tag:blogger.com,1999:blog-80890002912394527232024-02-07T19:04:55.032-08:00Sai Huda on BloggerCybersecurity Best-Selling AuthorSai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-8089000291239452723.post-60689248228390007402020-11-24T00:44:00.003-08:002020-11-24T00:44:55.084-08:00Five Key Questions About Cybersecurity that Every CEO Must Ask<div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9iYHQkdsQG6Rf2fWtG8F3WxirowdXMYIr_Z_OmkKwy6lN4cGfzoWp-bxol68FOXcPH3RG0IgFE3JMoa2trkZ_g6POzl6RC8Tc_cwI9rr4nhlFK67CXDruKADO3ItDIVB2OEMSxIidok/s626/technology-network-data-connection-background_24070-821.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="352" data-original-width="626" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9iYHQkdsQG6Rf2fWtG8F3WxirowdXMYIr_Z_OmkKwy6lN4cGfzoWp-bxol68FOXcPH3RG0IgFE3JMoa2trkZ_g6POzl6RC8Tc_cwI9rr4nhlFK67CXDruKADO3ItDIVB2OEMSxIidok/s320/technology-network-data-connection-background_24070-821.jpg" width="320" /></a></div><br /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><br /></span></div><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">A renowned authority on the subject of cybersecurity, <b><a href="http://saihuda.mystrikingly.com/">Sai Huda</a></b> is probably best known as the author of the best-selling book, Next Level Cybersecurity: Detect the Signals, Stop the Hack. Sai Huda has also written a range of thought-leadership articles including “Cybersecurity: Five Key Questions the CEO Must Ask.”</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">As part of its mission to serve a global readership of business leaders and individuals of high-net-worth, CEOWORLD magazine published “Cybersecurity: Five Key Questions the CEO Must Ask” authored by Sai Huda. This article begins by stressing the frequency of <b><a href="https://en.wikipedia.org/wiki/Cyberattack">cyber attacks</a></b> and the importance of guarding against them.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><p><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">The article reveals the five cybersecurity questions that CEOs must ask and places a profound emphasis on securing the most valuable company information. Dubbing this information the company’s “Crown Jewels,” the article guides the CEO readers to first identify all Crown Jewels and then precisely where each is located. Then, the CEO must lead efforts to recognize all the methods that cyber attackers might employ to access each Crown Jewel and map the high probability signals that these cyber attackers will likely reveal. Lastly, the CEO must ensure that these cybersecurity measures result in timely detection, reporting and oversight in order to mitigate cyber risk effectively.</span> </p>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-16885518055599512612020-10-14T01:54:00.003-07:002020-10-14T01:54:22.388-07:00The Dangers of Ransomware Attacks<p style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1uHiESxmMcEFo7kNxzXgMXL9H5kUgakccUryOj6VMDJXDbvx3lAc5Y5fRtBCHE7roZYRRslJ0q9qB5PXlRWosDNu9s1I7l9HE3KcoNtzcVWfKtkUH5fTrpAk0TX4oNbGKKWq6KZAy_Fc/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="240" data-original-width="375" height="205" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1uHiESxmMcEFo7kNxzXgMXL9H5kUgakccUryOj6VMDJXDbvx3lAc5Y5fRtBCHE7roZYRRslJ0q9qB5PXlRWosDNu9s1I7l9HE3KcoNtzcVWfKtkUH5fTrpAk0TX4oNbGKKWq6KZAy_Fc/" width="320" /></a></div><p></p><p style="text-align: justify;"><a href="https://saihuda.wordpress.com/" target="_blank">Sai Huda</a> is a globally recognized risk and cybersecurity expert and author of the best-selling book, “Next Level Cybersecurity: Detect the Signals, Stop the Hack.” Recently, Sai Huda was featured in a Cyber Insiders podcast by the Cyber Center of Excellence (CCOE), where he spoke about the dangers posed by ransomware.</p><p style="text-align: justify;">Sai highlighted that every single type of organization located anywhere in the world is susceptible to ransomware, and now extortionware.</p><p style="text-align: justify;"><a href="https://en.wikipedia.org/wiki/Ransomware" target="_blank">Ransomware</a> is a type of malware that encrypts critical files and systems, so that operations slow down or are completely shut down, until a ransom is paid to the cyber attackers. The attackers will leave instructions on how to pay the ransom to get a decryption key that will restore access. The ransom payment is demanded to be made in bitcoin, making them hard to track. Now, it has evolved to extortionware, since the attackers have enhanced the malware to first copy the data, exfiltrate it, then encrypt, so that if the victim refuses to pay the ransom, the attacker can then threaten to sell or disclose publicly the stolen data and compel the victim to pay the ransom.</p><p style="text-align: justify;">The ransomware has also evolved to scan for key words and search for backup files to encrypt, and there are many variants of the malware being produced by attackers. The attackers are frequently criminal gangs financed by nation-states.