VottsUp

Wednesday, June 14, 2023

Cyber Security for SME : Risk Assessment

  • 1. Identify and Involve Stakeholders:
  • 2. Define the Scope:
  • 3. Gather Information:
  • 4. Identify Threats and Vulnerabilities:
  • 5. Assess Impact:
  • 6. Determine Likelihood:
    • - Evaluate the likelihood of each threat occurring based on historical data, industry trends, and the organization's specific circumstances.
    • - Consider external factors that may increase or decrease the likelihood of a threat.
  • 7. Risk Evaluation:
    • - Assess the combination of impact and likelihood to determine the level of risk associated with each identified threat.
    • - Use a risk matrix or scoring system to categorize risks as high, medium, or low.
  • 8. Prioritize Risks:
    • - Prioritize risks based on their potential impact and likelihood.
    • - Focus on addressing high-priority risks that pose the greatest threat to the organization.
  • 9. Identify Existing Controls:
    • - Evaluate the existing controls and safeguards that are already in place to mitigate the identified risks.
    • - Determine their effectiveness in addressing the risks and identify any gaps or areas for improvement.
  • 10. Develop Mitigation Strategies:
    • - Based on the identified risks and control gaps, develop mitigation strategies to reduce the likelihood or impact of each risk.
    • - Consider a combination of technical, administrative, and physical controls to address the identified vulnerabilities.
  • 11. Implement Risk Mitigation Measures:
    • - Implement the identified mitigation measures, ensuring that they are properly integrated into the organization's processes and systems.
    • - Assign responsibility for implementing each measure and establish a timeline for completion.
  • 12. Monitor and Review:
    • - Regularly monitor the effectiveness of the implemented controls and mitigation measures.
    • - Conduct periodic reviews and assessments to identify any changes in the risk landscape or new risks that may emerge.
  • 13. Update and Improve:
    • - Continuously update and improve the risk assessment process based on feedback, lessons learned, and changes in the organization's environment.
    • - Stay informed about new threats and vulnerabilities in the cybersecurity landscape to ensure ongoing protection.
  • Remember, conducting a risk assessment is an iterative process, and it should be repeated periodically or whenever significant changes occur in the organization's operations or IT infrastructure.

How to Ensure that stakeholders understand the purpose and importance of the risk assessment

To ensure that stakeholders understand the purpose and importance of the risk assessment, you can use a combination of communication methods and materials. While a questionnaire may not be the most effective tool for this particular purpose, you can consider using the following approaches:

  1. Stakeholder Presentations:

    • Conduct presentations or meetings with stakeholders to explain the purpose and objectives of the risk assessment.
    • Clearly communicate the importance of cybersecurity and how the risk assessment helps identify and mitigate potential risks.
  2. Informational Materials:

    • Develop informational materials, such as brochures or handouts, that provide an overview of the risk assessment process and its significance.
    • Use plain language and avoid technical jargon to ensure easy comprehension.
  3. Executive Summaries:

    • Prepare executive summaries or brief reports that highlight the key points of the risk assessment, including the potential impacts of cybersecurity risks on the organization.
    • Emphasize the need for proactive risk management and the benefits of a comprehensive risk assessment approach.
  4. Visual Aids:

    • Utilize visual aids, such as infographics or diagrams, to illustrate the cybersecurity landscape and the potential consequences of security breaches.
    • Use visuals to make complex concepts more accessible and engaging for stakeholders.
  5. Case Studies or Real-World Examples:

    • Share relevant case studies or real-world examples that demonstrate the impact of cybersecurity incidents on businesses similar to yours.
    • Highlight the financial, reputational, and operational repercussions that organizations have faced due to inadequate cybersecurity measures.
  6. Q&A Sessions:

    • Provide opportunities for stakeholders to ask questions and engage in discussions about the risk assessment process.
    • Address any concerns or misconceptions that stakeholders may have regarding the assessment.
  7. Training Sessions:

    • Conduct specialized training sessions or workshops to educate stakeholders on cybersecurity best practices and the importance of risk assessment.
    • Customize the training content to suit the specific roles and responsibilities of each stakeholder group.

Remember, the goal is to communicate the purpose and importance of the risk assessment in a clear and accessible manner. Tailor your approach based on the specific needs and preferences of your stakeholders, ensuring that they grasp the significance of cybersecurity and their role in mitigating risks.

