%PDF-1.4 % 20 0 obj <> endobj 44 0 obj <> endobj 46 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 .014984 .51599 31.274 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .02 .8 .86 0 k (1)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 36 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.6318 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /Artifact <>BDC 0 .41 .96 0 k /GS1 gs 250.93 68.222 338.416 117.162 re f EMC /Figure <>BDC Q q 1 i 206.595 444.901 470.018 -313.345 re W n 254.73 373.079 334.618 -172.5 re W* n 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS1 gs q 335.521 0 0 173.185 254.403 200.292 cm /Im1 Do Q EMC /P <>BDC Q q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 9 0 0 9 36.593 542.691 Tm 0 0 0 1 k -.005 Tc 0 Tw [(Cyber)-24.4(threat intelligence \(C)14.2(TI\) is one of the latest)]TJ ET EMC /P <>BDC BT 9 0 0 9 227.0475 542.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 530.691 Tm -.005 Tc (buzzwords in the information security industry. As a)Tj ET EMC /P <>BDC BT 9 0 0 9 241.0693 530.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 518.691 Tm -.005 Tc [(fairly new resour)9.3(ce in the cybersecurity t)9.8(ool kit, it)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.2451 518.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 506.691 Tm -.005 Tc (has not yet reached maturity, but it is used by)Tj ET EMC /P <>BDC BT 9 0 0 9 214.7821 506.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 494.691 Tm -.005 Tc [(go)7.3(vernments, )]TJ /TT5 1 Tf 6.2075 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(nancial ser)-8.8(vices, banking, insur)19.5(ance,)]TJ ET EMC /P <>BDC BT 9 0 0 9 240.3497 494.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 482.691 Tm -.005 Tc [(retail companies, ecommer)9.3(ce, healthcare,)]TJ ET EMC /P <>BDC BT 9 0 0 9 200.7487 482.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 470.691 Tm -.005 Tc (manufacturing, telecommunication and energy)Tj ET EMC /P <>BDC BT 9 0 0 9 220.7101 470.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 458.691 Tm -.005 Tc (enterprises.)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 83.2373 462.4661 Tm 0 Tc (1)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 86.2246 461.661 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 87.3407 458.691 Tm -.005 Tc (Threat hunting is the activity)Tj ET EMC /P <>BDC BT 9 0 0 9 198.8647 458.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 446.691 Tm -.005 Tc [(associated with identifying the threats t)9.8(o)0( an)]TJ ET EMC /P <>BDC BT 9 0 0 9 209.0625 446.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 434.691 Tm -.005 Tc (organization and its critical digital assets and)Tj ET EMC /P <>BDC BT 9 0 0 9 215.1853 434.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 422.691 Tm -.005 Tc [(acquiring the intelligence t)9.8(o)0( combat them.)]TJ ET EMC /P <>BDC BT 9 0 0 9 202.8165 422.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 398.691 Tm -.005 Tc [(Organizations use C)14.2(TI t)9.8(o)0( understand the threats)]TJ ET EMC /P <>BDC BT 9 0 0 9 225.4828 398.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 386.691 Tm -.005 Tc [(that ha)7.3(ve, will or are currently targeting the)]TJ ET EMC /P <>BDC BT 9 0 0 9 204.1175 386.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 374.691 Tm -.005 Tc [(organization. It functions as a pr)9.8(oactive extension)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.1559 374.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 362.6911 Tm -.005 Tc [(t)9.8(o)0( incident response by le)6.3(ver)19.5(aging the output fr)9.8(om)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.8269 362.6911 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 350.6911 Tm -.005 Tc [(existing cybersecurity monit)9.8(oring t)9.8(ools. )19.5(The)]TJ ET EMC /P <>BDC BT 9 0 0 9 208.69 350.6911 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 338.6911 Tm -.005 Tc [(information obtained fr)9.8(om C)14.2(TI is used t)9.8(o)0( prepare)]TJ ET EMC /P <>BDC BT 9 0 0 9 229.0281 338.6911 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 326.6911 Tm -.005 Tc [(for)60.1(, pre)6.3(vent and identify cybersecurity threats that)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.687 326.6911 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 314.6911 Tm -.005 Tc [(are trying t)9.8(o)0( take adv)7.3(antage of v)7.3(aluable data. C)14.2(T)0(I)]TJ ET EMC /P <>BDC BT 9 0 0 9 229.4612 314.6911 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 302.6912 Tm -.005 Tc [(can also be described as e)6.3(vidence-based)]TJ ET EMC /P <>BDC BT 9 0 0 9 198.5306 302.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 290.6912 Tm -.005 Tc (knowledge about adversary motives, intents,)Tj ET EMC /P <>BDC BT 9 0 0 9 211.6529 290.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 278.6912 Tm -.005 Tc [(capabilities, enabling envir)9.8(onments and oper)19.5(ations.)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.1456 278.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 266.6912 Tm -.005 Tc [(C)14.2(TI can be focused on a single cybersecurity e)6.3(vent)]TJ ET EMC /P <>BDC BT 9 0 0 9 236.3912 266.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 254.6912 Tm -.005 Tc [(or a series of e)6.3(vents or trends, and it pr)9.8(o)7.3(vides)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.7917 254.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 242.6912 Tm -.005 Tc [(advisory and reactional information t)9.8(o)0( the defender)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 240.4014 242.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 218.6912 Tm -.005 Tc [(There are many types of cyber)-24.4(threats that can)]TJ ET EMC /P <>BDC BT 9 0 0 9 218.2471 218.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 206.6912 Tm -.005 Tc (cause concern for an organization. Gathering and)Tj ET EMC /P <>BDC BT 9 0 0 9 231.3351 206.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 194.6912 Tm -.005 Tc [(analyzing information about the sour)9.3(ce of such)]TJ ET EMC /P <>BDC BT 9 0 0 9 222.557 194.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 182.6912 Tm -.005 Tc [(threats helps t)9.8(o)0( combat any adv)7.3(anced persistent)]TJ ET EMC /P <>BDC BT 9 0 0 9 228.9764 182.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 170.6912 Tm -.005 Tc [(threats \(APT)56.6(s\), distributed denial-of-ser)-8.8(vice \(DDoS\))]TJ ET EMC /P <>BDC BT 9 0 0 9 237.5713 170.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 158.6912 Tm -.005 Tc [(attacks and web application attacks \()-8.8(W)21(AA\) that)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.3236 158.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 146.6912 Tm -.005 Tc [(may occur)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 79.8028 146.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 122.6912 Tm -.005 Tc [(The resour)9.3(ces a)7.3(v)7.3(ailable t)9.8(o)0( counter cybersecurity)]TJ ET EMC /P <>BDC BT 9 0 0 9 227.4329 122.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 110.6912 Tm -.005 Tc [(threats are numer)9.8(ous and co)7.3(ver a wide r)19.5(ange of)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.8994 110.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 98.6912 Tm -.005 Tc (options, including threat modelling,)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 174.4956 102.4661 Tm 0 Tc (2)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 177.4829 101.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 179.7896 102.4661 Tm 0 Tc (3)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 182.777 101.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 185.0838 102.4661 Tm 0 Tc (4)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 188.071 101.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 190.3779 102.4661 Tm 0 Tc (5)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 193.3652 101.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 195.672 102.4661 Tm 0 Tc (6)Tj ET EMC /P <>BDC BT 9 0 0 9 198.6593 98.6912 Tm -.005 Tc ( software)Tj ET EMC /P <>BDC BT 9 0 0 9 235.7925 98.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 86.6912 Tm -.005 Tc [(t)9.8(ools,)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 58.0321 90.4661 Tm 0 Tc (7)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 61.0194 89.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 63.3261 90.4661 Tm 0 Tc (8)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 66.3135 89.661 Tm -.0083 Tc (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 68.6203 90.4661 Tm 0 Tc (9)Tj ET EMC /P <>BDC BT 9 0 0 9 71.6077 86.6912 Tm -.005 Tc [( open-sour)9.3(ce threat information )]TJ ET EMC /P <>BDC BT 9 0 0 9 198.6599 86.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 36.593 74.6912 Tm -.005 Tc (feeds)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 58.7451 78.4661 Tm -.0083 Tc (10)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 64.7196 77.661 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 67.0264 78.4661 Tm (11)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 73.001 77.661 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 75.3078 78.4661 Tm (12)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 81.2823 77.661 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 83.5892 78.4661 Tm (13)Tj ET EMC /P <>BDC BT 9 0 0 9 89.5637 74.6912 Tm -.005 Tc [( and vendor ser)-8.8(vices.)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 173.1524 78.4661 Tm -.0083 Tc (14)Tj ET EMC /P <>BDC BT 9 0 0 9 179.1268 74.6912 Tm -.005 Tc ( Industry)Tj ET EMC /P <>BDC BT 9 0 0 9 213.285 74.6912 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 542.691 Tm -.005 Tc [(sur)-8.8(veys,)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 287.2527 546.4661 Tm -.0083 Tc (15)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 293.2273 545.6611 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 295.534 546.4661 Tm (16)Tj ET EMC /P <>BDC BT 9 0 0 9 301.5087 542.691 Tm -.005 Tc [( pr)9.8(ofessional associations)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 405.4343 546.4661 Tm -.0083 Tc (17)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 411.4088 545.6611 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 413.7157 546.4661 Tm (18)Tj ET EMC /P <>BDC BT 9 0 0 9 419.6902 542.691 Tm -.005 Tc ( and )Tj ET EMC /P <>BDC BT 9 0 0 9 438.8584 542.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 530.691 Tm -.005 Tc [(C)14.2(TI guides)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 297.0988 534.4661 Tm -.0083 Tc (19)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 303.0734 533.6611 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 305.3801 534.4661 Tm (20)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 311.3548 533.6611 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 313.6615 534.4661 Tm (21)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 319.636 533.6611 Tm (, )Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 321.9429 534.4661 Tm (22)Tj ET EMC /P <>BDC BT 9 0 0 9 327.9174 530.691 Tm -.005 Tc [( also pr)9.8(o)7.3(vide information and)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.2351 530.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 518.691 Tm -.005 Tc [(guidance t)9.8(o)0( address threats.)]TJ ET EMC /P <>BDC BT 9 0 0 9 367.8101 518.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 494.691 Tm -.005 Tc (Th)Tj ET EMC /P <>BDC BT 9 0 0 9 265.3302 494.691 Tm -.02 Tc [(e goals and objectives of C)14.2(TI include reducing)]TJ ET EMC /P <>BDC BT 9 0 0 9 440.3735 494.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 482.691 Tm -.02 Tc [(exposure t)9.8(o)0( internal and external threats, learning the)]TJ ET EMC /P <>BDC BT 9 0 0 9 457.1909 482.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 470.691 Tm -.02 Tc [(attack sur)-7.3(face, determining dwell time fr)9.8(om infection)]TJ ET EMC /P <>BDC BT 9 0 0 9 456.5136 470.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 458.691 Tm -.02 Tc [(t)9.8(o)0( detection \(i.e., mean time t)9.8(o)0( detection [MT)-7.8(TD]\),)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.5187 458.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 446.691 Tm -.02 Tc [(enumer)19.5(ating the time t)9.8(o)0( containment/spread)]TJ ET EMC /P <>BDC BT 9 0 0 9 426.6727 446.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 434.691 Tm -.02 Tc [(pre)6.3(vention, and estimating the number of breaches)]TJ ET EMC /P <>BDC BT 9 0 0 9 449.3586 434.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 422.691 Tm -.02 Tc [(and infections. Achie)6.3(ving these goals can keep an)]TJ ET EMC /P <>BDC BT 9 0 0 9 445.342 422.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 410.691 Tm -.02 Tc (organization functioning smoothly in the face of a)Tj ET EMC /P <>BDC BT 9 0 0 9 444.327 410.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 398.691 Tm -.02 Tc [(threat. Identifying the indicat)9.8(ors of compr)9.8(omise \(e.g.,)]TJ ET EMC /P <>BDC BT 9 0 0 9 456.7998 398.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.093 386.691 Tm -.02 Tc (known attacks, )Tj ET EMC /P <>BDC BT 9 0 0 9 314.5891 386.691 Tm -.005 Tc [(incidents/e)6.3(vents\) and the attacker)-7.8()54.7(s)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.6866 386.691 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT7 1 Tf 30 0 0 30 36.593 660.6805 Tm .02 .8 .86 0 k -.02 Tc [(Cyber)-24.4(threat Intelligence as a)]TJ ET EMC /P <>BDC BT 30 0 0 30 391.8375 660.6805 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 30 0 0 30 36.593 626.6804 Tm -.02 Tc [(Pr)9.8(oactive Extension t)9.8(o)0( Incident)]TJ ET EMC /P <>BDC BT 30 0 0 30 422.3078 626.6804 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 30 0 0 30 36.593 592.6805 Tm -.02 Tc (Response)Tj ET EMC /P <>BDC BT /TT9 1 Tf 11 0 0 11 262.2295 166.059 Tm 0 0 0 0 k (Larry G. Wlosinski,)Tj ET EMC /P <>BDC BT /TT2 1 Tf 11 0 0 11 350.2394 166.059 Tm [( CISA, CRISC, CISM, CDPSE, CAP)158.2(, CBCP)158.2(, CCSP)158.2(,)]TJ ET EMC /P <>BDC BT 11 0 0 11 561.7368 166.059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 11 0 0 11 262.2295 154.059 Tm -.02 Tc [(CDP)158.2(, CIPM, CISSP)158.2(, ITIL v3, PMP)]TJ ET EMC /P <>BDC BT 11 0 0 11 406.0049 154.059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 143.2589 Tm (Is a senior consultant at Coal)Tj /TT5 1 Tf 12.9003 0 TD ()Tj /TT2 1 Tf .5537 0 TD [(re Feder)19.5(al. He has more than 22 years of)]TJ ET EMC /P <>BDC BT 9 0 0 9 545.1011 143.2589 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 132.459 Tm [(experience in IT)19.5( security and priv)7.3(acy and has spoken at US go)7.3(vernment and)]TJ ET EMC /P <>BDC BT 9 0 0 9 562.4419 132.459 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 121.6588 Tm [(pr)9.8(ofessional conferences on these t)9.8(opics. He has written numer)9.8(ous)]TJ ET EMC /P <>BDC BT 9 0 0 9 532.0009 121.6588 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 110.859 Tm [(magazine and newspaper ar)-24.4(ticles, re)6.3(viewed v)7.3(arious ISACA)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 495.1572 113.8289 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 499.4023 110.859 Tm ( publications,)Tj ET EMC /P <>BDC BT 9 0 0 9 552.2949 110.859 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 100.059 Tm [(and written questions for the Cer)-24.4(ti)]TJ /TT5 1 Tf 15.1127 0 TD ()Tj /TT2 1 Tf .5537 0 TD (ed Information Security Manager)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 534.163 103.0289 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 538.4081 100.059 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 89.2589 Tm (\(CISM)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 286.8081 92.2289 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 291.0532 89.2589 Tm [(\) and Cer)-24.4(ti)]TJ /TT5 1 Tf 4.6152 0 TD ()Tj /TT2 1 Tf .5537 0 TD [(ed in Risk and Information Systems Contr)9.8(ol)]TJ ET EMC /P <>BDC BT 5.4 0 0 5.4 510.1689 92.2289 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 514.414 89.2589 Tm ( \(CRISC)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 544.7626 92.2289 Tm ()Tj ET EMC /P <>BDC BT 9 0 0 9 549.0079 89.2589 Tm (\))Tj ET EMC /P <>BDC BT 9 0 0 9 552.1368 89.2589 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 262.2295 78.4589 Tm (examinations.)Tj ET EMC /Artifact <>BDC 513.231 692.116 53.716 54.884 re f EMC /Figure <>BDC Q /GS1 gs BT /F1 1 Tf 9 0 0 9 513.2317 721.5889 Tm .011765 .41569 .94118 0 k .0249 Tc 0 Tw (FEATURE)Tj ET q 1 i 513.246 746.986 53.701 -54.87 re W n q 1 0 0 1 566.947 747 cm 0 0 m 0 -54.884 l -9.375 -54.884 l -9.375 -9.9448 l -49.977 -9.9448 l -49.977 0 l 0 0 l f Q EMC Q endstream endobj 47 0 obj <>/XObject<>/ExtGState<>>> endobj 85 0 obj <> endobj 90 0 obj <> endobj 95 0 obj <> endobj 100 0 obj <> endobj 115 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 .014984 .51505 31.516 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .02 .8 .86 0 k (2)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 414.3912 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 522.0229 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 144 665.6398 Tm -.005 Tc [(digital footprint are also impor)-24.4(tant objectives for an)]TJ ET EMC /P <>BDC BT 9 0 0 9 346.8834 665.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 653.6398 Tm -.005 Tc [(organization t)9.8(o)0( use t)9.8(o)0( defend themselves.)]TJ ET EMC /P <>BDC BT 9 0 0 9 309.5478 653.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 641.6398 Tm -.005 Tc [(Determining threat act)9.8(or beha)7.3(viors and adversary)]TJ ET EMC /P <>BDC BT 9 0 0 9 338.7114 641.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 629.6398 Tm -.005 Tc [(tactics, motiv)7.3(ations, infr)19.5(astructure, methods, and)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.3407 629.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 617.6398 Tm -.005 Tc [(pr)9.8(ocedures can pr)9.8(o)7.3(vide str)19.5(ategic and tactical)]TJ ET EMC /P <>BDC BT 9 0 0 9 321.655 617.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 605.6398 Tm -.005 Tc [(information that the organization can use t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 317.0242 605.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 593.6398 Tm -.005 Tc (combat them.)Tj ET EMC /P <>BDC BT 9 0 0 9 199.2268 593.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 569.6398 Tm -.005 Tc [(These C)14.2(TI goals and objectives can be dif)]TJ /TT5 1 Tf 18.2354 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cult t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 337.7524 569.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 557.6398 Tm -.005 Tc [(achie)6.3(ve due t)9.8(o)0( the challenges inherent in data and)]TJ ET EMC /P <>BDC BT 9 0 0 9 341.2274 557.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 545.6398 Tm -.005 Tc (information gathering, technology, analysis,)Tj ET EMC /P <>BDC BT 9 0 0 9 315.0818 545.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 533.6398 Tm -.005 Tc (information sharing, management, communication,)Tj ET EMC /P <>BDC BT 9 0 0 9 345.6515 533.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 521.6398 Tm -.005 Tc (and staf)Tj /TT5 1 Tf 3.6006 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ng; howe)6.3(ver)60.1(, it is impor)-24.4(tant t)9.8(o)0( understand)]TJ ET EMC /P <>BDC BT 9 0 0 9 344.2323 521.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 509.6398 Tm -.005 Tc [(them and, ultimately, defeat them t)9.8(o)0( reduce the)]TJ ET EMC /P <>BDC BT 9 0 0 9 329.8135 509.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 497.6398 Tm -.005 Tc [(amount of effor)-24.4(t needed in implementing and)]TJ ET EMC /P <>BDC BT 9 0 0 9 323.1732 497.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 485.6398 Tm -.005 Tc [(maintaining a C)14.2(TI pr)9.8(ogr)19.5(am.)]TJ ET EMC /P <>BDC BT 9 0 0 9 251.2875 485.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 144 459.6398 Tm 0 .41 .96 0 k -.005 Tc (Challenges in Data and Information)Tj ET EMC /P <>BDC BT 11 0 0 11 316.1273 459.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 11 0 0 11 144 445.6398 Tm -.005 Tc (Gathering)Tj ET EMC /P <>BDC BT 11 0 0 11 192.0815 445.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 144 427.6398 Tm 0 0 0 1 k -.005 Tc [(The most impor)-24.4(tant components of C)14.2(TI are data.)]TJ ET EMC /P <>BDC BT 9 0 0 9 337.3687 427.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 415.6398 Tm -.005 Tc (The key areas of concern are data quality, the)Tj ET EMC /P <>BDC BT 9 0 0 9 322.7262 415.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 403.6398 Tm -.005 Tc [(rele)6.3(v)7.3(ance of threat data, and the timeliness of)]TJ ET EMC /P <>BDC BT 9 0 0 9 324.2238 403.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 391.6398 Tm -.005 Tc (threat data, and the intelligence obtained.)Tj ET EMC /P <>BDC BT 9 0 0 9 306.9793 391.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 379.6398 Tm -.005 Tc [(Challenges in gathering data come in a v)7.3(ariety of)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.8891 379.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 367.6398 Tm -.005 Tc [(forms, and the t)9.8(op concerns are data quality,)]TJ ET EMC /P <>BDC BT 9 0 0 9 319.5676 367.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 355.6398 Tm -.005 Tc [(aggregation, v)7.3(alidation and normalization.)]TJ ET EMC /P <>BDC BT 9 0 0 9 309.4676 355.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 331.6398 Tm -.005 Tc [(Data quality refers t)9.8(o)0( the cleanliness and quality of)]TJ ET EMC /P <>BDC BT 9 0 0 9 343.2942 331.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 319.6398 Tm -.005 Tc [(data, which can be impr)9.8(o)7.3(ved by aut)9.8(omatically)]TJ ET EMC /P <>BDC BT 9 0 0 9 323.5633 319.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 307.6397 Tm -.005 Tc [(identifying and remo)7.3(ving expired indicat)9.8(ors of)]TJ ET EMC /P <>BDC BT 9 0 0 9 324.3302 307.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 295.6397 Tm -.005 Tc [(compr)9.8(omise \(IOCs\), disregarding stale data and)]TJ ET EMC /P <>BDC BT 9 0 0 9 332.6798 295.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 283.6397 Tm -.005 Tc [(remo)7.3(ving undependable r)19.5(aw data. Other fact)9.8(ors)]TJ ET EMC /P <>BDC BT 9 0 0 9 331.9734 283.