6ʫ0p<-1 /6^Y\L $eXbsYuW46 3zS$`wo$URK_U 0q3 kdv7Yʿ{$ 4 -fЉ V:[_\J*Ȭx -A뛉GWp~x ;q>G}lUB2[u 0ڕ8%1M:U nD؞ pI$dkqZR8-MdS Ltb38e k LnX;j irjed6TW(PpX)I>ʲrtci.ߢBmQuî437Ol؈5(s[Fr1 " qƤ ޙu$K5' 7<@M07˦6UMi|p$ F4c,i2Ӱ͚Q+zeN9ǭ%, KEXA! zbL UF)&n 5][OlfCc2T"18L+蜎68j{dd:}%ݺ|%ܺ2^}Wڎ%PK_ rǥ;Uu>6QX<nJZc-溙 K抣$ߗ]O&W.-m䝁6˖JTvp^mBiAcAVc@3$~X>^H6P,koALC24Gqw4# =:=":>tdNэɘhΏ-*NJW>^ݧ54$Wηezv#Ph)ҿ/oP"K7ZAҧI׾ @W15*'iV* qBFEN |i  V۷1qW ֿD1mWGNcЌ}v'!+$c78gbn'}ULPPlqj+N] }8leLI /RF$(F S}t*ks2=3`ϭ2rj`'l4KSCc6,hOLyVNQhoQ<&[vVv6d_g$ş5LO/ᝋS"wΣ1B:\άk-q8'!u| 󦭢2̐W!Ͷ#P!'A=JԿ\EpzbMF ]<)&>sniMoByOc\1je!Qu TkHyR3c-?,ЙW{=<t>$x/Wr藛\3Ƃ클˘-nVIӚ>˼A}눋>KQdH"M>0%V6$ojzlqW *wšq,`+LjZI=?n\ӆ}fLQ͏fɭF"oV7eVٍzm9ҴcRrM+IDuڸh+2Hlk.|޽lK`G|\0۾ ;,2.nMu"D>؎Ml/ܭ).?=rwV':VZ`4]M+@+:5LH3puAsCCL^Ji:2x1+]ג !9'"r˚26,">XKW͉f/x715d:%tڷ3s/㜽L'|Q1yuL߆\1|1]nyϖҐEϝ4|k6->InF޻ vs6nU~E)\[aA\tˑGzvlٱB7;FZ'^8Dh1:DiQLOe|/_hgD\_eTXryu-}j[)#fG4Lb[-it1+ŭ͛6 ɼ F"|a 0&;NĈϨ{ɇ*It'ن3Rpaք=Ǥ#N%@.իt&ʱN/qqAla$oG#3q_ brd=cyHaȌdcCv{T!eeSfc^l5-(»|\{jf2zvqȽUa'9,]ޙe硾=ƿVBk`0W+\Jw6fQTo,>Me$u|?F pvo]f#h(H_n,H=T>'a~i Nr)s+ [!4 ثDvEvH\~3^&G%k0+9 l 0G P)Vʩ*ٿu͚j*0U@oH#L P3Ŵ\>$d?z:#(_vlٰ:bR!R>9|J8a>q4GM8fc>q4Cf͂RNvs}486,? S'of̓H߉e cwèc486" e15*mٳf{y`+L[|Ge"&Iy{*S$O?>A?Mbr+E&ӕXUhA1iR=v=&Q?~^{@vLae[9uc/sv]IsO)ͭ#1}RynGvcnm4pZ~8+=ԉXP|p s3K!'oa]!wzF鿸#;-[09,!Q2=( }ٵZIh%hR;}O(p٫S4?PFhVdܤq/5/#2x{G/C%q94+Bp8 qm*V0\F(<kcďb3#-/l湳fYzK{y'Zn*2EnӸمbR3gIG(~a29H_ɾU9jpK@esY͢'s!TdOW<QN>;Pvx2GLtR+#GCP|1mkR8ىF8I@źWf\ʿOfR줁^k~N~$#/1>(X8XG+ᶁ!qx] k?V ҍ.9# ]ٹ7b4u>'ImM錄츥Ek=&;^8=WL4-=ga]|;f"}zavC 閠'M8Ӎk IlPF5A5>8S=ҀĈ4X`M)rmA jw銃32kI͍ۯltWT=+<q7h>˵30˄ דٳ`TRxf؃@|6lJXb hᘎc7=FN4$!?1#Q lcBqXW4FAvl]Z쳔@!q`rIΪP"#C.E>ȣgL`Ȉ'aԻ]HᔲL12'hu.6r,r Oc҃o;d=DfL#hjEOSo ,AM!V(Pj_̝ز8ci:ku8uqk晷tgDm>(JVVfz~2H ٔOxB5z9afq(۷ 7q,V)3CHۃ4Kd%t;½ǾIWg ":21rG9&1$?]g&Mz<^&vx:bi^BpHy;,+VsrOhD%.kg4aovGB 'uŤ0h C!:`I"޿~?˪$?s5AeVg)tAbOh|QZ`z8*2~XPiq%Zoו䄻ief΁ 4abSlBX'=+ |AP->)w=nH~>`kZ_Ȭ_F_M2UƴHbڙES\;JEqc>c naB+>iA2)862lWmNt(: c ~i'X=ȗj"0!8 OLr1ԌSfl6 ۶8#cޘ$ANNl}wcgw67͉͞ExuLdkV߮JX`#cA{8f~[\ٳ`(w4Ncx޾ɨFYB.Гto<DR?O.}O` )B|d/ٳbyr*朿ۦ,5AaMg1OFC3(? xǓLe st3ae y`c faGC{`8+SYt(❩i"*GaŌbxZ9U/ImrбSsq}=T4Zx"6c$ğ|OSjxGK<_c"|urTnIYɏ}-?aJjz-擪7BHQb?edz n΀oVm1|{s[iPuo.tZx-N_Y|> Gݑ9qKScX?Fh4o|^Y^42AӐ=F3w4GF)ԵLr)\Gɵ5 )kK#w24?%D_աf!< 5t›O|nkM\ږ&z.A_w|9eb9x}ɺ2s$|)=t]7ja䈫tDProï:m$cL"MGapԍqCA[v\l%JdCgN:*}iQ2wsՃ"%.F{$B\n_siI,}Ů$=#W|k>)OS[4>moLzԊN:v\] eoShv&o:OԯQ`@q`t"J־ c6[n*1JLF7 6{+ƹ7l^+S7aB`(xtqPxuv.LjYAPTv#8 !ky* Ƥd3H_O2>Ѩ>qZRs Ӝg{,e -]Qy @Gfod2E|̲qPZZ[ 0+LG2vZMy,P eRIؚt2K4s&32$%"z0`*}zUո b̤pKzG3>8.H ]`!f3䧡*+C74V\$(`dsZLIu6m 8cmJw1Xb- c;Ɨqb }x}{]$a䉆#Oν#V>}j~YR 甍vݯ4 DŽ=6m;Xl4tZx}cȏyF˷|Px*{lqi<Ĥ諾Y-&2v1$LF#WNH=5^ۚ)$ŰdP%V&fεgwGH[+Un!/f %+IVJZw'#y})}NN4Qc{Qva`0rG2~_> >y@Ot13YCcORmƣP3p e@z(=w<{o;z;?B ijRN1lhc|4?LgTx57,v<1(Ƒ3JTunO\x_ 7W^2o8ǒF+ O c꩗ X(EnV8 YC\&A n`-%Sj t؈佸fE{{K\un)CR(~B_s#ޠny\ƶ ָHP  G\<a} a-x?tPېh~h+0ax*؞Jt>8*qR#N^):|t@jS*n\ >!!xAV}mLhMW_mLc]Z,)NP)mwijؼQۦ5TcG~X@L Q5kN[#)KNڸ;w9\QqZ}Gܼؗ#nc\ؿw͞\R]Otq,srjJD5}c@jzd|Blyt:è7Dzd:o6,y?[ &ȏDM`.c{ jj0A#tRu%Zpc̟g2_Y zuCI x1!Њn2}6>JkFc2@a[*܈`$u%Ed2SA 2O|iw!Ӂ5t 5M_j6}Q ɾ!yQ,q7y+]ɤ5 rR{;Y @$ j5AL Ye\ 5yne u\yWXfF'bd7FӮ5=RLS$[ 77~YY^CmvifҰ!>#HFijiJbe6r)XMr- OҶ&OEWf.Ts(--헌,`mauAHޚקS6d,+Jwc9p=c#ˉ8KG1@&vVo ML+H&;|n"0=2THգH.$kX׾9ι8_|oG[4\n prwl#h }8Xj|^u޾vM9q:}KqԐ_eFB@Ů$?H~[Ǣ263!W9qLw_}3/‚fڣ2Q@(AoLy-kn5ZJt WOu8!i}8բ%%YN7ezŪKk >t 8<~Iﯽ~Ph7OV(/ZgN-=QoR'cដy90 3E"KwRF2X, lBȟ Sgie 1 YV71W5Y 'tL}f>cY8NH#!ޣUtٸǿD3:4Fùx}#Uݜɷ_ZWdѥ?zxn&x|<>Czɖɬ,:F3ܸ\FC,Z6}RԊ;x+{=ڹ;K,o%F"y4(DOb^+!gڿ"f\VNޥIt}JoX~ }U4鍠aN}{t΂DPzb8㈈,wkʛE>#^<qMN=22{` _t;k'Wz~D.!dl# 4pp,*7PU=|060WބJAa3QlWna(I7OڌB珮x^9y7!j?htdy Tr?NS\u_DzHG9#)[U=+'x`2>iQZ@]O a]~hk`>Q_nQӼ<+a/jpp "́_0Y ?v6*9s⣒=!` 2Z;`)D? MS|eR!c7@0A4-E+G."ϱEk?TPz Gn:kse@qk\LjEq/֘a*>ON r?,0ZR^iEdKy,i.Gc}I0#qF T0]DG:x.Lw:䎽X\R1Z If=@QXpFX#(t>S6lTff :38qp7ܞqaKa˪cPM;&bmLjZֳ#Ve ;b:zYzS-om+RI?1W3BTN.h*zsP]wE+ \F$?_zZj0[*ω8cy̛<;vpZ/ u =A}_ʳ<2$fv:}*7?N6vn:P vS J7ΏpqkǞF[ ){ f@ۂ{^)3Um$nωMr>uhqWYP<@9|{?)hɦZ!>2Jv&H|܏fA<2€͈?m=b(, 7)eR|0l r Aq{[\7p08>H}D'c4[('sL:;+JHv@V"|0<172Đ=xw) 9 N| /QM t7cc+^!3L~`aփ x_Eq<$ U838@j4-BRaǷriPoW"E)`il6ț?wDчNVz%6V1 tz q070I8%: wQ? V|jG}|J3pyz<3֡Xg}D|yNY3С)m T^rӨuĉ=ljm.na܆1{NڛM:Lu.ǾC\HxQV#y2sKZë:``G@N2܀9bcL{1 2匃9( qoSr6LQ6ĉDDuT}H޸)Ĝ>V3cI͕ &N-(`"`*a rqԝ#M9F'aC.jO0'D_ 9ԕ: !]ÿ8)#'R$Q4EI9yo3qFc(O;V00U]̶f +RKn&ةAi$w ,Q <4M;ӛԛՌ^dj׺(1JSTEEi}GoX}=,NM3s;h2zǩv'mZ}1J ۹8K e?m#7zhry~9^GRQL^ }k^*=2q0cmQՊ\-V݌:-@U ~2 5X|-o $w!<_1ܛ$'jH82TOal|=s?'63/!19Oyzz 1T뉃ǹPEJ>E;Ga\TpJ5싉!nƘvʳ z~O2Mm"RO&(N| Jg8S 2MK6ƥ &Z+ io˄ۖn''OՋ$pL#$S0:VJ} &@'C(Ւz>]R.$rQ5E轟 V"~ؑsM1/Pe"Ds\"nXA((f2vCAaZqzxؙZ"Agֈi`N@(olbLk0m>͉k? endstream endobj 59 0 obj <> endobj 60 0 obj <> endobj 579 0 obj <> endobj 580 0 obj <>stream HTOOHQvh̷lF{ȼl ^KX̝u$@!DD\wCAQQCI훉vyg 9WW:c]7=b_%2CeC'”;[mWkeI533Y+^EKѾoˀ U:GEVC_F4H|l蘠%ҠN6  jMFq!q6oa'}$l9^P .=S/`UϘ iAQZ[( g O]Ssb[AC")gSuf X2ȽxN wJ7Hye?OؓMSTz{kqeϮaw=z@[R; endstream endobj 581 0 obj <> endobj 582 0 obj <>stream endstream endobj 583 0 obj <>stream HV]lW;]٦&LNlnJ¦6iq⸶f?k`?XmR(6MQRy@j8RP9ww"!Ou}{;3w  3Pw| _r]Uz.Gvuh&"'a ^~xxl͛GzGzSpzc''xR;xS9ķ jަut-oywl֯ܧhU@'p-у'hik4hE05 b+EC(f߁XD ʅDYzZc:lEƔGJ1Ƒd=Q#UYQE&7!Lf9/Ey@©6%ے Np=Q)T)p\4%*H)-eC Z([mZƃɟy(ۭ+"tg+۲!($YL"L >֋ 4|2@;8fZ3#3!+!+dQN<*=vZżh$獤Y3n/4@oލ{ڭ '(CTܜALr]D6ΛSP݊;Qл>BG_|Ԓ{4g0&^Foy2v-4_I1S)Qsõ7ts($^˃_K_ ;Z'I|E$@v(j) s@c籑PsG@W-2ݫsz z=3ױ_ŋĿ{31lRusz-N9黰GqEVQWT40 1OTFwixY #n[yt&65%E'xԞea0,gW{jʃ>ø#V+~lWEimv(&"*f{i{P1k' )>3ԺT1OGcݖL=u%}/)ĶoWag\_]!wPM|MAu)JR0ଂ(XSMjƴ1.,SsM2VpV)/q&V ZYRxQci^ F=\wNF[`=dH 43g+I{u'/USͲg42KXku]1kEݵrX+]kwbb+\ FiNxHx9QBD/ř wiRO7j-;C~Q[Wci5\˗bj|G_.=+yN\Wc8K/qXBx(R(e ZophhyM8H 8B6Eֆ4Fыdfv7+wôLm*;G'[ScA=>zаd.;I*He߱ޝp(뻿mMa:T{S endstream endobj 584 0 obj <> endobj 585 0 obj <>stream H\V P>݅U]VY.]T0|(Ey)(PЪ!]1Zɘ&} LnMŎ8j$bL:If6IkUYz> ;{ιXqup5ZѱvQϩmVj,@it{hmAEUmz-֦oi[]CPnko}"C{Vy@UsQ<P? Pc]]bg%~ldžJbCnmAkp2y#*}D$ƺ{3x  |[Q&)CTKנU^K'F9c $!y+؉v|`64I`nA <U)(6 !!S:=_1?#.wrO6XG/@:=;?"ueRxF M~̯ >3$ECd1K0|3dh& JpfvY4BM6RDz FpБdJ;ZhHupmm!cr nTX}FgL6D"}tDZ4dJPy$&ElJ06;GJ'ˍش\oALReIO o/_|!:7omoJǁXlߩ?