Scope of the risk assessment

Defining the scope of the risk assessment involves determining the specific systems, processes, and assets that will be assessed for cybersecurity risks. While there isn't a predefined list that applies universally to all organizations, you can follow these steps to define the scope effectively:

  1. Identify Key Assets:

    • Identify the critical assets within your organization, such as databases, servers, network infrastructure, applications, intellectual property, customer data, financial information, and any other sensitive or valuable information.
  2. Determine Relevant Systems and Processes:

    • Identify the systems and processes that directly or indirectly impact the security of your key assets.
    • This may include network infrastructure, hardware and software systems, employee onboarding and offboarding processes, data storage and handling procedures, access control mechanisms, incident response protocols, and more.
  3. Consider Regulatory Requirements and Industry Standards:

    • Determine if your organization operates in an industry with specific regulatory requirements or compliance standards, such as healthcare (HIPAA) or payment card industry (PCI DSS) regulations.
    • Ensure that the scope of the risk assessment includes assessing compliance with these specific requirements.
  4. Analyze Interdependencies:

    • Consider the interdependencies between different systems, processes, and assets.
    • Identify how a breach or vulnerability in one area could impact others within your organization.
  5. Assess External Factors:

    • Take into account external factors that could affect your risk assessment scope.
    • This may include external service providers, cloud infrastructure, remote work arrangements, or partnerships with other organizations.
  6. Involve Relevant Stakeholders:

    • Engage stakeholders from various departments and teams within your organization, such as IT, security, operations, legal, and compliance.
    • Collaborate with them to identify the systems, processes, and assets that should be included in the risk assessment based on their expertise and responsibilities.
  7. Document the Scope:

    • Clearly document the identified systems, processes, and assets that will be assessed as part of the risk assessment.
    • Describe the boundaries of the assessment and any specific exclusions or limitations that apply.

Remember that the scope of the risk assessment may evolve over time as your organization grows, introduces new technologies, or faces emerging threats. It's important to periodically review and update the scope to ensure it remains relevant and comprehensive.

Identify the specific objectives and goals

To identify specific objectives and goals of the risk assessment, you can follow these steps:

  1. Understand Organizational Needs:

    • Gain a clear understanding of your organization's priorities, challenges, and concerns related to cybersecurity.
    • Consider the organization's overall goals, such as protecting sensitive data, ensuring business continuity, complying with regulations, or safeguarding customer trust.
  2. Consult with Stakeholders:

    • Engage key stakeholders, such as senior management, IT teams, legal and compliance personnel, and department heads.
    • Seek their input and insights regarding the objectives and goals they believe the risk assessment should achieve.
  3. Review Applicable Regulations and Standards:

    • Identify any relevant regulatory requirements or industry standards that your organization must comply with.
    • Determine the specific objectives and goals outlined within these regulations or standards, as they may influence your risk assessment.
  4. Assess Organizational Risks and Priorities:

    • Analyze the organization's risk landscape by considering past incidents, current vulnerabilities, and potential threats.
    • Prioritize risks based on their potential impact, likelihood of occurrence, and the organization's risk appetite.
  5. Set SMART Objectives:

    • Ensure that your objectives are Specific, Measurable, Achievable, Relevant, and Time-bound (SMART).
    • For example, an objective could be to identify and prioritize the top five cybersecurity risks facing the organization within the next three months.
  6. Align with Business Strategy:

    • Align the objectives and goals of the risk assessment with the broader business strategy of the organization.
    • Consider how cybersecurity risk management fits into the overall goals and vision of the company.
  7. Document Objectives and Goals:

    • Clearly document the identified objectives and goals of the risk assessment.
    • Include details such as the rationale behind each objective, the timeframe for achieving them, and the stakeholders responsible for their implementation.
  8. Regularly Review and Update:

    • Periodically review and update the objectives and goals of the risk assessment to ensure they remain relevant and aligned with the evolving needs of the organization.

By following these steps, you can establish clear and targeted objectives and goals for the risk assessment, helping to guide the assessment process and ensure that it effectively addresses the organization's cybersecurity concerns.

