Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

71
Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1

Transcript of Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Page 1: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Ironshore Data Privacy CE/CLE Seminar

September 17, 2014

1

Page 2: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Life Cycle of a Breach

Identification of the Threat or Security Incident What just happened?

Triggering the Incident Response Team Making sure the right people / partners are part of the team

Containment Have you stopped the “bleeding”?

Remediation Have you taken steps to prevent this type of event from occurring in

the future? Notification – and beyond

Page 3: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Overview

You are part of a company that operates retail stores throughout the United States. Payment-card and HR processing is handled by your corporate offices for all stores. The Company employees approximately 20,000 employees.

3

Page 4: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Cyber Attack!

4

ATTACK!

Page 5: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

SQL Injection8/21/2014

Rafael Negron

SQL Demo

Page 6: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

SQL Injection

Page 7: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

What is SQL?

Web Application

Web Application

DatabaseDatabase

SQL

o SQL: Structured Query Language

o Used to store, edit, and retrieve database data

o Applications issue SQL commands that manage data

Change

sSQL

Page 8: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

SQL Injection

Web Application

Web Application

o Malicious SQL statements are inserted into an entry field for execution

o Malicious SQL statements, are intended to do things, such as display,

“Username and Password”

Change

s

Insert Malicious Input

Insert Malicious Input

Database

Database

Page 9: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

SQL Mini-Lesson

Table containing data

UserName

FirstName

LastName

Password

CJONES Cynthia Jones XXXXXX

BSMITH Bill Smith YYYYYY

SKING Susan King ZZZZZZZ

RSMITH Rob Smith AAAAA

Criteria rows must meet

"Users" Table

Query Results

Column data returnedSELECT UserName, Password

FROM Users

WHERE LastName = 'Smith'

Page 10: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Exploitation Methodology

Page 11: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Step 1 Scan

Page 12: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Step 1 Vulnerability Assessment

Page 13: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Step 3 Remote Exploitation

Page 14: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Step 3 Privilege Escalate

Page 15: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Windows Passwords

Page 16: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

SQL Demonstration

Page 17: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Pass The Hash

Page 18: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Pass The Hash Demo

Page 19: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

What Just Happened?

Your Company was the victim of a sql injection attack against a web application that provided information on customers who had purchased the Company’s services. The hacker appears to have gained access to a database that was serving the web application.

Question: What Do You Do?

19

Page 20: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Information Exposed

   The initial investigation shows that the database contained

employees’ names, addresses, social security numbers, driver’s license numbers, position, and bank account information. The database has been operational for 5 years. The database appears to have stored cardholder information for repeat customers.

Question: Now what? Does this impact your initial plan of action?

20

Page 21: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Monkey Wrench #1

You just learned that Brian Krebs, an online reporter who is credited with breaking the story that Target had been breached, and is followed by thousands of other publications, posted a story on his blog that the Company appears to have been breached. The story mentions that the Company failed to return phone calls for two days.

21

Page 22: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Monkey Wrench #2

The CEO of the Company contacts you, and tells you that he just received an e-mail from an unknown e-mail address, informing him that this person has the personal information of the CEO and his daughter, provides his driver’s license as proof, and threatens to post it online unless the CEO pays a ransom.

22

Page 23: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Update From Investigation

The database contained a link to an application that was connected to the Company’s payment processing system, which is centrally located at the Company’s headquarters. The application automatically updated information for repeat customers, but also allowed the hacker to potentially access the payment card information of all customers, exposing over 2 million credit cards.

Page 24: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Monkey Wrench #3

The FBI has just showed up at your door, and wants access to your data center so it can image your computers and servers in order to investigate the cyber attack.

24

Page 25: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Money Wrench #4

In the midst of your investigation, you receive an Inquiry from regulatory agency requesting more information about the event, asking for policies and procedures, and seeking a meeting.

25

Page 26: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Summary

Responding Quickly, But Effectively Matters

Know Who Your “Team” Members Are Before You Have An Event - Internal And External

Training And Education Matters!