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 271.6397 Tm -.005 Tc (that affect data quality include:)Tj ET EMC /P <>BDC BT 9 0 0 9 266.0986 271.6397 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 155.016 253.6638 Tm -.005 Tc [(C)14.2(TI vendors that use an obsolete detection)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 324.0959 253.6638 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 144 253.6638 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 241.6638 Tm 0 0 0 1 k -.005 Tc (mechanism such as hash-based detection)Tj ET EMC /LBody <>BDC BT 9 0 0 9 321.771 241.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 155.016 223.6878 Tm -.005 Tc [(Threat applicability t)9.8(o)0( cer)-24.4(tain industries)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 310.9037 223.6878 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 144 223.6878 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 205.7117 Tm 0 0 0 1 k -.005 Tc [(The extensiveness of data co)7.3(ver)19.5(age \(i.e., Do the)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 343.2016 205.7117 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 144 205.7117 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 193.7117 Tm 0 0 0 1 k -.005 Tc (data contain useful information?\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 286.2947 193.7117 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 155.016 175.7358 Tm -.005 Tc [(F)16.6(alse threat repor)-24.4(ts )]TJ /TT5 1 Tf 8.8266 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(led by attackers t)9.8(o)0( mislead)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 345.4463 175.7358 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 144 175.7358 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.016 163.7358 Tm 0 0 0 1 k -.005 Tc [(C)14.2(TI users)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 192.4437 163.7358 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 145.7358 Tm -.005 Tc [(Data quality can be inhibited by an organization)39.1()54.7(s)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.8309 145.7358 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 133.7357 Tm -.005 Tc [(implementation of pre)6.3(ventive or pr)9.8(otective)]TJ ET EMC /P <>BDC BT 9 0 0 9 311.1727 133.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 121.7357 Tm -.005 Tc [(measures that pr)9.8(ohibit the re)6.3(velation of data)]TJ ET EMC /P <>BDC BT 9 0 0 9 319.0535 121.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 109.7357 Tm -.005 Tc (concerning classi)Tj /TT5 1 Tf 7.6909 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (ed or sensitive incidents.)Tj ET EMC /P <>BDC BT 9 0 0 9 315.9475 109.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 85.7357 Tm -.005 Tc [(Data aggregation is a challenge due t)9.8(o)0( the diverse)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.6825 85.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 73.7357 Tm -.005 Tc [(intelligence sour)9.3(ces, differing delivery mechanisms)]TJ ET EMC /P <>BDC BT 9 0 0 9 345.577 73.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 144 61.7357 Tm -.005 Tc [(\(e.g., format, software, t)9.8(ools\) and duplication of)]TJ ET EMC /P <>BDC BT 9 0 0 9 330.9355 61.7357 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 665.6398 Tm -.005 Tc [(data. Because threat intelligence sour)9.3(ces are)]TJ ET EMC /P <>BDC BT 9 0 0 9 539.8826 665.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 653.6398 Tm -.005 Tc (diverse, they can be dif)Tj /TT5 1 Tf 10.0153 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cult t)9.8(o)0( simplify and conver)-24.4(t)]TJ ET EMC /P <>BDC BT 9 0 0 9 564.6024 653.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 641.6398 Tm -.005 Tc [(t)9.8(o)0( a usable format. )19.5(The huge v)7.3(olume of data)]TJ ET EMC /P <>BDC BT 9 0 0 9 537.1117 641.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 629.6398 Tm -.005 Tc [(a)7.3(v)7.3(ailable for aggregation, st)9.8(or)19.5(age and ef)]TJ /TT5 1 Tf 17.629 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cient)Tj ET EMC /P <>BDC BT 9 0 0 9 545.444 629.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 617.6398 Tm -.005 Tc (querying and the fact that some data may be)Tj ET EMC /P <>BDC BT 9 0 0 9 538.8387 617.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 605.6398 Tm -.005 Tc [(encrypted are other fact)9.8(ors. Location-based data)]TJ ET EMC /P <>BDC BT 9 0 0 9 554.9087 605.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 593.6398 Tm -.005 Tc [(\(e.g., country, region\) may not be rele)6.3(v)7.3(ant and)]TJ ET EMC /P <>BDC BT 9 0 0 9 542.0734 593.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 581.6398 Tm -.005 Tc [(should be ex)9.8(cluded.)]TJ ET EMC /P <>BDC BT 9 0 0 9 441.1556 581.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 377.6397 Tm -.005 Tc [(The wide r)19.5(ange of collection methods \(i.e.,)]TJ ET EMC /P <>BDC BT 9 0 0 9 529.474 377.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 365.6397 Tm -.005 Tc [(aut)9.8(omatically collected, community sour)9.3(ced,)]TJ ET EMC /P <>BDC BT 9 0 0 9 538.4213 365.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 353.6397 Tm -.005 Tc [(pr)9.8(ofessional intelligence collection\) also makes)]TJ ET EMC /P <>BDC BT 9 0 0 9 550.2505 353.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 341.6397 Tm -.005 Tc (aggregation a challenge. Data delivery mechanisms)Tj ET EMC /P <>BDC BT 9 0 0 9 565.9731 341.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 329.6398 Tm -.005 Tc [(include web-based pr)9.8(ot)9.8(ocols such as HyperText)]TJ ET EMC /P <>BDC BT 9 0 0 9 551.6335 329.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 317.6397 Tm -.005 Tc [(T)36.6(r)19.5(ansfer Pr)9.8(ot)9.8(ocol \(H)14.2(T)-7.8(TP\) and File )19.5(T)36.6(r)19.5(ansfer Pr)9.8(ot)9.8(ocol)]TJ ET EMC /P <>BDC BT 9 0 0 9 565.6899 317.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 305.6397 Tm -.005 Tc [(\(F)-9.8(TP\), which are useful for sour)9.3(ces of information,)]TJ ET EMC /P <>BDC BT 9 0 0 9 560.4076 305.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 293.6397 Tm -.005 Tc [(but not all C)14.2(TI systems are designed for them.)]TJ ET EMC /P <>BDC BT 9 0 0 9 544.2936 293.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 281.6397 Tm -.005 Tc [(Either the data sour)9.3(ces need t)9.8(o)0( pr)9.8(o)7.3(vide more)]TJ ET EMC /P <>BDC BT 9 0 0 9 539.2728 281.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 269.6397 Tm -.005 Tc [(formats or the receiving software needs t)9.8(o)0( be able)]TJ ET EMC /P <>BDC BT 9 0 0 9 560.848 269.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 257.6397 Tm -.005 Tc [(t)9.8(o)0( receive it by design.)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.4052 257.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 233.6397 Tm -.005 Tc [(Data v)7.3(alidation inv)7.3(olves the elimination of false)]TJ ET EMC /P <>BDC BT 9 0 0 9 548.4037 233.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 221.6397 Tm -.005 Tc [(positives, remo)7.3(v)7.3(al of nonrele)6.3(v)7.3(ant threat intelligence)]TJ ET EMC /P <>BDC BT 9 0 0 9 565.4065 221.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 209.6397 Tm -.005 Tc [(and data augmentation for analytics and repor)-24.4(ting.)]TJ ET EMC /P <>BDC BT 9 0 0 9 562.6322 209.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 197.6397 Tm -.005 Tc [(Data priv)7.3(acy and legal issues may also impact)]TJ ET EMC /P <>BDC BT 9 0 0 9 544.5583 197.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 185.6397 Tm -.005 Tc [(a)7.3(v)7.3(ailability and usage of the data a)7.3(v)7.3(ailable.)]TJ ET EMC /P <>BDC BT 9 0 0 9 531.5593 185.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 161.6397 Tm -.005 Tc (Norm)Tj ET EMC /P <>BDC BT 9 0 0 9 384.8025 161.6397 Tm -.02 Tc (alization and correlation is another challenging)Tj ET EMC /P <>BDC BT 9 0 0 9 562.5313 161.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 149.6397 Tm -.02 Tc [(area due t)9.8(o)0( inconsistent data formats. If one set of)]TJ ET EMC /P <>BDC BT 9 0 0 9 555.5138 149.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 137.6397 Tm -.02 Tc (data is delivered as an unstructured PDF but another)Tj ET EMC /P <>BDC BT 9 0 0 9 562.4482 137.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 125.6397 Tm -.02 Tc [(takes the form of Structured )19.5(Threat Information)]TJ ET EMC /P <>BDC BT 9 0 0 9 543.6387 125.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 113.6397 Tm -.02 Tc (Expression \(STIX\), identifying genuine threats can be)Tj ET EMC /P <>BDC BT 9 0 0 9 563.0417 113.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 101.6397 Tm -.02 Tc (dif)Tj /TT5 1 Tf 1.0938 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(cult. )19.5(The challenge is compounded when)]TJ ET EMC /P <>BDC BT 9 0 0 9 533.0557 101.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 89.6397 Tm -.02 Tc [(assembling and comparing information fr)9.8(om internal)]TJ ET EMC /P <>BDC BT 9 0 0 9 564.276 89.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 77.6397 Tm -.02 Tc [(and external data sour)9.3(ces. )19.5(There are also )]TJ ET EMC /P <>BDC BT 9 0 0 9 521.7881 77.6397 Tm -.005 Tc (new)Tj ET EMC /P <>BDC BT 9 0 0 9 538.1503 77.6397 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5 65.6397 Tm -.005 Tc (vendor-speci)Tj /TT5 1 Tf 5.627 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(c data structure formats t)9.8(o)0( consider)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 562.0917 65.6397 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .02 .8 .86 0 k /GS1 gs 362.002 395.569 207.158 175.035 re f EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 370.2061 529.4183 Tm 0 .425 .075 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 384.1133 549.4186 Tm 0 0 0 0 k [( DA)63(T)38.6(A)0( V)36.6(ALIDA)63(TION)]TJ ET EMC /P <>BDC BT 14 0 0 14 503.4893 549.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 531.4186 Tm -.0195 Tw [(INV)6.3(OL)85.4(VES THE )-19.5(ELIMINA)63(TION)]TJ ET EMC /P <>BDC BT 14 0 0 14 552.2197 531.4186 Tm 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 513.4186 Tm [(OF F)83(ALSE POSITIVES,)]TJ ET EMC /P <>BDC BT 14 0 0 14 504.6553 513.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 495.4186 Tm [(REMO)10.7(V)36.6(AL OF)]TJ ET EMC /P <>BDC BT 14 0 0 14 454.3702 495.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 477.4186 Tm -.0195 Tw [(NONRELEV)36.6(ANT)19.5( THREA)63(T)]TJ ET EMC /P <>BDC BT 14 0 0 14 521.882 477.4186 Tm 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 459.4186 Tm [(INTELLIGENCE AND DA)63(T)38.6(A)]TJ ET EMC /P <>BDC BT 14 0 0 14 533.3253 459.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 441.4186 Tm [(A)8.3(UGMENT)38.6(A)63(TION FOR)]TJ ET EMC /P <>BDC BT 14 0 0 14 505.2773 441.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 423.4186 Tm [(ANAL)116.7(Y)-8.3(TICS AND)]TJ ET EMC /P <>BDC BT 14 0 0 14 474.2148 423.4186 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 370.2061 405.4186 Tm [(REPOR)39.1(TING. )]TJ ET EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 452.1416 385.4184 Tm 0 .425 .075 0 k ()Tj ET EMC Q endstream endobj 116 0 obj <>/ExtGState<>>> endobj 144 0 obj <> endobj 149 0 obj <> endobj 154 0 obj <> endobj 159 0 obj <> endobj 164 0 obj <> endobj 169 0 obj <> endobj 178 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 .014984 .51599 31.274 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .02 .8 .86 0 k (3)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 36 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.6318 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /P <>BDC BT /TT2 1 Tf 9 0 0 9 37.1595 665.6398 Tm -.005 Tc (Recommendations for data and information)Tj ET EMC /P <>BDC BT 9 0 0 9 210.2757 665.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 653.6398 Tm -.005 Tc (gathering include collecting the most useful)Tj ET EMC /P <>BDC BT 9 0 0 9 209.7619 653.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 641.6398 Tm -.005 Tc [(intelligence, ha)7.3(ving pr)9.8(o)7.3(viders prepare intelligence)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.0022 641.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 629.6398 Tm -.005 Tc [(int)9.8(o a usable format and le)6.3(vel of detail for each type)]TJ ET EMC /P <>BDC BT 9 0 0 9 241.6645 629.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 617.6398 Tm -.005 Tc [(of use, and a)7.3(v)7.3(oiding wasting time and money by)]TJ ET EMC /P <>BDC BT 9 0 0 9 226.437 617.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 605.6398 Tm -.005 Tc [(collecting and disseminating trivial data. E)12.7(v)7.3(aluating)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.4025 605.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 593.6398 Tm -.005 Tc [(data feeds in relation t)9.8(o)0( data sour)9.3(ces \(speci)]TJ /TT5 1 Tf 19.2286 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD (c)Tj ET EMC /P <>BDC BT 9 0 0 9 219.8223 593.6398 Tm ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 581.6398 Tm -.005 Tc [(industry\), ensuring tr)19.5(ansparency of data sour)9.3(ces \(t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 240.6824 581.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 569.6398 Tm -.005 Tc [(pre)6.3(vent intelligence poisoning\), and establishing)]TJ ET EMC /P <>BDC BT 9 0 0 9 226.9745 569.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 557.6398 Tm -.005 Tc [(policies related t)9.8(o)0( the unique data t)9.8(o)0( be used,)]TJ ET EMC /P <>BDC BT 9 0 0 9 215.8276 557.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 545.6398 Tm -.005 Tc [(frequency of data by sour)9.3(ce, and targeted)]TJ ET EMC /P <>BDC BT 9 0 0 9 201.1342 545.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 533.6398 Tm -.005 Tc [(measur)19.5(able results are also impor)-24.4(tant.)]TJ ET EMC /P <>BDC BT 9 0 0 9 189.6543 533.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 37.1595 507.6398 Tm 0 .41 .96 0 k -.005 Tc (Technology Challenges)Tj ET EMC /P <>BDC BT 11 0 0 11 151.7735 507.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 37.1595 489.6398 Tm 0 0 0 1 k -.02 Tc [(The v)7.3(ariety of technologies associated with C)14.2(T)0(I)]TJ ET EMC /P <>BDC BT 9 0 0 9 217.5161 489.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 477.6398 Tm -.02 Tc [(pr)9.8(o)7.3(vides challenges with regard t)9.8(o)0( t)9.8(ools, machine)]TJ ET EMC /P <>BDC BT 9 0 0 9 225.7211 477.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 465.6398 Tm -.02 Tc [(learning \(ML\) and analytics, integr)19.5(ation and)]TJ ET EMC /P <>BDC BT 9 0 0 9 201.5545 465.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 453.6398 Tm -.02 Tc [(inter)9.8(oper)19.5(ability, standards, aut)9.8(omation, and attack)]TJ ET EMC /P <>BDC BT 9 0 0 9 227.4265 453.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 441.6398 Tm -.02 Tc [(sur)-7.3(faces. )19.5(The following explains each of these)]TJ ET EMC /P <>BDC BT 9 0 0 9 213.9211 441.6398 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 37.1595 429.6398 Tm -.02 Tc (challenges brie)Tj /TT1 1 Tf 6.4109 0 TD 0 Tc <0001>Tj /TT2 1 Tf .5479 0 TD -.02 Tc (y:)Tj ET EMC /P <>BDC BT 9 0 0 9 105.8672 429.6398 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 48.1755 411.6637 Tm 0 .85 .15 0 k -.005 Tc [(T)101.6(ools)]TJ ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 69.7959 411.6637 Tm 0 0 0 1 k [(Many cybersecurity pr)9.8(ofessionals are)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 224.1858 411.6637 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 37.1595 411.6637 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 48.1755 399.6638 Tm 0 0 0 1 k -.005 Tc (working with outdated security information and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 234.4867 399.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 387.6638 Tm -.005 Tc [(e)6.3(vent management \(SIEM\) t)9.8(ools and a security)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 232.5816 387.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 375.6638 Tm -.005 Tc [(oper)19.5(ations center \(SOC)12.7(\) infr)19.5(astructure that is not)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 240.1956 375.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 363.6638 Tm -.005 Tc (suited for easy data acquisition. As a result, a)Tj ET EMC /LBody <>BDC BT 9 0 0 9 226.9744 363.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 351.6638 Tm -.005 Tc (lack of con)Tj /TT5 1 Tf 4.82 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(dence in the ability of t)9.8(ools t)9.8(o)0( catch)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 236.5788 351.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 339.6638 Tm -.005 Tc [(applicable threats requires a change in appr)9.8(oach)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 240.1096 339.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 327.6637 Tm -.005 Tc (and methodology.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 119.5085 327.6637 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 48.1755 309.6877 Tm 0 .85 .15 0 k -.005 Tc (ML and analytics)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 115.9753 309.6877 Tm 0 0 0 1 k [(T)36.6(r)19.5(anslating tacit knowledge)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 231.7685 309.6877 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 37.1595 309.6877 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 48.1755 297.6877 Tm 0 0 0 1 k -.005 Tc [(fr)9.8(om ML will be a challenge for years t)9.8(o)0( come.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 230.2373 297.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 285.6877 Tm -.005 Tc [(Containment of attacks and er)19.5(adication of)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 214.633 285.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 273.6877 Tm -.005 Tc [(vulner)19.5(abilities continually gr)9.8(ow more dif)]TJ /TT5 1 Tf 17.4122 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cult and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 241.4261 273.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 261.6877 Tm -.005 Tc [(increase the v)7.3(olume of data t)9.8(o)0( be pr)9.8(ocessed. In)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 235.1493 261.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 249.6878 Tm -.005 Tc (addition, it is dif)Tj /TT5 1 Tf 6.9314 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cult t)9.8(o)0( adjust ML t)9.8(o)0( new tactics)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 239.0727 249.6878 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 237.6878 Tm -.005 Tc (and techniques that exploit weaknesses in)Tj ET EMC /LBody <>BDC BT 9 0 0 9 215.4328 237.6878 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 225.6878 Tm -.005 Tc (current security defenses.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 150.5279 225.6878 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 48.1755 207.7118 Tm 0 .85 .15 0 k -.005 Tc [(Integr)14.6(ation/inter)17.6(oper)14.6(ability)]TJ ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 155.7554 207.7118 Tm 0 0 0 1 k [(Integr)19.5(ation of)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 215.7516 207.7118 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 37.1595 207.7118 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 48.1755 195.7118 Tm 0 0 0 1 k -.005 Tc [(malware sensor output and repor)-24.4(ts can be)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 215.5305 195.7118 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 183.7118 Tm -.005 Tc (dif)Tj /TT5 1 Tf 1.1388 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cult due t)9.8(o)0( incompatible software inter)-7.3(face)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 232.8861 183.7118 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 171.7118 Tm -.005 Tc [(pr)9.8(ot)9.8(ocols and formats.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 138.4077 171.7118 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 48.1755 153.7357 Tm 0 .85 .15 0 k -.005 Tc (Standards)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 89.0882 153.7357 Tm 0 0 0 1 k (Agreements and standardization)Tj ET EMC /LBody <>BDC BT 9 0 0 9 225.115 153.7357 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 37.1595 153.7357 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 48.1755 141.7357 Tm 0 0 0 1 k -.005 Tc [(related t)9.8(o)0( data pr)9.8(oduced by many sour)9.3(ces are)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 228.8331 141.7357 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 129.7357 Tm -.005 Tc [(not in place t)9.8(o)0( aid in the implementation of an)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 228.7377 129.7357 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 117.7357 Tm -.005 Tc [(organization)39.1()54.7(s)0( C)14.2(TI pr)9.8(ogr)19.5(am. )19.5(There ha)7.3(ve been)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 223.7849 117.7357 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 105.7357 Tm -.005 Tc [(some effor)-24.4(ts t)9.8(o)0( create C)14.2(TI standards by the)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 220.0714 105.7357 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 48.1755 93.7357 Tm -.005 Tc [(E)8.3(u)0(r)9.8(opean Union Agency for Cybersecurity)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 211.6029 93.7357 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 665.6398 Tm -.005 Tc (\(ENISA\),)Tj ET EMC /LBody <>BDC BT 5.4 0 0 5.4 299.4767 669.4147 Tm -.0083 Tc (23)Tj ET EMC /LBody <>BDC BT 9 0 0 9 305.4514 665.6398 Tm -.005 Tc [( but they only address cer)-24.4(tain aspects)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 455.0414 665.6398 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 653.6398 Tm -.005 Tc (such as information sharing.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.4716 653.6398 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 266.6755 635.6638 Tm 0 .85 .15 0 k -.005 Tc [(A)5.4(u)0(t)14.6(omation)]TJ ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 313.4407 635.6638 Tm 0 0 0 1 k [(The absence of aut)9.8(omation fr)9.8(om)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 450.0872 635.6638 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 255.6595 635.6638 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 266.6755 623.6638 Tm 0 0 0 1 k -.005 Tc (technical identi)Tj /TT5 1 Tf 6.6603 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cation of targeted areas t)9.8(o)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 436.0522 623.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 611.6638 Tm -.005 Tc [(consolidated and easy-t)9.8(o-understand repor)-24.4(ting)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 451.2256 611.