<<*]KBJC0RH@Q)f#W?EtDo*b*_ z G$6HE!c&ܯ], F}R,J0aLL2+5H4ّ:fxc励 :RfUc $s{̯8%Dc$z{p_t3v##3Ň;H-wxsXl84.IHL GXql[iL8&a(Oa";Ϝo? X=kqQvN<0mx}'e6bO&6(hkB?DH|["g xl < fQE|T%A N#:4̒')Gb8t;T 88Wa׫j{+# N򽪾୐2H|kώ_?‘yTp̯~f<JϷz흷yjj{sC I@H 5!aЊ>|m} :*kieTm}o)*՚QZRPXu3Z>d9ȍJgo߷ssnm*H .kGHWb_S^az }*_\@B>P /:ueSmdO#Z;b(,BYUPTEe,kl\;,muj䔝 e\ww?Fwj"{5_.՞YjHe6Etnw8qXǿHsl*+<͸TZl!6l cߘ|B&X+Ї8eHxpɢvm&@א[b[hU.G@·'WHq ōXs: [rsa#Z: uBhW0'ȭu'غS?127ͩY> 'ZNWQIu7=!=k1.u g"2B=eeC'?lhLg8s<ѰfM:GQO9;I,cS[hOO|PYe.J3$m$<!mv+.*.͘_G4Ol][^(s߽yͽԽG ֭/\(׀fwj};6"@lDfVhZ֡ @!LI%.rR]/tHi)l%]uud}_ȾԤqHoI%k84 z*bw EE{8 ;4Q :w ;a7a=0P٦X6=DUf7D [vleM Zdir|:/Z3n\:qYD  3ϜֿZJV"#O|plQPdc gYx&Pkܛ^VwWۙC9 ,e(ᖫ~d*hGh+G\̩߻`ɆMOJ{<7oƕѯV8mqǿ%C$( /E V\bod\kpU3嘦|o @!u (ܜA] }aaõ+)De<2Ů7q^-tz9*_O wZgzvcleWW0mp94 Į3sfٞU^; .~ b'YX yHwel5 n.}*Eɳl)Rb+}zU;ys?V5ի{ĘZz۩~5 M@FnOFcnI }%v5SF:6 iz^Msk>nz8~'첤 n ^ӓ 4zNMzB OĩV3voQ9qy-6"=[CN\L"6|I# $zCtoQ.$0QtAp%tzgb*CU~yu[>-y]60cN4$ |euB7B }K4r{:QĶ] 1IEx@Eu]as y0"F`tF-]56diM Vm5F*#| *huMTpbH JP#j,MDI̱]xeqE(6]{:ئ?~20˨_H8x6 [Te8k6-/Wdee8xH,\Cm!UjHFp0Sfkq'x>tZLfb_ƗWi&j5UxQ`qb]H6u9~Dsϸ@ ͚"~M6]iϠN#ǿ)F6D'(I?҇@1FtM$7HBYja$̗D_I &b/p k}ޯqJ>J`#~/-ŗoO]CoO+ҫ -+\OIUib+:LJ?--uE%?=wg"Jbmրq>}ZLz/Td!;4 b/;5rl.:=a~`vwv>gf41`}hآ-jxwbbp\B/8[tFɵNudlaa1G^tc(CkzIOQ)Znnl*׽Crr:=BO`zw/S, y^hmF$Ny62ۺ ؓ&*;#F\]}R4{V[&:znB9g'&}Txg6w)ҢIo߶m!~΄$Θq2FѣgX?2;(M1Fbe1]cP$0B؇+XV5ήaWM18h b̵SsespnKƜC?~ѳޔ&..ՂΨb2k&.HHh6/Tb8Vt1e4)9?̷l?"nWL\xCb) d{\Ot=ҧwmBpQ U$0Dane_ ~+HKޟ*bd ~Mf0F$"ܵ[Wﯺ:vM}_;+w-UbxO7m5 ko71WС qj\3=75%k|9M5sc =ޯ~t.*qA<1Gee9UATt> >i@b՞MC2Y>3\);ӬBM-nR읂~2Ept[#Fc|-3֑w\'#?<)n4[BXؐ,Bwߪ?*g>\Ѹ.lTrVnwC^Q쬉 oop,&Nj'?.rNJ&`E G+w > .36יX3^Xf>+5MMi3Wب*.d޴sc3  :22z mGS=aZb’|0~Z,gg- so,Ԁ_MƐhY4jWQ_;ӑ\.l#3m_77Ew N My=pj?>A6C#lRjj*{uA=ESAJ?2RCP9m αD+.ZLxׄ5DG?BBз Dܷ} 2 &ea±.zXG"EB(ozCgPl}1X`ۡC=G/ - л't3D؟{ꈒ`8fT8(iIO򣬞ô}RҌhKP;hpָ!6S AR.짡NX1ys M;1#F<Ꮡ xS~!<遊Gh;O;٨DEIԛP_JJ~4i FieHʢQ414i 4r(&QM|4*4fS1͡4Jh>=OR-rZLTIKh)@U~LQ nKmf[!IizQ?F߀clw %U,]I_IM绸=.J?K ܿ.})nJ_K7;T'+՗q+;qnH;̮aw/HWf3i'λjVfIӥmԗ/zx"-"y׆y*Cc FT: F~SWIMZFlJsx^o?:h脶BF cӃ}O]On{;ݽ>c ƺ^6bzy endstream endobj 586 0 obj <> endobj 587 0 obj <>stream H|V PT=.{7," "k1U|ݍAYXԴ ]iҌISc68Q$%36bGͣ6괙$}6>veLy;= @NǞ?c[]aRmt'ړ[~&Y&*:i[ezm}WK3|Oɝ[R] ηyۼbx͢Ւ8> [:œ:Ü64wỖqޮ e|0^` VXSaTNP$Kσ* = !YIX1 D~8sCO d tUvm 'Mv.p2]sZb4n;c| Z}:[Gs+gm>a{-enW{w6ΙH"i|Ln"H\siA{XyuǪZ>c5Vs.GצG٪%\nq KݼEQ}>OcvTO@jGHCd?O<=OG;7/u"E)KxaǗ"t!OV8X> C0m`D} %z`EPc= Eǭ^0.q@Z0b8<Ȟa%c0ľ^ Q8\g-23GX;9r"a`2jcl4u\Tyȵp2Bg Q_غuЛ`C&=QC rx|3rbX zG;;#2J3 ' 3'0@-7s(1K$'|qp[y"۱av j],ƾzWl]gz/kQBf2("RUVea^ ,*Ҏ@C =UƑ}fP#„ ĊMb&bS˺ѧfU sV0s@P#06LŒ84*k؄q4n.9~)O< 0 pe@:5"o4= %?tt[tj!BN":- VI]OB!k  /e5]|"m 6JR#  *8E"9h~ Xߵp6^:KuqS*Xx9H%1oB.|;ntڗj=dßzo׀.zAk9`Lg\*j*G\*w|e _˔V7̡+WZA20b/tw1't]9yu#] 춾ɮueHx0t Bҁ9L >8JgBWySU YiKO{ZDai7jeM#t "Ӌw.Xi{_8 \Wl۫Pd r4nYZLQ^Ik7R@1$CE,PTJRKq&+R@%4_]3-_XgC'XNm]9(1T9doj>&m7%vfϾИcD*3TAgQ+ N9uw+UϾ hW\̢mKg B&VRC ;G@ @X'wMR BH?D>=$C0"0Z&YNQD]B!8АA^Kn50{kȎ:$o(Cb}y' ~=Q 8 d_5u,(INutSphF+*HQ͌῱!sFv̞|ĎM]'U^r)rgHvc4zro|W{PSWso!!$!  XФjW;v3];VO@"T/ڭr*kWwm*>vvv½9 {|~?r ..i` ŞLmp>\,!* Z Xo1V V1NS}v(]H֪҉۶k`2eJQ>f1!(ʽ{ W{* q+8]7o9 Юqw@G ā?"K2?7N&k3l ~SqB <[p?=:x'(W])ZI=OZpc}wg쀘"m?Ki>F)=*("m,H;)NzucB^AgvIZXբoaii2ICVD,.Z&"J篐4sr yMdQC_%FlnMV`'\Gk0Ã:~"k"<5O!ܨW>].qk98hݻd(.p,hO=[x1 ͭ 990!S($~B~cF?o+H/n=MoJC3ݻ+lM@,6p\0"ఈC<@xc%+>taus|♙KF/jJjN5j}3E;ʂH%E?*;h_>޶qkWЊ =NXzFejByh6T+V)0!u}3)D_CfMV168#F S|xOrK~wQ˗,/{ "ݭSi%Q! Xx.9aV* nP"[c@p6dIv(|0qZOgIy]})61AZB0!kP^x%K[/J7Xyltl ʑ)c%Q'3aƆ-a1 Ư@]1Ė{/ yLIx$P MRfŘ55A/%{N 3'` ry&Ӂd3V7_\-I(6ZU7ZvdWc*e&v@k6ch䑉>n<-<U4 />'[Q嫃uG®zCO}-nUPp:iA17V/{l6A&ZV[XPp0 E9 YNZh>$..*(3QuIq%U1<FU4TĴ%p1 Gh:Q e*JP} հ!F);,35HW WYm2:}Q|}ȴ=*Rē A;Rn{l@[| 1wBWg{ A/r@baF6bd I*1(w  P6C@Id*N}bSy?L[oWhWq㔥ʹt}?[{j/k֩ 6'.2W*6v"䇳;uJ}DϘӴuW eXf8.d7(P&ӻ/*ugR#foVÿQPU*#BwbHTv08iy`n&T1-zi֔aRuf7R4աl=w0W?*|HA%xUut}1 =XB\E#3tu ՗)Ƿ%^C F?.k,%܉/I){Mԕ+7IH D(iڇV奂E@D (ZDVTZu2vnNݱuםJ._On$s9{}|טOwo#C^ѐo( M-HCGk/&e}|sc$ok -|F&T O c3br5JGcf{؆k;L4*tӪ_Rj֟?@$&:{p}k!\ ~@h5*F4tis4^JrRT)K.F@ҶJb\pGK:DBKp>b3GXQL0e3{d1w!!25 5To4zQD0=6;lh 5~>Kr6ԚNlmd2KLξGtY5e2v^[Lٍ#n)/:1M#䜄^rNׁaQqtO[d6Zj/@BHZW;=#0#⛲zr /_]ٲd t/e~vgU'ҿ'eupv@T8ҕ[]P7) vXzV=ZVP5+בeSNW+?z,#uf=FIAK7V7=UB !<r"ڠHUˎw GN0Ĥ} 6ҁO+5lj,"6Uc~(}Cw52 Ϙ 4GLf^u]I܊w|Zu0f.bFa`[O=tšIչCʃޑ|9c?\HNmcǕՌ xon !SO 3e_2`Da$9sxQ,quth 8Z4? |t)gX x@T({ 2pMVu-D7u.a(*7VEk9@AxUeȏ|H Ġ*¤$dJ`͙+,"a6oޑH#]QԤ}g$kRVKddlgIFF]O4c ]bnp~]g6u.΄,026z'r`aU<| )l:ou0-iձsGBir0xЄ*UQKN + ,cY/!N$8܃'WqQ॥vVVWJC{hFr$P&KXWfy0rd& 6p =Wq uN籿WAlDxs{siZ{|T\)ki}sթIVM%X2?hy cmgm5F/J&m^r[ 31POPM@괝%KԷڴRa:z\v,;fͅM\$f}fڿ Vml[]v93dBR.ܭʗ]uRٝ*. u-,t"!8[,QT^ʣ ǒ o}6k6_!IiI]3w%Ɍu#(Y71\^O%m(AQOLZ]+t%.hoo: ''ؘ$>4 es"}v1OKȀ(y9 G8/&TDY]w\ #%Khpo|e{7U6Sl9UZ-—Q9G9W-O|;koQ+jLK>n!˲khW'y8H:%[~5|-}Ws70yE.-"N-[TJ Kp]VM0h]ۺdjM!ݖkq*ko@JB4gC=+}_IqЋhԘNuFK@`(qo75%_v|n6`Pd[|8zT?h.ϬRke'WHݦO>éYK ɘ3*&yD[L#~sΫټBɖPUkE6BZ'*|:}<Rx'8I~4=1U-|a~niU3v{hWg\IQG;` 1cW@3џyr䀨g\T=uO^:EJ~?s@T4ME;C;-怸xrF_|CNO;FS0^Iʿ[̾<{N9\2ԖiY#!Mxr!C^J^]%3iNl hdq=mqE%Zc*w, eCJ[A ZG]Y(h L &G%?B*>M۴M)h mI{{̙3gΉt^A:'>X/޴zz|ćU%[àgN6ǺYqT؍ dnF:`Q\Ei b 92ihZ`\pp?뼞-1Npץ1tIi bNbij jdΉg}C"tw:Mͺ|laYؼdwDz#7eЃ#5#!Z٬c?:M ;O4Kt+G^]5ҟuG[W/fļ|XQ3~h{cH;(-TX0QN#:Ez1Kq`l/1:q%(GEwgⳈ(vn7q?{D+2IVߒ$w)-@*eR"X8kcsmxږqN3?k俲:;⦥)^Œ.5õ˳2&/ \* fī<(vz/R'b` wIGu+VI+z/43Rx:JC+\vygTWHa5k(C֣ [ a<:4;Є'{$BO!{цv1#ƪmk%7 endstream endobj 588 0 obj <> endobj 589 0 obj <>stream HlV}lS?g8Cl 6JJR5 M@bAIGZ>-Mv0XѩЩFPKW$$J tlS1 ws4Ks;w30CHP۰5ѩgluhMKcd >g֬\}@477&p}E3NϛJ[:`qֆz ͽ#nRע o MG]\k/`*߇Pj ;p?oi:|W 5#Ժ-)vg"C|![J(5J`INsb?X%74w"s)ցUe +߂p@^k zir'^kNV8r25K%_ x+rc5\Y6⋦H(‛WCjS08Ǚô0 xm0kZRim`aw8xuMvfqAWrqڂT+|\(HyW$ 7%DuV`V/ty1q{ܘay0E7hr,7z7ZF®Ȣj`Ы)JBA`pWCs˫ý.Xq |ҵOnUbxr2} {d4)_ d(b 2֜<~ YaW zV R̳0K8gmZvFf'={ƘyF3S9r,ZNbiJЕI2e|TOՓźldC Qk#mll=VĹBl hb șh£=BV0vK".^!!"DR*?Zx Ј}f q Ѓ 5fXrC&4㭟R̠f`1 St WcԄ95A-<ꄉnw[!$HneGK[6JgdGW⺻r^-u} qI[o)$[|kNħa(UpCG>3AK9AΙIA v4i"L \gZ3p;ŁK O5Tȇy>]]χmQf?_"mi;=7N".{Kg/?yK%v3%|r ?}"+H( gH 1@;ze':ƴxw~ٌtqT4t=4z(fUè le9T*U^6Y+ jL|IJ+ps]K48`т#]ި@} O)۝?,N 9m\X3km .L hD6@i< ȓ0Ҳy8y0@X5qqq:J\ɜ<Ë4zk!