No Two Events Are Alike - Expect The Unexpected

26

Page 27: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Ironshore Data Privacy CE/CLE Seminar

September 17, 2014

27

Page 28: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Panelists:Anjali C. Das, Partner Wilson Elser, LLP

Ty R. Sagalow, President Innovation Insurance Group, LLC

William A. Boeck, SVP Lockton Companies

Lindsay B. Nickle, Partner Wilson Elser, LLP

Kristi Janicek, Ironshore

Brenda Barnat, Abernathy MacGregor Group

28

Page 29: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

OVERVIEW

Corporate Exposures for a Data Breach Lack of Board Oversight for Data Privacy and

Security SEC Guidance and Enforcement Rise in Shareholder Litigation Against D&Os Corporate Governance and Cyber Risk

Management Cyber Insurance versus Other Insurance

29

Page 30: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

DATA BREACHES IN THE NEWS

Target Neiman Marcus Advocate Healthcare Twitter Adobe Facebook Living Social Evernote Federal Reserve Bank

30

Page 31: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

CORPORATE EXPOSURES FOR A DATA BREACH

31

Page 32: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Average Data Breach Response Costs

Avg. total organizational cost of breach ($5,403,644)

Avg. detection costs ($395,262) Avg. notification costs ($565,020) Avg. remediation costs ($1,412,548) Avg. lost business costs ($3,030,814) $200 a record

Note: Figures do not include mega breaches in excess of 100,000 breached records

Source: Ponemon Institute 2013 Cost of Data Breach Study32

Page 33: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Other Breach Related Costs

Litigation costsConsumer class actionsShareholder suitsGovernment investigations and proceedings

Impact on corporate financesCash flowLoan covenants and credit Shareholder valueReputational injury and loss of business

33

Page 34: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Adverse Impact on Target’s Corporate Financials

5.5% decrease in sales in 4Q 2013 “Meaningfully softer results” following news of

the breach 11% drop in stock price Reputational injury

34

Page 35: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Target Data Breach Related Costs

$88 million incurred for data breach response costs and related expenses to date

Amounts include internal investigation costs credit monitoring staffing call centers

$52 million in expected insurance recoveries $100 million in dedicated cyber liability insurance

35

Page 36: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Target Management Shake Up

CIO/CEO “resignations” CFO testifies before Congress Shareholder proxy advisor ISS recommends

ousting Board members Appointment of new Chief Information Security

Officer

36

Page 37: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

LACK OF BOARD OVERSIGHT FOR DATA SECURITY

37

Page 38: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

“Only a few executive officers understand security and the rest are clueless. . . . [T]his causes a big disconnect between the people performing information security to protect an organization’s data and the top-level executives at the organization.”

Source: Larry Ponemon, Founder of the Ponemon Institute

38

Page 39: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Many Boards are reassessing their skills in cyber risk management Experience in overseeing the growing threat of

cyber security risk is one of the key attributes Boards will consider when appointing new directors

IT expertise is now considered one of the top 5 attributes for today’s Board members

Only 11% of Boards are “very confident” of their ability to manage cyber risk

Source: NYSE 2014 Survey: What Directors Think

39

Page 40: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

SEC GUIDANCE AND ENFORCEMENT FOR DATA

SECURITY AND PRIVACY

40

Page 41: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

SEC Cyber Risk Disclosure Guidance

Discussion of aspects of business or operations that give rise to material cyber risks (costs and consequences)

Outsourced functions that may give rise to a cyber risk and how company manages that risk

Description of material cyber incidents to date (costs and consequences)

Risks related to cyber incidents that may remain undetected for an extended period

Description of relevant insurance coverage41

Page 42: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

5/1/13 Letter from SEC Chair Mary Jo White to Senator Rockefeller highlights the SEC’s interest in cyber risk

Cybersecurity risks are an “increasing concern” for public companies and financial markets

Since 2012, the SEC has issued 50 comment letters to companies regarding their cyber risk disclosures

SEC continues to “prioritize” this issue SEC is evaluating the “efficacy” of its guidance Possibility that the SEC consider further action on

this topic

42

Page 43: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

“Boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.”