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 599.6638 Tm -.005 Tc [(t)9.8(o)0( the C-suite is a challenge for C)14.2(TI managers.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 448.4418 599.6638 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 266.6755 581.6877 Tm 0 .85 .15 0 k -.02 Tc [(A)8.3(ttack sur)-9.8(faces)]TJ ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 327.8768 581.6877 Tm 0 0 0 1 k [(The attack sur)-7.3(face has been)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 443.0718 581.6877 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 255.6595 581.6877 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 266.6755 569.6877 Tm 0 0 0 1 k -.02 Tc [(expanding fr)9.8(om ser)-8.8(vers, workstations and lapt)9.8(ops)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 457.3901 569.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 557.6877 Tm -.02 Tc [(and now includes mobile de)6.3(vices \(e.g., cell phones,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 460.5635 557.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 545.6877 Tm -.02 Tc (tablets\), data hosted in the cloud, the Internet of)Tj ET EMC /LBody <>BDC BT 9 0 0 9 448.3644 545.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 533.6877 Tm -.02 Tc (Things \(IoT\) and employee information posted on)Tj ET EMC /LBody <>BDC BT 9 0 0 9 455.8255 533.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 521.6877 Tm -.02 Tc (social networks. As a result, better endpoint)Tj ET EMC /LBody <>BDC BT 9 0 0 9 433.1844 521.6877 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 509.6878 Tm -.02 Tc [(detection and response solutions are needed t)9.8(o)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 448.0953 509.6878 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 266.6755 497.6878 Tm -.02 Tc (aid in threat identi)Tj /TT5 1 Tf 7.5614 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (cation.)Tj ET EMC /LBody <>BDC BT 9 0 0 9 365.4702 497.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 473.6878 Tm (T)Tj ET EMC /P <>BDC BT 9 0 0 9 260.9848 473.6878 Tm -.02 Tc [(hese C)14.2(TI-related technologies and standards need)]TJ ET EMC /P <>BDC BT 9 0 0 9 452.4507 473.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 461.6878 Tm -.02 Tc [(t)9.8(o)0( be compatible in order t)9.8(o)0( integr)19.5(ate the data fr)9.8(om)]TJ ET EMC /P <>BDC BT 9 0 0 9 450.1147 461.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 449.6878 Tm -.02 Tc [(data-gathering t)9.8(ools on the network. )19.5(These t)9.8(ools)]TJ ET EMC /P <>BDC BT 9 0 0 9 440.0549 449.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 437.6878 Tm -.02 Tc (include endpoint detection and response \(EDR\), SIEM,)Tj ET EMC /P <>BDC BT 9 0 0 9 460.0903 437.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 425.6878 Tm -.02 Tc [(next-gener)19.5(ation )]TJ /TT5 1 Tf 6.8338 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(rewall \(NGFW)-7.3(\), intrusion pre)6.3(vention)]TJ ET EMC /P <>BDC BT 9 0 0 9 456.8779 425.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 413.6878 Tm -.02 Tc [(systems \(IPS\), antivirus \(A)42.5(V)-9.8(\), web application )]TJ /TT5 1 Tf 19.3716 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (rewall,)Tj ET EMC /P <>BDC BT 9 0 0 9 459.1549 413.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 401.6878 Tm -.02 Tc (secure web gateway \(SWG\), network IDS/network)Tj ET EMC /P <>BDC BT 9 0 0 9 444.9233 401.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 389.6878 Tm -.02 Tc (detection and response \(NDR\), antiphishing, or other)Tj ET EMC /P <>BDC BT 9 0 0 9 454.6938 389.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 377.6878 Tm -.02 Tc [(messaging security software, vulner)19.5(ability)]TJ ET EMC /P <>BDC BT 9 0 0 9 415.2553 377.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 365.6878 Tm -.02 Tc (management and )Tj /TT5 1 Tf 7.7464 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc [(le activity monit)9.8(oring.)]TJ ET EMC /P <>BDC BT 9 0 0 9 411.6908 365.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 341.6878 Tm -.005 Tc [(One recommendation is t)9.8(o)0( impr)9.8(o)7.3(ve the ability t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 444.8525 341.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 329.6878 Tm -.005 Tc [(integr)19.5(ate threat intelligence data by ha)7.3(ving vendors)]TJ ET EMC /P <>BDC BT 9 0 0 9 456.7346 329.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 317.6878 Tm -.005 Tc [(add new inter)-7.3(face capabilities \(i.e., expand a)7.3(v)7.3(ailable)]TJ ET EMC /P <>BDC BT 9 0 0 9 460.3271 317.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 305.6878 Tm -.005 Tc [(impor)-24.4(t and expor)-24.4(t )]TJ /TT5 1 Tf 8.0985 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(le formats\) t)9.8(o)0( their pr)9.8(oducts t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 454.2659 305.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 293.6878 Tm -.005 Tc [(simplify inter)9.8(oper)19.5(ability and repor)-24.4(ting.)]TJ ET EMC /P <>BDC BT 9 0 0 9 405.0936 293.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 269.6878 Tm -.005 Tc (Another recommendation includes keeping up with)Tj ET EMC /P <>BDC BT 9 0 0 9 456.4189 269.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 257.6878 Tm -.005 Tc [(technology by segmenting networks and de)6.3(vice)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.0099 257.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 245.6878 Tm -.005 Tc [(types, such as scanners, deskt)9.8(ops, systems, IoT)]TJ ET EMC /P <>BDC BT 9 0 0 9 444.3471 245.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 233.6878 Tm -.005 Tc [(de)6.3(vices, mobile de)6.3(vices, printers/copiers and other)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.804 233.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 221.6878 Tm -.005 Tc [(attack sur)-7.3(faces. Implementing a dedicated threat)]TJ ET EMC /P <>BDC BT 9 0 0 9 449.8392 221.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 209.6878 Tm -.005 Tc [(intelligence platform focuses a C)14.2(TI pr)9.8(ogr)19.5(am and)]TJ ET EMC /P <>BDC BT 9 0 0 9 446.0479 209.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 197.6878 Tm -.005 Tc [(makes implementing C)14.2(TI easier)60.1(.)]TJ ET EMC /P <>BDC BT 9 0 0 9 382.2612 197.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 173.6878 Tm -.005 Tc [(The C)14.2(TI community can work with standards)]TJ ET EMC /P <>BDC BT 9 0 0 9 431.851 173.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 161.6878 Tm -.005 Tc (organizations such as ENISA and the US National)Tj ET EMC /P <>BDC BT 9 0 0 9 450.0205 161.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 149.6878 Tm -.005 Tc [(Institute of Standards and )19.5(Technology \(NIST\) t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.8857 149.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 137.6878 Tm -.005 Tc [(standardize and share ML sear)9.3(ching and correlation)]TJ ET EMC /P <>BDC BT 9 0 0 9 460.7443 137.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 125.6878 Tm -.005 Tc [(techniques and establish an agreed-upon set of C)14.2(TI-)]TJ ET EMC /P <>BDC BT 9 0 0 9 255.6595 113.6878 Tm [(focused data formats and logic t)9.8(o)0( suppor)-24.4(t)]TJ ET EMC /P <>BDC BT 9 0 0 9 422.2928 113.6878 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 255.6595 101.6878 Tm -.005 Tc [(inter)9.8(oper)19.5(ability between t)9.8(ools and data feeds.)]TJ ET EMC /P <>BDC BT 9 0 0 9 435.5152 101.6878 Tm 0 Tc ( )Tj ET EMC Q endstream endobj 179 0 obj <>/ExtGState<>>> endobj 204 0 obj <> endobj 209 0 obj <> endobj 214 0 obj <> endobj 219 0 obj <> endobj 224 0 obj <> endobj 247 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 .014984 .51505 31.516 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .02 .8 .86 0 k (4)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 414.3912 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 522.0229 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 143.2637 643.6768 Tm 0 .41 .96 0 k -.005 Tc [(Challenges in Data A)23.4(nalysis)]TJ ET EMC /P <>BDC BT 11 0 0 11 278.6724 643.6768 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 143.2637 625.6768 Tm 0 0 0 1 k -.005 Tc (The challenges associated with data analysis)Tj ET EMC /P <>BDC BT 9 0 0 9 321.8425 625.6768 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 613.6768 Tm -.005 Tc (include the following:)Tj ET EMC /P <>BDC BT 9 0 0 9 227.1456 613.6768 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.2797 595.7007 Tm -.005 Tc [(Detection of adv)7.3(anced threats \(hidden, unknown,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 346.6938 595.7007 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 143.2637 595.7007 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 154.2797 583.7007 Tm 0 0 0 1 k -.005 Tc (emerging\), which exposes possible targets)Tj ET EMC /LBody <>BDC BT 9 0 0 9 322.9212 583.7007 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.2797 565.7247 Tm -.005 Tc (Identifying new adversaries that may target )Tj ET EMC /LBody <>BDC BT 9 0 0 9 326.86 565.7247 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 143.2637 565.7247 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 154.2797 553.7249 Tm 0 0 0 1 k -.005 Tc (an industry)Tj ET EMC /LBody <>BDC BT 9 0 0 9 197.9455 553.7249 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.2797 535.7488 Tm -.005 Tc [(Sear)9.3(ching for applicable and actionable)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 310.2055 535.7488 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 143.2637 535.7488 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 154.2797 523.7488 Tm 0 0 0 1 k -.005 Tc (information)Tj ET EMC /LBody <>BDC BT 9 0 0 9 200.2438 523.7488 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.2797 505.7728 Tm -.005 Tc [(Over)9.3(coming fatigue due t)9.8(o)0( large v)7.3(olume and t)9.8(o)0(o)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 343.9527 505.7728 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 143.2637 505.7728 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 154.2797 493.7728 Tm 0 0 0 1 k -.005 Tc (many platforms)Tj ET EMC /LBody <>BDC BT 9 0 0 9 216.7861 493.7728 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 154.2797 475.7968 Tm -.005 Tc [(Not ha)7.3(ving the t)9.8(ools for threat hunting)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 304.207 475.7968 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 143.2637 475.7968 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 154.2797 463.7968 Tm 0 0 0 1 k -.005 Tc (investigations)Tj ET EMC /LBody <>BDC BT 9 0 0 9 209.5 463.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 439.7968 Tm -.005 Tc [(Impr)9.8(o)7.3(ving awareness by identifying and monit)9.8(oring)]TJ ET EMC /P <>BDC BT 9 0 0 9 344.8955 439.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 427.7968 Tm -.005 Tc [(the applicable threat act)9.8(ors can help organizations)]TJ ET EMC /P <>BDC BT 9 0 0 9 342.8191 427.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 415.7968 Tm -.005 Tc [(address these challenges. Prepar)19.5(at)9.8(ory actions such)]TJ ET EMC /P <>BDC BT 9 0 0 9 347.0917 415.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 403.7968 Tm -.005 Tc [(as obtaining the right t)9.8(ools and data feeds, and)]TJ ET EMC /P <>BDC BT 9 0 0 9 328.439 403.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 391.7968 Tm -.005 Tc [(tr)19.5(aining C)14.2(TI staff on new t)9.8(ools, added feeds and)]TJ ET EMC /P <>BDC BT 9 0 0 9 331.7656 391.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 379.7968 Tm -.005 Tc (existing organizational mechanisms, are also )Tj ET EMC /P <>BDC BT 9 0 0 9 323.3708 379.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 367.7968 Tm -.005 Tc [(good pr)19.5(actices that add t)9.8(o)0( the C)14.2(TI pr)9.8(ogr)19.5(am)]TJ ET EMC /P <>BDC BT 9 0 0 9 312.9501 367.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 355.7968 Tm -.005 Tc [(capabilities and usefulness. )19.5(T)36.6(r)19.5(aining incident)]TJ ET EMC /P <>BDC BT 9 0 0 9 320.5265 355.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 343.7968 Tm -.005 Tc [(response staff on C)14.2(TI techniques, t)9.8(ools, resour)9.3(ces)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.8822 343.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 331.7968 Tm -.005 Tc [(and methodology also help t)9.8(o)0( strengthen the)]TJ ET EMC /P <>BDC BT 9 0 0 9 319.6551 331.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 319.7968 Tm -.005 Tc [(organization)39.1()54.7(s)0( C)14.2(TI pr)9.8(ogr)19.5(am.)]TJ ET EMC /P <>BDC BT 9 0 0 9 251.7103 319.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 295.7968 Tm -.005 Tc (Understanding how a malware package \(such as)Tj ET EMC /P <>BDC BT 9 0 0 9 335.0613 295.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 283.7968 Tm -.005 Tc [(r)19.5(ansomware\) acts t)9.8(o)0( exploit vulner)19.5(abilities helps t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 343.8992 283.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 271.7968 Tm -.005 Tc [(create a threat hunting package t)9.8(o)0( )]TJ /TT5 1 Tf 15.2557 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (nd the software)Tj ET EMC /P <>BDC BT 9 0 0 9 347.3016 271.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 259.7968 Tm -.005 Tc (and identify its actions. Sharing this hunting)Tj ET EMC /P <>BDC BT 9 0 0 9 315.7848 259.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 247.7968 Tm -.005 Tc [(package is another way of combating aut)9.8(omated)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.4665 247.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 235.7968 Tm -.005 Tc [(threat act)9.8(ors.)]TJ ET EMC /P <>BDC BT 9 0 0 9 196.0538 235.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 143.2637 209.7968 Tm 0 .41 .96 0 k -.005 Tc (Challenges Associated With Information)Tj ET EMC /P <>BDC BT 11 0 0 11 340.1896 209.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 11 0 0 11 143.2637 195.7969 Tm -.005 Tc (Sharing)Tj ET EMC /P <>BDC BT 11 0 0 11 181.0619 195.7969 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 143.2637 177.7968 Tm 0 0 0 1 k -.005 Tc (Information sharing between vendors and other)Tj ET EMC /P <>BDC BT 9 0 0 9 330.6305 177.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 165.7968 Tm -.005 Tc [(pr)9.8(o)7.3(viders is not always effective due t)9.8(o)0( concerns)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.7812 165.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 153.7968 Tm -.005 Tc [(about the potential misuse of data, the priv)7.3(acy of)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.8153 153.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 141.7968 Tm -.005 Tc [(corpor)19.5(ate data, possible data breaches, corpor)19.5(ate)]TJ ET EMC /P <>BDC BT 9 0 0 9 338.9189 141.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 129.7968 Tm -.005 Tc [(liability, a lack of trust in the receiver)60.1(, EU Gener)19.5(al)]TJ ET EMC /P <>BDC BT 9 0 0 9 332.9723 129.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 117.7968 Tm -.005 Tc [(Data Pr)9.8(otection Regulation \(GDPR\) exposure, )]TJ ET EMC /P <>BDC BT 9 0 0 9 323.1389 117.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 105.7968 Tm -.005 Tc [(a lack of exper)-24.4(tise in threat intelligence and a lack)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.8332 105.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.2637 93.7968 Tm -.005 Tc [(of v)7.3(alue t)9.8(o)0( share.)]TJ ET EMC /P <>BDC BT 9 0 0 9 211.1581 93.7968 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 644.3464 Tm -.005 Tc (Quality vendor information can be another area of)Tj ET EMC /P <>BDC BT 9 0 0 9 557.2654 644.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 632.3464 Tm -.005 Tc [(concern because the pr)9.8(o)7.3(vider may not be)]TJ ET EMC /P <>BDC BT 9 0 0 9 524.2773 632.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 620.3464 Tm -.005 Tc [(tr)19.5(ansparent about their sour)9.3(ces. Data pr)9.8(o)7.3(vided by)]TJ ET EMC /P <>BDC BT 9 0 0 9 556.1757 620.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 608.3464 Tm -.005 Tc [(the pr)9.8(oducer)60.1(, vendor or organization may not be as)]TJ ET EMC /P <>BDC BT 9 0 0 9 561.4788 608.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 596.3464 Tm -.005 Tc (complete, applicable or inclusive as needed, and)Tj ET EMC /P <>BDC BT 9 0 0 9 551.6855 596.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 584.3464 Tm -.005 Tc [(vendor repor)-24.4(ts and feeds may be focused on)]TJ ET EMC /P <>BDC BT 9 0 0 9 538.0818 584.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 572.3464 Tm -.005 Tc (speci)Tj /TT5 1 Tf 2.3476 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(c target audiences, such as go)7.3(vernment,)]TJ ET EMC /P <>BDC BT 9 0 0 9 546.4282 572.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 560.3464 Tm -.005 Tc (banking and )Tj /TT5 1 Tf 5.6138 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(nance, cybersecurity ser)-8.8(vice)]TJ ET EMC /P <>BDC BT 9 0 0 9 528.1292 560.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 548.3464 Tm -.005 Tc [(pr)9.8(o)7.3(viders, or technology.)]TJ ET EMC /P <>BDC BT 9 0 0 9 458.3913 548.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 392.3464 Tm -.005 Tc [(In addition, data fr)9.8(om sharing gr)9.8(oups may not be)]TJ ET EMC /P <>BDC BT 9 0 0 9 553.1357 392.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 380.3464 Tm -.005 Tc [(correlated; data may be just a simple feed fr)9.8(om a)]TJ ET EMC /P <>BDC BT 9 0 0 9 554.5189 380.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 368.3464 Tm -.005 Tc [(dedicated data acquisition t)9.8(ool. )19.5(There could also be)]TJ ET EMC /P <>BDC BT 9 0 0 9 565.111 368.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 356.3464 Tm -.005 Tc (signi)Tj /TT5 1 Tf 2.0888 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cant discrepancies between intelligence)Tj ET EMC /P <>BDC BT 9 0 0 9 543.0137 356.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 344.3464 Tm -.005 Tc [(estimates. )19.5(The repor)-24.4(ts and obser)-8.8(v)7.3(ations may be)]TJ ET EMC /P <>BDC BT 9 0 0 9 552.1577 344.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 332.3464 Tm -.005 Tc [(stale and would contribute only t)9.8(o)0( the v)7.3(olume,)]TJ ET EMC /P <>BDC BT 9 0 0 9 542.3931 332.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 320.3464 Tm -.005 Tc [(confusion and complexity of the analysis. )19.5(The)]TJ ET EMC /P <>BDC BT 9 0 0 9 542.0513 320.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 308.3464 Tm -.005 Tc [(information shared about internal Internet Pr)9.8(ot)9.8(ocol)]TJ ET EMC /P <>BDC BT 9 0 0 9 561.7371 308.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 296.3463 Tm -.005 Tc [(\(IP\) sour)9.3(ces may be of no v)7.3(alue t)9.8(o)0( other users or)]TJ ET EMC /P <>BDC BT 9 0 0 9 553.1039 296.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 284.3463 Tm -.005 Tc [(communities. )19.5(T)48.3(o)0( make matters worse, data-sharing)]TJ ET EMC /P <>BDC BT 9 0 0 9 564.3812 284.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 272.3463 Tm -.005 Tc [(par)-24.4(ties may be malicious and pr)9.8(o)7.3(vide false data,)]TJ ET EMC /P <>BDC BT 9 0 0 9 551.9052 272.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 260.3463 Tm -.005 Tc [(which could poison the C)14.2(TI community data.)]TJ ET EMC /P <>BDC BT 9 0 0 9 537.0403 260.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 236.3464 Tm -.02 Tc [(Recommendations t)9.8(o)0( impr)9.8(o)7.3(ve information sharing)]TJ ET EMC /P <>BDC BT 9 0 0 9 554.0867 236.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 224.3464 Tm -.02 Tc [(include vetting members of the sharing gr)9.8(oup prior t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 564.1427 224.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 212.3464 Tm -.02 Tc [(admission t)9.8(o)0( the gr)9.8(oup, implementing some type of)]TJ ET EMC /P <>BDC BT 9 0 0 9 557.9896 212.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 200.3464 Tm -.02 Tc [(multifact)9.8(or authentication \(MF)83(A\) for member access,)]TJ ET EMC /P <>BDC BT 9 0 0 9 563.826 200.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 188.3464 Tm -.02 Tc [(impr)9.8(o)7.3(ving the categorization of the data pr)9.8(o)7.3(vided)]TJ ET EMC /P <>BDC BT 9 0 0 9 548.9896 188.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 176.3464 Tm -.02 Tc [(\(e.g., target gr)9.8(oup, e)6.3(vent or obser)-8.8(ved dates\),)]TJ ET EMC /P <>BDC BT 9 0 0 9 528.5984 176.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 164.3464 Tm -.02 Tc [(increasing pr)9.8(oduct inter)9.8(oper)19.5(ability via multiple)]TJ ET EMC /P <>BDC BT 9 0 0 9 536.9396 164.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 152.3464 Tm -.02 Tc [(download formats and monit)9.8(oring/v)7.3(alidating the)]TJ ET EMC /P <>BDC BT 9 0 0 9 546.405 152.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 140.3464 Tm -.02 Tc (information submitted for sharing.)Tj ET EMC /P <>BDC BT 9 0 0 9 492.3806 140.3464 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 361.5004 114.3463 Tm 0 .41 .96 0 k -.005 Tc (Management Challenges)Tj ET EMC /P <>BDC BT 11 0 0 11 483.317 114.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 361.5004 96.3463 Tm 0 0 0 1 k -.005 Tc [(The t)9.8(op challenges for management can be)]TJ ET EMC /P <>BDC BT 9 0 0 9 533.0389 96.3463 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 361.5004 84.3463 Tm -.005 Tc [(categorized as str)19.5(ategic, oper)19.5(ational and technical.)]TJ ET EMC /P <>BDC BT 9 0 0 9 562.2721 84.3463 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .02 .8 .86 0 k /GS1 gs 358.83 413.782 207.157 122.943 re f EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 367.0335 495.54 Tm 0 .425 .075 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 380.9407 515.5402 Tm 0 0 0 0 k [( QU)10.7(ALIT)-7.8(Y VENDOR)]TJ ET EMC /P <>BDC BT 14 0 0 14 498.0404 515.5402 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.0335 497.5402 Tm [(INFORMA)63(TION CAN BE)]TJ ET EMC /P <>BDC BT 14 0 0 14 510.8754 497.5402 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.0335 479.5402 Tm [(ANO)13.2(THER AREA OF CONCERN)]TJ ET EMC /P <>BDC BT 14 0 0 14 557.4896 479.5402 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.0335 461.5402 Tm [(BECA)8.3(USE )19.5(THE PRO)10.7(VIDER MA)45.9(Y)]TJ ET EMC /P <>BDC BT 14 0 0 14 558.1117 461.5402 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.0335 443.5401 Tm [(NO)13.2(T)19.5( BE )19.5(TRANSP)67.4(ARENT)]TJ ET EMC /P <>BDC BT 14 0 0 14 513.9174 443.5401 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 367.0335 425.5401 Tm -.0195 Tw [(ABOUT)19.5( THEIR )-19.5(SOURCES. )]TJ ET EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 525.1967 405.5399 Tm 0 .425 .075 0 k 0 Tw ()Tj ET EMC Q endstream endobj 248 0 obj <>/ExtGState<>>> endobj 270 0 obj <> endobj 275 0 obj <> endobj 280 0 obj <> endobj 285 0 obj <> endobj 290 0 obj <> endobj 307 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 .014984 .51599 31.274 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .02 .8 .86 0 k (5)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 36 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.6318 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /Artifact <>BDC .02 .8 .86 0 k /GS1 gs 254.95 549.278 348.05 106.254 re f EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 35.9475 646.4162 Tm 0 0 0 1 k -.02 Tc [(Str)19.5(ategic challenges include not ha)7.3(ving clear priorities)]TJ ET EMC /P <>BDC BT 9 0 0 9 241.069 646.