SlideShare una empresa de Scribd logo
1 de 27
The underside of the PCI DSS ecosystem:   PCI as Security, simple facts that no-one talks about and anecdotes from the merchant’s perspective Patrick Wheeler, P.E. [email_address] December 2009 …  The following deck is shared post event: It is intended to be accompanied by a dialog and a verbal presentation that unfortunately is not as easy to share … however if you are struggling with PCI I encourage you to contact me via email, LinkedIn or any other means you find comfortable …
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disclaimers ,[object Object],[object Object],[object Object],[object Object],Doing the necessary … “ Views Expressed Here Don't Necessarily Reflect Those of Our Sponsors,” any Employer, Any Church, State or any Correct Thinking Individual Copyrights, trademarks, images, citations and other attributable  material reproduced here is incorporated for educational and  illustrative purposes and please address any concerns to  [email_address]
Background … ,[object Object],[object Object],[object Object],[object Object],[object Object],Andre Van Bever ©
Eight indicted in $9M RBS WorldPay heist...  Eight men have been  indicted on charges  that they hacked into credit card processing firm RBS Worldpay, and helped steal more than $9 million in a  highly coordinated  heist nearly a year ago Data Breaches are ever   more frequent & negatively impact public perception & diminish public trust in an institution Comprehensive Data Breach notification rules are inevitable Credit Card security standards like PCI are a first step Hackers escalate thefts of financial data Computer hackers stole more sensitive records last year than in the previous four combined, with  ATM cards and PIN information  growing in popularity as  targets , according …  Organised criminal groups  orchestrated nine in 10 of the most successful attacks, with 93 per cent of the 285m records exposed coming from the financial sector … US to Get  Data Breach Notification Laws :  …  notify anyone whose personal information may have been accessed in a breach  … set new standards for data breach notifications, the Personal Data Privacy and Security Act of 2009 (S.1490) and the Data Breach Notification Act (S.139), were passed by the Senate Judiciary Committee Nov. 5 … ( link )  The European Council has approved a data breach notification rule for Europe's telecoms firms. …  Security breach notification laws force companies which have lost customers' or employees' personal data to announce the loss.  Information Society Commissioner Viviane Reding said.   "The Commission will … extend the debate to generally applicable breach notification requirements and work on possible legislative solutions … In  2010 , the Commission intends … a  major initiative to modernise and strengthen network and information security policy in the EU ," ( link )
A bit about PCI DSS In 2003 California enacts notification rule for private data breaches:  SB1386 “ The Payment Card Industry Data Security Standard ( PCI DSS ) consists of an industry-wide set of controls and processes for securing cardholder data.  Any system  that stores, process and/or transmits cardholder data must comply with this standard.  ”   In 2004 Credit Card brands merged individual security programs to create the Payment Card Industry Security Standards Council ( PCI ) which created the Data Security Standard ( DSS ) ,[object Object],[object Object],[object Object],Is an attempt by the Industry to “Police Itself” and to prevent fragmented governmental regulations and intervention into business practices as well as protecting the consumer
The Bear ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SB1386 May I introduce you to the Bear?
PCI Security as Policy ??? ,[object Object],[object Object],[object Object],[object Object],[object Object],Bear Repellant?
ITIL COBIT ISO PCI Security Strategy on an Enterprise-wide Level
CobiT ,[object Object],Soup to nuts  is an American English idiom conveying the meaning of "from beginning to end". It is derived from the description of a full course dinner, in which courses progress from soup to a dessert of nuts. It is comparable to expressions in other languages, such as the Latin phrase ab ovo usque ad mala ("from the egg to the apples"), describing the typical Roman meal. "Soup to nuts" is often used in I.T. and Project Management to refer to "the complete process" from original idea to completion.
ITIL ,[object Object],[object Object],[object Object],[object Object]
ISO <According to our friends at  ISO27kfaq >
PCI  PCI is certainly not a strategy One of PCI’s biggest criticisms: “ It is too prescriptive ” Is one of its biggest strengths… PCI is, at its heart, basic housekeeping Not New Not Complicated Not Rocket Science <and, as we all know, not a guarantee> PCI is a list of procedures and  explicit instructions  implementable by a decent IT security practitioner and/or competent engineers/sysadmins and relatively easily verifiable
Security strategy on an enterprise-wide level ,[object Object],[object Object],[object Object],[object Object],[object Object],What if we do not have an enterprise level? <thanks in part to  http://www.stanford.edu/dept/Internal-Audit/infosec/ > ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Mistakes Companies Make …
Card schemes unexplained ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Which tier am I? https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf
Knowing your internal landscape ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with your Internal business partners ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],With Chip & Pin in Europe, PCI does-not/should-not be necessary... It is a problem because of you Americans…
Working with your External business partners ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PCI Compliance is a minimum, ‘PCI +’ ®™©  is a market differentiator
Dear  Mr. Retail Director , wish to speak with you about PCI DSS, the Data Security Standard …  Wait a minute, let me get the IT guys on the phone  … Dear  Ms. Risk Manager , wish to discuss our Certificate of Compliance –  Wait a minute,   let me call the auditors  … Dear  Mssr. Regional Store Manager , we need to discuss  Requirement 12 :  Maintain a policy that addresses information security for employees and contractors ,  Section 12.3.10   when accessing cardholder data via remote access technologies  –  Wait a minute,   let me get a pillow  … Where is the business?
…  An uncomfortable discussion with the Vice President of Audit  … … an even more uncomfortable meeting with the Enterprise Risk Manager  … …  Meeting with a fifth generation billionaire chairman emeritus business owner  … Where is the business?
Making sure your QSA is successful … ,[object Object],What the Big Four Auditor missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],No shortage of criticisms: …  while building an enterprise solution
A few Maladies to watch out for  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A few suggestions … ,[object Object],Repeat after me:  “The QSA’s success is the client’s success” Tone at the top matters … as do sotto voce comments Ensure your QSA can engage with you on a strategic level Ensure you can engage with your QSA on a strategic level Choose your tools wisely, focus on long term solutions Don’t buy quick-fix one-size-fits-all snake-oil magic-overnight-compliance solutions Look for integrated solutions merged into existing mature business & IT processes Look for tools that help you manage the security process, not PCI technical solutions
A few errors PCI commits on our behalf … ,[object Object],[object Object],[object Object],[object Object],<Insert your text here>
Is Compliance killing us ??? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],If it walks like a duck & talks like a duck, what is it? PCI +  ®™©
DSS, its own worst enemy and our best hope ,[object Object],[object Object],[object Object],We are all responsible for the success of the PCI ecosystem