SEC Commissioner Luis Aguilar speaking at the NYSE Conference:

Cyber Risks and the Boardroom (June 10, 2014)

43

Page 44: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

SEC “Blueprint” of Cybersecurity Issuesfor Wall Street Firms

1. Inventory of information security assets2. Dedicated employees responsible for monitoring

and detecting cybersecurity threats3. Cyber liability insurance4. Security policies, practices, and internal controls5. Cybersecurity risks associated with third party

vendors, service providers, and business partners

44

Page 45: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

D&O CYBER EXPOSURE:THE NEW FRONTIER FOR SHAREHOLDER SUITS

45

Page 46: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Securities Class ActionsWas there a stock drop following news of big

data breachDid the D&Os knowingly conceal a material

cyber risk (scienter)Were the stock losses caused by the bad news

or by a “corrective disclosure” (loss causation)Did company adequately disclose cyber risks in

its filings (per SEC guidance)

46

Page 47: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Derivative ActionsBreach of fiduciary duties and lack of oversight

by BoardWeak internal controls for cyber risk Damages to company resulting from data

breach or other cyber threat

47

Page 48: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Target Shareholder Suits Shareholder derivative suits against Target’s D&Os for

breach of fiduciary duty related to the 2013 data breach

Suits filed in Minnesota federal court Suits name CEO, CFO, CIO and Board of Directors D&Os allegedly failed to: (1) promptly notify

customers of the data breach, and (2) implement internal controls to detect and prevent a data breach

Complaints highlight Company’s Privacy Policy Company allegedly failed to use the PCI Data Security

Standard for large retail companies

48

Page 49: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Company’s Purported Damages

1. Reputational injury and loss of business2. Loss of revenue and profits3. Costs of defending and/or settling consumer

class actions4. Costs incurred in response to government

investigations5. Costs incurred from Company’s internal

investigation6. Data breach remediation costs

49

Page 50: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Corporate Governance and Cyber Risk Management Best Practices

50

Page 51: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

SEC Recommendations to Boards to Manage Cyber Risk

1. Use the NIST Framework as Guidance 2. Retain Directors with technical and security

expertise 3. Companies should have skilled employees to

manage cyber risk on a day-to-day basis4. Boards should make sure that companies have a

tested data breach response and recovery plan in place

51

Page 52: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

National Institute of Standards & Technology Framework

1) Identify critical IT and electronic data assets2) Protect these assets3) Detect cybersecurity threats4) Respond to cyber attacks (breach response plan)5) Recover lost, stolen, or impaired assets (recovery plan)

52

Page 53: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Privacy Policy Due Diligence

Who is responsible for Privacy Policy (i.e., Chief Privacy Officer) What PII does the Company collect From which states/countries is PII collected Who has access to the PII (both inside and outside the Company)

Drafting the Privacy Policy Does it provide notice of the Company’s collection of PII Does it provide consumers with opt-in/opt-out for use of their information Is PII being protected through appropriate (industry standard) security Is the Policy prominently located on the Company’s Website

Compliance/Auditing Are employees trained on protecting PII Does the Company employ effective security measures to protect PII Does the Company periodically audit compliance with its Privacy Policy

53

Page 54: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Contracts with Vendors/Business Associates

ID type of data to be stored or processed (PHI, PII, etc.) Where will data be stored, transferred, access Specify baseline security standards that Vendor must adhere to Does Vendor have its own Privacy Policy Definition of a reportable security breach Who will be responsible for notifying consumers (Company or Vendor) Data disposal and deletion requirements and time-frame Company’s right to audit Vendor for compliance with data

security/privacy Address Vendor’s use of Subcontractors Who has to comply with what laws, and who is financially responsible

(Company or Vendor, or both)

54

Page 55: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

More Data Security Policies and Procedures

Training employees Restricting users and access to network resources Implementing a process for managing IT assets Adopting a security policy that addresses mobile media Maintaining controls to secure portable media Maintaining protection against DDoS attacks Maintaining a written data destruction policy Maintaining a written cybersecurity breach response plan Testing computer backup systems Using data encryption Conducting periodic audits to ensure compliance with security

policies55

Page 56: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Carnegie Mellon’s Corporate Governance Best Practices Checklist

for Cyber Risk

Establish a Board Cyber Risk Committee Recruit directors with IT and security expertise Conduct an annual audit of security and breach

response programs and controls Require management to give periodic reports on

privacy and security risks Require the Board to conduct an annual review of

budgets for privacy and security risk management Evaluate potential liabilities and losses for cyber risk Review the adequacy of cyber risk insurance

coverage

56

Page 57: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Privacy and Security Risk Disclosures Privacy concerns relating to our technology could damage

our reputation and deter current and potential users from using our products and services.