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 634.4161 Tm -.02 Tc (for investment and executives not understanding the)Tj ET EMC /P <>BDC BT 9 0 0 9 236.5943 634.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 622.4161 Tm -.02 Tc [(technical issues. Oper)19.5(ational challenges include the)]TJ ET EMC /P <>BDC BT 9 0 0 9 232.9602 622.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 610.4161 Tm -.02 Tc [(time-consuming effor)-24.4(t t)9.8(o)0( reconstruct attack vect)9.8(ors)]TJ ET EMC /P <>BDC BT 9 0 0 9 233.3248 610.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 598.4161 Tm -.02 Tc (and the dif)Tj /TT5 1 Tf 4.4958 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (culty in identifying damage and if there)Tj ET EMC /P <>BDC BT 9 0 0 9 228.5832 598.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 586.4161 Tm -.02 Tc [(are additional breaches. )19.5(Technical challenges include)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.5391 586.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 574.4161 Tm -.02 Tc [(verifying the sour)9.3(ce information t)9.8(o)0( pre)6.3(vent false)]TJ ET EMC /P <>BDC BT 9 0 0 9 218.1721 574.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 562.4161 Tm -.02 Tc (positives; prioritizing software patches, replacements)Tj ET EMC /P <>BDC BT 9 0 0 9 239.0296 562.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 550.4161 Tm -.02 Tc [(and upgr)19.5(ades; and managing the v)7.3(olume of aler)-24.4(ts)]TJ ET EMC /P <>BDC BT 9 0 0 9 224.9085 550.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 538.4161 Tm -.02 Tc [(t)9.8(o)0( investigate.)]TJ ET EMC /P <>BDC BT 9 0 0 9 89.5241 538.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 514.4161 Tm -.005 Tc (Other management challenges include lack of)Tj ET EMC /P <>BDC BT 9 0 0 9 216.6587 514.4161 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 502.4162 Tm -.005 Tc [(budget, a lack of collabor)19.5(ation acr)9.8(oss depar)-24.4(tments,)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.355 502.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 490.4162 Tm -.005 Tc [(aligning the threats according t)9.8(o)0( the needs of the)]TJ ET EMC /P <>BDC BT 9 0 0 9 229.4132 490.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 478.4162 Tm -.005 Tc [(organization and the organization)39.1()54.7(s)0( infr)19.5(astructure,)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.2843 478.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 466.4162 Tm -.005 Tc [(and inadequate \(i.e., late, irrele)6.3(v)7.3(ant or not)]TJ ET EMC /P <>BDC BT 9 0 0 9 198.1338 466.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 454.4162 Tm -.005 Tc [(actionable\) str)19.5(ategic and oper)19.5(ational repor)-24.4(ting.)]TJ ET EMC /P <>BDC BT 9 0 0 9 221.2766 454.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 442.4162 Tm -.005 Tc [(F)10.2(o)0(r)-24.4(tunately, there are actions that can be taken t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 231.3326 442.4162 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 430.4162 Tm -.005 Tc (help address these management challenges:)Tj ET EMC /P <>BDC BT 9 0 0 9 212.5167 430.4162 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 412.4402 Tm -.005 Tc [(Creating a budget that co)7.3(vers threat hunting and)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 237.6759 412.4402 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 35.9475 412.4402 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 46.9635 400.4402 Tm 0 0 0 1 k -.005 Tc [(per)-7.3(forming attacker investigations)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 182.8159 400.4402 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 382.4641 Tm -.005 Tc (Keeping management informed of the number)Tj ET EMC /LBody <>BDC BT 9 0 0 9 229.4961 382.4641 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 35.9475 382.4641 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 46.9635 370.4641 Tm 0 0 0 1 k -.005 Tc (and types of attacks \(this will help with future)Tj ET EMC /LBody <>BDC BT 9 0 0 9 225.7799 370.4641 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 358.4641 Tm -.005 Tc (budget requests\))Tj ET EMC /LBody <>BDC BT 9 0 0 9 114.3238 358.4641 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 340.4882 Tm -.02 Tc (Organize the information by type for ease of)Tj ET EMC /LBody <>BDC BT 9 0 0 9 214.2764 340.4882 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 35.9475 340.4882 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 46.9635 328.4882 Tm 0 0 0 1 k -.02 Tc (handling \(e.g., credit card and )Tj /TT5 1 Tf 12.716 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (nancial account)Tj ET EMC /LBody <>BDC BT 9 0 0 9 226.8587 328.4882 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 316.4882 Tm -.02 Tc [(data, personal information, intellectual pr)9.8(oper)-24.4(ty,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 228.2302 316.4882 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 304.4882 Tm -.02 Tc (con)Tj /TT5 1 Tf 1.5855 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (dential business information, credentials and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 237.0543 304.4882 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 292.4882 Tm -.02 Tc [(IT)19.5( systems information, oper)19.5(ational systems\))]TJ ET EMC /LBody <>BDC BT 9 0 0 9 219.5236 292.4882 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 274.5122 Tm -.005 Tc (Obtaining threat intelligence feeds after carefully)Tj ET EMC /LBody <>BDC BT 9 0 0 9 238.7319 274.5122 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 35.9475 274.5122 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 46.9635 262.5121 Tm 0 0 0 1 k -.005 Tc [(investigating what is a)7.3(v)7.3(ailable and)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 182.0283 262.5121 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 250.5122 Tm -.005 Tc (recommended by similar organizations)Tj ET EMC /LBody <>BDC BT 9 0 0 9 200.9368 250.5122 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 232.5361 Tm -.005 Tc [(Conducting an analysis t)9.8(o)0( understanding an)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 219.9634 232.5361 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT11 1 Tf 12 0 0 12 35.9475 232.5361 Tm 0 .85 .15 0 k ()Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 46.9635 220.5361 Tm 0 0 0 1 k -.005 Tc [(adversary)54.7(s motiv)7.3(ations, infr)19.5(astructure \(if)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 208.0444 220.5361 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 208.5361 Tm -.005 Tc (possible\) and methods of attack. Information)Tj ET EMC /LBody <>BDC BT 9 0 0 9 225.5336 208.5361 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 196.5361 Tm -.005 Tc (sharing and analysis centers/organizations)Tj ET EMC /LBody <>BDC BT 9 0 0 9 217.1376 196.5361 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 46.9635 184.5361 Tm -.005 Tc [(\(ISACs/ISA)5.4(Os\) can help.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 142.7932 184.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 166.5361 Tm -.005 Tc [(T)27.8(wo types of vendors deser)-8.8(ving of careful resear)9.3(ch)]TJ ET EMC /P <>BDC BT 9 0 0 9 237.8419 166.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 154.5361 Tm -.005 Tc [(are security pr)9.8(oduct and security ser)-8.8(vice)]TJ ET EMC /P <>BDC BT 9 0 0 9 195.2903 154.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 142.5361 Tm -.005 Tc [(enterprises. Security pr)9.8(oduct enterprises typically)]TJ ET EMC /P <>BDC BT 9 0 0 9 230.2646 142.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 130.5361 Tm -.005 Tc [(design their solutions t)9.8(o)0( only suppor)-24.4(t their pr)9.8(oducts)]TJ ET EMC /P <>BDC BT 9 0 0 9 239.4472 130.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 118.5361 Tm -.005 Tc (and may not optimize other organizations security)Tj ET EMC /P <>BDC BT 9 0 0 9 235.3327 118.5361 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 106.5362 Tm -.005 Tc [(ar)9.3(chitectures or pr)9.8(ogr)19.5(ams. Security ser)-8.8(vices)]TJ ET EMC /P <>BDC BT 9 0 0 9 209.7979 106.5362 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 94.5362 Tm -.005 Tc [(enterprises may ha)7.3(ve a regional focus, whereas C)14.2(T)0(I)]TJ ET EMC /P <>BDC BT 9 0 0 9 238.9098 94.5362 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 82.5362 Tm -.005 Tc [(may need t)9.8(o)0( be collected and assessed on a global)]TJ ET EMC /P <>BDC BT 9 0 0 9 237.1882 82.5362 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 70.5362 Tm -.005 Tc [(basis. If this is the case, multiple sour)9.3(ces will need)]TJ ET EMC /P <>BDC BT 9 0 0 9 234.7835 70.5362 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 35.9475 58.5362 Tm -.005 Tc [(t)9.8(o)0( be obtained.)]TJ ET EMC /P <>BDC BT 9 0 0 9 94.9109 58.5362 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 253.5004 526.0059 Tm 0 .41 .96 0 k -.005 Tc (The Communication Challenge)Tj ET EMC /P <>BDC BT 11 0 0 11 404.1575 526.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 253.5004 508.0058 Tm 0 0 0 1 k -.005 Tc (Communication between organizational)Tj ET EMC /P <>BDC BT 9 0 0 9 410.9981 508.0058 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 496.0058 Tm -.005 Tc [(stakeholders is another challenge. )19.5(The security)]TJ ET EMC /P <>BDC BT 9 0 0 9 438.9446 496.0058 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 484.0058 Tm -.005 Tc [(oper)19.5(ations center \(SOC)12.7(\) and incident response \(IR\))]TJ ET EMC /P <>BDC BT 9 0 0 9 453.8083 484.0058 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 472.0058 Tm -.005 Tc [(teams want intelligence aler)-24.4(ts on newly emerging)]TJ ET EMC /P <>BDC BT 9 0 0 9 448.5281 472.0058 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 460.0059 Tm -.005 Tc (threats and adversaries delivered as soon as the)Tj ET EMC /P <>BDC BT 9 0 0 9 444.2172 460.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 448.0059 Tm -.005 Tc [(information is a)7.3(v)7.3(ailable so they can react)]TJ ET EMC /P <>BDC BT 9 0 0 9 415.1755 448.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 436.0059 Tm -.005 Tc [(immediately t)9.8(o)0( zer)9.8(o day and other types of attacks.)]TJ ET EMC /P <>BDC BT 9 0 0 9 455.2444 436.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 424.0059 Tm -.005 Tc (IR and forensics teams need a comprehensive)Tj ET EMC /P <>BDC BT 9 0 0 9 435.9166 424.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 412.0059 Tm -.005 Tc [(analysis of malware and cyber)19.5(attacks as soon as all)]TJ ET EMC /P <>BDC BT 9 0 0 9 458.7775 412.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 400.0059 Tm -.005 Tc [(the details are a)7.3(v)7.3(ailable. Chief information security)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.0581 400.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 388.0059 Tm -.005 Tc (of)Tj /TT5 1 Tf .9075 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(cers \(CISOs\) and IT)19.5( managers need summary)]TJ ET EMC /P <>BDC BT 9 0 0 9 445.856 388.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 376.0059 Tm -.005 Tc (information about malware and attacks, statistics)Tj ET EMC /P <>BDC BT 9 0 0 9 449.3181 376.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 364.0059 Tm -.005 Tc [(and trend data, and weekly or monthly repor)-24.4(ts.)]TJ ET EMC /P <>BDC BT 9 0 0 9 436.2871 364.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 352.0059 Tm -.005 Tc [(Executive managers need quar)-24.4(terly, high-le)6.3(vel)]TJ ET EMC /P <>BDC BT 9 0 0 9 433.4185 352.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 340.0059 Tm -.005 Tc [(summaries tied t)9.8(o)0( business issues and immediate)]TJ ET EMC /P <>BDC BT 9 0 0 9 451.8339 340.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 328.0059 Tm -.005 Tc (assessments of breaches and security issues)Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 316.0059 Tm [(especially when organization-oriented repor)-24.4(ts)]TJ ET EMC /P <>BDC BT 9 0 0 9 433.313 316.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 304.0059 Tm -.005 Tc [(appear in the press. )19.5(Timely and accur)19.5(ate)]TJ ET EMC /P <>BDC BT 9 0 0 9 413.2659 304.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 292.0059 Tm -.005 Tc [(information can help pr)9.8(o)7.3(vide answers t)9.8(o)0( questions)]TJ ET EMC /P <>BDC BT 9 0 0 9 453.1678 292.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 280.0059 Tm -.005 Tc [(fr)9.8(om the chief executive of)]TJ /TT5 1 Tf 11.7098 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cer \(CEO\), members of)Tj ET EMC /P <>BDC BT 9 0 0 9 453.528 280.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 268.0059 Tm -.02 Tc [(the board of direct)9.8(ors and the press.)]TJ ET EMC /P <>BDC BT 9 0 0 9 391.9002 268.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 244.0059 Tm -.02 Tc [(T)48.3(o)0( minimize confusion, communication should be)]TJ ET EMC /P <>BDC BT 9 0 0 9 443.8675 244.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 232.0059 Tm -.02 Tc (concise \(e.g., a one-page memo or a handful of)Tj ET EMC /P <>BDC BT 9 0 0 9 432.7361 232.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 220.0059 Tm -.02 Tc (slides\), be free of technical terms and jargon, explain)Tj ET EMC /P <>BDC BT 9 0 0 9 453.6425 220.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 208.0059 Tm -.02 Tc (issues in business terms \(e.g., direct and indirect)Tj ET EMC /P <>BDC BT 9 0 0 9 438.9684 208.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 196.0059 Tm -.02 Tc (costs and impact on the business and reputation\),)Tj ET EMC /P <>BDC BT 9 0 0 9 444.2766 196.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 184.0059 Tm -.02 Tc (and include a recommended course of action.)Tj ET EMC /P <>BDC BT 9 0 0 9 428.6134 184.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 160.0059 Tm -.02 Tc [(It is advisable t)9.8(o)0( de)6.3(velop internal analytics for)]TJ ET EMC /P <>BDC BT 9 0 0 9 426.7337 160.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 148.0059 Tm -.02 Tc [(management repor)-24.4(ting and pr)9.8(o)7.3(vide actionable)]TJ ET EMC /P <>BDC BT 9 0 0 9 430.2218 148.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 136.0059 Tm -.02 Tc (intelligence. Ideally, information should be prioritized,)Tj ET EMC /P <>BDC BT 9 0 0 9 455.0667 136.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 124.0059 Tm -.02 Tc (show response times, summarize the )Tj /TT5 1 Tf 16.1032 0 TD 0 Tc ()Tj /TT2 1 Tf .5337 0 TD -.02 Tc (ndings and)Tj ET EMC /P <>BDC BT 9 0 0 9 445.4802 124.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 112.0059 Tm -.02 Tc [(present the organization)39.1()54.7(s)0( threat posture.)]TJ ET EMC /P <>BDC BT 9 0 0 9 409.5936 112.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 88.0059 Tm -.005 Tc [(Also, it is a good pr)19.5(actice for an organization t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 439.2625 88.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 76.0059 Tm -.005 Tc [(par)-24.4(ticipate in ISAC/ISA)5.4(O or other industry sharing)]TJ ET EMC /P <>BDC BT 9 0 0 9 448.5041 76.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 64.0059 Tm -.005 Tc [(gr)9.8(oups t)9.8(o)0( aid in understanding the threats, their)]TJ ET EMC /P <>BDC BT 9 0 0 9 440.0193 64.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 253.5004 52.0059 Tm -.005 Tc [(applicability and the information a)7.3(v)7.3(ailable.)]TJ ET EMC /P <>BDC BT 9 0 0 9 419.9152 52.0059 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT13 1 Tf 47 0 0 47 267.0323 611.8401 Tm 0 .425 .075 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 279.9997 631.8403 Tm 0 0 0 0 k -.02 Tc [( ST)38.6(AFFING CH)-8.8(ALLENGES CAN BE O)10.7(VERCOME)]TJ ET EMC /P <>BDC BT 14 0 0 14 557.2291 631.8403 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 267.0323 613.8403 Tm -.02 Tc [(B)26.9(Y)0( EST)38.6(ABLISHING A )19.5(THREA)63(T)19.5( HUNTING )19.5(TEAM,)]TJ ET EMC /P <>BDC BT 14 0 0 14 546.3063 613.8403 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 267.0323 595.8403 Tm -.02 Tc [(MAKING C)14.2(TI A PRIORIT)-7.8(Y FOR )19.5(THE SOC AND)]TJ ET EMC /P <>BDC BT 14 0 0 14 532.1215 595.8403 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 267.0323 577.8403 Tm -.02 Tc [(TRAINING )19.5(THE SOC ST)38.6(AFF ON )19.5(THE PURPOSE OF)]TJ ET EMC /P <>BDC BT 14 0 0 14 561.3392 577.8403 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 14 0 0 14 267.0323 559.8403 Tm -.02 Tc -.0195 Tw [(THE THREA)63(T)19.5( )-19.5(HUNTING TEAM. )]TJ ET EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 452.9506 539.8402 Tm 0 .425 .075 0 k 0 Tc 0 Tw ()Tj ET EMC Q endstream endobj 308 0 obj <>/ExtGState<>>> endobj 344 0 obj <> endobj 349 0 obj <> endobj 354 0 obj <> endobj 359 0 obj <> endobj 364 0 obj <> endobj 369 0 obj <> endobj 374 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 39.4019 20.9698 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 60.8804 20.9698 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 91.7275 20.9698 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 30.069 .014984 .51505 31.516 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 12.8637 20.9698 Tm .02 .8 .86 0 k (6)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 414.3912 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 522.0229 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 143.6367 641.5422 Tm 0 .41 .96 0 k -.005 Tc (Staf)Tj /TT14 1 Tf 1.8272 0 TD 0 Tc ()Tj /TT9 1 Tf .6034 0 TD -.005 Tc (ng Challenges)Tj ET EMC /P <>BDC BT 11 0 0 11 239.907 641.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 143.6367 623.5422 Tm 0 0 0 1 k -.005 Tc [(There are two main C)14.2(TI staf)]TJ /TT5 1 Tf 12.1624 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ng challenges due t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.75 623.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 611.5422 Tm -.005 Tc [(the increased complexity and v)7.3(olume of analysis)]TJ ET EMC /P <>BDC BT 9 0 0 9 335.2729 611.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 599.5422 Tm -.005 Tc [(and work per)-7.3(formed. )19.5(The )]TJ /TT5 1 Tf 11.2804 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(rst is ha)7.3(ving insuf)]TJ /TT5 1 Tf 7.7224 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cient)Tj ET EMC /P <>BDC BT 9 0 0 9 343.8832 599.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 587.5422 Tm -.005 Tc [(staff tr)19.5(ained on C)14.2(TI t)9.8(ools and resour)9.3(ces or how t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 339.036 587.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 575.5422 Tm -.005 Tc [(per)-7.3(form threat analysis \(i.e., threat hunting\) t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 324.3461 575.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 563.5422 Tm -.005 Tc [(utilize C)14.2(TI effectively. F)10.2(ormal C)14.2(TI tr)19.5(aining can be)]TJ ET EMC /P <>BDC BT 9 0 0 9 333.7483 563.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 551.5422 Tm -.005 Tc [(obtained fr)9.8(om organizations such as the SANS)]TJ ET EMC /P <>BDC BT 9 0 0 9 328.0691 551.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 539.5422 Tm -.005 Tc (Institute,)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 177.741 543.3171 Tm -.0083 Tc (24)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 183.7156 542.5122 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 185.0074 539.5422 Tm -.005 Tc (ENISA)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 209.972 543.3171 Tm -.0083 Tc (25)Tj ET EMC /P <>BDC BT 9 0 0 9 215.9465 539.5422 Tm -.005 Tc ( and the EC-Council.)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 295.1548 543.3171 Tm -.0083 Tc (26)Tj ET EMC /P <>BDC BT 5.4 0 0 5.4 301.1293 543.3171 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 515.5422 Tm -.005 Tc [(The second challenge is maintaining staff t)9.8(o)]TJ ET EMC /P <>BDC BT 9 0 0 9 318.5505 515.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 503.5422 Tm -.005 Tc [(per)-7.3(form the C)14.2(TI work of data gathering and)]TJ ET EMC /P <>BDC BT 9 0 0 9 314.035 503.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 491.5422 Tm -.005 Tc [(analysis, running the t)9.8(ools, conducting risk)]TJ ET EMC /P <>BDC BT 9 0 0 9 310.8689 491.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 479.5422 Tm -.005 Tc [(mitigation, repor)-24.4(ting activity, and advising)]TJ ET EMC /P <>BDC BT 9 0 0 9 307.6301 479.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 467.5422 Tm -.005 Tc [(management. )19.5(These skills are needed and)]TJ ET EMC /P <>BDC BT 9 0 0 9 310.2061 467.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 455.5422 Tm -.005 Tc (complement the incident response and forensic)Tj ET EMC /P <>BDC BT 9 0 0 9 332.0275 455.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 443.5422 Tm -.005 Tc (staff skill set.)Tj ET EMC /P <>BDC BT 9 0 0 9 196.5698 443.5422 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 251.5421 Tm -.005 Tc (Staf)Tj /TT5 1 Tf 1.791 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ng challenges can be o)7.3(ver)9.3(come by)]TJ ET EMC /P <>BDC BT 9 0 0 9 300.8874 251.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 239.5421 Tm -.005 Tc [(establishing a threat hunting team, making C)14.2(TI a)]TJ ET EMC /P <>BDC BT 9 0 0 9 334.2436 239.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 227.5421 Tm -.005 Tc [(priority for the SOC and tr)19.5(aining the SOC staff on)]TJ ET EMC /P <>BDC BT 9 0 0 9 334.4966 227.