̌|}udea$ ݒmݽ|uRܼa_hEofw?iG CWD0.M! %$x5CA)e{ G%N,J7Xa԰bʶwmc:12[~F n&X.򠟠rKodB˯.nsLsuJL^IMy*EtPHET` Cb + ]h?T.͈r,*Ǐ?|Ӭ/{_> ̜RQ5R@rR՜Zl5jq2<0Tɘ#[?YCefVž2y@;lVEъujQp'N޾BZˏ~CK%CˮuyKEI˞ecȩ~qk(CQkw FH,Ѳ".( .H%V1^(UzohDFZNv, "$=0$Fl#E5RHi*`xeLE DˌK|Q=UXݻBUSHP2z`ļHwjnddϮ\PFWlXM<& A9z(;!lAFٯJK̪٪l Q<{^:Ǔ5;.7l}n޴1?ZٺS Z2o2^T7ߪw0v`5ch|smdQFŇn~#uhE*7HFPh6G)/gQ(RAT"̥\UT[,9h*T40V#KGD$S',[gyf㇫7HѴp= 9ΞBƏ16jډy5wOǙ!fJzKL7~NoeƔe\NJ~aֶw<FgH {i?]n#ohFT(E8]o0] ~T/XSթ[D5BlMJS-TQ>vM:Jd1+t6hfdC#T89RIcmP賈' 5:&uN)MR;7)^&{&r2fm.Nٮ 8ڴX9S@/\{Y:/ٲvtsBkZL#X[IYϭ f/78<)q$X $C!g;`a7R)AĐQr Mv=>  QxTJIq8wSGATk" #;k`y_a `.]OpZȧ9s.lqLOh|@SXs`Z\y_뛚YYL 06| }q0^ҁ1"P`3ZXr6|e>APD_~W9\NXI`R endstream endobj 590 0 obj <> endobj 591 0 obj <>stream HVoL[{̀; !l%S)PM(?)dHm6&͇ݚ/SՆ1V,U#-Zh[3֮m:i[)QS`jaݧiιw}da*ZN޳3dz`thlV*_}bmˤ0<_}@_3Lwҷ MLټ׀ H_t>:*s%#@_ i@{ye?E-}chMxgO\2OP22bG :3aPՁ^)仑ǟC#~ ed_=Zd'S6/0F 'Xhjqc[2bFlh4'% B@{p#h{B0<&'e|MP zMhZR B_ˑ䱑l->5=(X,yL1cTҷE u4 4,ȌtKa/l`hR>Q>QJocF=x}VvϣD<r 7fX*|nv@g0^zyׇn=|߾|us{vI`?RmUF0A~t8[85yGVd_O?ER=$qϡ &JaT:l =G1Nc#T{פ^} +QoӳZ0U`N%~;ت\ I( E2=s^a?ʳ̙Ü«)LzwQG0+-*Øc_%$zxA|I1?TĘr66#Ws(^p2sn^c39%xΒ$S(.w7i5ͅ9GitKfynkG2].l 5[Q26l,D/ YVn%Tn,nG\GRY!iRg(Qb ?Pb"NJxMª"3&I9c2IΕM#ᤄ$JD EvZBwJ vHp:sw CD=$f]!(rw\to(Jp43%%IϰHS#mQ4dTU3S-Y(kVr?Sԕ,/k⫗51eS^VgnAA=(ĉ.ҳ\URTWZq⼣'e뮒J)RQt} oFWEՊUNOuUuz~~UizUW{3Pt+/\PNvqeK>};r]~wGRE]nNB\OVWSӹS3io'ҜC׉HFj\A6BiPsϥN7{56kEE&"{h&lK"8D}z豓E?LV'.[n^e Nэn/,RJljnXJ{Z~S6zړ IK{?ܺ|e۝SoIф endstream endobj 592 0 obj <> endobj 593 0 obj <>stream H|U}PT?},.,=LHKIAݭ`DDHĘ5X;)Mcѻ/dDG;vFM ul$jFѱx]s9~wνDCPz&)[-Wi[R{oH*Sk׿7tabQN@)\jB^zQOmj ַ$ C-]m\#?ؖمϱ2;o罂q-mOtHorC}Kܽ sg֎M~sƘ?ȄA?,ԑ\x%98qΤցA'I Ic5g F3 FQN*B+ԝkk8$즤I9%i?}_/JM TH 8eK*(2-Y>_ ̍tu :N*:%ʧWx}VYB(Deq;ǖY9wCc#~&۲FrWil"2;"S,lr<iWg>F o{p^C:j@Qa & SoB[-ۙ6&Z1&&B;:َNSV S6 .eb/01|.{Db> y𮙃 DbKlk@|1"B]dګ>d8+F7b$L ;RQO WU~1b|eup5;gbDx[< F3] jvb2* "ebAP@,|zGyC<*ZlM[srIAzjFza˕ S4 D`)酲Is]G+߾C_U/uoغw/ォ#N"=Ehq}󉦍Z̟/~rϮ'=)QZ]0>mv@L!ANn|F0?B9y uw % G_79G * Bz&,ТaIcOI.]\l=e6GcDn/ᦵ];xuLjک^S6K <4x˳%gK8ϖ癄xuZ2ͳY YV/޾^TOsߪ_W<'lbD|ϠLl#J0PLb%뉵O?xymGɢecܺx^|5S4I &'`bQnr{W;0~ :2qOfAԖ=0lc㪕ZVl6Q1􏯱YaHJ3S$i BYS VqII“TzZׯ"G=R7꿑G3m?Wl;GrOD(Wx|LA0[LMفQ@ |+xۤx]y} ţx3jXTU-XXUOS00 1+P,ʳ(7Ĥq1d2a͘3W=ݼmTlfҮLƁX 8E{ 6쁈53`B%@Rxz$`\} F| 2QD%Q$nê(<~o^0/y@`@QTRPJEED2 *iZjۚɪ>-eiy= s ;g3{+UJ vu߻"!蒢 75t_B'XN|@X)['#?*pww#QFׄK~ n<$N}oHʊ,HT[mrb?#` ڎ)jPP nsg+Ŭɮ[h5564OEwz˿y[ٜ?7(::6#  '~dŊ Ĵf ʿdiJa tZ /܁Q|BȽFq3& J;v|k)N:='kV==2/o)Sg)Bo9p8*ַ#7!Dpy cbz&D\ Rp4'Й4.|&.%!l=V鯕V6gǗwbJ؇8qYqˍw\^^j7O o̡BDt9pPN"t3 kImoRWZVZ"$~Ņ*-D|2Jfl,p'Qwzd8Wup:dEC aLk2KOT01d; G(iݩX579MW01u`)E.6]#'*ٚ8 8YBa2P#64`MvãU m&!m McDӣaVA77l~k}zŕ8+޽q o}r-Ժ6 reJ5KW[H01U6MV3Ę_ mA؊ h%CkXBP18fy@ Ec8O ϔQ%P@(ByD_|^>뗼bMҽܯ<?ßelGlWtu| }igЯ2Wit~-FFy0!xlf:qr?ϑ; X:BnY+wwSָ0hnQBpÀD#mG+blrJoZضmBƕEh}ȼ='huɮug=2%毠ijs+``Qtf =<$Hm|A"IJs"f6{ t-N^%/d0xڵSޥ U0t<, 0<`ޜHyu+_bB[;m=k#@BQqma,Ȝ  ?`8]u!O;dĢPǂñI6{ΥQ0?~*eڡ2%:$ȟM:\#ۙu쏪 RT tcJY?-Q zr#f]V5y٢GYK{לn/u~ŧr}c=ooJ}z-\v\h6v N[ abP{-צy=76{*_g;XB"A&H?qIFX$S,YpF{&q1{)dG x&1v4ڠڶM9{h'^< 0C{mܐԤ4>QSL 8p;&gߙ "cU'Q, Wm FwCɯm8 N <}-MRQc%l5z?by /&5kyM֏w|XT(F"#I{F!Ku, bOwTc\~@9Llv. Hic}#?՝yqlrWiKq0??w2ʈwuF$'9{f3qy,3B?&>uNE3Rei Y vҖlvI~ĕ_,WG/N-):88 *DOnѭibzp!r$t$8HɁ \w [RBɬ7r]fW08]qqW PTUϽw_,l++ "PfZhr4-%( KҩgN*X{=,aS+_f]4tf=9{9\#&Js'l^OV3zbٴ簖ؗnY.. +%!湘 [J"*1!1TƁ.R.fU5u{JW`nvcr XOo cqqw yN~{.ƁZ*>Y/D-̘V׬Laj8: 3`RlѢEt E#X{֢s5=}GBU2 ʋMGI<>kvLIX7#92182R[A Nv\jtf]4ZpL~|?"YwV|6Ğ0>2$CI,5o}|] e`pqYGJ9Zh7 xU0kZ#|iB,4X'EDC6DlDq\=^_W닳WU=4/$4sÙMqݵ'_dm;yٕeG 3f89]E!GnVÁ`PĔZt Kp'd@  IVfe!YEź=/mɤՔQXqaJ%Z>OM.-HYꦅ5$QQʩ}o<%! Kt YA^rGNH:4Vxiz5k60*_zG@0=HX &>š`)<<^p[tT3'ߛ:w^7f4x̉~4~4q wb$wT02|3e=ty8dI-|wd bj ZA^ $&3b사 gɩ5'~-og*˖_|`i p&2.4~3>cqr%fҊt@H> H ]u?珼i@7i@CH@ {R &"@0axD86)0ݏ gE%Lzk|7Qcb)5 c&B !;ea#,CAV04 A/` 8|M.&D@M`2L0 f@>,(0`.v(Rʰ)Jj j{{V _ GpE*|*|(| |&|}G877a qY؆3{w .Z' IBi@9u/GJ-SQu ZgqEs?)r_/5eRTG=QZwfPkIPkԘu@~6l>j+Q\g{5xp1>jLJ(pd%ZC<=a]2^lfUn𑲊-iӖo;WC~b5f *O]UH endstream endobj 594 0 obj <> endobj 595 0 obj <>stream HtV PT> ]Y},UL-]рlDE#3 15ԟZM}G:bbiJԚDČ6LGe=-Kڝywλ x[9)Þ++Z2 -K r)q;+(Υl)n\OwyA\gSM=~"J}-;F ~q.6MЏ`RIJB*s2C崿GߟKo^asSmv.GvX䣥 `0\ A >;Jv`HW:%$d/˥w"_9RbfX7Agt2I3wCb o͝=}fcQܴ UP9N@̟ w}m1O=,ʋz6LzD/. Z= kYgB'T \BL }Ҡs(L\MqSiq/Kq?V[B%t/V[g#Kk\Btk Οjg-LOzbFŎg?u?tH,ZH\i!k.f.IƾlaƓ ief;323̔ȊvhSqYk*u)8y93ۙ03s<`fNi2c*͢hIf jUkPi+G9#ĥ@l,p+eM"N:sE6F:LLL!IċHp wP'bpᰆ>:х7s\Gx[4+ O 𪜞vN7#!ͳyE֕Y+,*6W`"(32\i^mn_x鯳η+phzT44,oz򟦖XY%}@zOHЌeY}oWo<*@Le>%CʈI0FTMf=dQrBo`wqR'ڬpfr恇=gmGJw7>8{N}pL;s}}KҦ\VCʧ'N GnfؠFKr$HD0ABa<c!@8H-赹Dh DWW$K_gh< ;k(Ն=UZqkk҇l\fBlȚ6Ӏl \ HaR L]q#8ua=cĖΥ)qH(O%&\LJ6k'Qe(%M" ޼򦏎I__Q_̑ oXuǁ ;hb;Q+*j Zhh&zj\xU2tW.a 4cj@e'RhƏ1:zs4Ny4aZLmNUMIYYu (CXo|ڡ,NN=v&M4S͈N$#DA<&ԭl8 2 P8iH( )OY:bs)!q&-=$CɆSBe.M 0q=G1|?<ٟ%)(uU[CZu%yd7"m/O`ҥ_[`-o$t}@>݊Y#CkRD*!EA*TUoM|_%WTM^lecy*- 2GvHEĠ!0%0 B%J" # "67N( ?XJAR Im|T#]N6?/osҽ;LwWSMX4d# l$ 5`@G r63FC "3bO~%C]yV}Ϝskw;HBgr!}Z\0U{dXmqXJ.d#z*!911*@, X$}=}_)¹nfLNg \28ȐM UK姓hթcw^.rPUuO7;ظkE8*3hpz&(J|J¸Բ QVGa :g*y殪b>ё 0W.?J8 Vֳ C!g45 Zu;tB){;qf&mvd!}yޡ*[ԎCT9ʐUs_YK9NJ2ӳ^Ϭl\TQ gп88!pPAA6I]K(m6 &q[߯ 0KxKL|6DFS`0##y`@E7%)[kzM2as:}i>&?#Q{݉lvxohߴA7{B1ֿ5r!D#&`.PTx1m,!mZBdZ,t{?UWҝw=nT|llZhh89mW^k5#t k{[3YgFu'Ϛ;G t=%_#DVS~Lȏݾ~Z%cub/aOeA/C"d~ȅ|(P%P 68 ePv/Q |'Οm|g[S5h %$E J,X ~ %F/ jJ2r$+Qg5Ög"S ٟ+ Z $C` wVז=A/R5kI2¯-X ȧoJ" P( 'NI.؅q:P3[xyϗ9!HMGgmQǻx,W f endstream endobj 596 0 obj <> endobj 597 0 obj <>stream HWkp>wWe[޲ d.ZXʘmlXi$[2XE& @&e d鴴JBlti2tIK_$VϮ&}{{݇BBnG/j~ @&F0vЛfNl\pI[ iT8߬~jkG٘N`5>`:8e$Bh*;7g1]X+ڟFÉo7o3 INyfmPP^M:N%uh=n%x` "S2wp0Z~O gjN}xfF2y\x?q e2O. -vЗ*ϕU8b.]{_UuOo>J(ȗ`7Ļ%INbN҂-~ ,:9Ot0WHxpv? WjE"!;ΧD~CU ׵֮nkZ_r/6q z۬:XeX@+\l8ke6[?Qs>־=0lIIIb(D.B8)(iKJIQJ8",Z_X[CV("E"~F60Z]LsD đa'Ry~^E0B !ZFi0AaF(fKVKL b8"͑tRȈxZ: ^8PrDqaӾyڱPDǶB3*(b0-oZ}5yp…1Xd V֤ Sr%yFƄLJ:5V6&8xcId"UI~}F^84TK<U'0W%M\Ӡ"hlT("v(T;(oBP14[Bb4^(DE!Zr~Hb]F☵GQ3ƨ5&!