</p><p style="text-align: justify;">Ransomware can enter through various vectors including phishing emails. An attacker sends emails with infected attachments to employees masquerading as from someone familiar or with authority, such as CEO or manager. If an employee opens the attachment, the ransomware infiltrates the system, leveraging administrative tools to take over and encrypt files.</p><p style="text-align: justify;">The adverse impact to an organization can be devastating. Some organizations have shut down permanently from ransomware, unable to recover since operations were shut down for weeks and months. Recently, even a hospital patient died from a ransomware attack because the hospital was unable to provide the patient in critical condition with healthcare and re-routed to another hospital and by the time the patient received service, it was too late.</p><p style="text-align: justify;">Huda advises organizations to improve the quality of security awareness training provided to employees so they can better identify phishing emails and to implement more sophisticated scanning of emails, and a more intelligent anomalous activity detection system to detect ransomware signals. In his book, Next Level Cybersecurity, Huda reveals the ransomware signals. Also, to have backups offsite, so the ransomware cannot encrypt the backup files and recovery can be quick. Finally, Huda advises ongoing scanning for vulnerabilities and prompt patching and configurations to avoid providing the attackers an easy opening.</p>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-32578778999131984792020-10-05T22:12:00.002-07:002020-10-05T22:12:09.295-07:00How Cloud Service Misconfigurations Become Cyber Risk to Organizations<p><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"></span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimijpQ34UtZNYHP6DC366FpIO4RqCKqCY7FEvXYzhFBux17_tih78YgPryvy03LgdA1bop98MtKSiRa1WliJ1FWSmb5MyOywJbD2Hj1o9TCN330N4Hl8Kt4kMxrQppox7paIgo_YkFIAk/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="339" data-original-width="508" height="214" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimijpQ34UtZNYHP6DC366FpIO4RqCKqCY7FEvXYzhFBux17_tih78YgPryvy03LgdA1bop98MtKSiRa1WliJ1FWSmb5MyOywJbD2Hj1o9TCN330N4Hl8Kt4kMxrQppox7paIgo_YkFIAk/" width="320" /></a></div><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Bestselling cybersecurity author </span><b style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><a href="https://saihuda.weebly.com/">Sai Huda</a></b><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"> is alerting businesses to misconfigurations in the cloud. Huda is the author of the best-seller, Next Level Cybersecurity: Detect the Signals, Stop the Hack, and former GM, Risk Information Security and Compliance Solutions at FIS, a Fortune 500 company. Under his leadership, FIS attained number 1 ranking in RiskTech100.</span><p></p><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">When organizations shift their operations wholly or partly to the cloud, they receive out-of-the-box configurations to various systems that <b><a href="https://en.wikipedia.org/wiki/Cloud_computing">cloud service</a></b> providers give their clients. However, businesses have responsibility to review these out-of-the-box configurations, and make proper adjustments, not the cloud service provider, and once in the cloud, they have to complete all necessary configurations to adequately safeguard their data.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">If there is a misconfiguration, a malicious attacker can exploit it to access valuable customer data. Common cloud misconfigurations include unrestricted inbound and outbound access, unrestricted metadata service requests, and passive monitoring of keys and tokens.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Recently, for example, an organization reported the theft of data belonging to over 100 million customers. A past employee of the cloud service provider that the company used identified a misconfiguration in the client company’s web application firewall and used it to break into its cloud system. Once inside, the attacker queried a metadata system to obtain access keys and tokens and used these to collect the data of millions of customers.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Businesses operating through the cloud should make cloud configurations and regular testing of configurations a top priority to avoid creating a back door for cyber attackers to exploit.</span>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-41474066375737977772020-09-14T23:56:00.001-07:002020-09-14T23:56:42.567-07:00Sai Huda on Cyber Center of Excellence (CCOE) Cyber Insiders Podcast<div class="modal-body" style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px; padding: 15px;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvZfzTOKcMVk3N-wez9TvsGpvGxCULMGxit_7PbR-d4-5rMxKwk0UDv9_IpXPiGTi8LUrKQpGXbbHnLKaZWztFRKG3ic5djz9LTJ0Qc-oZ13NRA6YgoSo1cs7LYNiaQG8qp9fo_l0nzss/s626/business-corporate-protection-safety-security-concept_53876-64964.