How to To collect relevant information

To collect relevant information about the organization's infrastructure, systems, and processes for a risk assessment, you can use a combination of methods, including documentation review, interviews, and surveys. While there isn't a predefined table or set of forms that applies universally to all organizations, you can follow these approaches:

  1. Documentation Review:

    • Review existing documentation, such as network diagrams, system architecture diagrams, IT policies and procedures, incident reports, and previous risk assessments.
    • Identify information related to the organization's infrastructure, systems, and processes, including hardware and software inventory, network topology, data flow diagrams, access controls, and security configurations.
  2. Interviews:

    • Conduct interviews with key personnel from various departments and teams within the organization.
    • Engage IT staff, system administrators, network administrators, and other relevant individuals to gather insights about the organization's infrastructure, systems, and processes.
    • Ask specific questions about system configurations, data handling practices, security controls in place, incident response procedures, and any known vulnerabilities or threats.
  3. Surveys or Questionnaires:

    • Develop surveys or questionnaires tailored to gather specific information about the organization's infrastructure, systems, and processes.
    • Include questions about network infrastructure, hardware and software assets, security controls, access management, data protection measures, backup and recovery procedures, and employee awareness of cybersecurity practices.
    • Distribute the surveys to relevant individuals or departments and collect the responses.
  4. On-Site Assessment:

    • Perform on-site visits to physically inspect the organization's infrastructure, systems, and processes.
    • Observe the physical security measures in place, such as access controls, video surveillance, and environmental controls.
    • Verify the accuracy of documented information and gather additional details by directly examining the systems and infrastructure.
  5. External Service Provider Engagement:

    • If the organization utilizes external service providers, engage with them to understand the security measures they have in place and the potential risks associated with their services.
    • Request relevant documentation, such as service-level agreements (SLAs), security certifications, and incident response procedures.
  6. Data Collection Forms:

    • Develop customized data collection forms or templates to organize and capture the information gathered.
    • Include fields for capturing details such as system names, versions, vendor information, patch levels, network configurations, user access controls, encryption methods, and disaster recovery plans.

Remember, the goal is to gather comprehensive and accurate information about the organization's infrastructure, systems, and processes. Choose the most suitable methods based on the organization's size, complexity, and available resources. Adapt and customize the data collection approach to fit the specific needs and requirements of the risk assessment process.

How to document the types of data and sensitive information being handled

To document the types of data and sensitive information being handled in an organization, you can use a data classification framework or template. While there isn't a specific predefined template that applies universally to all organizations, you can follow these steps to document the types of data and sensitive information:

  1. Identify Data Categories:

    • Determine the categories or classifications that best represent the types of data and sensitive information your organization handles.
    • Common categories may include personally identifiable information (PII), financial data, intellectual property, trade secrets, legal documents, and health records.
  2. Determine Data Attributes:

    • For each data category, define the specific attributes that are relevant to your organization.
    • Examples of data attributes include the data's confidentiality level, integrity requirements, regulatory compliance considerations, and retention periods.
  3. Create a Data Classification Framework:

    • Develop a data classification framework that outlines the categories, attributes, and associated criteria for classifying data within your organization.
    • This framework should provide guidelines for employees to identify and handle data appropriately based on its sensitivity.
  4. Data Classification Template:

    • Design a data classification template or form to capture information about the various types of data and sensitive information.
    • Include fields such as data category, attributes, description, relevant regulations, handling requirements, and any additional notes or considerations.
  5. Engage Relevant Departments:

    • Collaborate with departments that handle or have knowledge about the different types of data within the organization.
    • Involve IT, legal, compliance, HR, finance, and other relevant stakeholders to ensure comprehensive coverage and accuracy in documenting the data types.
  6. Data Inventory and Documentation:

    • Conduct an inventory of the organization's data assets and document the relevant details using the data classification template.
    • Gather information from databases, file servers, document management systems, and other sources to identify and describe the types of data being handled.
  7. Review and Update:

    • Regularly review and update the data classification documentation to reflect any changes in the organization's data landscape.
    • Stay abreast of new data types and ensure that the classification framework and template are adaptable to evolving data handling practices.

Remember, the data classification framework and template should be tailored to the specific needs and requirements of your organization. Customize them to align with your industry regulations, internal policies, and the unique characteristics of your data assets.