ɝ[{ESgV]V۵ OB 1$+yWflJRK iSL)C(|\^_+Ek@-K"fE+~IoTN!X1 o-^BJ*&U-v+ S s^M~oc ʛߑeˎOts܍Ƒ̅#q&.!fMzn<3a2 CG&69wdjuqFhC*䄹{{NϧH*=B]Fxnf1E!1rg4@~ 2:*DIENs`ų蕣5V}]V@EV5l>|$pݼr\#Sj>X[]pyEchݿv q+ׯp;(Pk*DF\˜iD|/N{5$,/QVr{>4F4참r V(;F6h:ةq=5C׸Bۢ;ۥGGLbl(f[(BE C@ݧyA1 Q}*aC`p}~؈W(nEuʻt%KmA 3U6l',[WR_z gyUk_/= endstream endobj 598 0 obj <> endobj 599 0 obj <>stream H|V}TT{{. EP  INTQlϮZ#GEMM 4Ѵ~4Ѫw6b4&ŦDlOƤUS?=:- hޙ;ߝ@ AK<9IR\gy y/uaU{lNw5Ԣ![i ,_nQo|~aU%TaP_TS?M.ʝC71T~x~-5]o[0`ǃQp |"P`%f$ "6qjि[նC!F,la0 Fg(dxŀ˂B6ZI:V1 gy<%uŌT12J3τ!O~:舘fp}/j¡,`iA}ۚPDFÄC`~Oz<+0!,8%ݬ8eO ;^dNjr(g>Ek1(?3E#YA(j^50fЫxP߀(i%e7^ ^+#P}(#DJ,X} U&h<>y1}6e5z`z0b1 9j;vYNG{^j>y!I<E Z10W*Z8%NCA|֣=rp'=W +xŬZ|2.жR_)cbxQf2LG m`ʄ҆q{N*Nc>="%! US|g,9k1p3T;˲9|ęͺ b}iIN+ptfQlqF$E,elx$Mb!8E7)Ih'%ރzw7Hl.6qqn.rT~Q(Ƣ00ab1jcΥAf]ƶM/ 2PS!]TTH)IE.bfXبXY˂;dOda$m+Юk'KT4BUUbvKFu%]iYtV3, @j H_HVLf ƍ#A.ЊBG?ZuGxYy'X1b0)'G=` 3lAY2ݷB3-{ߒ{yDc7 ˑ /^:pőqLIZ+)\ Q̖%+"95!uZM?84cL*6Ȁ}Ⱦ̈ۻdTyh7'Μ̛cEH}UI}Y-2$/=-#=?/-a3AD)zS΄@nI{]֭xL;]]Ckבe$Tfբg=W7+ÉD߻_ w9S$ޑ~S',3/> T3!lǮ^+"}%9 ?/=CU ]ıayZ~Ljy~|Wku}C#}==Iq0,'Vg*"pzYm%"C2Vf9M7"$hno$}p㵍{"]$u!'O}ڽorwֿ[ϰ1 MH쩎!?#^x"`.^1b-G$s̉{>頧$[3g?/u~}kvSb2øG5,RY{jx.>|.[jHm;Mޫ](v1C' ;U?q"G.;g8 []/~8R <pzYP):%vUuW:EsmuG#GaQ ދ)^NtU=:=޼dDcR$#ȗhG+62TAo;?}wT9}p):;?_CPʴk|7a,0&+Kؘ^^:yubbEp~{?٢R-K>'M7NdKig_K˗nˁ}G0BW /nŷe,?jwi4CI~Nʵ,)tfMߑ_: x/UusݻnlYC % YRI$$&0aY䑀 hSTPдtJ^"<e:"}cʎ {osv7޻i{3s6yr3+ʛ*:v wF$xa+z5536IIjD$&,OeZB¨m$G#ݴbCrY;}v8'kg>\r1.u$ q73kV=/Zo]Cƪy: +btzY1tFrȘxNg9%Mb,3|zܒvtac.D8|wCuҙˡ4vp|aWtȿ}}oy\_@wP$rXۍ_4mU 'o'"Yf|q( xBܙ91wvB"Dtr ܑ6(T i5D &iퟑݟ4g,o #B˻?' #B몖mcHSn.h{쾣mx4<R0W}n["~u;R[ヤ,WXGsšq![1S|ٸ=|ZiʋFORh|b} k} |n'ӯroP[#x@P5ٲX 8KD'iG;]>47oz9Nss]H QW|* 95P,YCP!f 2r7 DїnN 77gju<*IbCs'r?WON4n}c ̕WDyUZ{j Jf<.E5\ϻqkfzY.^VT($) "wqd&ɘ=Ec˪fIlWѤdI ym;U̸~>ÙxϢjvDD)hX+'޺zx$o8tE׶~M *7eEoJs ]Y,bG,P*V?NLlANѤT(`%;~Шb^&ʰ- $=[{քND^zJJb/g8? Z0Ryp< ɞ\](Iν8jeagܟAAw"ܔVUy?#<|koݓyN34zOgOdyS\?xӃG74ԡ;%w(?G}u{no8ιaI2cjL4|EF1!ڀ1^ 7!q?e>8>: RlxX]k 6lC^,lctl]Cs+%p!xpkj#_@ԃRdNkw%rvG'ŝ;^\{(w4(P X K:Zulh-͸zS{r^ɪ'׫Nx}\R~VRAe@97cx?ǾW9#a<4i Kki(R.EM$̊9̇e1+jcѱy%U *.iXpOemM]7ĸQPSDQmq-lDtAf=P+k0*uEK W飘r݋ & :0 0hc=lpg+>4s"|wg [pu>[54osƆ [(K7T endstream endobj 600 0 obj <> endobj 601 0 obj <>stream HT_HSas[6S )k$#"m%DtZ!HAAKK/EDPTOPo˪{}5K9w=w#mK:By: ̖d"wN@+gܒdTk"~E'ۮ 2E9JG'87,}Mdk\3uM\e2z!Y7Ҍz !ujeEƧni%'ygeann ih0Zqv4 9c^׽Ws 5JtjKy]1'SN]I&TCIOSq ;oH-w{x戙]za{bǐGA`a6b"€2VXF"iﮏ$&ƂX*ȤD@F=}c6RNSq8-ٍ CuݿaZ7~r1#rm{-FI-y $ͣj g.^;]ʃђr`p؋g}ä1s󶾲 ; endstream endobj 602 0 obj <> endobj 603 0 obj <>stream HlV lSGqb'!aF%B*B[܃X~7Ezmg|qc6Eāu}>w_ϫ]R3}9qtvMoϚ=NDogri~L@;7p؅F;}`:l("@-Br\IU/# ,X.KVZ-H(hZ(H{!AՂ8V$.+'񚀀*Kbnj1<&yZ(`آjƸOMd4&N6xZ8eUQjaɜ>D"t1H>y'!p>ۀh!CQsfLIC^#xc[bMHQG(k(!' @%v8tX`xIO'ܲI/!Q?<d94A9kWָeݟ>䧐q=/*Qe,XyO8_ӗr* !ޙ'WZZ .z!9U Erh%uSK=`:JgRcl|fIM.ZQZKM2fJQԬMͶybrO/)]CtOE]?5$E MRB)J?"-Eiafǀ1 w qb O)JqqIi)u5>C\}b1P 9Ql5$-7 ǜxSpJ)A sTNSKg.B\dƧk$# qE\;h[.:8J[iދ>5v v&UM"P%U+& Dتb)iC:1|qH)45$dGFQZJ'#/)~M0N00Hd L܆TU/`e~~$KJUS~-ڼ܇0F9&OW^LK?ƕ+$1ĕg|cH "pAk+ޝUau&=YgV2˽C)'0LEں냯쏽Mw>m5b8^m gs0'v0a0.3o[j0~|kX[ӗ;< ЖamA›2oŖc<[\m3Yp~kv>`y$\._N@/\t2xts2U!1Fw4t&W/Sb/-&uro?E/o҆Qݪ?tl K}Gz>nI|18gY0[G/wR~#7 5sG\6G1> =2| +̾&wʳ{Fz,Ȝl0x=ވ°^"fGTW*"L{ϚLopa}o7hݹf߹a׬,l^_Rտz[Y?\78ꢗ7roNz'orW//O*Pх%s!4;W[W!]utJzh0`3[32ȭi⏝;?t0}^2nPeo%*Saعw%lwªP_Aܰ''Brt$F)`@2[^{A_uR@ FYL$9F9NHc=ʮgkF}q;u7e-" tE8۲T6f|2WxnDQY FI,e O3髹x;}A=gZ~yP[C5ד:zmzNΌdLNN,X3 ?9l~υLbQ"OIt~Q!s2z䈢Ȗ<ӱDņwáʆ'K48ooĩR6)R6mR2IC1HUYav7oy֦VO[hGݔ&am3@F Bƅ,j4>UNve%y:z7+]OaY*-l(ވ'{:'sn|;b)yڙыjF'6AM$d-{iSllwt>l҉jy[ⷅ^%Rg^ Ē>K$Rt 4ESs(]&U7,=IZ$|֊ZL=݈>rDGR`a_O kvg&M,ly 8eyo$Λ06B3.腽#0X8G s#WuSi>忬)B0)!_jpOh/āϐL 򱖶@k#FFG{á>ֆU3`P%t j}HQ!#kUVxݎ^B־||OI\"1"pr dP WbQ:rׄW |JҊ6hE!=Z\_/jM .K 0 endstream endobj 604 0 obj <> endobj 605 0 obj <>stream HV_lSUιnvEw/ƲҎ9݀luCE66: =`2( BbxVH'!Ѹ@b/:"mN[*1ɓ}z=adg5F&7Zv4rcic0ph(zѿi kRjt"6  |p6Dh*Jۅ^7{omDY#<U Oi+~ η M <$hd_,}=p:NB `4G\0Gq,5e f(_AXP 2Ɍ,!ks$ ?1k܌>gdͨHf*w0':;3#N 5̠78=0aMkv33i&؝K;nS;e&ٴ|~ͩ(r;ټߩh5xh̞֠2}I As2r)l:ws64 ϑ@ffڥ8PQ c X2W :`f{ kQ\\@Ye9vg<U5|ǥen{N)PYn͛jb^dxS7i,x8KO]JvK_ux7c L2El_""w^NgؕJ_d Frs\3FTP9.G4EM;:{"XĽ12>5 W;lЁ["İ0I}6"㭰u<*Ϯj), ܺZq_pVfG%& aߒtE(.HP|[2痬ߟ}*y&[x%K endstream endobj 606 0 obj <> endobj 607 0 obj <>stream HVml[~ν+Nl7nr/ITMiJKbT̆5k8mĖiBDV!MibVhcTt&A'!QL+${lc}y{^{.JCEthF@? 'g>n<d'=2xrВO%: T)}'3s:4@uRPj4Ae*itb.U)_OK%4h֯A4wt:[`4z81=v#Nd ).Y]YsxIŃx#xەIȪCW TlO MuNe*[08{2 pCΪ zd*,HP(6AnzVNf}2|SX6ު Ħc{oұx#(,Ëeq*p\`_ -Ы )?&^{ C јxPnHѩR0m K@LtylI 1zt7K _ t}9@;Yb̼ʀa<@@,B-Ԣ- #AQ-\3[гs]]`a0v{W͘ʀZX`,ׂZ YXLS'>v2<3HSxNTa?S&~||xt ~N6c|Z}4ǽөm~ :w -kh4Q#Zph&t-|٤)tdrLCw'5D/Fc++U=I*]t[^P:szj%&W6_|/FwMO( VOfN_ܟշ :v r e *w+WvӯMZd%nH=BeVJ\dsD]=}{SRTpw&qhjߍЃ>/$? Y?0YBGnn ʛ­gy ]:y`.Y|hz~&7=EEި*y+`7WoNZW߶P5\̨Gr66}"O.]vYfHZo=`0V endstream endobj 52 0 obj <> endobj 374 0 obj <> endobj 608 0 obj <>/DW 1000/W[5[568]]/CIDToGIDMap/Identity>> endobj 53 0 obj <> endobj 54 0 obj <> endobj 55 0 obj <> endobj 56 0 obj <> endobj 57 0 obj <> endobj 58 0 obj <> endobj 216 0 obj <> endobj 217 0 obj <> endobj 218 0 obj <> endobj 278 0 obj <> endobj 279 0 obj <> endobj 467 0 obj <> endobj 609 0 obj <>stream HTPN0 91$পKohaA ĭ"Q'rӡOnpgXݩ#@=-ŭ.8YcuYyQoKA]=< C( ^ ["T}|F_)c!jFYOG2.+hB͞}}W]?xmݻҘś-2GWrd oΧ)_n> endstream endobj 7 0 obj <> endobj 62 0 obj <> endobj 219 0 obj <> endobj 280 0 obj <> endobj 317 0 obj <> endobj 375 0 obj <> endobj 468 0 obj <> endobj 610 0 obj <> endobj 611 0 obj <> endobj 61 0 obj <> endobj 574 0 obj <> endobj 572 0 obj <> endobj 569 0 obj <> endobj 567 0 obj <> endobj 564 0 obj <> endobj 562 0 obj <> endobj 559 0 obj <> endobj 557 0 obj <> endobj 554 0 obj <> endobj 552 0 obj <> endobj 549 0 obj <> endobj 547 0 obj <> endobj 544 0 obj <> endobj 542 0 obj <> endobj 539 0 obj <> endobj 537 0 obj <> endobj 534 0 obj <> endobj 532 0 obj <> endobj 529 0 obj <> endobj 527 0 obj <> endobj 524 0 obj <> endobj 522 0 obj <> endobj 519 0 obj <> endobj 517 0 obj <> endobj 514 0 obj <> endobj 512 0 obj <> endobj 509 0 obj <> endobj 507 0 obj <> endobj 504 0 obj <> endobj 502 0 obj <> endobj 499 0 obj <> endobj 497 0 obj <> endobj 494 0 obj <> endobj 492 0 obj <> endobj 489 0 obj <> endobj 487 0 obj <> endobj 