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="404" data-original-width="626" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvZfzTOKcMVk3N-wez9TvsGpvGxCULMGxit_7PbR-d4-5rMxKwk0UDv9_IpXPiGTi8LUrKQpGXbbHnLKaZWztFRKG3ic5djz9LTJ0Qc-oZ13NRA6YgoSo1cs7LYNiaQG8qp9fo_l0nzss/s320/business-corporate-protection-safety-security-concept_53876-64964.jpg" width="320" /></a></div><br /><div id="md-content"><br /></div><div id="md-content">The Cyber Center of Excellence (CCOE) hosted a thought leadership podcast on iHeart Radio titled "Data Protection & Detection" featuring a panel of industry-leading cybersecurity experts, which included<b><a href="https://wiseintro.co/sai-huda"> Sai Huda</a></b>.<br /><br />Sai Huda is a globally recognized risk and <b><a href="https://en.wikipedia.org/wiki/Computer_security">cybersecurity </a></b>expert and author of the best-selling book, Next Level Cybersecurity: Detect the Signals, Stop the Hack. Huda is also an advisory board member at CCOE.<br /><br />In the panel, Huda was joined by Tony Anscombe, Cybersecurity Evangelist at ESET and Steve Kelley, CRO, GoSecure.<br /><br />In the podcast, Huda shares his expert insights on the cyber attack chain, common tactics, techniques and procedures (TTPs), and the signals that are frequently missed that could detect the attacker timely and prevent loss or damage. He also shares some innovative cybersecurity risk mitigation best practices.<br /><br />The Cyber Insiders is a series of cybersecurity thought leadership podcasts on iHeart Radio hosted by the CCOE. The CCOE is a non-profit organization comprised of member organizations in the cyber community, dedicated to advocating cybersecurity best practices and growth of jobs in the cyber community.</div></div><div class="modal-footer" style="background-color: whitesmoke; border-radius: 0px 0px 6px 6px; border-top: 1px solid rgb(221, 221, 221); box-shadow: rgb(255, 255, 255) 0px 1px 0px inset; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px; margin-bottom: 0px; padding: 14px 15px 15px; zoom: 1;"></div><p> </p>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-78101035706826683722020-09-04T00:22:00.002-07:002020-09-04T00:22:39.000-07:00Cyber Center of Excellence Article: Top Three Cybersecurity Threats<div class="separator"><div style="margin-left: 1em; margin-right: 1em; text-align: justify;"><img src="https://media.istockphoto.com/photos/business-technology-internet-and-networking-concept-picture-id1016968886?b=1&k=6&m=1016968886&s=170667a&w=0&h=wKluXgn_QPoMuFxM75HgTDpLHFOpJ3fhXiE86IstcJU=" /></div></div><div style="text-align: justify;"><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">The <b><a href="https://ccoe.dsci.in/">Cyber Center of Excellence (CCOE)</a></b> thought leadership article titled "Top Three Cybersecurity Threats You Should Mitigate Before It Is Too Late" warns organizations of all sizes and types of the significant risks posed from ransomware, cloud mis-configurations and supply chain backdoors.</span></div><div style="text-align: justify;"><span style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><br /></span></div><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><div style="text-align: justify;">The article was authored by <b><a href="https://hireclub.com/saihuda">Sai Huda</a></b>, advisory board member at the CCOE. Huda is a globally recognized risk and cybersecurity expert, and author of the best-selling book, Next Level Cybersecurity: Detect the Signals, Stop the Hack.</div></span><div style="text-align: justify;"><span style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><br /></span></div><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><div style="text-align: justify;">In this timely article, Huda explains why these are the top three cybersecurity threats and provides examples of the threats and the impact to organizations. He also reveals a five step method to mitigate the threats that organizations of any size or type can implement to manage the risks.</div></span><div style="text-align: justify;"><span style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><br /></span></div><p style="text-align: justify;"><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Founded in 2014, the CCOE is a non-profit organization comprised of member organizations of all sizes and types in the cyber industry. The COOE is an advocate for cybersecurity best practices and growth of jobs in the cyber industry. The group provides opportunities for collaboration among industry stakeholders and performs research for the cyber community, such as economic impact studies. It also recently hosted Cyber Insiders, a thought leadership podcast on iHeart Radio on emerging cyber risks, featuring industry-leading cybersecurity experts.</span> </p>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-61800239109283199322020-08-17T21:46:00.002-07:002020-08-17T21:46:58.569-07:00Reasons Cyber Attacks Are Difficult to Prevent Completely<p style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIJrEKxd934VVu_QwcgNtD_VYhzpidQl0QHlEONgvK8t69P8Frxn7g_CglgFKG2ic7UIAxZu2kM5fk_kedZlVVuDsI4IrsGNLpS3oZuEN0Y8AgM32mly3ytz7-QD_Tjzx6iQSE-OyAmRY/s508/Cyber+Attacks.