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 215.5421 Tm -.005 Tc (the purpose of the threat hunting team. It is also)Tj ET EMC /P <>BDC BT 9 0 0 9 333.1692 215.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 203.5421 Tm -.005 Tc [(helpful t)9.8(o)0( tr)19.5(ain the security assessment staff on C)14.2(T)0(I)]TJ ET EMC /P <>BDC BT 9 0 0 9 347.4792 203.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 191.5421 Tm -.005 Tc (and potential weaknesses, as it aids the)Tj ET EMC /P <>BDC BT 9 0 0 9 300.5019 191.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 179.5421 Tm -.005 Tc [(assessment team in determining if the C)14.2(TI pr)9.8(ogr)19.5(am)]TJ ET EMC /P <>BDC BT 9 0 0 9 346.6572 179.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 167.5421 Tm -.005 Tc (is current and effective.)Tj ET EMC /P <>BDC BT 9 0 0 9 236.5111 167.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 143.6367 141.5421 Tm 0 .41 .96 0 k -.005 Tc (Conclusion)Tj ET EMC /P <>BDC BT 11 0 0 11 198.4253 141.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 143.6367 123.5421 Tm 0 0 0 1 k -.02 Tc [(The intent of C)14.2(TI is t)9.8(o)0( use current cybersecurity)]TJ ET EMC /P <>BDC BT 9 0 0 9 323.2641 123.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 111.5421 Tm -.02 Tc [(monit)9.8(oring t)9.8(ools with additional resour)9.3(ces such as)]TJ ET EMC /P <>BDC BT 9 0 0 9 336.1622 111.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 99.5421 Tm -.02 Tc [(vendor data feeds t)9.8(o)0( identify the threats most)]TJ ET EMC /P <>BDC BT 9 0 0 9 317.4232 99.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 87.5421 Tm -.02 Tc [(applicable t)9.8(o)0( an organization. Because C)14.2(TI is not fully)]TJ ET EMC /P <>BDC BT 9 0 0 9 347.0703 87.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 75.5421 Tm -.02 Tc [(matured and the attack sur)-7.3(face is expanding, there)]TJ ET EMC /P <>BDC BT 9 0 0 9 337.0499 75.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 143.6367 63.5421 Tm -.02 Tc [(are many challenges that need t)9.8(o)0( be addressed and)]TJ ET EMC /P <>BDC BT 9 0 0 9 340.5171 63.5421 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 643.6378 Tm -.02 Tc [(solutions t)9.8(o)0( be implemented. As C)14.2(TI de)6.3(velops, AI may)]TJ ET EMC /P <>BDC BT 9 0 0 9 567.5925 643.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 631.6378 Tm -.02 Tc [(be used t)9.8(o)0( aut)9.8(omate some of the conversion,)]TJ ET EMC /P <>BDC BT 9 0 0 9 535.0492 631.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 619.6378 Tm -.02 Tc (correlation, data enrichment, forecasting and)Tj ET EMC /P <>BDC BT 9 0 0 9 533.3314 619.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 607.6378 Tm -.02 Tc [(repor)-24.4(ting aspects of C)14.2(TI. A global effor)-24.4(t and)]TJ ET EMC /P <>BDC BT 9 0 0 9 529.9607 607.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 595.6378 Tm -.02 Tc [(coordinated methodology is needed t)9.8(o)0( combat the)]TJ ET EMC /P <>BDC BT 9 0 0 9 555.4537 595.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 583.6378 Tm -.02 Tc [(many threats and threat act)9.8(ors that appear t)9.8(o)0( be)]TJ ET EMC /P <>BDC BT 9 0 0 9 546.9637 583.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 571.6379 Tm -.02 Tc [(constantly increasing. )19.5(The recommendations)]TJ ET EMC /P <>BDC BT 9 0 0 9 535.0446 571.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 559.6379 Tm -.02 Tc (discussed can enhance a threat management)Tj ET EMC /P <>BDC BT 9 0 0 9 537.1141 559.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 547.6379 Tm -.02 Tc [(pr)9.8(ogr)19.5(am and the C)14.2(TI industry in gener)19.5(al.)]TJ ET EMC /P <>BDC BT 9 0 0 9 514.8381 547.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 523.6379 Tm -.005 Tc [(The other impor)-24.4(tant piece of C)14.2(TI is repor)-24.4(ting. )19.5(The)]TJ ET EMC /P <>BDC BT 9 0 0 9 557.1592 523.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 511.6379 Tm -.005 Tc [(best intelligence repor)-24.4(ting occurs when pr)9.8(o)7.3(viders)]TJ ET EMC /P <>BDC BT 9 0 0 9 556.7954 511.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 499.6379 Tm -.005 Tc [(are monit)9.8(ored for changes t)9.8(o)0( their software,)]TJ ET EMC /P <>BDC BT 9 0 0 9 535.975 499.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 487.6379 Tm -.005 Tc [(ser)-8.8(vices and sour)9.3(ces, and network infr)19.5(astructure is)]TJ ET EMC /P <>BDC BT 9 0 0 9 563.3677 487.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 475.6379 Tm -.005 Tc [(monit)9.8(ored for modi)]TJ /TT5 1 Tf 8.4749 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cations that may aid or inhibit a)Tj ET EMC /P <>BDC BT 9 0 0 9 567.6205 475.6379 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 463.6378 Tm -.005 Tc [(C)14.2(TI pr)9.8(ogr)19.5(am. Vendors do not want t)9.8(o)0( pr)9.8(o)7.3(vide bad,)]TJ ET EMC /P <>BDC BT 9 0 0 9 558.4094 463.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 451.6378 Tm -.005 Tc [(incomplete, stale or err)9.8(oneous intelligence, but)]TJ ET EMC /P <>BDC BT 9 0 0 9 546.2936 451.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC BT 9 0 0 9 362.5861 439.6378 Tm -.005 Tc (vigilance is the key.)Tj ET EMC /P <>BDC BT 9 0 0 9 439.073 439.6378 Tm 0 Tc ( )Tj ET EMC /P <>BDC /GS1 gs BT /TT9 1 Tf 11 0 0 11 362.5861 413.6379 Tm 0 .41 .96 0 k -.005 Tc (Endnotes)Tj ET EMC /P <>BDC BT 11 0 0 11 408.3914 413.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.9495 395.6379 Tm 0 0 0 1 k -.005 Tc (Cybersecurity Insiders, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 471.3485 395.6379 Tm -.0195 Tw [(2020 Threat )-19.5(Hunting)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 550.8259 395.6379 Tm 0 Tc 0 Tw ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 395.6379 Tm 0 .85 .15 0 k (1)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 379.5861 383.6379 Tm 0 0 0 1 k -.005 Tc [(Repor)-24.4(t)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 405.4812 383.6379 Tm (, USA, 2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 454.1415 383.6379 Tm [(https:/)109.4(/www)60.5(.cybersecurity-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 371.6379 Tm [(insiders.com/por)-24.4(tfolio/2020-threat-hunting-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 548.722 371.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 359.6379 Tm -.005 Tc [(repor)-24.4(t-download/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 447.1047 359.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.9495 347.6379 Tm -.005 Tc [(Gumbley, J.; )58.6(A)0( Guide t)9.8(o)0( )19.5(Threat Modelling for)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 555.8995 347.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 347.6379 Tm 0 .85 .15 0 k (2)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.5861 335.6379 Tm 0 0 0 1 k -.005 Tc [(De)6.3(velopers,)83( mar)-24.4(tinF)10.2(owler)60.1(.com, 28 May 2020,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 558.6978 335.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.5861 323.6379 Tm -.005 Tc [(https:/)109.4(/mar)-24.4(tinfowler)60(.com/ar)-24.4(ticles/agile-threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 311.6379 Tm (modelling.html)Tj ET EMC /LBody <>BDC BT 9 0 0 9 437.5441 311.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.9495 299.6378 Tm -.02 Tc [(She)6.3(v)6.3(chenko, N.; )19.5(T)106.4(.)0( A. Chick; P)158.2(.)0( ORiordan; )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 535.0369 299.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 299.6378 Tm 0 .85 .15 0 k (3)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.5861 287.6378 Tm 0 0 0 1 k -.02 Tc [(T)106.4(.)0( P)158.2(.)0( Scanlon; C. W)15.1(oody; )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 471.3049 287.6378 Tm (Threat Modeling: A)Tj ET EMC /LBody <>BDC BT 9 0 0 9 542.2802 287.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 275.6378 Tm -.02 Tc [(Summary of A)24.4(v)7.3(ailable Methods)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 496.7234 275.6378 Tm (, Carnegie Mellon)Tj ET EMC /LBody <>BDC BT 9 0 0 9 562.5129 275.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 263.6378 Tm -.02 Tc (University, Software Engineering Institute,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 537.1034 263.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 251.6378 Tm -.02 Tc [(Pittsburgh, Pennsylv)7.3(ania, USA, July 2018,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 535.9561 251.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.5861 239.6379 Tm -.02 Tc [(https:/)109.4(/resour)9.3(ces.sei.cmu.edu/asset_)]TJ /TT15 1 Tf 15.5623 0 TD 0 Tc ()Tj /TT4 1 Tf .522 0 TD -.02 Tc (les/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 538.6411 239.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 227.6379 Tm -.02 Tc [(WhiteP)5.4(aper/2018_019_001_524597.pdf)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 528.8223 227.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.9495 215.6379 Tm -.02 Tc [(Gonzalez, C.; Six )19.5(Threat Modeling)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 509.8191 215.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 215.6379 Tm 0 .85 .15 0 k (4)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.5861 203.6379 Tm 0 0 0 1 k -.02 Tc (Methodologies: Prioritize and Mitigate )Tj ET EMC /LBody <>BDC BT 9 0 0 9 526.8588 203.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 191.6379 Tm -.02 Tc [(Threats,)83( Exabeam, 6 July 2020,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 500.011 191.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 379.5861 179.6379 Tm -.02 Tc [(https:/)109.4(/www)60.5(.exabeam.com/information-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 167.6379 Tm (security/threat-modeling/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 475.3171 167.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 379.9495 155.6379 Tm -.005 Tc [(She)6.3(v)6.3(chenko, N.; Threat Modeling: 12 A)24.4(v)7.3(ailable)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 564.6481 155.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 155.6379 Tm 0 .85 .15 0 k (5)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.5861 143.6379 Tm 0 0 0 1 k -.005 Tc [(Methods.)83( Carnegie Mellon University Software)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 564.4963 143.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 131.6379 Tm -.005 Tc [(Engineering Institute, Pittsburgh, Pennsylv)7.3(ania,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 563.399 131.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 119.6379 Tm -.005 Tc (USA, 3 December 2018, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 474.2567 119.6379 Tm [(https:/)109.4(/insights.sei.)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 548.9242 119.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 107.6379 Tm -.005 Tc (cmu.edu/sei_blog/2018/12/threat-modeling-)Tj ET EMC /LBody <>BDC BT 9 0 0 9 552.9121 107.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.5861 95.6379 Tm -.005 Tc [(12-a)7.3(v)7.3(ailable-methods.html)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 482.4711 95.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 379.9495 83.6379 Tm -.005 Tc (Op cit)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 402.5488 83.6379 Tm [( She)6.3(v)6.3(chenko, Chick, ORiordan, Scanlon)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 556.7487 83.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 367.5861 83.6379 Tm 0 .85 .15 0 k (6)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 379.5861 71.6379 Tm 0 0 0 1 k -.005 Tc [(and W)15.1(oody)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 423.7944 71.6379 Tm 0 Tc ( )Tj ET EMC /Artifact <>BDC .02 .8 .86 0 k /GS1 gs 143 271.307 205.501 160.325 re f EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 152.6241 390.4468 Tm 0 .425 .075 0 k ()Tj ET EMC /P <>BDC BT /TT2 1 Tf 14 0 0 14 166.5313 410.4471 Tm 0 0 0 0 k [( BECA)8.3(USE C)14.2(TI IS NO)13.2(T)19.5( FULL)116.7(Y)]TJ ET EMC /P <>BDC BT 14 0 0 14 343.3496 410.4471 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 392.4471 Tm [(MA)63(TURED AND )19.5(THE A)63(T)-7.8(T)38.6(ACK)]TJ ET EMC /P <>BDC BT 14 0 0 14 332.546 392.4471 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 374.4471 Tm [(SURF)83(ACE IS EXP)67.4(ANDING,)]TJ ET EMC /P <>BDC BT 14 0 0 14 309.4405 374.4471 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 356.4471 Tm (THERE ARE MANY)Tj ET EMC /P <>BDC BT 14 0 0 14 267.878 356.4471 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 338.4471 Tm -.0195 Tw [(CH)-8.8(ALLENGES TH)-8.8(A)63(T)19.5( )-19.5(NEED T)13.7(O)]TJ ET EMC /P <>BDC BT 14 0 0 14 337.2765 338.4471 Tm 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 320.4471 Tm (BE ADDRESSED AND)Tj ET EMC /P <>BDC BT 14 0 0 14 282.3428 320.4471 Tm ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 302.447 Tm -.0195 Tw [(SOL)26.4(UTIONS T)13.7(O)0( )-19.5(BE)]TJ ET EMC /P <>BDC BT 14 0 0 14 267.9874 302.447 Tm 0 Tw ( )Tj ET EMC /P <>BDC BT 14 0 0 14 152.6241 284.447 Tm (IMPLEMENTED. )Tj ET EMC /P <>BDC BT /TT13 1 Tf 47 0 0 47 255.7784 264.4469 Tm 0 .425 .075 0 k ()Tj ET EMC Q endstream endobj 375 0 obj <>/ExtGState<>>> endobj 395 0 obj <> endobj 400 0 obj <> endobj 405 0 obj <> endobj 410 0 obj <> endobj 415 0 obj <> endobj 420 0 obj <> endobj 425 0 obj <> endobj 430 0 obj <> endobj 435 0 obj <> endobj 440 0 obj <> endobj 445 0 obj <> endobj 450 0 obj <> endobj 455 0 obj <> endobj 460 0 obj <> endobj 465 0 obj <> endobj 470 0 obj <> endobj 475 0 obj <> endobj 480 0 obj <> endobj 485 0 obj <> endobj 490 0 obj <> endobj 491 0 obj <>stream /P <>BDC q 1 i 0 783 603 -783 re 301.5 391.515 m W n 0 783.015 603 -783 re W n /GS2 gs BT /TT2 1 Tf 7 0 0 7 490.9954 20.9379 Tm 0 0 0 1 k 0 Tc 0 Tw (ISACA )Tj ET EMC /P <>BDC BT 7 0 0 7 512.4738 20.9379 Tm (JOURNAL)Tj ET EMC /P <>BDC /GS1 gs BT 7 0 0 7 543.321 20.9379 Tm .02 .8 .86 0 k [( V)6.3(OL 6)]TJ ET EMC /Artifact <>BDC 0 0 0 1 k /GS2 gs 572.364 .014984 .51599 31.274 re f EMC /P <>BDC /GS1 gs BT 7 0 0 7 587.3827 20.9379 Tm .02 .8 .86 0 k (7)Tj ET EMC /P <>BDC /GS2 gs BT 7 0 0 7 36 20.9769 Tm 0 0 0 1 k [( 2021 ISACA. All rights reser)-8.8(ved. )]TJ ET EMC /P <>BDC BT /TT4 1 Tf 7 0 0 7 143.6318 20.9769 Tm [(www)60.5(.isaca.org)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.5653 643.6378 Tm -.005 Tc [(Marley, K.; Cyber )19.5(Threat Hunting: )19.5(T)36.6(ricks and)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 228.1662 643.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 41.2017 643.6378 Tm 0 .85 .15 0 k (7)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 631.6378 Tm 0 0 0 1 k -.005 Tc [(T)48.3(ools Y)31.7(ou Need,)83( Gadellnet, 23 June 2020,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 218.6528 631.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.2017 619.6378 Tm -.005 Tc [(https:/)109.4(/gadellnet.com/blog/cyber-threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 209.5485 619.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 607.6378 Tm -.005 Tc [(hunting-t)9.8(ools/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 107.6575 607.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.5653 595.6378 Tm -.005 Tc [(Shiv)7.3(akumar)60.1(, S.; Threat Intelligence )19.5(T)48.3(ools,)83()]TJ ET EMC /LBody <>BDC BT 9 0 0 9 219.5319 595.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 41.2017 595.6378 Tm 0 .85 .15 0 k (8)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 583.6378 Tm 0 0 0 1 k -.005 Tc (EDUCBA, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 91.0216 583.6378 Tm [(https:/)109.4(/www)60.5(.educba.com/threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 571.6379 Tm [(intelligence-t)9.8(ools/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 122.8266 571.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.5653 559.6379 Tm -.02 Tc [(Mohammadi, A. K.; Ten )19.5(T)48.3(op )19.5(T)48.3(ools for )19.5(Threat)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 224.2971 559.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 41.2017 559.6379 Tm 0 .85 .15 0 k (9)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 547.6379 Tm 0 0 0 1 k -.02 Tc [(Hunters fr)9.8(om Black Hat USA 2018,)83( A)5.4(uthentic8,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 232.0813 547.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 535.6379 Tm -.02 Tc [(21 A)5.4(ugust 2018, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 117.4706 535.6379 Tm [(https:/)109.4(/blog.authentic8.com/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 225.3002 535.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 523.6379 Tm -.02 Tc [(10-t)9.8(ools-for-threat-hunters-fr)9.8(om-blackhat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 208.3634 523.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 511.6379 Tm -.02 Tc (usa-2018/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 91.6644 511.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 499.6379 Tm -.005 Tc [(Reback, G.; )58.6(A)0( List of the Best Open Sour)9.3(ce)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 222.1663 499.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 499.6379 Tm 0 .85 .15 0 k (10)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 487.6379 Tm 0 0 0 1 k -.005 Tc [(Threat Intelligence Feeds,)83( logz.io, 4 May 2020,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 237.107 487.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.2017 475.6379 Tm -.005 Tc [(https:/)109.4(/logz.io/blog/open-sour)9.3(ce-threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 463.6378 Tm (intelligence-feeds/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 125.1864 463.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 451.6378 Tm -.005 Tc [(Banerd, W)60.1(.; Ten of the Best Open Sour)9.3(ce)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 215.3666 451.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 451.6378 Tm 0 .85 .15 0 k (11)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 439.6378 Tm 0 0 0 1 k -.005 Tc [(Threat Intelligence Feeds,)83( D3 Security, )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 207.7983 439.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 427.6378 Tm -.005 Tc (30 April 2019, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 109.6339 427.6378 Tm [(https:/)109.4(/d3security.com/blog/10-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 415.6378 Tm -.02 Tc [(of-the-best-open-sour)9.3(ce-threat-intelligence-feeds/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 238.5334 415.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 403.6379 Tm -.005 Tc [(SENKI, Open Sour)9.3(ce )19.5(Threat Intelligence)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 211.3774 403.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 403.6379 Tm 0 .85 .15 0 k (12)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 391.6379 Tm 0 0 0 1 k -.005 Tc [(Feeds,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 83.5289 391.6379 Tm [(https:/)109.4(/www)60.5(.senki.org/oper)19.5(at)9.8(ors-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 379.6379 Tm [(security-t)9.8(oolkit/open-sour)9.3(ce-threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 189.7025 379.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 367.6379 Tm -.005 Tc (intelligence-feeds/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 125.1864 367.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 355.6379 Tm -.005 Tc [(The Cyber )19.5(Threat, Cyber )19.5(Threat Intelligence)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 226.4278 355.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 355.6379 Tm 0 .85 .15 0 k (13)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 343.6379 Tm 0 0 0 1 k -.005 Tc [(Feeds,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 83.5289 343.6379 Tm [(https:/)109.4(/thecyber)-24.4(threat.com/cyber-threat-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 331.6379 Tm (intelligence-feeds/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 125.1864 331.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 319.6378 Tm -.005 Tc [(G2, Best )19.5(Threat Intelligence Ser)-8.8(vices)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 200.6469 319.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 319.6378 Tm 0 .85 .15 0 k (14)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 307.6378 Tm 0 0 0 1 k -.005 Tc [(Pr)9.8(o)7.3(viders,)83( )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 96.8973 307.6378 Tm [(https:/)109.4(/www)60.5(.g2.com/categories/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 223.9121 307.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 295.6378 Tm -.005 Tc [(threat-intelligence-ser)-8.8(vices)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 157.3187 295.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 283.6378 Tm -.005 Tc (Lee, R. M.; )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 96.0578 283.6378 Tm [(2020 SANS Cyber )19.5(Threat Intelligence)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 238.4263 283.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 283.6378 Tm 0 .85 .15 0 k (15)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 53.2017 271.6378 Tm 0 0 0 1 k -.005 Tc [(\(C)14.2(TI\) Sur)-8.8(vey)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 100.5141 271.6378 Tm (, SANS Institute, USA, February)Tj ET EMC /LBody <>BDC BT 9 0 0 9 221.1293 271.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 259.6378 Tm -.005 Tc (2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 77.1414 259.6378 Tm [(https:/)109.4(/www)60.5(.sans.org/reading-r)9.8(oom/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 219.6427 259.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 247.6378 Tm -.005 Tc (whitepapers/threats/2020-cyber-threat-)Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 235.6378 Tm [(intelligence-cti-sur)-8.8(vey-39395)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 164.0808 235.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 223.6378 Tm -.005 Tc (Shackleford, D.; )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 117.155 223.6378 Tm [(Cyber )19.5(Threat Intelligence Uses,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 236.4651 223.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 223.6378 Tm 0 .85 .15 0 k (16)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 53.2017 211.6378 Tm 0 0 0 1 k -.005 Tc [(Successes and F)16.6(a)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 123.3043 211.6378 Tm -.02 Tc [(ilures: )19.5(The SANS 2017 )]TJ ET EMC /LBody <>BDC BT 9 0 0 9 208.5582 211.