484 0 obj <> endobj 482 0 obj <> endobj 479 0 obj <> endobj 477 0 obj <> endobj 475 0 obj <> endobj 473 0 obj <> endobj 471 0 obj <> endobj 469 0 obj <> endobj 463 0 obj <> endobj 461 0 obj <> endobj 458 0 obj <> endobj 456 0 obj <> endobj 453 0 obj <> endobj 451 0 obj <> endobj 448 0 obj <> endobj 446 0 obj <> endobj 443 0 obj <> endobj 441 0 obj <> endobj 438 0 obj <> endobj 436 0 obj <> endobj 433 0 obj <> endobj 431 0 obj <> endobj 428 0 obj <> endobj 426 0 obj <> endobj 423 0 obj <> endobj 421 0 obj <> endobj 418 0 obj <> endobj 416 0 obj <> endobj 413 0 obj <> endobj 411 0 obj <> endobj 409 0 obj <> endobj 407 0 obj <> endobj 405 0 obj <> endobj 403 0 obj <> endobj 401 0 obj <> endobj 398 0 obj <> endobj 396 0 obj <> endobj 393 0 obj <> endobj 391 0 obj <> endobj 388 0 obj <> endobj 386 0 obj <> endobj 384 0 obj <> endobj 382 0 obj <> endobj 380 0 obj <> endobj 378 0 obj <> endobj 376 0 obj <> endobj 366 0 obj <> endobj 364 0 obj <> endobj 362 0 obj <> endobj 360 0 obj <> endobj 358 0 obj <> endobj 356 0 obj <> endobj 354 0 obj <> endobj 352 0 obj <> endobj 350 0 obj <> endobj 348 0 obj <> endobj 346 0 obj <> endobj 344 0 obj <> endobj 342 0 obj <> endobj 340 0 obj <> endobj 338 0 obj <> endobj 336 0 obj <> endobj 334 0 obj <> endobj 332 0 obj <> endobj 330 0 obj <> endobj 328 0 obj <> endobj 326 0 obj <> endobj 324 0 obj <> endobj 322 0 obj <> endobj 320 0 obj <> endobj 318 0 obj <> endobj 313 0 obj <> endobj 311 0 obj <> endobj 309 0 obj <> endobj 307 0 obj <> endobj 305 0 obj <> endobj 303 0 obj <> endobj 301 0 obj <> endobj 299 0 obj <> endobj 297 0 obj <> endobj 295 0 obj <> endobj 293 0 obj <> endobj 291 0 obj <> endobj 289 0 obj <> endobj 287 0 obj <> endobj 285 0 obj <> endobj 283 0 obj <> endobj 281 0 obj <> endobj 274 0 obj <> endobj 272 0 obj <> endobj 270 0 obj <><><><><><><><><><><>]/Pg 219 0 R>> endobj 268 0 obj <> endobj 266 0 obj <> endobj 264 0 obj <> endobj 262 0 obj <> endobj 260 0 obj <> endobj 258 0 obj <> endobj 256 0 obj <> endobj 254 0 obj <> endobj 252 0 obj <> endobj 250 0 obj <> endobj 248 0 obj <> endobj 246 0 obj <> endobj 244 0 obj <> endobj 242 0 obj <> endobj 239 0 obj <> endobj 237 0 obj <> endobj 234 0 obj <> endobj 232 0 obj <> endobj 230 0 obj <> endobj 228 0 obj <> endobj 226 0 obj <> endobj 224 0 obj <> endobj 222 0 obj <> endobj 220 0 obj <> endobj 212 0 obj <> endobj 210 0 obj <> endobj 207 0 obj <> endobj 205 0 obj <> endobj 202 0 obj <> endobj 200 0 obj <> endobj 197 0 obj <> endobj 195 0 obj <> endobj 192 0 obj <> endobj 190 0 obj <> endobj 187 0 obj <> endobj 185 0 obj <> endobj 183 0 obj <> endobj 181 0 obj <> endobj 179 0 obj <> endobj 176 0 obj <> endobj 174 0 obj <> endobj 171 0 obj <> endobj 169 0 obj <> endobj 166 0 obj <> endobj 164 0 obj <> endobj 161 0 obj <> endobj 159 0 obj <> endobj 156 0 obj <> endobj 154 0 obj <> endobj 151 0 obj <> endobj 149 0 obj <> endobj 146 0 obj <> endobj 144 0 obj <> endobj 142 0 obj <> endobj 140 0 obj <> endobj 138 0 obj <> endobj 136 0 obj <> endobj 134 0 obj <> endobj 132 0 obj <> endobj 130 0 obj <> endobj 128 0 obj <> endobj 126 0 obj <> endobj 124 0 obj <> endobj 121 0 obj <> endobj 119 0 obj <> endobj 116 0 obj <> endobj 114 0 obj <> endobj 111 0 obj <> endobj 109 0 obj <> endobj 106 0 obj <> endobj 104 0 obj <> endobj 101 0 obj <> endobj 99 0 obj <> endobj 96 0 obj <> endobj 94 0 obj <> endobj 91 0 obj <> endobj 89 0 obj <> endobj 86 0 obj <> endobj 84 0 obj <> endobj 81 0 obj <> endobj 79 0 obj <> endobj 77 0 obj <> endobj 75 0 obj <> endobj 73 0 obj <> endobj 71 0 obj <> endobj 69 0 obj <> endobj 67 0 obj <> endobj 65 0 obj <> endobj 63 0 obj <> endobj 48 0 obj <> endobj 46 0 obj <> endobj 44 0 obj <> endobj 38 0 obj <> endobj 36 0 obj <> endobj 34 0 obj <> endobj 32 0 obj <> endobj 30 0 obj <> endobj 28 0 obj <> endobj 26 0 obj <> endobj 24 0 obj <> endobj 22 0 obj <> endobj 18 0 obj <> endobj 16 0 obj <> endobj 14 0 obj <> endobj 12 0 obj <> endobj 10 0 obj <> endobj 8 0 obj <> endobj 612 0 obj [10 0 R 10 0 R 10 0 R 14 0 R 18 0 R 18 0 R 20 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 26 0 R 26 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 32 0 R 32 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 34 0 R 38 0 R 38 0 R 38 0 R 40 0 R 46 0 R 46 0 R 46 0 R 46 0 R 46 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R 48 0 R] endobj 613 0 obj [65 0 R 65 0 R 65 0 R 69 0 R 73 0 R 73 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 81 0 R 81 0 R 83 0 R 81 0 R 81 0 R 86 0 R 86 0 R 88 0 R 91 0 R 91 0 R 93 0 R 96 0 R 96 0 R 98 0 R 101 0 R 101 0 R 103 0 R 106 0 R 106 0 R 108 0 R 111 0 R 111 0 R 113 0 R 116 0 R 116 0 R 118 0 R 121 0 R 121 0 R 123 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 124 0 R 126 0 R 126 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 128 0 R 130 0 R 130 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 134 0 R 134 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 138 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 140 0 R 146 0 R 146 0 R 148 0 R 146 0 R 146 0 R 151 0 R 151 0 R 153 0 R 151 0 R 151 0 R 156 0 R 156 0 R 158 0 R 156 0 R 156 0 R 161 0 R 161 0 R 163 0 R 166 0 R 166 0 R 168 0 R 171 0 R 171 0 R 173 0 R 171 0 R 171 0 R 176 0 R 176 0 R 178 0 R 176 0 R 176 0 R 176 0 R 176 0 R 179 0 R 179 0 R 181 0 R 181 0 R 181 0 R 181 0 R 181 0 R 181 0 R 181 0 R 181 0 R 187 0 R 187 0 R 189 0 R 187 0 R 187 0 R 192 0 R 192 0 R 194 0 R 197 0 R 197 0 R 199 0 R 202 0 R 202 0 R 204 0 R 202 0 R 202 0 R 207 0 R 207 0 R 209 0 R 207 0 R 207 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R 212 0 R] endobj 614 0 obj [222 0 R 222 0 R 222 0 R 226 0 R 230 0 R 230 0 R 234 0 R 234 0 R 236 0 R 239 0 R 239 0 R 241 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 242 0 R 244 0 R 244 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 