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="339" data-original-width="508" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIJrEKxd934VVu_QwcgNtD_VYhzpidQl0QHlEONgvK8t69P8Frxn7g_CglgFKG2ic7UIAxZu2kM5fk_kedZlVVuDsI4IrsGNLpS3oZuEN0Y8AgM32mly3ytz7-QD_Tjzx6iQSE-OyAmRY/s0/Cyber+Attacks.jpg" /></a></div><p></p><p style="text-align: justify;"><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><b><a href="https://en.wikipedia.org/wiki/Computer_security">Cybersecurity </a></b>expert and author of the best-seller, Next Level Cybersecurity: Detect the Signals, Stop the Hack, Sai Huda, advises leading companies to bolster their cyber-attack preparedness, ensuring they can positively identify attack signals and take measures to stop the attack before any damage is done. Sai Huda did a book-signing at the 2020 RSA conference and spoke on the seven step-method to detect the attackers as revealed in his book. He also spoke in an interview with the Editor-in-Chief of Big Data-Made Simple where he shared his insights on cybersecurity best practices.</span></p><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">One question he answered was why companies still faced cyberattacks despite investing millions to stop them. According to him, the reason was three-fold: the difficulty of locking out bad actors, the allure of valuable data, and hackers’ growing level of sophistication.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Companies continue to face cyber-attacks because prevention is almost impossible. In the digital world, there are too many doors, windows, and potential entry points for attackers to exploit. Locking all these doors is virtually impossible and as long as these companies hold valuable data, attackers will always figure out a way to gain entry.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">In addition, the attackers themselves have become sophisticated and are capable of creating and deploying malicious applications designed to evade cybersecurity systems. Today, they do not have to steal the data. Attackers can simply hijack companies’ internal systems, hold sensitive data hostage, and demand ransom payments. With this in mind, companies should equally invest and focus in cyberattack detection. Huda reveals in his book the top 15 signals of the attacker and a seven step method to detect them early and stop the attack before any damage is done.</span>Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-13148394253955824762020-06-16T02:56:00.001-07:002020-06-16T02:56:53.645-07:00Sai Huda's Cybersecurity Article for Cyber Center of Excellence (CCOE)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="modal-body" style="color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px; padding: 15px;">
<div id="md-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8apoGM4JTvHgmqfkoLe-b0SGxIed2BR-D04zQvAIQSDv0__VEXeBLpCdIaVdd7IC1-V-rJsDCPZ1qTGTAF-sjM0vUI0i6Eqp-ABupgjyqcSnSS8b6jkRL4HVH0EtWcBjoquGBeORpYHA/s1600/female-scientist-white_53876-89029.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="428" data-original-width="626" height="218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8apoGM4JTvHgmqfkoLe-b0SGxIed2BR-D04zQvAIQSDv0__VEXeBLpCdIaVdd7IC1-V-rJsDCPZ1qTGTAF-sjM0vUI0i6Eqp-ABupgjyqcSnSS8b6jkRL4HVH0EtWcBjoquGBeORpYHA/s320/female-scientist-white_53876-89029.jpg" width="320" /></a></div>
<span id="goog_2055485646"></span><span id="goog_2055485647"></span><br /></div>
<div id="md-content">
<b><a href="https://www.blogger.com/"><span id="goog_2055485635"></span>Sai Huda<span id="goog_2055485636"></span></a></b> authored the thought-leadership article titled "Top Three Cybersecurity Threats You Should Mitigate Before It Is Too Late" in behalf of the Cyber Center of Excellence (CCOE). The article educates the business community on the top three cybersecurity threats faced today and the risk mitigation best practices to implement.<br />
<br />
Sai Huda is a globally recognized risk and <b><a href="http://cyber.harvard.edu/cybersecurity/Main_Page" target="_blank">cybersecurity </a></b>expert and the author of the best-seller, Next Level Cybersecurity: Detect the Signals, Stop the Hack. He has over two decades of experience in cybersecurity working in high-level positions for large companies. Recognized by his peers and engaged with the industry, Sai Huda is a founding member of the Cyber Center of Excellence (CCOE), where he sits on the board of advisors.<br />
<br />
The CCOE is a non-profit association created to encourage cybersecurity best practices and the growth of the cybersecurity economy. Any organization dedicated to helping with the advancement of the cyber industry can join CCOE as a member.<br />
<br />
Besides providing government and non-profit membership opportunities, CCOE provides four main membership types for businesses. For instance, the guard membership is for cyber companies with revenue up to $2 million, and it provides a connection to capital, service providers and cyber leaders, and access to a job board and career map.<br />
<br />
Companies with revenues more than $2 million can join as shield members and receive eligibility to participate in committees, task forces, and advisory groups for projects. Another available membership for these organizations is the armor type, which provides recognition in CCOE’s marketing campaigns and eligibility to serve on the board of directors.<br />