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 199.6378 Tm -.02 Tc [(C)14.2(TI Sur)-8.8(vey)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 93.1457 199.6378 Tm (, SANS Institute, USA, 2017,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 197.0993 199.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.2017 187.6378 Tm -.02 Tc [(https:/)109.4(/i.crn.com/sites/default/)]TJ /TT15 1 Tf 12.9602 0 TD 0 Tc ()Tj /TT4 1 Tf .522 0 TD -.02 Tc (les/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 188.8375 187.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 175.6378 Tm -.02 Tc (ck)Tj /TT15 1 Tf .9693 0 TD 0 Tc ()Tj /TT4 1 Tf .522 0 TD -.02 Tc (nderimages/user)Tj /TT15 1 Tf 7.1449 0 TD 0 Tc ()Tj /TT4 1 Tf .522 0 TD -.02 Tc [(les/images/crn/cust)9.8(om/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 228.4286 175.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 163.6378 Tm -.02 Tc [(CRN360/20170314_Sur)-8.8(vey_C)14.2(TI-2017_)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 196.6544 163.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 53.2017 151.6378 Tm -.02 Tc (LookingGlass.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 118.9076 151.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 53.7288 139.6378 Tm -.005 Tc (National Council of Information Sharing and)Tj ET EMC /LBody <>BDC BT 9 0 0 9 226.8991 139.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 36.2018 139.6378 Tm 0 .85 .15 0 k (17)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 53.2017 127.6378 Tm 0 0 0 1 k -.005 Tc (Analysis Centers \(ISACs\),)Tj ET EMC /LBody <>BDC BT 9 0 0 9 153.2876 127.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 53.2017 115.6378 Tm -.005 Tc [(https:/)109.4(/www)60.5(.nationalisacs.org/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 173.216 115.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 643.6378 Tm -.005 Tc [(The Information )19.5(TechnologyInformation)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 436.6287 643.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 643.6378 Tm 0 .85 .15 0 k (18)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 271.4338 631.6378 Tm 0 0 0 1 k -.005 Tc [(Sharing and Analysis Center \(IT)113.3(-ISAC)12.7(\),)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 420.6503 631.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 271.4338 619.6378 Tm -.005 Tc [(https:/)109.4(/www)60.5(.it-isac.org/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 363.1316 619.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 607.6378 Tm -.005 Tc [(F)12.7(riedman, J.; M. Bouchard; )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 378.8563 607.6378 Tm (De)Tj /TT15 1 Tf 1.1497 0 TD 0 Tc ()Tj /TT4 1 Tf .537 0 TD -.005 Tc [(nitive Guide t)9.8(o)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 449.2644 607.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 607.6378 Tm 0 .85 .15 0 k (19)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 271.4338 595.6378 Tm 0 0 0 1 k -.005 Tc -.0195 Tw [(Cyber Threat )-19.5(Intelligence)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 367.5911 595.6378 Tm 0 Tw [(, iSIGH)14.2(T)19.5( P)5.4(a)0(r)-24.4(tners, USA,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 457.321 595.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 583.6378 Tm -.005 Tc (2015, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 295.3734 583.6378 Tm [(https:/)109.4(/crypt)9.8(ome.org/2015/09/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 415.5074 583.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 571.6379 Tm -.005 Tc (cti-guide.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 319.8965 571.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 559.6379 Tm -.005 Tc [(Open Sour)9.3(ce Resear)9.3(chers, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 377.8301 559.6379 Tm (The Cyber)Tj ET EMC /LBody <>BDC BT 9 0 0 9 416.9101 559.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 559.6379 Tm 0 .85 .15 0 k (20)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 271.4338 547.6379 Tm 0 0 0 1 k -.005 Tc [(Intelligence Analyst)54.7(s Cookbook)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 394.2421 547.6379 Tm (, 2020,)Tj ET EMC /LBody <>BDC BT 9 0 0 9 419.9032 547.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 271.4338 535.6379 Tm -.005 Tc [(https:/)109.4(/github.com/threat-hunting/awesome_)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 446.7101 535.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 523.6379 Tm -.005 Tc [(Threat-Hunting/blob/master/T)36.6(r)19.5(aining%2C)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 432.7132 523.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 511.6379 Tm -.005 Tc (%20Documents%20and%20Instructions/Files/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 450.5442 511.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 499.6379 Tm -.005 Tc (The%20Cyber%20Intelligence%20Analyst%20)Tj ET EMC /LBody <>BDC BT 9 0 0 9 446.5461 499.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 487.6379 Tm -.005 Tc [(Cookbook%20V)22.5(olume%201%202020-THlink.pdf)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 455.8758 487.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 475.6379 Tm -.005 Tc [(CyberEdge Gr)9.8(oup, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 344.6377 475.6379 Tm (The Security Intelligence)Tj ET EMC /LBody <>BDC BT 9 0 0 9 439.3666 475.6379 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 475.6379 Tm 0 .85 .15 0 k (21)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 271.4338 463.6378 Tm 0 0 0 1 k -.005 Tc (Handbook)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 311.4202 463.6378 Tm (, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 315.3248 463.6378 Tm (Third Edition)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 364.2487 463.6378 Tm [(, Recorded F)10.7(uture, USA,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 455.9168 463.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 451.6378 Tm -.005 Tc (2020, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 295.3734 451.6378 Tm [(https:/)109.4(/go.recordedfuture.com/hubfs/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 442.131 451.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 439.6378 Tm -.005 Tc (ebooks/security-intelligence-handbook-third-)Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 427.6378 Tm (edition.pdf?utm_medium=email&_hsmi=)Tj ET EMC /LBody <>BDC BT 9 0 0 9 427.4121 427.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 415.6378 Tm -.005 Tc (96974607&_hsenc=p2ANqtz-8nZ7Z6uVybOhp)Tj ET EMC /LBody <>BDC BT 9 0 0 9 449.4619 415.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 403.6379 Tm -.005 Tc [(Y1UcGjy9ST)7.8(S6FwBSLFmyC1zjXIY)35.6(aBrBcS8me)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 447.8193 403.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 391.6379 Tm -.02 Tc [(PmvNcMfWyfW0VY)28.3(sEa84AiGNeIh6XTBbpVk)9.8(cAM)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 379.6379 Tm (6XIFpwXFhcEV2RByISjeaBxx8IQ&utm_content=)Tj ET EMC /LBody <>BDC BT 9 0 0 9 450.4266 379.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 367.6379 Tm -.02 Tc [(96974607&utm_sour)9.3(ce=hs_aut)9.8(omation)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 419.7206 367.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 355.6379 Tm -.005 Tc [(CyberEdge Gr)9.8(oup, )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 344.6377 355.6379 Tm -.0195 Tw [(The Threat )-19.5(Intelligence)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 433.1461 355.6379 Tm 0 Tc 0 Tw ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 355.6379 Tm 0 .85 .15 0 k (22)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 271.4338 343.6379 Tm 0 0 0 1 k -.005 Tc (Handbook)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 311.4202 343.6379 Tm (, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 315.3248 343.6379 Tm (Second Edition)Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 373.3312 343.6379 Tm [(, Recorded F)10.7(uture,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 444.1832 343.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 331.6379 Tm -.005 Tc (USA, 2019, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 316.1895 331.6379 Tm [(https:/)109.4(/paper)60.1(.bobylive.com/Security/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 458.2098 331.6379 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 319.6378 Tm -.005 Tc (threat-intelligence-handbook-second-edition.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 456.7243 319.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 307.6378 Tm -.005 Tc [(Doerr)60.1(, C.; )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 309.1712 307.6378 Tm [(Cyber )19.5(Threat Intelligence Standards)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 453.9426 307.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 307.6378 Tm 0 .85 .15 0 k (23)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT4 1 Tf 9 0 0 9 271.4338 295.6378 Tm 0 0 0 1 k -.005 Tc [(A High-Le)6.3(vel Over)-8.8(view)]TJ ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 357.5361 295.6378 Tm (, Delft University of)Tj ET EMC /LBody <>BDC BT 9 0 0 9 431.3995 295.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 283.6378 Tm -.005 Tc [(Technology, Netherlands, 16 No)7.3(vember 2018,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 450.6255 283.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 271.4338 271.6378 Tm -.005 Tc [(https:/)109.4(/www)60.5(.enisa.eur)9.8(opa.eu/e)6.3(vents/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 415.6261 271.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 259.6378 Tm -.005 Tc [(2018-cti-eu-e)6.3(vent/cti-eu-2018-presentations/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 444.5898 259.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 247.6378 Tm -.005 Tc (cyber-threat-intelligence-standardization.pdf)Tj ET EMC /LBody <>BDC BT 9 0 0 9 442.5059 247.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 235.6378 Tm -.005 Tc (SANS Institute, SANS Cybersecurity Courses)Tj ET EMC /LBody <>BDC BT 9 0 0 9 447.0042 235.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 235.6378 Tm 0 .85 .15 0 k (24)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 271.4338 223.6378 Tm 0 0 0 1 k -.005 Tc [(and Cer)-24.4(ti)]TJ /TT5 1 Tf 3.975 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc (cations, )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 345.207 223.6378 Tm [(https:/)109.4(/www)60.5(.sans.org/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 432.1575 223.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 211.6378 Tm -.005 Tc (cyber-security-courses/)Tj ET EMC /LBody <>BDC BT 9 0 0 9 362.4997 211.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 199.6378 Tm -.005 Tc [(E)8.3(u)0(r)9.8(opean Union Agency for Cybersecurity,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 437.11 199.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 199.6378 Tm 0 .85 .15 0 k (25)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 271.4338 187.6378 Tm 0 0 0 1 k -.005 Tc [(T)36.6(r)19.5(ainings for Cybersecurity Specialists,)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 424.2077 187.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 271.4338 175.6378 Tm -.005 Tc [(https:/)109.4(/www)60.5(.enisa.eur)9.8(opa.eu/t)9.8(opics/tr)19.5(ainings-)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 163.6378 Tm (for-cybersecurity-specialists)Tj ET EMC /LBody <>BDC BT 9 0 0 9 380.4716 163.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT /TT2 1 Tf 9 0 0 9 271.9609 151.6378 Tm -.005 Tc [(EC-Council, Cer)-24.4(ti)]TJ /TT5 1 Tf 7.2998 0 TD 0 Tc ()Tj /TT2 1 Tf .5487 0 TD -.005 Tc [(ed )19.5(Threat Intelligence Analyst)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 459.2675 151.6378 Tm 0 Tc ( )Tj ET EMC /Lbl <>BDC /GS1 gs BT /TT9 1 Tf 9 0 0 9 254.4339 151.6378 Tm 0 .85 .15 0 k (26)Tj ET EMC /LBody <>BDC /GS2 gs BT /TT2 1 Tf 9 0 0 9 271.4338 139.6378 Tm 0 0 0 1 k -.005 Tc [(\(C)14.2(TIA\), )]TJ ET EMC /LBody <>BDC BT /TT4 1 Tf 9 0 0 9 300.6931 139.6378 Tm [(https:/)109.4(/www)60.5(.eccouncil.org/pr)9.8(ogr)19.5(ams/)]TJ ET EMC /LBody <>BDC BT 9 0 0 9 447.1617 139.6378 Tm 0 Tc ( )Tj ET EMC /LBody <>BDC BT 9 0 0 9 271.4338 127.6378 Tm -.005 Tc [(threat-intelligence-tr)19.5(aining/)]TJ ET EMC Q endstream endobj 492 0 obj <>/ExtGState<>>> endobj 6 0 obj <> endobj 5 0 obj <> endobj 54 0 obj <>stream Adobed         #"""#''''''''''     !! !!''''''''''i""  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz?~4eGAa޽'mkۈw׽X( P5Ģ{?Wk4q|$Xo_ƞU `iNؠ1(o{ÁUALx=A~_s1;s?&0^ן-Sb@9v'F ƴ$Wm*LNSEqE"ZjDkPz T:$E_b+Z` xOMN@xh)i!Gg"6ZubzcUWiBiڿ>/^,blx>"z$6-ޝgjL(Tv?;+p$MHLV]M 8zCݑY(jO|ސI8vC*ݛ6lT`kbvzҠcB~Od]3Fܜd<ݗ ~Ci/O'N 7i rsvr6U8@#+߉ͪ R)MIqçӒ居G.5Z&=$`sf͐:a6Ab ϳ`:0͛6EE14qXjOAh{Asݍ;6l] *ҕM)ى ~y/`͛6% yf8Ҙ[ Pl)\jǧoՎP tT' >cMy }>~9{S'i" S*)^(UH֔|a6cA'8- TjV%nZ_ҏLtSV_ƘMx);j.U-Z}Ǩ(f͛6la +be7Rٳfĩ_lrN_zp͛6 wɯ@( #&Y0=3q/HٳaN&†4-<:(P\짊l!ٳf[ŇEǘ֧&=wǽ;6l@ю IF q*JW|AH4pD@PEVeݳ]܃e6UX=acS;2>f x6omeDdŌ2$ <@ׯzr,;`˧\){e,O"ĚRP3vx'}VxBVƹ{ 5ƛܱU"~n#*!XDjZ0Ó'£%En- ƆH*IbDFzoБZ7\MoմoQ6PY#!OOі`PajpZz+';o^ˊ4l O_lV7 +Az`h!>qL=Yvr /N6 Q~'瑋ߓDSvλd=7='ݼpáuAGljw @Y$/}$1_v=iW7۝wOYYk):TV #0!q!-j7!UiPky96|Y iL>)xu`;6l!S@z1xڪGZ>8ҔX]fQ>NG;,f(jN܍cTr@M~Pun?e7%Ru;8yvA)BjM><h{c܆m8!kh5&R$!r;uLlp>U ف>0eV+qڞjqFEuf;$ѾUJ`5*o#4J $ y6qr_/JWn>iDV,btcnA܃w@+U;{䆚lȽ“=2pk\Mrk#r{PWw;wOo dj>.qaQb;wS*F5GL4t$SpX;Wʠ~i4`/W|" )J隬s 1ͅR*{޻`@)O~knٳbu*(3qcRM<:`f͛rw+`8Tr} u?N9!ٳf(O^a (F  @iQ)λ iZ6lآT}8>;`IhZw;݌]:fX*TWŁw!)=~:Y6B:WBSC }8*&ٻ;B ֟(X7_7D)zS6PMhkL$ vLU%+ʔHWPFm(m(ݩ< A#θ)NK-Tb+9l Ob+z1?mq*r,ׄɑx.?F_3\\*:a 7=)nCʡf̀o$T|*k(;]6l \zFFT8Ss ʃHa-柀Rs*ٳaQ[dIpjiwuk,9P/MH|_7uh5xpjtӟi0ٳdٔ=%$fwq-I (QG\כt{6lxFNQUjֽkPM6n*@#٫s`]6lA TtEKWbE6צ>wޝ;m~N͛6%AN=j`)PlT۩cٳb\~*feڣq6Goo-M>^#WΘӳf́d(j}Ŝ+TǪӹLJ6l'cZ,D.cz*nV `:{;vlٰ*y~W+\/zMѐ ?{+,`EbG%' vڮvy~W<%Ĥ'+ b@n]?lHıM1!,j;DҟF\Zq۾2$ }O` ~}M@*{*Ǿ.!bł8Rw?EpIv#p1zqa@hVSrHZN=0RYhOA\Pa~9ت=rNSQO+ۺуM(DFjBXH>[Z{ jM|wftIA 9w.Z[ 5RORrߴ7dZY ᆺjn+z+M9攎_,dyi5$f͍zIp˿wdKX ~uWrfN9dBù"@gDu#5Nl=a*+қbrδ Z|1QVbPjVo01? )^3 ye w%㸦Ҵ68pz|MGS1pXMbB|Fp;Sv.7^\eDÿa8 _l 9USZa~BE)@N'6M'(sDߠ, /VEq7B~Ϗ)ʴ^QI]1h wU8= h<3稐G?yVIg}a\S58u߯_v$R@?avݕFۮP{f%VkO|Tr nK΀GHjeu'fYe ͛,|-#[{Xgf͛ OQQmQew>:S0b\j:$23kVy6l/eiֽ!2 >e^ٳf'`>q q79mٳf"Zhֻ`I$Ywڔ3Hz- Vn(qHf͘b.X {cCPqVzAd* N͛69j'U'+}D-N͛6ޢ ؑJaÂwɚ~wWf͛]Ͼ`e50U͛6uBG0רaoE>BГ`wsvlٱvZD{fU^=SUjwВe]61sm͛^#»/¸ *U~"n>5&̼#;mF>T쵯lB a5v#x^'N?땘s`AaʪoF87'9=& n-r ڹ\e˯8jQr޷}}Q^a(wukʢNFBP"(Xtz2ɻ+ަFhԆ^u‚~]&oxM8 qmA< Pfra]Fy Xu=B"c7׮rR&K$PGӐMFl=LnCUL_BҔ/hɦgkUe)-͎e#V|xaS@S O]g [\;QǩPaU~v^Gz|꺧O#`wuߥjOzxf|'g m4UÉONMgfh҂!Pz9jRO^˫(5>UM 99@?sKy*64Zbeˮ&I&xO*E=k = (4?~=^DzOב]#VFTQJ1JPmhjNDPӹ>8+)'FPe$QP]"~r? lTPcŷ)oZQ\~~81Pl7WRXڿ̪{oLm[`>J*Gork֨[qCjMGZa`Pffw"ƽwhwNۏe[zE= 2\_uXh7qb5:5Ƨڵ==W~{ ؜1I [̞~i_|kw>ƠZlu$*֠Lz6'_#Nޟv\y˿ >P&ңěbOj| 5g38ߵNKoB~ >;3df͛-|1BG)A%jW1vjvlٲ~Ux@&p:׎;vlٰ1_ H(«(v"+zYZq"-wfǠIUB?^,#梸AS۾,ߨ"λos=$Ep\roN{z!>pXA-~7H6 D])S+#"JSKb|hv24!BQ>{b6$+ޣ6lp)lr{ L oACT5C*F ,QZ+%iyf͒o:nDj3)E* 4J(ARJ jZͩ n=j :."N0;1.CaFKHé\+U~ {QX\j{턓ԝM.B5M؞O=?35z]iҼٳdirp)ɶ;S)mMj`~P+fͅknh{V*t8d-_6$T 5G'&k^3pCPg0` DA/n͛6CȒk]cv=0WʿiA UAғYa/P6lSʪOZoEfPl_j~1kb~S7:>t"%Wu}/͛62VbfU1N$f O5DWÇa2 l{S> ⽁?t2ٳfkN*qᨆRk%ȪYNxSӾo '{f̓]7pEv-2Ҿ02j699a^cFRA5~朆=͛6 rI SEمvqVn}Ga.i(9OS+>٦1areIjvlٱ$,I4y cO3 n[avs=<G=FrzזI [͛6IW_*>' 0 mߚW4#~9*&~ Ce^\Ld#B7`~vlٲMkM(;o=8snsНTf͛VP_|ZE=#]|uXqΆ'c<1ϗXTA|AI q E#{yξ]ۮa@(tvRQG۸\e3jWkBl;}9 7u׷Ng\/hᎻy Lj${ru f͛:tʯ@RG RS1f oH(qHe`qnsxn)ȳT}֟OK<2UH/_QזxZ[4bw4ޔ2rR ؂0٠C,g~jME0df1xI>WUٳfɄsq pcdzs8d͛6G-@c=_cgji-?y ދ9.;xdj\˔I,{X5)#UٳføB:E2ReGZIXb'nI=?P#͎KR+881˹lpPyyvlٰvЏdڨuE *{LC/l2L"#|]6l4=?9m=69v4=yǬɞb#d{-ٳf8`)޽qo"n"_!Xn+h8REjvڝfkq1<$Ǝ\F2]G7f͗^]> (?)^$tƖ3N>gASg>]U: le=p*&w(ڕ47! Oם PhL>-Y˩zƝ3hu0 S@.;;1Ouuu͛6z,D=@ƴLP"(z bz{w8lnhq,c^ZfnT1PP#}ISoJ W)5a_MB$7*u4kP6p:]=y|i(ϕk^[4.T5eFƻ? >l䲩?u*$ :mpS@'%ʂO«NFk5 G?vĻQz$vt_+H5k? |!׳rrA/ɈS_a*Ƥxw%vA sIr;A$s1Tl~^8v'nۈ\&L e?+Gxm~ߥ SNB+M *ԧ&B*;w<<}Lۿ­QOLp<]M]Wۚ [KנRqh+W~$IemgOޱ +c ބ{ԯcԭGn&^RHq̂-#/1N]ο]8'Zù;}C+I?Hl7 ${nbx/A:^۞q|"$F'r46l؋ {Ƿ+vaȸeٳfƞ+f+m:Wf͛ZZw|>YMe,,nF$HH6l͛6 Ѵl`=Xn[ mJTo7s}.=>؈f{!> 8%@$b(X!~ bѯ6$+|*oPzӧs.q\tg(}PM {R7U;2 Ѫ|;bf-(M_ ^֕\ϦB8FU8"cRi / ?"I5vxqZf͆S92*pU?(ʟQPtsyTl |S޸Y.֏_ᎠAj{wK R5Og/Pup.yta>[6Qw8DYv;|@~( 8akb LeQ$Nx;[,50PBȮJXN&'dIAJdZZV`|3}9#."k2q j"56lHY]Ubs@jp7_\#[$q8Ek8,|c bw5{=MY $5 xV}͛6D]]6}so[Y|?Ֆ?ҷӑܨF`zR7Q(uC? Hw_/҉rvlٰL$Yv*AY=工U}}Mi@: ui^8DQ}p}(طVB^[HFE(9|cɐd 3Qst9vlٱh.!Np1Z;PC YFh :^nT՗4SU]-@T8:u*Y @HO:Wf͛$J*3Bp+ F24ˡXāGȬj1D[ULcuY?VaR2Ɔk' 9(О}R96l؅ Hܚ~~AeV}rT6':H?Q`?kߦ-9d ` (CyYc(R~1->2>i6q~2Ɋ*;x6ݳr^#Yoxqcp>)U9=mɗtJF%.@l)g95OtYvyvGI8r#!sspݛ6lTQȟ b5ڞ sffz%X=s"c]N}fWl^$Ñ$+O;2¡ ~UPchE{`gXaP+3TU+Fb2Bb{S+HOϔ>(|Z{" )CW1 &F\ح >:ɍKcjtix»&jrt©h{v{_Ͻ[8&m NpH9+rbza(*Cmȏn8|QX;F =no.'\n(TTTu8fH`Xg'q |4JjtOY9F oC߳|,Xx(.dzaegG*ƪ>iCC֠`/a )HO;צ'Q-=짚Flj`hL$+++HAVZ(3yHo]~NAb^׮ʊp#_BC1SƵPnG4®Q) 5F=bA韴¸H,'ndSV@JC%OY*G%~9DIufoREI$Ƞ;kJÆJ f"(1Da ֭^=Ų-:o~!#j'ާ ;hgHvAo YA0+ 1O|3#7 `۸=b1_UB3քzN7 q!'7QBT.$rHv>pH#3X7ѱ&Aֻ.=r2 QZ71c[<e@Ig!SxtPARH]N\PFΪd'b=EgfpKG}mBG;W;9ɩ⅏qlwqaR0Ar;NE>ާ8e jݽIqFřiJu0{^*t5Nas9p+ﶡĨqvap//AJ0b6$Ҙ,l+[kv>s%wLy%h 4L`F{n rVxɮÐq.iQFjlq-9(Fr>NM_VGep8H.L BV( m]wt36]6lT\#1衁$ڀHdˡX6DWCeXYD]6ݛ6lz!yr-a! e!-V!n7H|8lW! 5'K;F*6bQ\B 4埘(^p` ^8sRí3֟$'P wm9M>MsW+6IcRI'mw2؁{NyI{NrkIOlhFFq"Po[qfLmSe ӶY"§*zq?F*+H>f H 6w58A ?Rag*Ƿnv ~}5犴ďjl0Ðg "ĚW=|z1dF㑠1e | 0֦Rz\Ifۦ =G06cQ_F"u12' $JTjSoQ뀤j:/IND4:Ԅbr&48kR7#es95f+tmTwz=pWcqvI㌌N2Edj9%͛6-pQ'ԟyASPz ' ǥhuan͛6iaMw'cV .+\Hvlٰ%kqI&cR6l]"L["D%l?2z ]6l qW82j:v|M9V0I? H U|sr`vlٲ^ߎC:G[%(>ϊ6lODV);NV&fͅW6 Z=W#kmh"y1%U$a" ReDևA|yf́,HG6ŏl3XYΓ[BƵ`h95zl0RM~HMM0oHc'(ϙڇ)!ٳf-Bqs{<Ѥ`+Nuӻjӷ:4$oA\jR'7O*G˼v2/MYHۮ+:[KrQ #›=Au tPP5~ .NPH:w7֖4JESighg \OQxL'C2AUu ;SqY'ma(ND*Kpe =r>M\0 $/AvwټzTˮiߥO=\mչ F߿QOl$X`Y2a90xd.k_x1 *~&M{ Fb)cKkMZN <(I16^*z /fD!X@yq']S-1Z;A5)AFjΗ5ٔNד<.u{m{ f@F'^ݳW p0նSXOq'`>ce76):Ru5ϪZ,J1uROS)2K!i$jLJ]s1\<#3[m_Hs[Ǹ˟OиF֣X  =h?_B)ۣ'qaV9b*OSh 5KrJMMN# `#R7.VlzW.Nݲ|zseiVob!R;un&bx(&´9X1$5}>Capj vZز.Ʀ5ۯSzo9djZXu-͂u6 Ej~;bo);zٞd܍)\r;|,QOsK-EI44y=C…ꋗ# >*}JMlz5WrߦB"j}5^F0)߯|ZhEN@mp{9*GxT4zD8"91P6ޗcRlٱ ioXKiR+؞;iFƻ)ed\49p?]6lR8M +p39gcԓԜE4]@BiVfgL(#o ͛6Uʐ7OsΏX.j)F7^NzX!53N#TS}(ڹGzgf͛T 1$/*cP ©:7LF6l2 .RN͸bN rǦMm͛6Fgk$i=\N7C?ydp}^5"6R|2pl(z@"ʏخ͛6֛[߫O)(ރl:f~}ٳaDw'$Zd2]Hĵg?wU4Dz~& XB< 1ݚ̚xsG#;6l{ZEgA$61A# ,Ac@zwݍ@Ptn nRU(ş!e9Q~Oe j(zad<%0qޟ'M^KKiJ|R8P17xZ"€wlԧJxafu]j鸡>!ɏ{}΃[Cqwu u5$djR\U `e6ymo}.߅#q (b4ەZ:x];vڙfcfrDțgW$G„ǿgHܪ=m|rgч7QBiA: \QKp%wXV͛6AowdM(a;S}h )8ҍ>?~u<(f͉ 72 nmL@_[hZk㏻YF'lgY~,3c p|SQٳar= 97z-nFBo鴼 [F;\(@$PvlٰiQ f" mwkhUjiA˦v]*PlyĻ68~RQR1zrZ㉠ڽX6ʎ(~$d i|ŮVC!!EBY9u X2+iR)؃1db"L@8=hN# (ȓA1&59c,)(vUӹphmdgIf;g%ywQ %~R/XԔ]R(?,-!n_7SfM-BEha1"7%Zvd}x^0JΑ{=BG+IgN Izdcӓ~Ү͛66A9W\ۈqƋTP~K[j +g5osm8w5vlٰyi|;P(ԩ8If96=rK`iPv:sn;6l>(=P|)JӶ!)n;W:lQv+I*|Pˑُn]q^5r$n͛6]R߮G,,c'"O?ZvNrڸFWWf͛ _~mp\q Gǵ+Zv0!6!]6l&mhm%cUoLl75Oq,+4xM9+f͒ "'(tSIWqԝ=qA=+r\

G{ecLx~.>y)f޾>V-XمYvp͛"RpݵX Wf͛=**m< jҐz7ĥ ¿=Vs@03o2˜@3fޯ{tBɲ®@"]pX2g}B*G+ 0miV'`ry V:`)G!ʇzQQ ҫT#ajBD2@߯wF+H+Vt~l#c+S+ T0*]pIx*V- _q䰧*}VLrdE >M5Hn95[Y_FwKTGQҙ Fs˿Oۡe5Ҏ f!ܔHOk=u0Y~|v퀙v K#k)'n 2\@JԚ}'Ptyc%{m!% :[dK,5H}+*amv[,~Zfb9 Ũ< 6FXW(1p#eu_5Hzw.+ƀ\-75z׶8 >/$wLyeo~G+#*Hv=7B%u7f=վɧݘZ,B09:xfӌ2_aS bZn#N-CdXESب,QMk_R\ ՈK&P?tl#|6(SKC݋EYE{Tt ѻe~6'2q Wr^5 Lyl)<'#Vɧ,3zֈQ/^0\~ /44=jF~䟉8 y`&:f)9\{iou ?Za%25(tR]'%Gp7+ڙ_~>9eHp#ǒ#؂(Lw뚕ɧ~B&-DwJ^y ra}` zuľU<]"(f9}a-.ۀ+,͎Ͷ F@ x8S[-̳FG/ۊWc4 W%&ُO =77Ϻ &kse˦$ d~)wok3mS3FV4e͆ jZ:ţb֎ n8iQ #Njebh75p\v #B)qASP6#q3k#b7zaE>ܥXJő:xاnߎ2(Dj)V0$|q9D T|RqҹW{RF qG ,و$ I #P[n PȊ{anF e-F#NO,'y"Qvlٰxf(zq냚 શQSִ~]|fy"8ȎAsٳf}'#8MzGo~8LT gE˯r;ؑ3M98L'cHvlٲsi9&48Mi5u=F)A^i|g|s_=\qcr?暿6l;.k:"؆?޾[$wZ oOv.eR6l]iM0 TЯ#8PHvʳg(KfWf͛%܍(1#P;"?&a}HǟB<5qT͛6`kޣ o ~jma^oT6#?͛6J隴X#A$V'p'Uٳfz=rmzBZ~;K%Q&j8z9]6l?3h~? lM{drX3x띫f͊"8 1ژTB6l77i6߮Y[+f͏&$ H+f͚Y~)ަ};јyeJٳcL`~9r3uvlٰZOCvbd&͛6T{'э~}pӶڟoz8m]6lii۽rWfxңv\_ՙѺq\2f͛ *jݖMƽgF;tc&ܳf .3PВ@:U,OU S͓hYm͛6)u wf*T(i9! 1c͛6cS߶gBH+n͛6 VdI:Pwwc@AtX,/&GfiH'%,:fggK! 刉6+6l.!*#Oij !S Tiޝ*c~eVl$z#dU2Ԟr 1%휖H6lAr~, Lqg'T{ٳfF:xF!F{ ~Qʭ oU)a ƀngH4!_|W:⾜-.0$[d $'d)D6ju41 HZv ̊2CrQzv!*Zi#ɷSo,bH_WS H|s^\]D 2DO zi $OEpƒ0G,U 0g Ӑ (BGZJxHj:(+;yF;bR Z*+S2?ztLr.m7$|b's|;w%'+16:+kEfr0!K˯uŸ2y.$܊Aޞ[OR>\8GA"CW-ݛ6lF_.\ON]Ycb4 m!gHH; pv XS)ZDT|\<6K+m\>1=^Z.Xrl*c\.ّK.=Y^2p4oyͼ-r8LTڍl$SQMƃ rd ydDDC9d$j$RQ=og\}p.KH1E+ӿ| QcЭĖEa$VvQҙ :FLX0y9DJQ;6ë!Yxˠ9@WGho_l!>b(5fY1U 0_muMclKt4vo݋4]УTa8%y'(NW9i@?XX"Lv8;Clc% N>r32Df!cnv=\wRx8*IJОj|3Kv~-Ǧ0'{DR$dPVjs!/Za\~)a)i-1:/zI.#Ej q9[FDy'U(~(h>f@͎2y 'f͛!,Uq;0 >Ƞ/ 13!۶p_P#sٳ`r r$aR>445(i5͛6el%rO3G)ZjU\BǶ lZB ȂzWlf`tR, @(='~Wf͛鷳VD ᩌկ-( 䡷ZCoK470Gw< KW,xBЫ=Fc]|ٳf:̶i VrC #Mɧ .%DvK+wZwa6'f,yO)ѲȜ䉃B]6lnszeS/(k^w-L`isʲ Bn./ؕT]j?/.>/V]6lnsg$Kn [w3f3v6֛f4tu'E&>ԵhM`X':mWz}9o)7bxwۋnA]6lGNbԯl?z\҂ k825j;S6oEqN|\=\BC}]6lf{qo8H* (9S\J,EG2kM}-u08P-'2[v6V*/.{fqO-xwٳfĭgy% Tf<+`!!&nVǭVQg3.BP}ɿ]6l >w#|bQT1zVv=TjT}GP{'qW)cw~LʏPj`=*= niAmn-.>d@$ӨCAky ރ6RV%f`i˖_NHE65Yn tr?dlkGOɘxdžF$ruZVSVNAkx{Fi$$_`Wm"W8WF;~67'64#D$rI S^A =^q#zo/fp u71ڛkJ|vӮwQtWq$li]F3)`.(c'|U8>L Hy_G_zfV3>s`BōI8q}fЩ0)n&~iZr| 4>ʏv睋_퉁i-Ԥ5JVۏ}u0˒iHK$uN=׸9=5YDHrkG`QDOņ,fmD*J@¯-[NaJ}"Ŗh9tZa-jJ};23bw xb&]L:bPLu x8Y @w <Íj} xl䂂pVӯoQ|N b5|46QU:%,zpCAP"o ep.J7' rv֝鲎_hm<~^I[Gwc6•߷Qzfe#r;gxҧd l+NB00Vf=k'u“W|oP|F6CkaAJPdN'tyR 6/vW0F@SEn RA|t|WIm <\QzltF_pXsco9co ծ(O nr2ƥ`zzo4òAlJS^2'qLrcaKif7hgÏrfTx[2:Xe@P龦5QElPsZSZ0=#QՏÙ VEc%t^]AN Nm~i9?VieV͟%. er)A?朵*+Ha38OT(1:7v^j45z`5ܩy>_R %<9+UoLj55R@q-6=*Iy=*H[ KQqЬCߐ);RI~e LEs[S*A0< #vnm<~ՙZ8m$:DyYc4khXzQY#tQN$>|f+YeZ+֦}YKkwu#Hoəc)p(IM!͚;X-+A>&USeԅ@PR=WӃTj67nPIx׌tE0C_[CcjS%N:9F288Gq{^AFݛ6lO$Qu?iqݮHZ3G@aa,Zk}7pkXu9&~\uJ# ґ" j0?N|^^آ>]6lS˵|p\1ii20L:n;8=嶵O QQ=]6lZMr1m;ҹ2 nc>JP)߾䵧ؼV i5Zn ڼ&N͛6M>V؊*k>xhiy*Z0@ %ӒO/-Zs{~EDd}6=H9|] T% #iG$B|ݛ6l:H,kɾ8ҵ{Uz5?uKK{HEK}Wzf_ԄV6]}.!ɜpgƉ]6l'"LOǖ{'h_HO`㈶`:4G/ٳfƒfᾔsR΍22Ct#d%͛6D[Lխ 1+mv8)d[SSzup8a\t|;(y»6lYi9 ?Do 8Z> R{6OI oG'd1L6|y|Uٳfâ1c- _u/\|H ٳb.0,Lc\\ꂻ6l _ l!v X]$+*q mϢ6l؍Wk3P6"l^1 =OeC+f͂ Pi6kM0*Z0scB6l Zбd)B25i'qKqE ZӶultWf͛e N@+T-_b4-CB^uyPK$ݪk֢>Gep gkWR"dJs]o xcg2f͛ /5U. н*T@P[XTN pŶ+]s(&8ۯ+zbPޚhak5R显!<&~QhvlٰQ[TVB@2|V;w ߈ӒXaY\-hv=gԆX']6lTuRݺ*ٳb<|pO?=~ weP24[{ٳf֎40D4 |($-jY*7zbvlٰxy0MӮJa`fQvy;6l Jo OS.M ?ww8*ٳa'^UDUϪ^b1KĵϪkR9HBcSN/9<~,o'|GpS隼P^ȅ|9VzC@L0յlAM W!4k\mkO  ]iUg(VQA 꼏pq۳}rzDKojsksu7Wpxza.e~$) T ?|0"3.q^Lӡ4!CP=m YY%ON2t]pĽCAC$؂by{ɂX^/īFo!1ġEOr[F^=N ӗ~y>€=pRMn0̈h̲)G[kK&Lyx,pr/$8SBPTbI#r&G@|qk8KHN+z\H Gj{\Qhh`?ݣ<TvTwl1[ü.p9^P6@fߘPJ?BI8NjRN4޻О5BÐ'1Yjq?k[5"LyiJP(I2㌺|G㓑0yt=>5wn."@no4nUz6! RS؄6RBl;狋)2Sz7uK8q @S|#*bO*JJ ֻƄCoo&OL5aBT #rA= Sn{ރ5Cɺd҃OE:iTŔE<}:|wV #>g='P~K?fc<~O2]E5d&њ .ծn"UFO5-tK)u 1 ,v;guf9kQ ]~8K+2}$'Hӧӄ?{mg7p_|LLH˙i$dl d'Ttb9aL~獂"IgpubMEL`3 db>)r2M'>,۞6Xa@_3T(nu>9ǪS~b3b*C2WlaaۭzojrO6c| ̷vk~5~Z z|28Lyl91s[JWչ)+\r:wG^0^r>9`#4+TOJ )d9 0qumӸ=Tw2yG7N隃7L:Wl.y-پV'n,HfNpt½X}iEsWړLJ)X< G˛D0z=yQ_f9YMeM>RfuRH¡w$ Ga,ˁiIwz ٬m=:0'SOËiz> ӥ/˴kDǑͣ$8@ d핗7`0H-P2q}q~47Kn~$pE1yG }|XG. ="XB/)zf4u:m2B؎0'#[﹎<`$c]5)52P0X5VWK)wZ2lvmWu'K".IF+k^c%[nQ԰*15?I^b}.X-R)#m٤7޵5=O;_6U=:S'|1һˑ9'2ÄA+M8:IIo5ލs>0JNaئ$EƝy /v+hpm>qo?