Identify potential threats

To identify potential threats that could impact an organization's assets, you can follow these steps:

  1. Conduct a Threat Assessment Workshop:

    • Gather a team of key stakeholders, including IT staff, security personnel, and department heads, to conduct a threat assessment workshop.
    • Ensure that participants have relevant expertise and knowledge about the organization's assets and operations.
  2. Identify Asset Inventory:

    • Create an inventory of the organization's assets, including physical assets (e.g., buildings, equipment), information assets (e.g., databases, servers), and intellectual property (e.g., trade secrets, patents).
    • Include both tangible and intangible assets that are critical to the organization's operations and objectives.
  3. Brainstorm Potential Threats:

    • Facilitate a brainstorming session to identify potential threats that could impact each asset.
    • Encourage participants to think broadly and consider internal and external threats, such as natural disasters, cyberattacks, human errors, supply chain disruptions, or regulatory non-compliance.
  4. Categorize Threats:

    • Categorize the identified threats based on their nature and origin.
    • Common categories may include physical threats (e.g., theft, vandalism), cybersecurity threats (e.g., malware, data breaches), environmental threats (e.g., fire, floods), operational threats (e.g., power outages, equipment failures), and regulatory or legal threats.
  5. Evaluate Threat Likelihood and Impact:

    • Assess the likelihood and impact of each identified threat on the organization's assets.
    • Consider factors such as historical data, industry trends, geographic location, and vulnerabilities of the assets.
    • Use a scale (e.g., low, medium, high) to rate the likelihood and impact of each threat.
  6. Prioritize Threats:

    • Prioritize the identified threats based on their likelihood and impact ratings.
    • Focus on the threats that are most likely to occur and have the highest potential impact on the organization's assets.
  7. Research Industry-Specific Threats:

    • Research and stay updated on industry-specific threats and emerging trends.
    • Consider industry reports, cybersecurity publications, regulatory guidelines, and information sharing platforms to gain insights into sector-specific threats that may pose risks to your organization.
  8. Document Threat Assessment:

    • Document the results of the threat assessment, including the identified threats, their likelihood and impact ratings, and the prioritization.
    • Ensure that the documentation is regularly reviewed and updated to account for new threats or changes in the organization's assets or operations.

By following these steps, you can identify potential threats that may pose risks to your organization's assets. This information will serve as a foundation for developing risk mitigation strategies and implementing appropriate security measures.

Identify vulnerabilities

To identify specific objectives and goals of the risk assessment, you can follow these steps:

  1. Understand Organizational Needs:

    • Gain a clear understanding of your organization's priorities, challenges, and concerns related to cybersecurity.
    • Consider the organization's overall goals, such as protecting sensitive data, ensuring business continuity, complying with regulations, or safeguarding customer trust.
  2. Consult with Stakeholders:

    • Engage key stakeholders, such as senior management, IT teams, legal and compliance personnel, and department heads.
    • Seek their input and insights regarding the objectives and goals they believe the risk assessment should achieve.
  3. Review Applicable Regulations and Standards:

    • Identify any relevant regulatory requirements or industry standards that your organization must comply with.
    • Determine the specific objectives and goals outlined within these regulations or standards, as they may influence your risk assessment.
  4. Assess Organizational Risks and Priorities:

    • Analyze the organization's risk landscape by considering past incidents, current vulnerabilities, and potential threats.
    • Prioritize risks based on their potential impact, likelihood of occurrence, and the organization's risk appetite.
  5. Set SMART Objectives:

    • Ensure that your objectives are Specific, Measurable, Achievable, Relevant, and Time-bound (SMART).
    • For example, an objective could be to identify and prioritize the top five cybersecurity risks facing the organization within the next three months.
  6. Align with Business Strategy:

    • Align the objectives and goals of the risk assessment with the broader business strategy of the organization.
    • Consider how cybersecurity risk management fits into the overall goals and vision of the company.
  7. Document Objectives and Goals:

    • Clearly document the identified objectives and goals of the risk assessment.
    • Include details such as the rationale behind each objective, the timeframe for achieving them, and the stakeholders responsible for their implementation.
  8. Regularly Review and Update:

    • Periodically review and update the objectives and goals of the risk assessment to ensure they remain relevant and aligned with the evolving needs of the organization.

By following these steps, you can establish clear and targeted objectives and goals for the risk assessment, helping to guide the assessment process and ensure that it effectively addresses the organization's cybersecurity concerns.

How do you determine the potential impact?