<br />
The most advanced membership type, sentinel, provides all previously mentioned benefits, in addition to opportunities to serve on CCOE’s executive committee and host and keynote CCOE programs and events.</div>
</div>
<div class="modal-footer" style="background-color: whitesmoke; border-radius: 0px 0px 6px 6px; border-top: 1px solid rgb(221, 221, 221); box-shadow: rgb(255, 255, 255) 0px 1px 0px inset; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px; margin-bottom: 0px; padding: 14px 15px 15px; zoom: 1;">
</div>
</div>
Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-2548532683986063742020-04-12T05:58:00.001-07:002020-04-12T05:58:42.470-07:00Five Questions to Ask About Your Company’s Cybersecurity<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikI7z3Ng4sRnZiFApvcU-VYCAnIck_I-U2Qs4QVorVKzyqabiDqrxw6_lD8oK96JZeaHhyphenhyphen5cNjsJ61q4zc38807lANicyUdW6DM9FRkl5lhevrjKFORZNv5S2F-YdOfHsbpX7HaP4rJsY/s1600/internet-screen-security-protection-60504.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikI7z3Ng4sRnZiFApvcU-VYCAnIck_I-U2Qs4QVorVKzyqabiDqrxw6_lD8oK96JZeaHhyphenhyphen5cNjsJ61q4zc38807lANicyUdW6DM9FRkl5lhevrjKFORZNv5S2F-YdOfHsbpX7HaP4rJsY/s320/internet-screen-security-protection-60504.jpg" width="320" /></a></div>
<span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;"><br /></span>
<span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">A technology visionary with an extensive background in assessing cybersecurity and corporate risk, <b><a href="https://sai-huda.blogspot.com/" target="_blank">Sai Huda</a></b> has given keynote presentations on the subject at events such as the Risk and Compliance Summit. In a recent article, Sai Huda explored the foundational threats presented by hackers and ransomware, and listed key questions that every <b><a href="https://en.wikipedia.org/wiki/Organization" target="_blank">organization </a></b>should ask as a way of staying proactive and mitigating risk.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">One of these questions centers on whether a “reverse stress test” is undertaken periodically that simulates data theft or a ransomware attack. This process should provide answers to the timeline and manner in which recovery can occur, as well as trace the source of the data breach or ransomware attack, and the control and backup deficiencies.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Another question is whether a behavioral detection engine is continuously sifting through all of the “noise" and pinpointing signals that indicate potential ransomware activity before it spreads or lateral movement by the attacker prior to data exfiltration.</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">A third question is whether audits are regularly performed to ensure system configurations are all aligned and secure, such that the “crown jewels” in the cloud cannot be hacked or stolen. Does top-to-bottom organizational training on security awareness take place on a regular basis that both teaches cyber best practices and simulates threats?</span><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><br style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;" /><span style="background-color: white; color: #404040; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 13px;">Finally, ask whether the supply chain, which may have privileged access to company data, has been thoroughly audited and does not have weak security that presents potential backdoors to your company’s IP or data.</span></div>
Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.comtag:blogger.com,1999:blog-8089000291239452723.post-2371707901144225882019-09-30T11:35:00.000-07:002019-09-30T11:35:18.753-07:00The Most Critical Sector With Cyber Risk
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:DoNotShowComments/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="375">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:-536870145 1107305727 0 0 415 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1727028462;
mso-list-type:hybrid;
mso-list-template-ids:884228424 -528323888 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@list l0:level2
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level3
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
@list l0:level4
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level5
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level6
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
@list l0:level7
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level8
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level9
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">When
it comes to cyber risk, electricity is without a doubt the most critical of
critical sectors. Imagine if all of a sudden there was no electricity for
several days.<span style="mso-spacerun: yes;"> </span>What if it was for several
weeks or longer. It would be catastrophic. Just about everything, everywhere
would come to a halt.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">It