浢v*=S{Rc1ҫ7^Ab?Dϧ XjScJv6-'DVqЩ?yO>'k(M!#jŵ@ma|8s]DjNs#9 GH PXv96lQ ihC nV#B뷌^y't LVQZMa}~)J 1i'Ϫ5Έîc^a."Ylv4$=ӘN+ܮ͛6z*w昔>aJON)8u2Gn};[0Q qBV;Wf͛$:éOT f9T0?xdEdJcӆH%e[DTyvlٱ -5 >|]Rvo]}9^P&fR.,'bw͛6lp;BNfÓ/5vlٲ3'\ s#K*ZFJ⑆1:ϠjٳalS?rS-?Bvy!w[w_6lmڈ G:+W6C wxdD *'NwmvD1%v'Čc` KsCqs<ٳf=0P5^0.@ֽC<61Jٳ`˹Eqo ! Y]w4ɽA=$ ,aA^ b&}gpK NGQ`t>vlٱk{t4hA 8.|jb?X=q&2)HUz+f͊N>Om$Pp*ZoiEԮcqZa <ϧ~ٳbr\joƩF&Il $=r9}]6lVmT(Ҥ9a{zdv>9/ѷe^ٛe +QƄư |ǒ3p8M=&<j/zMJ6킣ߵ6딼$nw؀7 Xn+۶^XHBC@;W3HB6"e(.Q)aLqwDrk5Q|) ! 6 'bC5^~ vzyߧ<2ýzDHO d%zM)EFW$hj E~ w?,hFrǭ އ0 Ǩqs1Iu< lhUUH.ƔFޞ̼WMWMϷOmәf˶,]?;sfLS/K#< lę-ֵ=LQN8WaԳ~ʥz^ww 9s_ n{]Ⰰko̚ν$GUk%ߎKob!/O|6٩҆N XHڴ~4l>l$fdeG#:vie&Cd@4gk)lZp6=PMzvđ=6mjݿs2<7RZ\}8NR1o^̎~ N<(qKt /`օ6ND@d[.ij׍G a@*XһmEr2>!j<]c]zW.w4`qnG2f3N%oNBw 7S{{'}Dk;i;PTtHSVJ0idۑ~=:Wj258[H W;T-;'rv*UZ1v?1N٨OliLsfbC^8\ o60H|4_ŔLo@~!>/l&փ*܆kv ]F0"?-Î;P>{Ӛ ^(&Q=&e*H>%lTBi_2!VJm2Q@S|:58 S%~/^~ ZA݁ }+U:/1 ġDDŖLQ >ƚQ\^XC]zL}9"vԓDKg[hy\Fǃo+ZΉqy-]wqVv>*n`nFvMmtɭK'D "!Wm̖pNuc;(̈́7,tf/%ɐ$%MieLmFqJ5qA kȰ-4\|?X|sc=4*sȉF.lxGk$Ǻ;̀Dnٳ`q] "1iW[4O(pLfOtn1 ],29t*WfblM2pƍ-&D[6lht|;}]E_R z8۞Sʉ>R۽ٳfEfxl7# u_&V:u`,w>66 ? XX?t c}?74(C˛' 9+> l Cf8ɼl\ӤxP zzzy~;}?pI%w1?h n{;1Z Ï -♣V#lPG t>Vw$r&fL`?PMU$I.}UyZI)%W`w$OqL1;Fٳb%ku+|Aez큝a]6ld(s *5j|Dm!$s@?Ql{ٳfeX^2 Ǹa]C[YdR*9 ?z6lؕ){#pw?|"nl|F yHH9+f͆%Oqϔf>$|a"H͛6([FRXCjSj4Evlٱ9RC$w/gRzsrZTx㫗Ƈ̃Wf͛2]ފ҇Iot0>.+[則䁖&_1@ ٳacaww=8>Z2vlٰ\/jxnCNda͛6 i\xxaSJcLf̓zm\IΌRܷb #+Oxfksf͂L$ Zr$Sƻb,0 Uٳfk&xdE9 Uj+dG5* zf(d6lHwJWsuZuoPl`wٙa u"7C ,5+*x#a> o;A]|LG`!tq?إƻcHh bDzD&vǀ8ܵ{ep T#rOsR~w9( prN&Y9srM G,eH%8qބhp_p:[ Xٙ 3&ڜ9@XOhO݊*xRٌ+ǯl/*-O-wíb ;8Hj_#I>.?e5{<_;gO1TUU+J*ԑ\OT%y'"WnV0YTvZĪ@yh6۾2sSq\{^T :x$8F_cңܨF#cI54ZwL ޝȁ5 8!4XV.T6൅+gڀBxnN]A0 ܩǷ|^80g>z0 *k^iht _F^4xb;W"icz!k@+J#9؊v5QusrF R$VIؒ*7 WT3B߾q^]x`gh2zMZ\G,5oYέilB*@ntK2[BLĴcO;9nMZr= J *Mi-1\#!uxUgf7[Fn>'$cԱkJD=^ZY-/S-fZYr "я5w[P1&.Eˮ/ׁۦ8T*mCJj1Pyr>9`A2~:+17΃܍6IRr+{t5ymV;O|J uƀ9j S=OހOC$v_J'CF<Q+OQ3m^b>}(Oqڕ42CJbAۗ=THI#:+ $_iߵ=@ߩŘ3VWc:ױU?h{er\Q?UHŠOQs c)ޛu6e/@~F1 ߧ&q][q;e Mjl;c9*Q w2q2 R?ZcCjjܽ/qu5I:"]M^xvC-bk⻰$]78ø\sYNei#n9F0 f^Lui=X6EzxW:tQk/absP?ejVKgaڹs2OK]F66ۈ~9-40F MN$j'U@qq "5.խ}:^c%D˙= E]6l*rNqqj֯giP{C %f$n?͛61*nzaՏX>}ٳf@VۮYK]6l \F?'o&7'uc']6lסh.!'A;`ǂbﲻ6lO|۝hms_J~OLj|1Wt͛6Hz6~ w'`1t'] <=ٳfȭm{oO~㓅ӛæ*{Tlp'Ȁ/Wf͛#w1K/;taOl6[lXit9 $'}Wf͛!7 Љ(i ?iL2HgbO.vlٲ%OmkcaihH2v|āH/櫳f͑;k7>d3q .͈ci$/QQ((G\bjZ,鿫1ܗf͛ѕѦZJ~ z>ȃJ0Bu>9ݗ,0 \';.Yx!ZF)I M)ؐ }O pZm⺹L]:ʑ1Dk\t<}8Iep0sG4{~ǣ9:ϩ˂#)Y-0dQ yni;횭e?3,KFj:(uޠR  n dy~q}|;|Xo=`JmT woijT>Sd,XO1j-(;MQQNָ0ڻ] MQNTS/@ Fí6PSW񅢞JhvFPiv24koj<"b=t\jŪAn,+qN$*u(**hON+}~0 l+eA/2~7+nI|IsP6 S4܌WsXT8p@;o߾yY'p:yejT ~Ҋ%hNI0?=)&/oc╇?O3g, 'dN 晌uL效A\/Y7Q͍A%ŸjF>ٯn:-w Lf,1&ei3IcS]#>yu5</W،v{y*w32O~DVpY%f5'1]N HҤ}8+ۭ:Ӧ H%xf~Si0]NC{Ju9)G(z9N=~[W6أ;x""|1ԧC_lr x\`+Z}-?dej7YBD6@^ c1^Bg84U'q;Pe)NP9|YH_ w&ԃr跕rPcr?6b JwǢU^ǝjH<0TmHO4%*c}li" 5<;bUݱXaz8:+~xv6QPvcğ*#3͂=&2 ( \wՠ79DSu;Z5;vw[42z|%QJ5F½@=+,ǧu">̃g&UT#U(?=~1gQTĊ (\i!\cwOiH?kjv_li5|o#QqZT`7ˉ )!Dn1O"qyn8ZmVja[.B՗RvYbq}H`WcNЭEd)QvKdy`Q RpE ۵^R׍թ̜R'ŃQLO]͛6'iϩz$Omk8ך4ڞ2meKoc.\7%@|8i%yFU@+7$ie>EsaAɬ#1!)e4=:rgO.lx>eXY5h>3Ӵ/eTPiӶH4,YۻݘIJ 2IofZV%E-,BO8.ܱQ@[w4\%ٽe %xF'ߣi1$Gޡ#RIҦ4,e|RI (5M6si5#Ryvlyn+P=}~4ٚH eX3"eζ7G˔ㄫAUq<ԉ;(ٯ<';VvsH^'}P4D^HzW%yC hk_sO ܘ<3+~#2;>0O."d?펗6m7?{  fQPp6I$U+ Vj_YЎz`#ڛTg4l<$D{4}ؑߧ1{R GNؗNiQf͛ >vaF -6ա}:Nq?AvqEi|,#'z(ϾG&f+hc]6lC#05ll^4]6l8CDHX E ^M L%o`}x$))Fc˓&>{ٳf}Z5 r "_ՒD\ "+x6 >7r;FU@rmqBPh1 })xȮ=^{cE^$WS[Տ GҘwdK]e:7g;&iUh6lLrzvǧǠa~J)/|Xjzub;8W†Ĝ("ܟՋ0l|?7.K̡$Ex [,T|dڢ0ŦQ4wo coAJ)Ҟfvs5sbj~]C Fnskr{0>ɮBRZ)fahC3;cRw'-ry1ܓƤH*}*r,An""k:M!̴Z<B=͘ =29Z42ؑP_ mib6b&-|UQkZ:b}Lx 5)MW |3".Xփ7zST 'zZv8QF |[{lz v{'e=Cԩ*h:HҵVJ)E{bJ.חLYT¤vm#u޷<24;Wr ~Aq*6@7E1 ZjWj;ܽc Ary:1bNc&vP ÿ5Hw4{wQR)N2@|oGl_ymk]Da0a۸-8_rqĀ+㸱?='"(ӯфI.w¢FeZ+4 Nʅ"rj)ҽSw'fOw)"rW2 úZ֧N0U3 fjmQH>Ɗ ޕ=Ud|SQ۝p١lØ@t˩+ʡb7;o\ł'34Z_Y]wj(zw[XFU1C7ޙU;щ{7={|U7")k0H`1єHt,P֤'+AEᔂRT(6xTIw;˔:mQڟirW]F"YVJ8+3]1-$HȞ ɳR"dv{<ӞSHbOV!c fUK='e$#:ե|0ˁ- H#=<|<=fٳfMCND\P@z%ϫj6%h_$ZXrցٟe5q#,n>dz f#cˈ/1:a/f ceNkV{dHA_I=Қh$1),l"*W`_-$٨RkZƙ"U2#. R#;Vb$cG}q3x)fV=^'l<İk֝"W0I r K?Ÿx#a$jA =23+skgu,{>_Gmvb|#o`OλK=V͛#5 hI(O8J)2:VE;Cj?!A^m<Ɋr'>doKf͑T~ŸmCWeI8=ݥG"4ēN.4ӄ\z܅W==N8ÐHe)rZ6l8 V~xZu7R<2UR@=Oi 5ݻ1 lXO!ٳfj.iBʇLEG[^rEOM+T@iP_&::q_'fͅ%"uSTv⨦^+V%8/FJiђ1jG21*Wf͋h*#ϪEo#бx+YE+2@4͆-F&Ib1)&ڴٳe5+Q〢 mm͜vAoJV(b1g&%XB*ٳeƁHPx`V=Q@ H#l4h,XZ2:'xB\&u*}Vf͋6ۥ1tf52I#6 Gq^ǛF0CQ<ю)<vlٱufޘKin"rUr?^^E?"rp~g0}B."jٳf[H֫JDB;IFJP/QpH_m4D+ESnfQHɌp|'If͛Bs֊*kC4tYW/EConׅc, hM::N0Wer͏99qՋ _]6l'g73@@'ҕ1B>>.vi)ޔd[S)\Y$8Hpr;Wf͛/Mws]lzoIdGSMGu)6q`a^Nt݁<8Qg./c`r<ݏ ̱㏲fgH}kC o[bz.p Ў8ck/,J +߳tz ]?lh5,S.ݹ9~Op>#!q+61 F\@o j=k>.~`T?9j䟈}v wxeO}S#I#v٘ ("|03fGJ}; T$z +JP9 W;(57TxY̝Њmu*4l^B1Hp)"=*}BSu mJ-2'oOv#%xe9|ӶEvYI˖i'nX18m o1AKlm8(|^li#ZmLN;, 8ছePGAЃSv] wkALxgy [ኪH>8J/  i Ӧ0P|wπ< N17 ִ14hq@ ҟLe@wc|rӍ+ecz}`1j%@-Qh6A¤YIuq´ZlPb:-v~xSPvaო 2dX~qT픧n={a?6O>j'$VAJ@ʨ۩w~SB 7'&l.޴w~ȥjNcR@Y@sAE)mC ~A5ު!w0 t~)V>ĐiOoS$r,8Cg`F6IDo~ NىGBBw(ѫP>'ހ4$1LHm}q#VSzf?F1ً)Ww>^#͇@+ph:eeTf71+,qVW)QC w =k+QQA5 i)-QR~;7fh/5Ѻ͉k$on}" 02*v<$TjSS![gWes[ǭd;/3Fc×GV^VJŅ{xkCLy~;J;ʤ8M==+~hI90bc@+P8Jnysa fj؂7 g8sٳ`B~T JيnjEh')|x eҹQ#2l UOtn8=+K!V0$VdA\; N$VG?C$*M u N )p y=Be|Zaፈ&ߥl p~[)Z7n[7$9uSyo\Z"7 aVgyzCXpPjw57Ùi)? 2u3qDXvlٰP=T-JmH$j{ ћЊ |qoe]I˨5'5 az WЂG^>X1`_̼<;K>\>Lbxp_އf͛|ћ?l5471:#~t͟c4Yr> 1H+(ʮv]vVl2Ȃ4;E˜m nY@AI-nJzΫO9t~$aŧ(oTܒ=z܎ك1CBi4|cn:b"#>EU q uJyt#sڽZq~!7S"|e3$>'(,F=idЁQZF-= ӝseQO_OJIb&:̠@Hڠx`ESJT;W*̡)UˣK;ZRIϿȓKl|p,PQ^dϿi%H? c(x{ct\yފU44N#u[IsvQXmn:8fR&I 諀7sEӈMqP6߽1bGZPTͮ 8~/CRxwWEFnAcF0RAڃ)JE@޿{S5G}l6*]|stJv">I4;/bU?FStjB qnw*~(+Z@>'/6)ˮƛZ\N/*}</n. `y3' yn^G4>x%$zhӕ;"N^շ @v'#)s^mS1 " :w1O@v=J_ N@ elޠEF_5ﶜ7>|[vfjߦ'ZָQ W5ZֻUm14wi 񻚂"l<[s1$;Scku4cGS=hlС?vǶV.wPf;qw7#l |.+^ǔI5^vQ#50#{Ivn4u4"49R3Y%-͖r_A>V2 H=T>x1EϟvlfRT?\:v.rdA#a8WM3vn`fhpkg.V#FlFXLljLr'O 6،&-ѿɅ|$6:  $ip3>ޠ5s ,h0eJJmm^T 8qm$ir^ &tm? z WӊC doGLů>Y! %~n;4v +/Ӯ>;;VQW'ԍE?l{K8CLtK3͒=`khvnWڳ 5D$I>x^ײbU~8&GP,AyOf~[I2ڧ>>#R\#w:,q1#fǪ41  \Z7nZKBԩ=id4cfIEA$|؂(cXbMiOS:4V9OGie{+@deI<#id[d@.Idyk Gv?՛ ~rG/ՐoY[-͋ ?NTļm푟I:w1wBjM2K*,0)!ƥٳcR*Ž:1 ^^uW';4%RF u럻"Gr? r+Wf͛.nG[XY-ONzenǾ$[,ێʋs=9'hBGf"Ǡ&Cf͂,39߹~wZn}?ȥ+6r(iGϩi_ƕld;?(HC+}ٳd퍘$>xPo"an#u#O˵6)*n_b=G'nB-@۠BR2c^@lGOlM oڌzVcڪzژ)mB@;0zqHa#6_$:)#cJS, Mn?7'A7nbD1A b;#I,Ktn @jkdUU=w2p0wʎkj d8 %kSJm_C(*)C]Zan_n(lГJP{~=m؁&GlF!:<=P8oM `ń*v~>|py bwLz~>6|<q'$S֤rAGAD56ѾsTS=됽s(4AF߫:nO\\jWFo7aNJ}Jw`}Q]|?/gј;O({SWB'M{..՟j`ҴXkW(&)<{3mEsڤޭԌǿ XILF H헂 mU.h3zC`9~<0 n~ fU䂛w|-H#ûSPe)EO8v3P8¡mUZzt6OՕR۟[QC|GY( G:JMfFM>cރs, 'N9tVNYɮ2>Ɔll1JrHJWqCt<۷ˡS؃ֹKPRTrϛ9UY䰂k_Py<5Ęӭ}* I lfel,Ȑt|+@O{{⼕H=21n1\jr¯,6Tۮ((5;1J 7u?bM:YpHÎr+1Nj ~gdBNB6=1#*Ǧ mu\XdDhVjtӍW_#:b~>?Y]lqȈ?5t\N\HJ,"UhUXb1En*|ټ /klyHUs=v9#qCrS,\#.8V P@$>tNU ;oUi)2ՊnWs2ʶ4.=x=>]ЕI1z9Z槴òxᩳ=Y<{xpe9mZvS.wp161N٨N ƿ_mNd̚4}eo#XՙT#zWVN SS^zMv q@sMO#1NgpVSyli56Q9ˈ0}H&[WJx,I5'9땓'<pKJekU^9;u8\GB6e\Zy,،h56LYI=e1e}x7^&2<<;crJ|af#@Ju.<< 1w؁VFUhn#/Caퟗ8bR^3]ssX#7hhu$QZ]^H6>8t⹋18>΄ ZV ٔS V4#:jw^&&[¿[X֛ ;xcx yRl-%" 9a=_hjgd%R"GRllpO@v9@'sA$!|@kI h)~Ui vĦu;[n*?rݩ[X"(νϮ͚@r;G%3I!flgfO SyqGp~kwʲ 8.U~l6<)ɬ xb̊9Z]hOj[O4ӏ\D'/ٲ³($ dugsۓqwlN2WsOc8-PP}*_$yje)%`C'ftzoᇌedL0;99x'Y8H OΙk/Z"Z KM0 `wnІFR}zoQ*(>3<ҀtĵA 9u۟=YK?9E 'Pk$!Xn%>N!\D6@+Są뀤-PjIX,l׮FdR%j^G~\hv0CWf 8D|QA=ƕ3ITǦ&g GLh(jHn#GbJ %ѯ/,2gaLNzF VE2EγxpMkQ\`eǨH\?z<8tUצOA_cDnLjc_l*YOn\G5*?dzU $SAwwjCJV‰YVGPшZdG)8'!J5~#.A!@-M6嗝_qlI/' nX;aaAZ\jX'SZ"I #BA?&v6?VV[tW%ji޵˽NDgKTkR?d> U"^W"o/] H] Eka^(`zq ~귪V9.-f 0}ls=.Q$}]}lhD5RJuQ4-'Qk21,MbT4G~&0G94ebGp *;yhPjbH]q@ԍx̷FVCJ.CՂ?*Q5{Oؽ8; C |c P'E[N.4#|Jyets #ŨaLΑx ؟aǤAZ[#JBkefId O߆1Zc3E><8 q(ǗYǏҳ<( zAm^cCgfbGm}HDQ}ŷŮm^ QX FKF0LlewmW7?-|N.?`FK p&A$RW4P*F jn BŊ/VOp}N{d@I{4姐;/zf8t'3ꅈnpzà)^[ ?@T{n~xr٤SlH_BF uAQ1gȲ% hI+n.brdϏ dr#fYi"'4c ÿlĈ}:'pF+ Jzot[q Pd ZfhN%ACR9stL qy#)׾I}!Z.`f<ٕ:S|r>>CuF':#ė?&_yiq܂Ȗ:v yw[d2i/+-0 r%J-ow_|ʥEJcSsND10$gFsr6qxK(H#+5ʿND@oR1@cLjFac5@2}7*I05M o`w,( wUe3` _v%i_v <Qˡ1S@6#7> ?.Wl{Q ,WpjW`kM=.5Ӿ`CZvޕ4S\I#1~)\o)/r۶S>,ǮUIŃPC2NoASsrNxL$*7Ch4lZߧe&bmjDG66%.2n!O(frLv*9SOaU\M_rϽ:K w9 m(&߽k8{)n/#Jv * "4;WDflNTdyrQS=4 REpz$h4`Wr)SZ}Ovm6:b5hd>aYV {QK]&6Zv 拵s_pdfs=Љ3tY!?IIyWtO s, 2NM *[F%T5,€dx*>mѢ״K?z+ ,ִ{A ֓*J#~L^3O}  j7ߘy{K[ژ ge \edx!YV ri_΄Hk;ZhJ1NX0Kx0&-:p 6Ҹ=CO<R rvґ^PNY[#HJ|fh>]P`1N!`{nn>92 :ӏ56:l'|?z:#0<8JTRYXKqq|} i"~ʸNRcqsY\8nPt[Lל(Hx^o % e_y/'' '«e$ٲGu5+s(ݪG2"Y>E5&ўV侻ce/P9Bƴν.yBJ&sn?g\AV:,H?@oKKO]֞'Cv?gHsmOcxVil NIeW-oPZPᏂON,.rm(MP[qM=E9)E1lզne 2ı ٘qG6^I,fJDn M&~Ta$JY(αц 'N[Fǹ(K;XGˎ)0|{29Wh;7048m^m0cc͓Qޗ&nX!BY\des;W 2QXeYG YhGȌ(7yq,P5F}FbcCNpJJ:)1G$,t_c@ՉvDB؈S!qRxNJu§^\IaGĶ什kgAVB'E͙o0뒪S5SzS9f,\=Nk1:kϤʓO^]_K2*J7s^B)Mm:ǝ ޮm$hdV4KV6GڻmʘmqrH=T 2uY{OWS<,kMv[WHMj!k~M>Fom.YUӏ#@Ċ~fRD*~X[EuG„qP=/\8[4 G=؁0`J!c/kv^ό*q\=&9u0Z~(QVJx(x6il.bqRwl$A1Z)5}qvA3W~&Ux$IG&F;Rws;xccàJCv>rfn:e\h{V~sBV|IK[W篎"mc,I{!MM8G!Ζ, ;F?Ъϥš$djS*8DN-7qY nﷆ$l4TyMce^Uq>,h4֪M+^1KhRWJS5}dgRp?3Aعy{/~^Ia:c ${f@_kf8FmTdv Z7)}|jhTr(4'|;>:H=NLt+b 4)1XQ]HW  Kk+ a"Hznc}2APvPS+0û`_ޙ7Px੄~z7'Djc~av4=2^1R1a`Ok5~c(zy~-ENPh?m 6`VJnQʄj%W?F:1Y SGolk\S 2-yVz&,}hN9}QK8S|0 r5|LlHS Y #Liw"sg,[IM7Yws*Gk khBr>NV/hqp#?C0^4ݰ{_Ddy)Aǭk_@GCUb>pœ؎퇜4"ؘFr &䆀7hg83yWljq2#.WYݼi/^aOK Oܷ5xЄEM*0!1IOPp/~r1}=HGњkr,s /gB{KU, qthj"<.͑8zA5~XwWUJֻw»T!0v'Q,i 45=rGcCk˖GgÄAmK@Ejto fR~W2{WS䨌PvcZ7+ۓb69)ng[@]Tl˖{^R!nGlN(T0#lީ5B8R>y*XZtVji3 N#7Ql$IC(ʑŋef4垇5;`X07c7RcMMnfɹ5k 6/xET3Kfc႒.2mjt3 C&4ce%j6Rj ; b(9qqssjغj6 +xLT`FZ0S|Lv?=|N_qr` urc\(ElR8;ǰJwRݘAQڝ"zeך千H"@#oݍF;o jl1ۍ)JlHC WsP;xe8 7R*H_%۝WۏSfZ'Bw#Q|陨uq}=[`AZw,@dF毛\GrhsSRTfkǐTb߮RcQ\p+3/\\]<ͶJORNǸSwWpiڸAFݍ1ֵ;ֻdCUtL΀&AB+C wĥj:b%^/ǯ|IE܎PGSqwe*5ܟϿ[NӯR)//)1jMiaozqjC>Oq㨛>ϟbHsp8ȎJ6|%hWwaGˈyQTҦ# .UGD'VB!u khĖzGh-e~I( O£ Ԟ$uH9k">{acHLJj̥%Ş]@r@WIKX|V/zR pm./SґjҀ ߦ dcjJ~$8iF% ʧSTQ@,ڃo|K~ Kh9A<ud=%Ol۶4ӓɧOScT3|o_۷q~hzO^H$w1Rhι^CWX8M5{ 1Dj#qj58m!B «Fsh;K0!@1u#+q#zR-:*̲ 36?9V5z|lv͝6 NQF0q 2SP'"Nu} D>wG.=!#ݵ`7<:\U ]l'bMk Da*|0tzn4hqS0|Үja "|*$zJWnu0dui%>6GTRՎ/` }$ ]Nٞ5n}IBZ^,:7~% GPps" 2j IcEElQ xh;m aŐFwI5UӑTB+) JQ`"~tJ% U#xaRy~9gla ¥H%.i!/m>uf{Hdc s2qljgZ}O%Tz7 T,թ;2Ӯn%$n:Ţjw>n>:YFy*P*o|Ng1>!NRx$52*hoRa%' 'Uw cL94E e$Hmp>$4P*,!k8D'2: HgFQ{\Աi$lmO(c.kkCXI-ŷoj<~ tb6(e N[* !5t69:m&Yj,G)7QqcX6# qȁC4B)x?KU,6bo#j omԻ4Bu#EYZ1BXoN[]ml(h@˹57$!?3Mic-/f  ~q3zVEZ٭?lO S%ޕ**uPn<߾Gx[ܩ_ :7.ҎqÏ@FUwˏ&1lu>4Eڷ8NF{ w;HTZq{` غȈH%4L,$RI㭅nFkۑ 0/ڠQfFgD(t%9d|]TxyDJDih/ژ](K?sI_ZSU aA-_ՙc j{ Gg elt, i{-WX{11i,3{SzH@}FRg8<ݦW[$enj'jna`J N?1xꜴpqo|ܸZr?Z -ab*'OA|x@z+ԒuOoʇ44ۇkRպ&;TUvN)G3X0^Wolł>*>g̟WK=!Jmv|IGy:Z0'1@M?k?-#J.RmHƱïqF\[rڍR uj k{?-~ڿmg*Z F&~юiY ;_Y8=#~6eH~~D^\cJ`wyQ59@ՠcǟmo'sa(`H\ )J]G?7n,OӚ?8.j:+@I q?G"OeFJxx _1ʑV -Z ;"N%}VPIW47'b*)Fť>9%rߓé\;di?~s;4uq >F淽BZ7s+poՀmra ^,Ěᭇ,0ݟ3m3+ àP; xG+ ,.EA,*%75?kܧ#/-4q§l3%X4'Mo?l| "4O~|?aO?;i>&A )St?k #;kfq/>s|cNem !Pm86 ǏBjE=;Z6lh?Ɋ*Sj7?,M??wik<."x6 ::aOFhc!dfv>xآzT_fEh~\bBovo"7"Ji0}BiaA2~Y?X1UPT)-/?3S}|8*9Y8_5 "qxWd펛/ڄqZ\rNԨ'`__]^_q7;>L`wS;o'`OLUcR>x-se ~k;qWG>ʸ _YOXDUlGK\! hx .ӣ$I#mȊm0#x|Z>koHެMOm (B'V:`Ol'.YKZ 1UEAE ⣨/oա1g0 s)n>#cœ7; qHGo RU wH5>9%=XWsM/%r D\ *Ux^8ӓ!`\M<"F#JoiEMrՆ֟dfJ4>3<#?լٲ!ic:0- x'gC'e'*#OOy鿁_ g endstream endobj 55 0 obj <> endobj 56 0 obj <> endobj 493 0 obj <> endobj 494 0 obj <>stream HTOMHTQݧ!W3XoMH5ͤF0A+I$3opU"3bIEAQQ-…?+ L͸sq`su-v3uK}eCaʝ ]kvNLպ$gM],X+gzucqu͢hϷ`Oe@|*ૢy4H&|l蘠9Ҡ^v jİ: WOpVvoa$9Su7(wLԔ(-󅙗-{3h,]]Aj0u*L2aI7I!vi!)@"qL>#={f:?bxޑwOvs u9>.- 05 endstream endobj 495 0 obj <> endobj 496 0 obj <>stream endstream endobj 497 0 obj <>stream HVkL;c&`w~bw fmF/y.*I} :2OOw\W@Fʯ%G!}g]dP=61CCa=ri9&4|m@xk{g)lЭ7nn4N] m v Wq֕fPE8.QblD)12`P.$b-җ3,K[2>'.Y4&%KڊK-f6KÎ8fL?96A)*\MScJtG lK6:tqƥPe[&Pc~5.X))i[&ò1-l)[.'ÖĥGҧnuI:. l K8tΊXr6i˟hNiͦl +GĊXԡK_n-j &+0&HcGٜ!0\JI',#Tܜ[ OrCL6-8dg /J0AϲMz_;)箃<+Hm@B>q]`8Mx #hM&$ac+KFiߠr'IzwQ>.F1KC,cẠ]AC>?ǂvUb)gMwͳulW񲸅K{?.pFա x)'DZqE-~_`SFҪ #_%ExD/!<8q}zoQ(,,dW{k+x|1nxeZǗwW)&zJD7)TaήY?Bԡs49>!?؃ h + ,ҪẇZ7'M܋|LCWojdVK endstream endobj 498 0 obj <> endobj 499 0 obj <>stream H\V P>eE]W]ºJ[pTb`.+!8jjn0Z:jcg$1qrwTSL!i;mҘ6mf1Ap=s=APz&5(jfM\׶uI}; p?Z<6@q֡'q~rM[9mpr@>CyU{N+,Cihv>yl̓wD!O-=Cq^KW7u͊{ M-x(FΎ3(V14R+yKplZ#/A`&Eb`@"y ,E$ 2 !B^ !Pf$GU+Zit3L 9&-x A59.P5531Mq% HkV?f[b7yQ `?fRNʄ*r?)P+*?Xnwn&?Sr]H3υ^/ЋF}xY̅U.hUhO<+QkG(BX u!s6lf =k)M+ g¹6dR¢LAAZ%%ɜ|9x-ȳsӮU.\[5g*5t=JJtΙv5/ڙ? Wp.Φ2&eLp. kT}/&3Sp'?3l /㤃')Sf{l3/'$e5p9d 4ģ]ޥf d%d3sabX0`SYF Ugc(u^ ,R@ϰ )FBasTO*I滹Cb!xCȌ>bIM#4؃W$Cdzh[#c $RflnJHx"&.K~"nIM.h{It뻭 2jW.=V`xxҸpD %`(oe$۴=.={ *G+l.p@u6R`SQP]z/ vC$*:D2[Qy8 }ނtSNt|yI6AN |yI6ٙNZhޒ]5Zl_yc.#] ]m+]CmioKKkXPhd?,J(,y,ebx1zXPc:l d3fx y51C.'5$ڬP"{K{oaڽ~bzӁd5|Z]sCOh>!M־3:}ng̗%B ZG ^*3.,~"!UxK=!OK˧IߵǛ䆖c:+2+E(##}}2h&L4` : & s J6tA M'Pʄ3too%Q|]eKq5zo|1djƗ;uGSսiOE{]{K~uK/x|37%~ bːFjpK)$b"CL;xpCZ`Prv+Kj̀(a߼ LÜ&5ڳ&m/`841NQST.U\/xI)*^ZJO3S(<9N 7;c}vUրp~_p>pԋ\0eKbXZTtt5=8Uz]"eI biW:"3Z@wdϗ$6SGC4O"iv\>pmy+VuPukjW!SI?5^!ÁB4dOe >00rx?>seUhv;G)FQXϙJKdb'Wؘi` '< UW{u#p晓._׳W2fڋchL/D-_#h;z$Ҙ+2)(O:4/}FQ#F C\5"EdJ`8R{!:2a{G^A; cHirR9 {DYYX o s |ubL*^Qf2%y>8aź(n` Vd6jpSC+\A Sū&d˩M VæB yw8L3 JP4HqBJ\цINM|γw߳c@pOF;J`2cZZdgq˅19W0^v[HXcpqioAY3dy͢-KT*$y6dbo9@Ifʒ,c% 6FEN.^Aݡ7qh;54'rv!"Ȟ| w/b z==^Sǽs|C#zFR=gdLtEFSb"n0-FF@vy2Z'yJ`6C Iy WB**B[t! =RC03l_U8bG?q.HR]Ͽf!: P'=zU%4mKO 2d1Z=n3$EB߫ 8oH;@9}H)PF &Zc [J7_ gpCыAa!.$Sk*x5y~Ij1@vjNfǼݪZAE/\V|Txy Uoxc*j;ںU$ `!_~•o\y>(!JGS"9C<1w7\!ބ{Bm,DMqjUٶpUf8&à T Gn#{}Gtc#|淕[_|h.YCFl.i+<Q]t(m{jpu"--ٴ}*xD׿k~]-| &B]"`c@S_YSZ #dz7&in104 s-`5Q 5GF\G`'(j}dn͈JL5Q [h!N`>!a{9|܊_ѵՎ'u;h@q SB ?dX73$W!Պ fS1xcϧ/6.=y; c=h+`3h7¿)gϻ_%ɎfAߣԤ(u15RA&; mtZ$kdSEcy߽o[{HVfζkïC5dtFndw͊CQO;Ol,xEb(MTda%ѕʤđ4:Q;wQRQ?@u;Ⱦ|[ >] E.],+CIrUZB {^f&O+!t-(f\ X"B=z8=s݈U3K{[3s֖>?! 7Cm#@s`m?Q &+IvWlVM *{ge 2-3h/\F cKw0ːfã[5;7~M=94*" >*[.x%fWhژlVynm\0 J^QTGWJX,)6(rp iK]tA-5 }~ʣuW"C9(+1 |w η[͚0]aF5|FA+|?wz4Dwzz_頂㦃уO $h, DO^T8MTdEN9xsG& W}+>GsX.]h+E>qm&dr4}IKĤ$5tg$ ,h S$>% o@-VnbH0=* Y@1: UӳC %Zk5g˵3jpoYsԯvbC 9("^[H.gsו\Aie.h*!(yL`tbIgɕ_,^ɚu_@$38JxKG_T$޴ pk[G,;zRHO10nUU1]j[nwH=.g?չr\YWn"tQ4TbN88ĵ :Qz&vA/ \360KF#,ԠA  g ,L_u€{"Kpݬ 臏7oߦFܲf~V6^=sslİJ*"J)6;08 ?ryv5:0AoyNd}9-QdoMoU vnX`aL), UACvه.\UCܝpv'Jz:Tʝډ5iGg_{i#wYW\ߵ'zںc੭l a_j3X'1t_13߻vYXvaEDYA@" "Td|+66tBFАVGbX 8I %6Em㴉ɳ߹w%{v:s?nXqJPpP n׫EoS<}%#ZIxTUGcGq!F=@1-Ў@ *tt#Kّr^ӵDyku[}/@שko=o?uB@>q_>^sCh7xd%2mxI8|@VuD^W7D z%zׯLKײcn3!Q1sjv N >yY\|V*bT蹀zTȋ1u y"A GOid FrP-y{o{P+}ѫyb[ͥzdKUy+vV\ܚ~;P*aRT ;j E4rR萝lbGʬnUU{ЁRo䘨F~!T "*F@~:#W+2j~j&<)zնAړW|>o _˃y/K~ ڄ\_ kG+UXTh+x+860AvI*Qe5dg7dsԼON̈ Og0w'ѓ>&E6T<llcݓ0G/=sYKφ| c@Π"`\.$RV*Be//]"}3Q0t 74߀2s ?c !4Y@"2en!-f OUEY" dmED.% m6Ehl![L~5b|洫A~xyIq4y!Rdȱ}$1c;dȑ|L4m@T:,#HAZg"ZgINʰ"Ь9iى ӿcL圡Iϙ25 K.\T˖η/Y\Vc޽bŨɓqaXRn<#Ã$=J3)Y4IEtK4*i!-ZJʨCq+TM5TKuD }h3m!mFFMLi} zvꠣtnOا09._ƗW䗯dBJm/sR0O'dboا$?{f]1;~]3w.>vgg<]e7{x?bcK/-vu+2ϳ~K Ƶ07{bXU&~?_ {p>ϫ[\ p-̋dI˼ =6y5~^ ti2WٕZ~m~#`V j4PsX.~=`җK.R$,!ȯ;)=+U.iHǿi#auT);~ֲ:,4I'~}L>%\45ws~oO endstream endobj 500 0 obj <> endobj 501 0 obj <>stream H\V P?A$ID@+Q@H+(&u"( Z(9^+)mqds;DPqnnznUl깮nz]oAPisg}˛[ yԸ+[N_SC]6` 1?=@o?mC*SpU˲:T\iR\G_c 3?] _|qEsR]?{0?oYsϲUﮮkn83bsֶ0Z_V !3?lPeBpBG+|(89@/U!(JO^~ClIM dE 9:ɲ氖 ^zTW/xzDcuZTyVDlzsWaxE#+#?#$GUJ|h/bfqbzsdF[W$ Oq9+GD #TyDElc^ 7PK+#4E l88GhUц#F;$GqLT:GN:*O_pX՞>[>E!W'1eCuZeO -}n{szҡAo.=}2 q`{nZx+43.}or" \A? mln( 7q/q _ڛ˼JU 0_M}|;ËWjC|fIIcߕd6>>Xinc>? =hN#*8xYɒ><Jd,E hӜ@0M$.r2FrM& ae9̊]5[q񿁞ӛ!y3HY@[6׬tt=M}8s G~-hK 0'L:e"XD!) Oݼf]N˥ 2fFCYEB&ل y34w΁VY#?X+h3w,}¥5wWbp3g;X]|.ݚziHBxB<Ϲɰ2)T^I#"{*qC%fhqhխGAs@hdvO&iFٞd .Cf^vv$F.E4X_ޝo[ -bSPo?|/k͡, (Ajy@pqM4 6˔ fM5o؎~r#(7I2b˺Ў.~F@k_BpW:M~%yC|"SSd0ƤiidRk.Wƙ J(- y{3?/S%Ӓ7(Lڦ@е]vPDc4`~_O8Us8o9l=}Gd#;nǸ8>?UՕ馡fǶEz"nc1Qc*MmD$D=F- ['FE `hh%LtҔ:soЍ ľl!^R-vwCũ^s1Brۤ}6jA}8hH8CO3{8MQ͒OO+5/v}E ĠP[*C'XR[u(\^&.ؘL}Zd >߱N;QjDlN!``&ߙ\x^3'3sfH93)n0:F~ -=m]Y|p=|e+e@d!Mtp#ݲ4Xb8\ၝ4SdCqw"4߁Ŭ@1|s>hB'Yϩ?Bt͠13hمߏvxb .Δi(C|=Eml}Ș5=umde<"l oX8;6?޶Oi oIքƢM vF-<DK| h hcCm^ь|ă?Ԯk x> 'I9pxRCOmO*¬4!&S;ԫΑ+iO]ɧ67aRPR[g?{OxiII fo)IlcȾS6_;X %Y!OOcz]w5ե-+vg&>R|.rMۅuv_;C_>z}wrY_PӀ,^aZg\:$2tl.|ӈ~\ȁ/[ࣹ0rc$--\6ki@LJ0S7 Kj'iPXIF3jj6k4aR5=OFdx<[[]ā/GZjq%*AP%bUjT/Ux?nR؋M^+tehIVGn:$V~-6bME3Vr20ɛM'Iu MIزe#|9Yhjnh fiϡ*JKGxṪz|^%*aG -6 xvY >]O8-Lkfs18q) VV]5Qy~~񧑦K`! ]=:ӾYgflIኀ? 2"qOKji+8GQ4>Z'_kw[m(v<1UlVBn T^aS3_ -|Mgi*E?_)s <6zPVe"@!0xSt%v&n]By/0/&tr4?Ϛ"Б 5P/d d\m^]Vp߯YbMdox5(K8QًV\[doZ8o9ۆϘ%V ż6BV"lDi5a!)D.Uj*h,愞mB:઎p `Niˈ'GavMd y9[w{5:3v9j,~- ~چ(͒#SGa>Rw8ZVI5BO"U+bnKԔHiߟvլ|g/;q\'t[W g-rv(.(qgngnc}g~Yc/n3񣛌v#UM[梼2B6zpp&SP=*P u9Dꇸ qʟ4Q[ {S)+78c,ЛyYUf趷DԵ. ?p6ī,ƺp+Lu(r#wY%P++9|$5:gher1%|1n3JH')>+6[Ow)kvv +8dLh[9E@[BO["QY'k7U{~LvJ~:`h<ÝǶcatGyQ.)z.n\ , -Ig_Dl# PxS?! Lm.X10WGZ֗ r?!c)SuSSaemICґ6rs }>,X&*KGd˿wGn'Bh9\fS4znid#S&Aow VAƗLgJXԨwou}=וt?7>gS|7qDP6We&l?u7ZU4kg"BМֈ 4%Ezx/c A[AtG!e[n;A1W+[ĽbxV s umzU xY`R!xݬyd9SA*fF-_VT4.$&1ۉ 1 Z/1`ctwX3tjآ 1PI sҙz)W,!x2bcaz7 G6<^\D.W+FiaS .LȊẎɡx%xo2yy]8 fbf ł& T2 eq ejN ]\ bj_K_N_;?B> K{P%`V{`0mGcd^l5bJ<25yMƺ&GMCFs\Uj!Hl+0 s-GkotaSrj >PZvWಋ} e phj[jE2_5 h<ѥ]5^z[Rv)>ӘO<Ƽ|]ʼUVcD`-N3ftD5ٸqYx/{g+j,'moX0$x*qr'jw]rɗd =؜.3?6xTk dRKY6mYQ/'X O+ Aؚ NLͮlOXY#X/L1k\ߝN0_QQ]WxsjI]5fIMN3+?rsϙ{oVϣ"}kMa#rЄ?!,wCbRʎխB5z/}?q?yǤ[X=_HSsғ4 DeO.#'3N鮊y머\(]J_nG^u5y͡^?ulFl\|lrsVA5[z_r)?#U ؑ7%/l=Fesۡ \j)8=\U!RkWl8!X=x=8 :.#-A?{[$`4~<\LVpr}J=yueI7N1ɡ`SIyKl p/xcս_!~b@4)VArsDu_o#BZ*^?뛒VDŽe:  ZiL+1!Iy'V(_aHsk6u"A n"!(| , fq \'Y!n|G*|zR嚛;Rszdˈ̬1,-4w y%f 5=^%̸--\ЇI)wL;&/gS ƞޝh֖6V^}Sl [ZJ#Ǧ[E(/'ǂ޳QiD0_OZrfƯ7oE]pq˞.FwR@0BBW'Hbcx pr ʑ 'տ|ٹD֍f{BẪ`JjuAEfl+%UT5ݿMN[=SUT{lXO@6&Od Aqށ6.>Fb]ЪS3a$Ig7Eipظ$A&Mc3ED`H0[GެO '=>P*U6윴dW5sޭ/}6,–YNU'e0m!!Cc'D }sy)"9_+YJfrĚNw,pphppkI!A!!)"n0*'$"z~JF Dst,;&K=Yu;ގ;juAW FjrRԠnr1-!TxB5NECwy(2,ԱEE}NRz]ٝtEjג܆IF`+0GJ!M/j@p :Xe$ GTW IrCC<)ヿx<][ETuZnߦiy.FTSBF^;|%Je/;Ľuz_E@hh+:IOv@ϕuMA pǹu&yB{2`um+nƻ7Ϋg}Fs79q ; NE .ŹplX@8>XG"qmDh\K %sCI(H>aaKEw^O7Psls#%aqȠh7PQ>Ýx w6T?2mT9ydϸIIcZW=]7M; C6뎅8䝡0  pH !Ra 4txH 0&Cd 0^ `6ḂbX"KarXP+e(Uag.Ї1"k }n"kzju+:C=d}f{C'v}*;NFofqv0+`؟>uvggv{]oHj)巿%/:B!b|:{[H${qDM]ao˱4yR)YKc'-YXJGHVHZh)Bd-ʸXf))B=mocSqb󙚓! ܙBȀRl^/|4xA N%b{=(m=V[~ƨ\cd endstream endobj 502 0 obj <> endobj 503 0 obj <>stream HVoL[m0`3 ὺ$B &s I!*h0 S d1ِK4vkPZe*Rv5Ӛivi5v6}]{yw} @f"tR#ϟHb7# &<B:L[&% ncN} ERZ7xb|:sxW?^Wys !)Ӝrv~|[tn>̩X/vVyp={q"xσA_dz]yiGHf}f{W2ۉd-,YG#%e?1Оs%)p:d\5n(IuvB2?JHdM${%|WBM&IJ8-$ٔ1%GLSɼrO%n^ %#aMBf J).J wn3tGt+@$N+p8JRhOaUB$)d >3Ȥ%ieKDzґ䤔P\m2Tc.jJPRK񱢮2ee">{b]9Lr)VzY栠k(ɤmN!SʳZU2Twpml$c)"2:YuɜWEm.o]mښ -޻Bj^XxGG?@itI]8ۻ^yўӟ?LߍKs_ x&_OG"Z׿nWa(yDsәJFC+ȅ*E g8'Lkֺgw_GPt2{w ؃h!Q"$ =v c "SP.X3k+7r7 n/,CJlqY_F+ۄZySdԛm+ˮ{ߵh嚳&?ۧ { endstream endobj 504 0 obj <> endobj 505 0 obj <>stream H|VPwrwrGO1Ăazg#"r ҡv:Bk5wf#Iq阦1tjӎ-G8t°{}Qվ5[$@r9a\~3f ϫiaqJ]M+Wx3⚆*s{b~]c&W`ُ[_{ ߄[\Zy>V7V^aEكU5VA<Լ"ҡC%C)pJXoV*4:n0v `v` N1hī 2\%4'dnEʊLJ\6["J*3)$ݞIym!g,uٺtj0CqQ(Ec^-ȤS#j~LA2Ub|jgYiajۊ@Y^o&9ڄ [4"C ]]A.kZḟ‰ ~^;V;[I#]%bhG:M/Τz;IsΥyԁm1+\= ( v70#V {,T75B jsЯ1UHG}Cl8;\&Oz6XxuEA-,B-c$rjȠ21pD"(EJK2AD#i8=mYS6G+KԙQSZ4+9&j}fK̰Y\wJf ]b9:ZĂy!SiLd΄DZqm%[p'b&xL21=1xha'Z$<֔ =`bzי(ϳ6vgfXtKb_s_᠅$鏈뷁Y #gǏ#~s=s|9[v ?L *H~n%Do i1#m#NޫеkcNʃ<^MB!%N"Kt,La6D,&ġg$elݡ\P. [];r,p?pQ\,XfbYfI0jBRIUa^â0YBYt̰g:$<*;INQ:%zu}{/ 'W4XZOf/8CފBHJIa$e=QƈO a9H]Qwx4t<&{N  {O_aS1~sdFCX54C rρ}MiR E7K/Z:W iWS=zU::u`UmUiN-#V 6xJy _76nޟL/!_ yQIpW͹RRa*XklxʀHaHO[mMְg F5yˍMb˗]Էwݾohջʰpa}mUb4/1I\MNe4$ʣ=3zsPLTcU+ ulBDbs!Z0i1#|#^knioz+V\>9GHƻ'$҃۔bjIP$1b&@=~Dj,wH`G2'JVDl2ӘuwGCt~0[ s"+grs&aDP#Їr‚y3FoQ7Nq&Hp7K\ܐ\~Y=羻/Cn1翔y_!iwxOj~f~\zp>2TM2[~l/Y.mkWood̻sg?D>$MlWjP4PT^"6c+-Hm C 8ëR(:)̀-UQAE-/q8 "Y$E 9ww ท^0C9 F<΢jp$ZQxʹ/GN tVACsʞFW͵kmo/Vp\ꉾ̖6]8ﮃuO3L-"jϾ@?@o.wWύ\0ԯ:i"qcmS)0UbSE栤?\2E z#Ph,TR{2ei[3{[JY:ok/q-Kջߨ9m+9|6_қ>]bBqJ "v 3vîp)F-˟bsqϔѣ5цN#6)$lQnաBiښ9EŽ;1y[Z"l&{]YF쌄75Rz}$ #sTnk>}NryM 7?a\}fo6>fΎ0z8wz]ॠbfqX.LMeWQi ut3d%RJQqePIE1iw@"Krgƥ{jW5_:o {7տGيMYU}E*jicj麙 @dv 6lؒbW"w)pPŜ1䆬ݡn+zU(auVjի)u5Ofo8ڴ>WF 'sAdD3V(Ө) nq2>Yq=bsWD^"MTX$i %42pLO${"w(~- j'>26  1* C_گݻwe ?6 -q75o2Yi(Y9t`!"XK @%TA 2|#; 3!%y|kS>(woȍڙ=Zabmf++!aß*Qr)& i2&3أTY7kI g5lŒ5 P`">A <J!~4:8Xʬ]zS vtEIib=(GFkp6⪙Qz؜we~|mHHS729ͻRUc `M endstream endobj 506 0 obj <> endobj 507 0 obj <>stream HV}PT?owE},_27)"kh*hw((*(H$djt4m۠Zj㘩qįjI1 \z[>Se}{y ^ݓ~#Uk[߲˙ iXiEj.𠩩adA,+8 =@%Nkji<( Zm;ใx+p}bOƶ%y8[R/XC8?G|ږ>Ў;6moi{K5q~^[v܇|GƃlŰï$'S'=E +'! j2$]2PoF##OY8eU].'>'\\N}dk\yr%}Ҡ7 {n{z8K=>h 5f5^rwC\d 0~8|<\ɨ>ݕ.^^ri'|ҥB\~wsr\nE rP8C^wî0` L}>P>yjIWsՐa2HQCfO r{Y}L }&y,x ROB.>]xyOFP:^P.`~ |ntWv xi tIheݰGzuFeǰ Bh5" Y3ecz fր&@Qo=P|Pag`!4TP7У`FjVa[.=xJ=hF\7`[enQb9:rOOS봲I=e|߱+{̒=5ݝlȞ$;E_a*&OhϼbQYg [؃bķǒ*@E MGi|'`45iFq;c+:#:-&K({7q'UiF/g=h棑'm-YxP!0 z]ͽfoLç.C{[5|KC&;=x- c90IT?ZfyBk#0"E$")khS>Cy̎rCeK1]Gy*.Xu<8kTW oi୫iUu5uմI555KKؼKox1DorpQsC lSa⢸k=E,:z5!>at={w cՍ\7P ݴ-jRBuţn~7ݴ6Mjn7ϧIJe4Y\Va3 L/՘ Vk8_\;DD!i.qlO^ G^9\%nҹ}_"e~@_ӪZQX!0I+>cMdW&*M&Q{)mr=D GIIFWH@~V>kH|>>NR ljڵ̨ 3q _,~~E U '?T_s#" yFFߧoӔu6Vx촨D{.`uX^Ī5{<<>ATI1KAS-85_fLWSl)U(#-3D~'i(43~dFekNDV}߇~zqk]#+~K<;IײO_~i˙]aM]is܄lj !#*e"AEQRh[պud[Zҙ2XQq-X[[+hUr$yA{{xas e~ uXs;E06$]>qE:ny!(@ aMAG= @ж9(>b)V*F%tDOhcǙcSw]n]RmnnTAc&W5jv[2gdPGR8?>t#K&?WzA &t"Oiכw95UViTGk (duH>M m;F oFKn(C%J lt~4Ƃ0¼A8LAL8ٛC)8pS#ed& @b\3Y|qtL0D:'H,v͞=reb1ofvdx*5ˡ+FGT$?^b*' T-AcqLa4PØP0bb[[ZBI5xnhB`7џ "z!7YvjkP N K(-NcM-7S1RSx6.>IG$ {]$lÞgA/nv6*Hpտ$?D AqNkȉ\#7(DڃXy^@t&BhRY4麳nhtpDY,>o9rwZT,(3wZk FWn qF5Q&rs<^Nb̃}1JK < Z*Ω éu?_MJ]S9/t(82K ؄ >v_B&L-$W(`ߖIpFJg؀@JmtV+#w~lb^N_QѴdEn#KMW.X!/<ʹSuUUhhj"th?ï`Bq\-L?wpAaT$61pZX>`@K`EcedfN:矓ߝ[2{Ό(:4޺O1)CI :ȼ^Ȝ>͒ܯqD%q\S#hԁiװYYc7]Dz$\Gꊲr{5NѽJB8i^;WۄrDZpk#ֆ Of[SDǣTɳsґ)#++cLV9F>Qx#Q:G.j je>Sn9JT}6(:# j=v!q3sIbVXrTE3JQ vE35S/+Rf=fjDSkApa99ҜlUZ3Tsͨ 9|YrKdDYaZafT(x i5>_~ucG5{ 7\bo] Sc_Q-_V]a,,= >QpЫ%A'%{A82\iJd_ޠ] }Nhn0B=Lk s}OOy@EO'&7/LlH͝ys"Df3T32:/amBiD%[|&%`xd&{B_η'ʊ‚rswwMc]nm6to/vyŕųv7%A?ЏBVZUz!䫇 jO)Q/pr{KV$z+ZwͤyhTs|E/ 껵בCd#) Etm˖n5yg̙"ޟe^kQS0L(mXKWۃ?u.M7O:J璳P0FO{K,䪀=j!#wug1:%kP>XZwmlHd%v_˦ԩRR<Ǥzj`+/Teݘ9c Yɛh_:)Glz$6=i>͚e@`mXw`G kS' LF/jU՟܇zy$^yoq9oţa);ARmH\Ѐ"\܉nA$ T<MWޮo id!%E*g22:bc4ĠUMHgݷW墺Zr&喾~v֘(|޻Kw+KDSnZdl cU)i?6`j M["IИj5QR[F߽{YlZp93sacWU/ 7:}mWO>uœ03IQ q֟06n/IRD@T"%@[ ɞy2r"QRʰ50ezX $J9.˿;ۣmZ)5IO ԝd3D}kHq- J̲s\6!jVS9 CS}JZEjZC먂1z6ГTO~zh 5R5#P+mv Rh;/<75~O|3N>{ :1~|)iV" [5\̣xdŽ2Xج4\ݪJ5y5 (Z,RI^بʣhj`&ؠ ކPݎ?Q4RDS.OAӏYyrű^LY(@,6a }23v4k`yb}#3Be>g}7Ñ w;4E?-Uia endstream endobj 508 0 obj <> endobj 509 0 obj <>stream HWmlS~Ͻ$N81K( ı r !$p a;8Ph8Pj1UƦwqJL&:i]SnLh&c;s89=~Ax>4!E{7db$w^ioȺ5 ;@1t*:1Q_FQ_?qyԍʯc,o'QSٙ+Ɵ1on Z Odƿ`8)o״v|7\k1{L+^ej1~nUnxfFy\x? u2K!-fЗ-ϔU؃||./'I{$Y&er!X{Mym8/H'YA ($ =NLe !nel"!|Jd{^[fu{`JVǗ=e+R ^ھ%<ЫhABA#re.B8(a)JNQJأ[H4g:-w&$R5mPEZ cEQ  /r`kk6Z c48G"wc&?ʳguvg #U( &(LK™>SRN&t cp2OKTՋ) 2+G8ǫ܍!wV6aj'1ɣB=*1P8)omSz5q… 1Yx V֤ cc%VżXEbs769] u6lLuZhuzd6NI+fVo5FѼ(_0a{ E!E.р/J{w+EBrJ3S%-kR"=>S_BSgMb>=ݮЬ'F70r\n9:Nw*W!**6U[̂T<uPfKLu~c `kmZ:Xg?.HYv\#S|ἁ3_8 kVm7 7_~4r^ZȨ#W24! k>MVȀ`.JeUYܾ}\2ˆσ סCnӸja9-1bP:y'ڵgoD+XQnʃ0 <} >+ ,b>;ӣTGv M_Qܒ1ػt0/aꒅ6tb \FvxiwJϞ6oB?Kf?rZj 08 endstream endobj 510 0 obj <> endobj 511 0 obj <>stream HTKHTak^Mӌ)\3+A>M6 fA-u'a(H"h&M"M wEs 6V3, сs=?^Hܘ`Ҩcd'Uy y?L%qqhnR hMį+xLB-OgcQ@wd9K_ 'r)4'N7X<{DsQogHpP#ԋ|ُupS&~E4r*YU@RSɜ~^eĵ^f;_MX֍ZiHiJeInƯlkE ̮tJUUaHC(Hu)l?'Y \5 sF׻Kz͏w}V{uzG RdIUTG4Gh]pd-Zɛ:6~U ۈNFtXXVXX%maHW5Нil:ADЅZvH` #hbH;EE(7e7r7Ky޿aZ7~r1"bڅnUEɖV$2QP3/]&Q}޳m>(_-=RԷsNS}`; endstream endobj 512 0 obj <> endobj 513 0 obj <>stream HVolSU^׭l젬{o\*1lt>5f"$"K|*ac0b81s2e1&w~s=w߽- []q\ [ٷzQ!;ԟHhm|Ȣ~(PHzNW>PTҧzbZ0vm[MiosG_P9Q}Fe?G6]szmX4\ h/.:iJ#c-{sOV+V_"zώeC;pYM_/ ^3G.+- > _R# ^'uQqNjmܔ݄k1S4+BeTI6e lJɀuk>Ca ^#b!*^4:5G;=ZZBSTxx<|ǽqZ]=ves@d 5z|W|Ϡူ뛢ASH@d?Mѓ5PaTI+LQq}xԉ\ Ttć$|ʥ}Z[<}n'̺"# qMxv E!: _ݖ~4uY*H@zqZ`SKUXݨUTaLZ@D-be"c"Kmr ,!k!['=&]C0dudo G@,[PR43Z y)S1g*}YJf[qeKf >U=C ztdwxksl==Q%sXB8 l 1$Kk:VKI'} rĠ1аGJɮJ(Pr}0)a :Rн9W`䢁w$*x;=fJfBp=-Yt`F:"Bp1S JIM> endobj 515 0 obj <>stream HVoL[8 iHi 4!!Adm8N0 Ѝjʼd[mImUˇ\UBZ*QFtYLlͤl ޹uM{~`옅c)y@7{`[IG'N<oSdŭNP|9쿰kd96g_TŷN$b@0o$m26TP%S<6|C OކmsO)&cIUGdGcK%+aTE=Y38!M:J 'Atֆ##b6m0vLjFtFҏW5isPX z##M 'MOp^w{ˎ/: l6>*ꍴSXuAQlLӽmZ`/ruɨG(>-|J{@-x(Gsh-Wߢ./nYWpZDOS`Ry=7N'pOu sh1]ïhq~Z՜_B^nlZ?.zqr_o;/h'h~XG2H$9h)5{B}@WjO?g񒲈w'|41> ƏxX{khax-pjtЉ܃FC_ˏ]?7KE*?