When assessing the potential impact of each identified threat, you can consider the following factors to determine the potential impact if the threat were to materialize:

  1. Data Sensitivity: Evaluate the sensitivity and criticality of the data that could be affected by the threat. Consider the potential consequences if the data is compromised, lost, or accessed by unauthorized individuals. This may include financial data, customer information, intellectual property, or confidential business data.

  2. Operational Disruption: Assess the potential impact on the organization's operations if the threat disrupts key processes or systems. Consider the downtime, loss of productivity, delays in service delivery, and the resulting financial and reputational consequences.

  3. Financial Loss: Estimate the potential financial impact of the threat. This includes direct financial losses, such as theft of funds or damage to physical assets, as well as indirect costs, such as recovery and remediation expenses, regulatory fines, legal fees, and loss of business opportunities.

  4. Customer Trust and Reputation: Evaluate the potential impact on customer trust and the organization's reputation. A significant cybersecurity incident can result in the loss of customer confidence, damage the organization's reputation, and lead to customer churn or difficulty in acquiring new customers.

  5. Regulatory and Legal Consequences: Consider the potential regulatory and legal consequences if the threat materializes. This includes the risk of non-compliance with industry-specific regulations, data protection laws, privacy regulations, and the associated penalties or legal liabilities.

  6. Business Continuity: Assess the potential impact on the organization's ability to maintain business continuity. Evaluate the potential disruption to critical operations, services, and supply chain dependencies. Consider the organization's ability to recover and restore operations within acceptable timeframes.

  7. Reputational Damage: Evaluate the potential impact on the organization's brand and reputation. Consider the public perception, media attention, and potential negative publicity associated with a cybersecurity incident. Assess the long-term impact on customer trust, partner relationships, and market competitiveness.

  8. Health and Safety: For certain industries or situations, consider the potential impact on the health and safety of individuals if the threat were to materialize. This includes scenarios where cyber incidents can have physical consequences, such as in critical infrastructure, healthcare systems, or transportation networks.

To assess the impact, you can assign a rating or score to each factor based on its potential severity. This can be done on a qualitative scale (e.g., low, medium, high) or a quantitative scale (e.g., assigning a numerical value to each factor). The cumulative impact rating helps prioritize the threats and allocate resources accordingly for risk mitigation and prevention.

How do you access consequences of each threat?

When assessing the financial, operational, reputational, and regulatory consequences of each threat, you can follow these steps:

  1. Financial Consequences:

    • Estimate the potential direct financial losses that could result from the threat. This may include costs related to data breaches, theft of funds, damage to physical assets, or financial fraud.
    • Consider the indirect financial impacts, such as the costs of incident response, forensic investigations, legal fees, regulatory fines, customer compensation, and loss of business opportunities.
    • Quantify the potential financial consequences as accurately as possible based on available data, industry benchmarks, and expert judgment.
  2. Operational Consequences:

    • Evaluate the potential impact on the organization's day-to-day operations. Assess the potential disruption to critical processes, systems, and services.
    • Consider the potential downtime, loss of productivity, delays in service delivery, and the resulting impact on customer satisfaction and revenue generation.
    • Determine the potential operational consequences based on the severity and duration of the disruption.
  3. Reputational Consequences:

    • Assess the potential impact on the organization's reputation and brand image. Consider how the threat could be perceived by customers, partners, stakeholders, and the general public.
    • Evaluate the potential negative publicity, media attention, and social media impact that could arise from a cybersecurity incident.
    • Consider the long-term consequences on customer trust, loyalty, and the organization's market competitiveness.
  4. Regulatory Consequences:

    • Identify the relevant regulations and compliance requirements applicable to your industry or geographic location.
    • Evaluate the potential non-compliance consequences, such as regulatory fines, penalties, sanctions, or legal liabilities.
    • Consider the impact on the organization's ability to operate within legal and regulatory frameworks, maintain necessary certifications, and comply with data protection and privacy laws.

To assess the consequences, you can use a combination of qualitative and quantitative analysis. Consider assigning ratings or scores to each consequence based on severity or impact levels (e.g., low, medium, high), or use numerical values to quantify the potential losses or impacts.

Additionally, it can be helpful to consult industry benchmarks, historical data on similar incidents, and expert opinions to gain a comprehensive understanding of the potential consequences associated with each threat. This assessment will aid in prioritizing threats and focusing resources on mitigating the most significant risks to the organization.

where to find such indistry bench marks?