In addition, as nearly all of our products and services are web-based, the amount of data we store for our users on our servers (including personal information) has been increasing. Any systems failure or compromise of our security that results in the release of our users’ data could seriously limit the adoption of our products and services, as well as harm our reputation and brand and, therefore, our business. We expect to continue to expend significant resources to protect against security breaches. The risk that these types of events could seriously harm our business is likely to increase as we expand the number of web-based products and services we offer, and operate in more countries.(Source: Google Form 10-Q 7/24/14)

57

Page 58: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Privacy and Security Risk Disclosures We experienced a significant data security breach in the fourth

quarter of fiscal 2013 and are not yet able to determine the full extent of its impact and the impact of government investigations and private litigation on our results of operations, which could be material.

We are currently subject to a number of governmental investigations and private litigation and other claims relating to the Data Breach, and in the future we may be subject to additional investigations and claims of this sort. These investigations and claims could have a material adverse impact on our results of operations or profitability.

Finally, we believe that the greatest risk to our business arising out of the Data Breach is the negative impact on our reputation and loss of confidence of our guests, as well as the possibility of decreased participation in our REDcards Rewards loyalty program which our internal analysis has indicated drives meaningful incremental sales. (Source: Target Form 10-K 3/14/14)

58

Page 59: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Don’t Count on Traditional Insurance to Respond to Cyber Exposures

CGL Coverage

D&O Insurance

Cyber Liability Insurance

59

Page 60: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

CGL Policy

Coverage A: Bodily Injury or Property Damage Property damage means physical injury to

tangible property, including loss of use of property

Is electronic data physical or tangible property? Evolution of ISO standard form CGL Policies

Pre-2001: No exclusion for electronic data Post-2001: Electronic data excluded Post-2004: Exclusion for damages arising out of the loss of,

damage to, corruption of, or inability to access electronic data60

Page 61: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

CGL Policy

Coverage B: Personal and Advertising Injury Includes “oral or written publication of material

that violates a person’s right to privacy” Coverage B might apply to theft of consumer data

or misuse of customer information Post-2001 ISO standard form CGL policy exclude

coverage for Internet-related activities

61

Page 62: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

New ISO Exclusion for CGL Policies

1). Arising out of any access or disclosure of any person’s or organization’s confidential or personal information; OR2). Arising out of the loss of, damage to, corruption of, or inability to access or manipulate electronic data

62

Page 63: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Public Company D&O Policy

Coverage for shareholder suits Limited coverage for investigations Entity coverage limited to Securities Claims No specific cyber exclusions Bodily injury and property damage exclusion Personal injury exclusion Other insurance provision

63

Page 64: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Private Company D&O Policy

Duty to defend Broad entity coverage Could include claims for negligence for failure to reasonably

safeguard customer information Bodily injury / property damage exclusion that applies to

injury to physical or tangible property Personal injury exclusion that applies to claims for “invasion

of privacy” Courts have held that loss or theft of PII pursuant to a data

breach does not give rise to a typical tort claim for invasion of privacy

64

Page 65: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

Cyber Liability Policy

1. First Party Coverage, including: Breach notification costs Forensic investigation Credit monitoring or identity theft Public relations / crisis management Call centers

2. Business Interruption Coverage3. Cyber Extortion Coverage4. Third Party Claims against Insureds5. Regulatory Investigations

65

Page 66: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

D&O and Corporate Cyber Exposure Takeaways

The buck stops with the Board No companies are immune to a data breach If the Target shareholder suits gain traction, more

may follow Companies should have adequate cyber risk

management policies and procedures Boards should be well-informed of cyber risks Duty to disclose material cyber risks Boards should consider how insurance responds to

cyber-related claims

66

Page 67: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

CYBER RISKS THE BUCK STOPS WITH THE BOARD

HYPOTHETICAL DATA BREACH SCENARIO

&

MOCK EMERGENCY BOARD MEETING

67

Page 68: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Ironshore Data Privacy CE/CLE Seminar

September 17, 2014

68

Page 69: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Imagine someone trying to break into your house. Now

imagine it 60,000 times a day.

http://www.ibm.com/smarterplanet/ie/en/business_resilience_management/overview/index.html?re=spf

69

Page 70: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Agenda

From a forensic, legal, and insurance perspective:

Bring Your Own Device (BYOD)

Vendor and Supply Chain Risks

What Data Do I Collect, Where Is My Data, Who Has Access To My Data

The Insider Threat

70

Page 71: Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1.

Thank You For Attending

Company Panel Participants:

71