^va e功ey&?.}-[  Jd߽yپR2V[2)p\2C<pfdo𥳐TR`WSd߉(ΦZ%6ImuwjAYj !^Rٝn6m nuKHHpNBNͦibZΖвD4%P$K2+W@ j=@*9VPY\w9V$hͣ}nP<fG4o 8wD\je.(K^eJl7ǞWBqdl7eNCu2dfZڪ,7uUfkkLY]ħ/jǕ9~NS B;FsRj|P*zUQ.n27J2*E*iT82.&J㷞QV#:2o·SiiCesm]hθϔyf}#p4;WܿyAy<_( ߂X ; ,CfĄC8}H? X/~vU/wXĭFk+(W)"^"7eݻ{D3o}؏.즿]G8L"0F1 p6qAtQ8n+t-sger*L6Ux]e ImX(޴L̏{(o;ܖ|uvzǗVrTYȴ<=`}m endstream endobj 48 0 obj <> endobj 180 0 obj <> endobj 516 0 obj <>/DW 1000/W[1[568]]/CIDToGIDMap/Identity>> endobj 49 0 obj <> endobj 50 0 obj <> endobj 51 0 obj <> endobj 52 0 obj <> endobj 53 0 obj <> endobj 117 0 obj <> endobj 118 0 obj <> endobj 376 0 obj <> endobj 377 0 obj <> endobj 517 0 obj <>stream HTPn0 :$&BURu%E*Nd7WX~hlN`dFd gADq-Fu]X\o4 |qblikuLz3R MBՌ 6Pe\v;WYфPK)fOH汾.>|8h"j4&}nKqCYiyOrn. endstream endobj 7 0 obj <> endobj 58 0 obj <> endobj 119 0 obj <> endobj 181 0 obj <> endobj 249 0 obj <> endobj 309 0 obj <> endobj 378 0 obj <> endobj 518 0 obj <> endobj 519 0 obj <> endobj 57 0 obj <> endobj 488 0 obj <> endobj 486 0 obj <> endobj 483 0 obj <> endobj 481 0 obj <> endobj 478 0 obj <> endobj 476 0 obj <> endobj 473 0 obj <> endobj 471 0 obj <> endobj 468 0 obj <> endobj 466 0 obj <> endobj 463 0 obj <> endobj 461 0 obj <> endobj 458 0 obj <> endobj 456 0 obj <> endobj 453 0 obj <> endobj 451 0 obj <> endobj 448 0 obj <> endobj 446 0 obj <> endobj 443 0 obj <> endobj 441 0 obj <> endobj 438 0 obj <> endobj 436 0 obj <> endobj 433 0 obj <> endobj 431 0 obj <> endobj 428 0 obj <> endobj 426 0 obj <> endobj 423 0 obj <> endobj 421 0 obj <> endobj 418 0 obj <> endobj 416 0 obj <> endobj 413 0 obj <> endobj 411 0 obj <> endobj 408 0 obj <> endobj 406 0 obj <> endobj 403 0 obj <> endobj 401 0 obj <> endobj 398 0 obj <> endobj 396 0 obj <> endobj 393 0 obj <> endobj 391 0 obj <> endobj 389 0 obj <> endobj 387 0 obj <> endobj 385 0 obj <> endobj 383 0 obj <> endobj 381 0 obj <> endobj 379 0 obj <> endobj 372 0 obj <> endobj 370 0 obj <> endobj 367 0 obj <> endobj 365 0 obj <> endobj 362 0 obj <> endobj 360 0 obj <> endobj 357 0 obj <> endobj 355 0 obj <> endobj 352 0 obj <> endobj 350 0 obj <> endobj 347 0 obj <> endobj 345 0 obj <> endobj 342 0 obj <> endobj 340 0 obj <> endobj 338 0 obj <> endobj 336 0 obj <> endobj 334 0 obj <> endobj 332 0 obj <> endobj 330 0 obj <> endobj 328 0 obj <> endobj 326 0 obj <> endobj 324 0 obj <> endobj 322 0 obj <> endobj 320 0 obj <> endobj 318 0 obj <> endobj 316 0 obj <> endobj 314 0 obj <> endobj 312 0 obj <> endobj 310 0 obj <> endobj 305 0 obj <> endobj 303 0 obj <> endobj 301 0 obj <> endobj 299 0 obj <> endobj 297 0 obj <> endobj 295 0 obj <> endobj 293 0 obj <> endobj 291 0 obj <> endobj 288 0 obj <> endobj 286 0 obj <> endobj 283 0 obj <> endobj 281 0 obj <> endobj 278 0 obj <> endobj 276 0 obj <> endobj 273 0 obj <> endobj 271 0 obj <> endobj 268 0 obj <> endobj 266 0 obj <> endobj 264 0 obj <> endobj 262 0 obj <> endobj 260 0 obj <> endobj 258 0 obj <> endobj 256 0 obj <> endobj 254 0 obj <> endobj 252 0 obj <> endobj 250 0 obj <> endobj 245 0 obj <> endobj 243 0 obj <> endobj 241 0 obj <><><><><><><><><><><><><><><><><><><><>]/Pg 181 0 R>> endobj 239 0 obj <> endobj 237 0 obj <> endobj 235 0 obj <> endobj 233 0 obj <> endobj 231 0 obj <> endobj 229 0 obj <> endobj 227 0 obj <> endobj 225 0 obj <> endobj 222 0 obj <> endobj 220 0 obj <> endobj 217 0 obj <> endobj 215 0 obj <> endobj 212 0 obj <> endobj 210 0 obj <> endobj 207 0 obj <> endobj 205 0 obj <> endobj 202 0 obj <> endobj 200 0 obj <> endobj 198 0 obj <> endobj 196 0 obj <> endobj 194 0 obj <> endobj 192 0 obj <> endobj 190 0 obj <> endobj 188 0 obj <> endobj 186 0 obj <> endobj 184 0 obj <> endobj 182 0 obj <> endobj 176 0 obj <> endobj 174 0 obj <> endobj 172 0 obj <> endobj 170 0 obj <> endobj 167 0 obj <> endobj 165 0 obj <> endobj 162 0 obj <> endobj 160 0 obj <> endobj 157 0 obj <> endobj 155 0 obj <> endobj 152 0 obj <> endobj 150 0 obj <> endobj 147 0 obj <> endobj 145 0 obj <> endobj 142 0 obj <> endobj 140 0 obj <> endobj 138 0 obj <> endobj 136 0 obj <> endobj 134 0 obj <> endobj 132 0 obj <> endobj 130 0 obj <> endobj 128 0 obj <> endobj 126 0 obj <> endobj 124 0 obj <> endobj 122 0 obj <> endobj 120 0 obj <> endobj 113 0 obj <> endobj 111 0 obj <> endobj 109 0 obj <> endobj 107 0 obj <> endobj 105 0 obj <> endobj 103 0 obj <> endobj 101 0 obj <> endobj 98 0 obj <> endobj 96 0 obj <> endobj 93 0 obj <> endobj 91 0 obj <> endobj 88 0 obj <> endobj 86 0 obj <> endobj 83 0 obj <> endobj 81 0 obj <> endobj 79 0 obj <> endobj 77 0 obj <> endobj 75 0 obj <> endobj 73 0 obj <> endobj 71 0 obj <> endobj 69 0 obj <> endobj 67 0 obj <> endobj 65 0 obj <> endobj 63 0 obj <> endobj 61 0 obj <> endobj 59 0 obj <> endobj 42 0 obj <> endobj 40 0 obj <> endobj 38 0 obj <> endobj 36 0 obj <> endobj 34 0 obj <> endobj 32 0 obj <><><><><><><><><><><><><><>]/Pg 7 0 R>> endobj 30 0 obj <> endobj 28 0 obj <> endobj 26 0 obj <> endobj 24 0 obj <> endobj 22 0 obj <> endobj 18 0 obj <> endobj 16 0 obj <> endobj 14 0 obj <> endobj 12 0 obj <> endobj 10 0 obj <> endobj 8 0 obj <> endobj 520 0 obj [10 0 R 10 0 R 10 0 R 14 0 R 18 0 R 18 0 R 20 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 24 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 26 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 28 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 30 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 36 0 R 36 0 R 36 0 R 36 0 R 36 0 R 40 0 R 40 0 R 40 0 R 40 0 R 40 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 42 0 R 44 0 R] endobj 521 0 obj [61 0 R 61 0 R 61 0 R 65 0 R 69 0 R 69 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 32 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 71 0 R 73 0 R 73 0 R 73 0 R 73 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 75 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 77 0 R 83 0 R 83 0 R 85 0 R 83 0 R 83 0 R 88 0 R 88 0 R 90 0 R 93 0 R 93 0 R 95 0 R 93 0 R 93 0 R 98 0 R 98 0 R 100 0 R 98 0 R 98 0 R 101 0 R 101 0 R 101 0 R 101 0 R 101 0 R 101 0 R 101 0 R 101 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 103 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 105 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 107 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 109 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R 113 0 R] endobj 522 0 obj [122 0 R 122 0 R 122 0 R 126 0 R 130 0 R 130 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 132 0 R 134 0 R 134 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 136 0 R 142 0 R 142 0 R 142 0 R 144 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 142 0 R 147 0 R 147 0 R 147 0 R 149 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 147 0 R 152 0 R 152 0 R 152 0 R 154 0 R 152 0 R 152 0 R 152 0 R 152 0 R 152 0 R 152 0 R 157 0 R 157 0 R 157 0 R 159 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 157 0 R 162 0 R 162 0 R 162 0 R 164 0 R 162 0 R 162 0 R 162 0 R 162 0 R 162 0 R 162 0 R 167 0 R 167 0 R 167 0 R 169 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 167 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 170 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 172 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 174 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R 176 0 R] endobj 523 0 obj [184 0 R 184 0 R 184 0 R 188 0 R 192 0 R 192 0 R 194 0 R 194 0 R 196 0 R 196 0 R 196 0 R 196 0 R 202 0 R 202 0 R 204 0 R 202 0 R 202 0 R 207 0 R 207 0 R 209 0 R 207 0 R 207 0 R 212 0 R 212 0 R 214 0 R 212 0 R 212 0 R 217 0 R 217 0 R 219 0 R 217 0 R 217 0 R 222 0 R 222 0 R 224 0 R 222 0 R 222 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 225 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 227 0 R 229 0 R 229 0 R 229 0 R 229 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 231 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 233 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 235 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 237 0 R 239 0 R 239 0 R 241 0 R 241 0 R 241 0 R 241 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R 245 0 R] endobj 524 0 obj [252 0 R 252 0 R 252 0 R 256 0 R 260 0 R 260 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 241 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 262 0 R 268 0 R 268 0 R 270 0 R 268 0 R 268 0 R 273 0 R 273 0 R 275 0 R 273 0 R 273 0 R 273 0 R 273 0 R 278 0 R 278 0 R 280 0 R 278 0 R 278 0 R 278 0 R 278 0 R 278 0 R 278 0 R 278 0 R 278 0 R 283 0 R 283 0 R 285 0 R 283 0 R 283 0 R 283 0 R 283 0 R 288 0 R 288 0 R 290 0 R 288 0 R 288 0 R 288 0 R 288 0 R 288 0 R 288 0 R 288 0 R 288 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 291 0 R 293 0 R 293 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 295 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 297 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 299 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 301 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R 305 0 R] endobj 525 0 obj [312 0 R 312 0 R 312 0 R 316 0 R 320 0 R 320 0 R 322 0 R 322 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 324 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 326 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 328 0 R 330 0 R 330 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 332 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 334 0 R 336 0 R 336 0 R 342 0 R 342 0 R 342 0 R 344 0 R 342 0 R 342 0 R 342 0 R 342 0 R 342 0 R 342 0 R 342 0 R 347 0 R 347 0 R 349 0 R 347 0 R 347 0 R 347 0 R 347 0 R 347 0 R 352 0 R 352 0 R 354 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 352 0 R 357 0 R 357 0 R 359 0 R 357 0 R 357 0 R 357 0 R 357 0 R 357 0 R 357 0 R 357 0 R 362 0 R 362 0 R 364 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 362 0 R 367 0 R 367 0 R 367 0 R 369 0 R 367 0 R 367 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R 372 0 R] endobj 526 0 obj [381 0 R 381 0 R 381 0 R 385 0 R 389 0 R 389 0 R 393 0 R 393 0 R 395 0 R 393 0 R 393 0 R 393 0 R 393 0 R 393 0 R 393 0 R 398 0 R 398 0 R 400 0 R 398 0 R 398 0 R 398 0 R 398 0 R 403 0 R 403 0 R 405 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 403 0 R 408 0 R 408 0 R 410 0 R 408 0 R 408 0 R 408 0 R 408 0 R 408 0 R 413 0 R 413 0 R 415 0 R 413 0 R 413 0 R 413 0 R 413 0 R 413 0 R 413 0 R 418 0 R 418 0 R 420 0 R 418 0 R 418 0 R 418 0 R 418 0 R 418 0 R 418 0 R 423 0 R 423 0 R 425 0 R 423 0 R 423 0 R 423 0 R 423 0 R 428 0 R 428 0 R 430 0 R 428 0 R 428 0 R 428 0 R 428 0 R 428 0 R 433 0 R 433 0 R 433 0 R 435 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 433 0 R 438 0 R 438 0 R 438 0 R 440 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 438 0 R 443 0 R 443 0 R 445 0 R 443 0 R 443 0 R 443 0 R 443 0 R 448 0 R 448 0 R 450 0 R 448 0 R 448 0 R 448 0 R 448 0 R 453 0 R 453 0 R 453 0 R 455 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 453 0 R 458 0 R 458 0 R 458 0 R 460 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 458 0 R 463 0 R 463 0 R 463 0 R 465 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 463 0 R 468 0 R 468 0 R 468 0 R 470 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 468 0 R 473 0 R 473 0 R 473 0 R 475 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 473 0 R 478 0 R 478 0 R 480 0 R 478 0 R 478 0 R 478 0 R 478 0 R 478 0 R 483 0 R 483 0 R 485 0 R 483 0 R 483 0 R 483 0 R 483 0 R 483 0 R 488 0 R 488 0 R 490 0 R 488 0 R 488 0 R 488 0 R 488 0 R] endobj 527 0 obj <> endobj 4 0 obj <>/K 5 0 R>> endobj 528 0 obj << /Dt (D:20210920124231) /JTM (Distiller) >> endobj 529 0 obj /This endobj 530 0 obj << /CP (Distiller) /Fi 529 0 R >> endobj 531 0 obj << /R [ 2400.000 2400.000 ]>> endobj 532 0 obj << /JTF 0 /MB [ 0.000 0.000 603.000 783.000 ]/R 531 0 R /W [ 0 6 ]>> endobj 533 0 obj << /Fi [ 530 0 R ]/P [ 532 0 R ]>> endobj 534 0 obj << /Dm [ 603.000 783.000 603.000 783.000 ]>> endobj 535 0 obj << /Me 534 0 R >> endobj 536 0 obj << /D [ 533 0 R ]/MS 535 0 R /Type /JobTicketContents >> endobj 537 0 obj << /A [ 528 0 R ]/Cn [ 536 0 R ]/V 1.100 >> endobj 3 0 obj <> endobj 538 0 obj <>stream QuarkXPress(R) 16.33 2021-09-20T12:42:29-06:00 2021-09-20T12:42:29-06:00 QuarkXPress(R) 16.33 %%DocumentProcessColors: Cyan Magenta Yellow Black %%EndComments Layout 1 Sally Kennedy endstream endobj 1 0 obj <>/MarkInfo<>/Lang(en-US)/QXPr:DeviceNColorants 2 0 R>> endobj 2 0 obj <<>> endobj 45 0 obj <> endobj 21 0 obj <> endobj xref 0 539 0000000000 65535 f 0000294785 00000 n 0000295007 00000 n 0000291207 00000 n 0000290502 00000 n 0000141518 00000 n 0000141249 00000 n 0000261670 00000 n 0000279752 00000 n 0000000000 00000 f 0000279701 00000 n 0000000000 00000 f 0000279655 00000 n 0000000000 00000 f 0000279608 00000 n 0000000000 00000 f 0000279562 00000 n 0000000000 00000 f 0000279512 00000 n 0000000000 00000 f 0000000016 00000 n 0000295107 00000 n 0000279066 00000 n 0000000000 00000 f 0000278948 00000 n 0000000000 00000 f 0000278818 00000 n 0000000000 00000 f 0000278730 00000 n 0000000000 00000 f 0000278478 00000 n 0000000000 00000 f 0000277914 00000 n 0000000000 00000 f 0000277868 00000 n 0000000000 00000 f 0000277802 00000 n 0000000000 00000 f 0000277748 00000 n 0000000000 00000 f 0000277682 00000 n 0000000000 00000 f 0000277548 00000 n 0000000000 00000 f 0000000086 00000 n 0000295027 00000 n 0000000158 00000 n 0000018066 00000 n 0000258013 00000 n 0000258575 00000 n 0000259180 00000 n 0000259730 00000 n 0000259897 00000 n 0000260284 00000 n 0000141577 00000 n 0000216649 00000 n 0000216799 00000 n 0000263311 00000 n 0000261892 00000 n 0000277502 00000 n 0000000000 00000 f 0000277449 00000 n 0000000000 00000 f 0000277403 00000 n 0000000000 00000 f 0000277355 00000 n 0000000000 00000 f 0000277309 00000 n 0000000000 00000 f 0000277258 00000 n 0000000000 00000 f 0000277163 00000 n 0000000000 00000 f 0000277104 00000 n 0000000000 00000 f 0000277015 00000 n 0000000000 00000 f 0000276932 00000 n 0000000000 00000 f 0000276867 00000 n 0000000000 00000 f 0000276815 00000 n 0000000000 00000 f 0000276752 00000 n 0000000000 00000 f 0000018246 00000 n 0000276700 00000 n 0000000000 00000 f 0000276643 00000 n 0000000000 00000 f 0000018297 00000 n 0000276591 00000 n 0000000000 00000 f 0000276528 00000 n 0000000000 00000 f 0000018348 00000 n 0000276475 00000 n 0000000000 00000 f 0000276412 00000 n 0000000000 00000 f 0000018399 00000 n 0000276340 00000 n 0000000000 00000 f 0000276212 00000 n 0000000000 00000 f 0000276076 00000 n 0000000000 00000 f 0000275988 00000 n 0000000000 00000 f 0000275860 00000 n 0000000000 00000 f 0000275812 00000 n 0000000000 00000 f 0000275687 00000 n 0000000000 00000 f 0000018451 00000 n 0000037118 00000 n 0000260712 00000 n 0000260876 00000 n 0000262117 00000 n 0000275639 00000 n 0000000000 00000 f 0000275583 00000 n 0000000000 00000 f 0000275535 00000 n 0000000000 00000 f 0000275484 00000 n 0000000000 00000 f 0000275436 00000 n 0000000000 00000 f 0000275382 00000 n 0000000000 00000 f 0000275265 00000 n 0000000000 00000 f 0000275210 00000 n 0000000000 00000 f 0000275125 00000 n 0000000000 00000 f 0000275039 00000 n 0000000000 00000 f 0000274983 00000 n 0000000000 00000 f 0000274878 00000 n 0000000000 00000 f 0000037274 00000 n 0000274822 00000 n 0000000000 00000 f 0000274717 00000 n 0000000000 00000 f 0000037328 00000 n 0000274661 00000 n 0000000000 00000 f 0000274580 00000 n 0000000000 00000 f 0000037382 00000 n 0000274524 00000 n 0000000000 00000 f 0000274403 00000 n 0000000000 00000 f 0000037436 00000 n 0000274347 00000 n 0000000000 00000 f 0000274257 00000 n 0000000000 00000 f 0000037490 00000 n 0000274201 00000 n 0000000000 00000 f 0000274079 00000 n 0000000000 00000 f 0000037545 00000 n 0000273946 00000 n 0000000000 00000 f 0000273857 00000 n 0000000000 00000 f 0000273752 00000 n 0000000000 00000 f 0000273651 00000 n 0000000000 00000 f 0000037600 00000 n 0000058635 00000 n 0000258223 00000 n 0000262343 00000 n 0000273603 00000 n 0000000000 00000 f 0000273547 00000 n 0000000000 00000 f 0000273499 00000 n 0000000000 00000 f 0000273448 00000 n 0000000000 00000 f 0000273400 00000 n 0000000000 00000 f 0000273346 00000 n 0000000000 00000 f 0000273293 00000 n 0000000000 00000 f 0000273234 00000 n 0000000000 00000 f 0000273156 00000 n 0000000000 00000 f 0000273100 00000 n 0000000000 00000 f 0000273034 00000 n 0000000000 00000 f 0000058790 00000 n 0000272978 00000 n 0000000000 00000 f 0000272912 00000 n 0000000000 00000 f 0000058844 00000 n 0000272856 00000 n 0000000000 00000 f 0000272790 00000 n 0000000000 00000 f 0000058898 00000 n 0000272734 00000 n 0000000000 00000 f 0000272668 00000 n 0000000000 00000 f 0000058952 00000 n 0000272612 00000 n 0000000000 00000 f 0000272546 00000 n 0000000000 00000 f 0000059006 00000 n 0000272431 00000 n 0000000000 00000 f 0000272346 00000 n 0000000000 00000 f 0000272285 00000 n 0000000000 00000 f 0000272188 00000 n 0000000000 00000 f 0000272076 00000 n 0000000000 00000 f 0000271931 00000 n 0000000000 00000 f 0000271810 00000 n 0000000000 00000 f 0000271753 00000 n 0000000000 00000 f 0000271052 00000 n 0000000000 00000 f 0000271004 00000 n 0000000000 00000 f 0000270902 00000 n 0000000000 00000 f 0000059060 00000 n 0000076433 00000 n 0000262569 00000 n 0000270854 00000 n 0000000000 00000 f 0000270798 00000 n 0000000000 00000 f 0000270750 00000 n 0000000000 00000 f 0000270699 00000 n 0000000000 00000 f 0000270651 00000 n 0000000000 00000 f 0000270597 00000 n 0000000000 00000 f 0000270500 00000 n 0000000000 00000 f 0000270422 00000 n 0000000000 00000 f 0000270366 00000 n 0000000000 00000 f 0000270300 00000 n 0000000000 00000 f 0000076589 00000 n 0000270244 00000 n 0000000000 00000 f 0000270172 00000 n 0000000000 00000 f 0000076643 00000 n 0000270116 00000 n 0000000000 00000 f 0000270032 00000 n 0000000000 00000 f 0000076697 00000 n 0000269976 00000 n 0000000000 00000 f 0000269904 00000 n 0000000000 00000 f 0000076751 00000 n 0000269848 00000 n 0000000000 00000 f 0000269764 00000 n 0000000000 00000 f 0000076805 00000 n 0000269652 00000 n 0000000000 00000 f 0000269595 00000 n 0000000000 00000 f 0000269382 00000 n 0000000000 00000 f 0000269285 00000 n 0000000000 00000 f 0000269196 00000 n 0000000000 00000 f 0000269115 00000 n 0000000000 00000 f 0000269067 00000 n 0000000000 00000 f 0000268973 00000 n 0000000000 00000 f 0000076859 00000 n 0000096299 00000 n 0000262795 00000 n 0000268925 00000 n 0000000000 00000 f 0000268869 00000 n 0000000000 00000 f 0000268821 00000 n 0000000000 00000 f 0000268770 00000 n 0000000000 00000 f 0000268722 00000 n 0000000000 00000 f 0000268668 00000 n 0000000000 00000 f 0000268615 00000 n 0000000000 00000 f 0000268502 00000 n 0000000000 00000 f 0000268411 00000 n 0000000000 00000 f 0000268314 00000 n 0000000000 00000 f 0000268259 00000 n 0000000000 00000 f 0000268120 00000 n 0000000000 00000 f 0000268015 00000 n 0000000000 00000 f 0000267958 00000 n 0000000000 00000 f 0000267712 00000 n 0000000000 00000 f 0000267656 00000 n 0000000000 00000 f 0000267562 00000 n 0000000000 00000 f 0000096455 00000 n 0000267506 00000 n 0000000000 00000 f 0000267424 00000 n 0000000000 00000 f 0000096510 00000 n 0000267368 00000 n 0000000000 00000 f 0000267250 00000 n 0000000000 00000 f 0000096565 00000 n 0000267194 00000 n 0000000000 00000 f 0000267104 00000 n 0000000000 00000 f 0000096620 00000 n 0000267048 00000 n 0000000000 00000 f 0000266942 00000 n 0000000000 00000 f 0000096675 00000 n 0000266886 00000 n 0000000000 00000 f 0000266812 00000 n 0000000000 00000 f 0000096730 00000 n 0000266764 00000 n 0000000000 00000 f 0000266646 00000 n 0000000000 00000 f 0000096785 00000 n 0000116579 00000 n 0000261047 00000 n 0000261212 00000 n 0000263021 00000 n 0000266598 00000 n 0000000000 00000 f 0000266542 00000 n 0000000000 00000 f 0000266494 00000 n 0000000000 00000 f 0000266443 00000 n 0000000000 00000 f 0000266395 00000 n 0000000000 00000 f 0000266341 00000 n 0000000000 00000 f 0000266285 00000 n 0000000000 00000 f 0000266210 00000 n 0000000000 00000 f 0000116748 00000 n 0000266154 00000 n 0000000000 00000 f 0000266082 00000 n 0000000000 00000 f 0000116801 00000 n 0000266026 00000 n 0000000000 00000 f 0000265939 00000 n 0000000000 00000 f 0000116855 00000 n 0000265883 00000 n 0000000000 00000 f 0000265808 00000 n 0000000000 00000 f 0000116909 00000 n 0000265752 00000 n 0000000000 00000 f 0000265674 00000 n 0000000000 00000 f 0000116963 00000 n 0000265618 00000 n 0000000000 00000 f 0000265540 00000 n 0000000000 00000 f 0000117017 00000 n 0000265484 00000 n 0000000000 00000 f 0000265412 00000 n 0000000000 00000 f 0000117071 00000 n 0000265356 00000 n 0000000000 00000 f 0000265281 00000 n 0000000000 00000 f 0000117125 00000 n 0000265225 00000 n 0000000000 00000 f 0000265135 00000 n 0000000000 00000 f 0000117179 00000 n 0000265079 00000 n 0000000000 00000 f 0000264968 00000 n 0000000000 00000 f 0000117233 00000 n 0000264912 00000 n 0000000000 00000 f 0000264834 00000 n 0000000000 00000 f 0000117287 00000 n 0000264778 00000 n 0000000000 00000 f 0000264700 00000 n 0000000000 00000 f 0000117342 00000 n 0000264644 00000 n 0000000000 00000 f 0000264546 00000 n 0000000000 00000 f 0000117397 00000 n 0000264490 00000 n 0000000000 00000 f 0000264372 00000 n 0000000000 00000 f 0000117452 00000 n 0000264316 00000 n 0000000000 00000 f 0000264170 00000 n 0000000000 00000 f 0000117507 00000 n 0000264114 00000 n 0000000000 00000 f 0000264008 00000 n 0000000000 00000 f 0000117562 00000 n 0000263952 00000 n 0000000000 00000 f 0000263842 00000 n 0000000000 00000 f 0000117617 00000 n 0000263786 00000 n 0000000000 00000 f 0000263704 00000 n 0000000000 00000 f 0000117672 00000 n 0000263648 00000 n 0000000000 00000 f 0000263566 00000 n 0000000000 00000 f 0000117727 00000 n 0000263510 00000 n 0000000000 00000 f 0000263432 00000 n 0000000000 00000 f 0000117782 00000 n 0000117837 00000 n 0000141106 00000 n 0000216947 00000 n 0000217147 00000 n 0000217672 00000 n 0000217894 00000 n 0000217955 00000 n 0000219619 00000 n 0000219827 00000 n 0000229076 00000 n 0000229285 00000 n 0000238844 00000 n 0000239052 00000 n 0000240804 00000 n 0000241008 00000 n 0000244829 00000 n 0000245023 00000 n 0000251020 00000 n 0000251206 00000 n 0000253389 00000 n 0000253580 00000 n 0000254316 00000 n 0000254510 00000 n 0000256059 00000 n 0000256268 00000 n 0000258363 00000 n 0000261379 00000 n 0000263247 00000 n 0000263273 00000 n 0000279797 00000 n 0000281125 00000 n 0000282541 00000 n 0000284128 00000 n 0000285507 00000 n 0000287022 00000 n 0000288585 00000 n 0000290404 00000 n 0000290651 00000 n 0000290714 00000 n 0000290738 00000 n 0000290789 00000 n 0000290836 00000 n 0000290922 00000 n 0000290974 00000 n 0000291036 00000 n 0000291071 00000 n 0000291146 00000 n 0000291494 00000 n trailer << /Size 539 /Root 1 0 R /Info 3 0 R /ID[] >> startxref 295190 %%EOF