Industry benchmarks for cybersecurity can be found from various sources. Here are a few places where you can access industry benchmarks and relevant data:

  1. Industry Associations: Industry-specific associations and organizations often provide cybersecurity benchmarks and best practices for their respective sectors. These associations may conduct surveys, publish reports, or offer guidance on cybersecurity standards and performance metrics. Examples include the National Institute of Standards and Technology (NIST) for various industries and the Payment Card Industry Security Standards Council (PCI SSC) for the payment card industry.

  2. Government Agencies: Government agencies, such as national cybersecurity centers or regulatory bodies, may publish industry-specific cybersecurity guidelines and benchmarks. These resources can provide insights into the cybersecurity practices and standards expected within a particular industry or region. Check the websites of relevant government agencies responsible for cybersecurity or data protection in your country.

  3. Cybersecurity Research Firms: Companies specializing in cybersecurity research and analysis often produce reports and benchmarks that provide insights into industry trends, threat landscape, and best practices. These firms may offer paid subscriptions or publish free reports on their websites. Examples include Gartner, Forrester Research, and IDC.

  4. Security Vendor Reports: Cybersecurity solution providers and technology vendors may release reports based on their research or customer data. These reports often include industry-specific benchmarks, threat intelligence, and cybersecurity trends. Check the websites or blogs of leading cybersecurity vendors for any available reports or whitepapers.

  5. Incident Databases: Publicly available incident databases, such as the Verizon Data Breach Investigations Report (DBIR) or the annual reports from the Identity Theft Resource Center (ITRC), provide valuable insights into industry-specific cyber incidents, their causes, and the resulting impacts. These reports can help you understand common threats and their consequences within your industry.

  6. Professional Networks and Forums: Engaging with cybersecurity professionals, participating in industry forums, and networking with peers can provide access to valuable insights and benchmarking information. Online communities, such as professional forums, social media groups, and industry-specific events, can be excellent sources of industry benchmarks and best practices.

Remember to review and validate the data from these sources to ensure its relevance and applicability to your specific industry and organization. Benchmarking can provide valuable context and comparisons for assessing your cybersecurity posture and understanding the potential consequences of threats within your industry.

whare can I find histroical data?

Historical data related to cybersecurity incidents and trends can be found in various places, including:

  1. Industry Reports: Industry reports and surveys conducted by cybersecurity research firms, industry associations, or government agencies often include historical data on cybersecurity incidents, trends, and their impacts. These reports may provide insights into the types of threats faced by specific industries, common vulnerabilities, and the evolving nature of cyberattacks.

  2. Incident Databases: Publicly available incident databases, such as those maintained by cybersecurity companies, government agencies, or industry-specific organizations, can provide historical data on cybersecurity incidents. These databases often include information on the nature of the incidents, the affected industries, the attack vectors used, and the consequences of the breaches.

  3. Case Studies and Whitepapers: Case studies and whitepapers published by cybersecurity solution providers, consulting firms, or research organizations may offer historical data on specific cybersecurity incidents. These resources often provide detailed analyses of notable breaches, including the tactics employed by the attackers, the impact on the organizations involved, and the lessons learned.

  4. News Archives: Historical data on cybersecurity incidents can be found in news archives and media coverage. News outlets often report on significant cyber incidents, data breaches, and their impacts. Searching news archives can provide insights into past incidents, the industries affected, and the consequences experienced by the targeted organizations.

  5. Regulatory and Legal Documentation: Regulatory bodies, such as data protection authorities or regulatory agencies, may maintain historical records related to cybersecurity incidents and their consequences. This information can be valuable in understanding the regulatory landscape, compliance requirements, and the impact of non-compliance.

  6. Collaboration and Information Sharing Platforms: Online platforms and forums where cybersecurity professionals and organizations collaborate and share information may include historical data on cybersecurity incidents. These platforms often serve as repositories of knowledge and experiences, allowing participants to discuss past incidents, share lessons learned, and provide insights into the consequences faced.

When accessing historical data, it's important to ensure the reliability and credibility of the sources. Consider cross-referencing information from multiple sources to validate the accuracy and relevance of the data. Additionally, keep in mind that specific details of cybersecurity incidents may not always be publicly available due to confidentiality concerns.



0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home