246 0 R 248 0 R 248 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 250 0 R 252 0 R 252 0 R 254 0 R 254 0 R 254 0 R 254 0 R 254 0 R 254 0 R 256 0 R 256 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 258 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 260 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 264 0 R 264 0 R 266 0 R 266 0 R 266 0 R 266 0 R 266 0 R 266 0 R 266 0 R 266 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 268 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R 274 0 R] endobj 615 0 obj [283 0 R 283 0 R 283 0 R 287 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 270 0 R 289 0 R 289 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 293 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 303 0 R 305 0 R 305 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 307 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 309 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R 313 0 R] endobj 616 0 obj [320 0 R 320 0 R 320 0 R 324 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 330 0 R 330 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 336 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 338 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 340 0 R 342 0 R 342 0 R 344 0 R 344 0 R 344 0 R 344 0 R 344 0 R 344 0 R 344 0 R 344 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 346 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 348 0 R 350 0 R 350 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 356 0 R 358 0 R 358 0 R 360 0 R 360 0 R 362 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 364 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 366 0 R 368 0 R] endobj 617 0 obj [378 0 R 378 0 R 378 0 R 382 0 R 388 0 R 388 0 R 390 0 R 388 0 R 388 0 R 388 0 R 388 0 R 393 0 R 393 0 R 395 0 R 393 0 R 393 0 R 393 0 R 393 0 R 393 0 R 393 0 R 398 0 R 398 0 R 400 0 R 398 0 R 398 0 R 398 0 R 398 0 R 398 0 R 398 0 R 401 0 R 401 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 405 0 R 407 0 R 407 0 R 413 0 R 413 0 R 415 0 R 413 0 R 413 0 R 413 0 R 413 0 R 413 0 R 413 0 R 418 0 R 418 0 R 420 0 R 418 0 R 418 0 R 418 0 R 418 0 R 418 0 R 423 0 R 423 0 R 425 0 R 423 0 R 423 0 R 423 0 R 423 0 R 423 0 R 423 0 R 423 0 R 428 0 R 428 0 R 430 0 R 428 0 R 428 0 R 428 0 R 428 0 R 428 0 R 428 0 R 428 0 R 433 0 R 433 0 R 435 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 438 0 R 438 0 R 440 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 443 0 R 443 0 R 445 0 R 443 0 R 443 0 R 443 0 R 443 0 R 443 0 R 443 0 R 443 0 R 448 0 R 448 0 R 448 0 R 450 0 R 448 0 R 448 0 R 448 0 R 448 0 R 448 0 R 448 0 R 448 0 R 448 0 R 448 0 R 453 0 R 453 0 R 455 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 458 0 R 458 0 R 460 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R] endobj 618 0 obj [471 0 R 471 0 R 471 0 R 475 0 R 479 0 R 479 0 R 479 0 R 481 0 R 479 0 R 479 0 R 479 0 R 479 0 R 479 0 R 479 0 R 484 0 R 484 0 R 484 0 R 486 0 R 484 0 R 484 0 R 489 0 R 491 0 R 489 0 R 489 0 R 489 0 R 489 0 R 489 0 R 489 0 R 494 0 R 494 0 R 496 0 R 494 0 R 494 0 R 494 0 R 494 0 R 494 0 R 494 0 R 494 0 R 494 0 R 494 0 R 499 0 R 499 0 R 501 0 R 499 0 R 499 0 R 499 0 R 499 0 R 499 0 R 499 0 R 499 0 R 499 0 R 504 0 R 504 0 R 506 0 R 504 0 R 504 0 R 504 0 R 504 0 R 504 0 R 504 0 R 504 0 R 509 0 R 509 0 R 511 0 R 509 0 R 509 0 R 509 0 R 509 0 R 509 0 R 514 0 R 514 0 R 514 0 R 516 0 R 514 0 R 514 0 R 519 0 R 519 0 R 521 0 R 519 0 R 519 0 R 519 0 R 519 0 R 519 0 R 519 0 R 519 0 R 524 0 R 524 0 R 526 0 R 524 0 R 524 0 R 524 0 R 524 0 R 524 0 R 524 0 R 524 0 R 524 0 R 524 0 R 529 0 R 529 0 R 531 0 R 529 0 R 529 0 R 529 0 R 529 0 R 529 0 R 529 0 R 529 0 R 534 0 R 534 0 R 536 0 R 534 0 R 534 0 R 534 0 R 534 0 R 534 0 R 539 0 R 539 0 R 541 0 R 539 0 R 539 0 R 539 0 R 539 0 R 539 0 R 539 0 R 539 0 R 539 0 R 544 0 R 544 0 R 546 0 R 544 0 R 544 0 R 544 0 R 544 0 R 544 0 R 549 0 R 549 0 R 551 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 549 0 R 554 0 R 554 0 R 556 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 554 0 R 559 0 R 559 0 R 561 0 R 559 0 R 559 0 R 564 0 R 564 0 R 566 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 564 0 R 569 0 R 569 0 R 571 0 R 569 0 R 569 0 R 569 0 R 569 0 R 569 0 R 569 0 R 574 0 R 574 0 R 574 0 R 576 0 R 574 0 R] endobj 619 0 obj <> endobj 4 0 obj <>/K 5 0 R>> endobj 620 0 obj << /Dt (D:20200824155713) /JTM (Distiller) >> endobj 621 0 obj /This endobj 622 0 obj << /CP (Distiller) /Fi 621 0 R >> endobj 623 0 obj << /R [ 300.000 300.000 ]>> endobj 624 0 obj << /JTF 0 /MB [ 0.000 0.000 603.000 783.000 ]/R 623 0 R /W [ 0 6 ]>> endobj 625 0 obj << /Fi [ 622 0 R ]/P [ 624 0 R ]>> endobj 626 0 obj << /Dm [ 603.000 783.000 603.000 783.000 ]>> endobj 627 0 obj << /Me 626 0 R >> endobj 628 0 obj << /D [ 625 0 R ]/MS 627 0 R /Type /JobTicketContents >> endobj 629 0 obj << /A [ 620 0 R ]/Cn [ 628 0 R ]/V 1.100 >> endobj 3 0 obj <> endobj 630 0 obj <>stream 2020-08-24T15:57:10-06:00 QuarkXPress(R) 16.01 2020-08-24T15:57:10-06:00 Layout 1 Sally Kennedy %%DocumentProcessColors: Cyan Magenta Yellow Black %%EndComments QuarkXPress(R) 16.01 endstream endobj 1 0 obj <>/MarkInfo<>>> endobj 369 0 obj <> endobj 2 0 obj <<>> endobj 41 0 obj <> endobj 21 0 obj <> endobj xref 0 631 0000000000 65535 f 0000342905 00000 n 0000343212 00000 n 0000339327 00000 n 0000338624 00000 n 0000146688 00000 n 0000146435 00000 n 0000308149 00000 n 0000327623 00000 n 0000000000 00000 f 0000327572 00000 n 0000000000 00000 f 0000327526 00000 n 0000000000 00000 f 0000327479 00000 n 0000000000 00000 f 0000327433 00000 n 0000000000 00000 f 0000327383 00000 n 0000000000 00000 f 0000000016 00000 n 0000343316 00000 n 0000326815 00000 n 0000000000 00000 f 0000326616 00000 n 0000000000 00000 f 0000326564 00000 n 0000000000 00000 f 0000326440 