would cause severe economic, health and environmental damage. In the U.S., just
in the east coast, Lloyd’s of London estimates $243 billion in insurance costs
and loss of life and damage from a cyberattack disrupting the electricity
distribution network.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">Bad
actors such as organized crime groups and rogue nation-states know this and are
going after the electricity sector with more cyberattacks than ever before. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">They
are also targeting the supply chain first, to infiltrate and use as the
“backdoor” into the electricity sector. So not only are the 3,300 electricity
utilities in the U.S. prime targets, so are its suppliers.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">In
my book, </span><span style="font-family: "Arial",sans-serif; font-size: 11.0pt;"><a href="https://www.amazon.com/Sai-Huda/e/B07N7LYCVX%3Fref=dbs_a_mng_rwt_scns_share" target="_blank">Next LevelCybersecurity: Detect The Signals, Stop The Hack</a></span>,<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;"> in one of the cases,
I show how a rogue nation-state broke into several “staging targets” first. These
were suppliers. They used the suppliers as the “back door” to break into the
electricity utilities to steal detailed information about the Crown Jewels
(i.e. mission-critical cyber assets and systems) to plan the eventual attack on
the utilities. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">The
book shows what a cyberattack chain is and reveals the common signals to look
for to detect the attacker timely, regardless of whether you are an electricity
utility or other type of entity.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">The
North American Electric Reliability Corporation (NERC) in January 2019 also
sent a warning to the electricity sector and raised the bar for cyber risk
management by assessing a $10 million penalty for 127 violations of cyber
security standards by a electricity utility. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">NERC
determined that the violations in aggregate created serious and substantial
risk, and mandated cybersecurity enhancements.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">The
Federal Energy Regulatory Commission (FERC) also approved new cybersecurity
standards on security management controls and supply chain risk management that
utilities must comply by January 1, 2020 and July 1, 2020, respectively.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">Electricity
utilities must be proactive and not get caught by surprise by either a
cyberattack or a regulatory audit. The stakes are too high. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">A
regulatory audit discovering non-compliance can be costly, but a cyberattack
will be even more costly. Just one successful cyberattack on one utility or a
supplier can cause a domino effect and lead to a systemic catastrophe. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">So
what can electricity utilities do now?<span style="mso-spacerun: yes;"> </span>Here
are three steps to remain proactive:<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "Calibri",sans-serif; font-size: 11.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">Perform
a “reverse stress test” where you assume the worst case (a successful cyberattack
that shuts the power supply off for several days), then trace back all of the
high probability steps the attacker would have taken, all the way back to the
“intrusion” source. This will help identify gaps and blind spots, for risk
mitigation.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "Calibri",sans-serif; font-size: 11.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">Performing
ongoing Crown Jewels Risk Assessment, to make sure
you not only correctly categorize low, medium and high impact cyber assets and
systems per NERC cybersecurity regulations, but also map to threats,
vulnerabilities and risk mitigation, including monitoring for signals of cyber
attackers trying to get to the Crown Jewels, and report results to the board
for ongoing oversight.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "Calibri",sans-serif; font-size: 11.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span style="font-family: "Arial",sans-serif; font-size: 11.0pt;">Train
your entire organization using three tiers (oversight, awareness and
performance) and on the NERC cybersecurity standards, beyond basic security
awareness, to prevent non-compliance as happened in the recent $10 million penalty
case, to transform your people, to be the strongest link in the chain, not
the weakest and the most vulnerable.</span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="font-family: "Arial",sans-serif; font-size: 11.0pt;"><br /></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="font-family: Arial, sans-serif;"><span style="font-size: 14.6667px;">To learn more on risk mitigation, please visit <a href="https://www.saihuda.com/" target="_blank">www.saihuda.com</a>.</span></span></div>
<!--EndFragment--><br />Sai Hudahttp://www.blogger.com/profile/04700982630149325136noreply@blogger.com