00000 n 0000000000 00000 f 0000326343 00000 n 0000000000 00000 f 0000326289 00000 n 0000000000 00000 f 0000326123 00000 n 0000000000 00000 f 0000326077 00000 n 0000000000 00000 f 0000326019 00000 n 0000000000 00000 f 0000000086 00000 n 0000343232 00000 n 0000146747 00000 n 0000151496 00000 n 0000325965 00000 n 0000000000 00000 f 0000325899 00000 n 0000000000 00000 f 0000325789 00000 n 0000000000 00000 f 0000000158 00000 n 0000016842 00000 n 0000303158 00000 n 0000303720 00000 n 0000304445 00000 n 0000304973 00000 n 0000305383 00000 n 0000305550 00000 n 0000305988 00000 n 0000248774 00000 n 0000248924 00000 n 0000309790 00000 n 0000308371 00000 n 0000325743 00000 n 0000000000 00000 f 0000325690 00000 n 0000000000 00000 f 0000325644 00000 n 0000000000 00000 f 0000325596 00000 n 0000000000 00000 f 0000325550 00000 n 0000000000 00000 f 0000325499 00000 n 0000000000 00000 f 0000325435 00000 n 0000000000 00000 f 0000325331 00000 n 0000000000 00000 f 0000325279 00000 n 0000000000 00000 f 0000325216 00000 n 0000000000 00000 f 0000017052 00000 n 0000325164 00000 n 0000000000 00000 f 0000325107 00000 n 0000000000 00000 f 0000017103 00000 n 0000325055 00000 n 0000000000 00000 f 0000324998 00000 n 0000000000 00000 f 0000017154 00000 n 0000324946 00000 n 0000000000 00000 f 0000324889 00000 n 0000000000 00000 f 0000017205 00000 n 0000324835 00000 n 0000000000 00000 f 0000324777 00000 n 0000000000 00000 f 0000017256 00000 n 0000324722 00000 n 0000000000 00000 f 0000324663 00000 n 0000000000 00000 f 0000017308 00000 n 0000324608 00000 n 0000000000 00000 f 0000324549 00000 n 0000000000 00000 f 0000017361 00000 n 0000324494 00000 n 0000000000 00000 f 0000324435 00000 n 0000000000 00000 f 0000017414 00000 n 0000324380 00000 n 0000000000 00000 f 0000324321 00000 n 0000000000 00000 f 0000017467 00000 n 0000324243 00000 n 0000000000 00000 f 0000324189 00000 n 0000000000 00000 f 0000324087 00000 n 0000000000 00000 f 0000324033 00000 n 0000000000 00000 f 0000323943 00000 n 0000000000 00000 f 0000323889 00000 n 0000000000 00000 f 0000323817 00000 n 0000000000 00000 f 0000323723 00000 n 0000000000 00000 f 0000323631 00000 n 0000000000 00000 f 0000323537 00000 n 0000000000 00000 f 0000323481 00000 n 0000000000 00000 f 0000323412 00000 n 0000000000 00000 f 0000017520 00000 n 0000323356 00000 n 0000000000 00000 f 0000323287 00000 n 0000000000 00000 f 0000017574 00000 n 0000323231 00000 n 0000000000 00000 f 0000323162 00000 n 0000000000 00000 f 0000017628 00000 n 0000323106 00000 n 0000000000 00000 f 0000323045 00000 n 0000000000 00000 f 0000017682 00000 n 0000322989 00000 n 0000000000 00000 f 0000322928 00000 n 0000000000 00000 f 0000017736 00000 n 0000322872 00000 n 0000000000 00000 f 0000322803 00000 n 0000000000 00000 f 0000017790 00000 n 0000322747 00000 n 0000000000 00000 f 0000322670 00000 n 0000000000 00000 f 0000017844 00000 n 0000322614 00000 n 0000000000 00000 f 0000322534 00000 n 0000000000 00000 f 0000322440 00000 n 0000000000 00000 f 0000322384 00000 n 0000000000 00000 f 0000322315 00000 n 0000000000 00000 f 0000017898 00000 n 0000322259 00000 n 0000000000 00000 f 0000322198 00000 n 0000000000 00000 f 0000017952 00000 n 0000322142 00000 n 0000000000 00000 f 0000322081 00000 n 0000000000 00000 f 0000018006 00000 n 0000322025 00000 n 0000000000 00000 f 0000321956 00000 n 0000000000 00000 f 0000018060 00000 n 0000321900 00000 n 0000000000 00000 f 0000321831 00000 n 0000000000 00000 f 0000018114 00000 n 0000321783 00000 n 0000000000 00000 f 0000321682 00000 n 0000000000 00000 f 0000018168 00000 n 0000038740 00000 n 0000306361 00000 n 0000306525 00000 n 0000306978 00000 n 0000308596 00000 n 0000321634 00000 n 0000000000 00000 f 0000321578 00000 n 0000000000 00000 f 0000321530 00000 n 0000000000 00000 f 0000321479 00000 n 0000000000 00000 f 0000321431 00000 n 0000000000 00000 f 0000321377 00000 n 0000000000 00000 f 0000321321 00000 n 0000000000 00000 f 0000321263 00000 n 0000000000 00000 f 0000038909 00000 n 0000321207 00000 n 0000000000 00000 f 0000321148 00000 n 0000000000 00000 f 0000038962 00000 n 0000321063 00000 n 0000000000 00000 f 0000321008 00000 n 0000000000 00000 f 0000320920 00000 n 0000000000 00000 f 0000320865 00000 n 0000000000 00000 f 0000320786 00000 n 0000000000 00000 f 0000320731 00000 n 0000000000 00000 f 0000320664 00000 n 0000000000 00000 f 0000320609 00000 n 0000000000 00000 f 0000320497 00000 n 0000000000 00000 f 0000320382 00000 n 0000000000 00000 f 0000320205 00000 n 0000000000 00000 f 0000320148 00000 n 0000000000 00000 f 0000320067 00000 n 0000000000 00000 f 0000319938 00000 n 0000000000 00000 f 0000319503 00000 n 0000000000 00000 f 0000319455 00000 n 0000000000 00000 f 0000319345 00000 n 0000000000 00000 f 0000039016 00000 n 0000058842 00000 n 0000307149 00000 n 0000307520 00000 n 0000308822 00000 n 0000319297 00000 n 0000000000 00000 f 0000319241 00000 n 0000000000 00000 f 0000319193 00000 n 0000000000 00000 f 0000319142 00000 n 0000000000 00000 f 0000319087 00000 n 0000000000 00000 f 0000318963 00000 n 0000000000 00000 f 0000318866 00000 n 0000000000 00000 f 0000318787 00000 n 0000000000 00000 f 0000318708 00000 n 0000000000 00000 f 0000318593 00000 n 0000000000 00000 f 0000318504 00000 n 0000000000 00000 f 0000318399 00000 n 0000000000 00000 f 0000318342 00000 n 0000000000 00000 f 0000318209 00000 n 0000000000 00000 f 0000318096 00000 n 0000000000 00000 f 0000318048 00000 n 0000000000 00000 f 0000317954 00000 n 0000000000 00000 f 0000059024 00000 n 0000077694 00000 n 0000309048 00000 n 0000317906 00000 n 0000000000 00000 f 0000317850 00000 n 0000000000 00000 f 0000317802 00000 n 0000000000 00000 f 0000317751 00000 n 0000000000 00000 f 0000317663 00000 n 0000000000 00000 f 0000317575 00000 n 0000000000 00000 f 0000317520 00000 n 0000000000 00000 f 0000317423 00000 n 0000000000 00000 f 0000317296 00000 n 0000000000 00000 f 0000317187 00000 n 0000000000 00000 f 0000317078 00000 n 0000000000 00000 f 0000316933 00000 n 0000000000 00000 f 0000316876 00000 n 0000000000 00000 f 0000316795 00000 n 0000000000 00000 f 0000316650 00000 n 0000000000 00000 f 0000316533 00000 n 0000000000 00000 f 0000316476 00000 n 0000000000 00000 f 0000316403 00000 n 0000000000 00000 f 0000316314 00000 n 0000000000 00000 f 0000316261 00000 n 0000000000 00000 f 0000316203 00000 n 0000000000 00000 f 0000316145 00000 n 0000000000 00000 f 0000316092 00000 n 0000000000 00000 f 0000315950 00000 n 0000000000 00000 f 0000315808 00000 n 0000000000 00000 f 0000077839 00000 n 0000343127 00000 n 0000225668 00000 n 0000227193 00000 n 0000077915 00000 n 0000102508 00000 n 0000303368 00000 n 0000309274 00000 n 0000315760 00000 n 0000000000 00000 f 0000315704 00000 n 0000000000 00000 f 0000315656 00000 n 0000000000 00000 f 0000315605 00000 n 0000000000 00000 f 0000315543 00000 n 0000000000 00000 f 0000315487 00000 n 0000000000 00000 f 0000315420 00000 n 0000000000 00000 f 0000102739 00000 n 0000315364 00000 n 0000000000 00000 f 0000315286 00000 n 0000000000 00000 f 0000102792 00000 n 0000315230 00000 n 0000000000 00000 f 0000315152 00000 n 0000000000 00000 f 0000102846 00000 n 0000315097 00000 n 0000000000 00000 f 0000314973 00000 n 0000000000 00000 f 0000314876 00000 n 0000000000 00000 f 0000314821 00000 n 0000000000 00000 f 0000314543 00000 n 0000000000 00000 f 0000314487 00000 n 0000000000 00000 f 0000314409 00000 n 0000000000 00000 f 0000102900 00000 n 0000314353 00000 n 0000000000 00000 f 0000314278 00000 n 0000000000 00000 f 0000102954 00000 n 0000314222 00000 n 0000000000 00000 f 0000314140 00000 n 0000000000 00000 f 0000103008 00000 n 0000314084 00000 n 0000000000 00000 f 0000313994 00000 n 0000000000 00000 f 0000103062 00000 n 0000313938 00000 n 0000000000 00000 f 0000313836 00000 n 0000000000 00000 f 0000103117 00000 n 0000313780 00000 n 0000000000 00000 f 0000313698 00000 n 0000000000 00000 f 0000103172 00000 n 0000313642 00000 n 0000000000 00000 f 0000313552 00000 n 0000000000 00000 f 0000103227 00000 n 0000313496 00000 n 0000000000 00000 f 0000313394 00000 n 0000000000 00000 f 0000103282 00000 n 0000313338 00000 n 0000000000 00000 f 0000313248 00000 n 0000000000 00000 f 0000103337 00000 n 0000313192 00000 n 0000000000 00000 f 0000313082 00000 n 0000000000 00000 f 0000103392 00000 n 0000313034 00000 n 0000000000 00000 f 0000312924 00000 n 0000000000 00000 f 0000103447 00000 n 0000124234 00000 n 0000307691 00000 n 0000309500 00000 n 0000312876 00000 n 0000000000 00000 f 0000312820 00000 n 0000000000 00000 f 0000312772 00000 n 0000000000 00000 f 0000312721 00000 n 0000000000 00000 f 0000312665 00000 n 0000000000 00000 f 0000312589 00000 n 0000000000 00000 f 0000124403 00000 n 0000312533 00000 n 0000000000 00000 f 0000312464 00000 n 0000000000 00000 f 0000124456 00000 n 0000312408 00000 n 0000000000 00000 f 0000312333 00000 n 0000000000 00000 f 0000124510 00000 n 0000312277 00000 n 0000000000 00000 f 0000312190 00000 n 0000000000 00000 f 0000124564 00000 n 0000312134 00000 n 0000000000 00000 f 0000312050 00000 n 0000000000 00000 f 0000124618 00000 n 0000311994 00000 n 0000000000 00000 f 0000311913 00000 n 0000000000 00000 f 0000124672 00000 n 0000311857 00000 n 0000000000 00000 f 0000311782 00000 n 0000000000 00000 f 0000124726 00000 n 0000311726 00000 n 0000000000 00000 f 0000311657 00000 n 0000000000 00000 f 0000124780 00000 n 0000311601 00000 n 0000000000 00000 f 0000311520 00000 n 0000000000 00000 f 0000124834 00000 n 0000311464 00000 n 0000000000 00000 f 0000311377 00000 n 0000000000 00000 f 0000124888 00000 n 0000311321 00000 n 0000000000 00000 f 0000311233 00000 n 0000000000 00000 f 0000124942 00000 n 0000311177 00000 n 0000000000 00000 f 0000311095 00000 n 0000000000 00000 f 0000124996 00000 n 0000311039 00000 n 0000000000 00000 f 0000310945 00000 n 0000000000 00000 f 0000125051 00000 n 0000310889 00000 n 0000000000 00000 f 0000310807 00000 n 0000000000 00000 f 0000125106 00000 n 0000310751 00000 n 0000000000 00000 f 0000310637 00000 n 0000000000 00000 f 0000125161 00000 n 0000310581 00000 n 0000000000 00000 f 0000310479 00000 n 0000000000 00000 f 0000125216 00000 n 0000310423 00000 n 0000000000 00000 f 0000310353 00000 n 0000000000 00000 f 0000125271 00000 n 0000310297 00000 n 0000000000 00000 f 0000310179 00000 n 0000000000 00000 f 0000125326 00000 n 0000310123 00000 n 0000000000 00000 f 0000310037 00000 n 0000000000 00000 f 0000125381 00000 n 0000309981 00000 n 0000000000 00000 f 0000309911 00000 n 0000000000 00000 f 0000125436 00000 n 0000125491 00000 n 0000146292 00000 n 0000249072 00000 n 0000249272 00000 n 0000249797 00000 n 0000250019 00000 n 0000250081 00000 n 0000251756 00000 n 0000251964 00000 n 0000261610 00000 n 0000261819 00000 n 0000270139 00000 n 0000270343 00000 n 0000275307 00000 n 0000275515 00000 n 0000277277 00000 n 0000277469 00000 n 0000284190 00000 n 0000284377 00000 n 0000287996 00000 n 0000288182 00000 n 0000290366 00000 n 0000290560 00000 n 0000294989 00000 n 0000295180 00000 n 0000295916 00000 n 0000296112 00000 n 0000299538 00000 n 0000299734 00000 n 0000301241 00000 n 0000301450 00000 n 0000303508 00000 n 0000307858 00000 n 0000309726 00000 n 0000309752 00000 n 0000327668 00000 n 0000328807 00000 n 0000330383 00000 n 0000331922 00000 n 0000333333 00000 n 0000335336 00000 n 0000336915 00000 n 0000338526 00000 n 0000338773 00000 n 0000338836 00000 n 0000338860 00000 n 0000338911 00000 n 0000338956 00000 n 0000339042 00000 n 0000339094 00000 n 0000339156 00000 n 0000339191 00000 n 0000339266 00000 n 0000339614 00000 n trailer << /Size 631 /Root 1 0 R /Info 3 0 R /ID[<20526a89525636b6448162b4026f1835><20526a89525636b6448162b4026f1835>] >> startxref 343395 %%EOF