Más contenido relacionado

La actualidad más candente

Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Dr. Ahmed Al Zaidy
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Dr. Ahmed Al Zaidy
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...PECB
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Dr. Ahmed Al Zaidy
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Dr. Ahmed Al Zaidy
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Dr. Ahmed Al Zaidy
 

La actualidad más candente (20)

Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 

Similar a Pci Europe 2009 Underside Of The Compliance Ecosystem

A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesAnton Chuvakin
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxharigopala
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdfkarthikvcyber
 

Similar a Pci Europe 2009 Underside Of The Compliance Ecosystem (18)

A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Topic11
Topic11Topic11
Topic11
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptx
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 

Pci Europe 2009 Underside Of The Compliance Ecosystem

  • 1. The underside of the PCI DSS ecosystem: PCI as Security, simple facts that no-one talks about and anecdotes from the merchant’s perspective Patrick Wheeler, P.E. [email_address] December 2009 … The following deck is shared post event: It is intended to be accompanied by a dialog and a verbal presentation that unfortunately is not as easy to share … however if you are struggling with PCI I encourage you to contact me via email, LinkedIn or any other means you find comfortable …
  • 2.
  • 3.
  • 4.
  • 5. Eight indicted in $9M RBS WorldPay heist... Eight men have been indicted on charges that they hacked into credit card processing firm RBS Worldpay, and helped steal more than $9 million in a highly coordinated heist nearly a year ago Data Breaches are ever more frequent & negatively impact public perception & diminish public trust in an institution Comprehensive Data Breach notification rules are inevitable Credit Card security standards like PCI are a first step Hackers escalate thefts of financial data Computer hackers stole more sensitive records last year than in the previous four combined, with ATM cards and PIN information growing in popularity as targets , according … Organised criminal groups orchestrated nine in 10 of the most successful attacks, with 93 per cent of the 285m records exposed coming from the financial sector … US to Get Data Breach Notification Laws : … notify anyone whose personal information may have been accessed in a breach … set new standards for data breach notifications, the Personal Data Privacy and Security Act of 2009 (S.1490) and the Data Breach Notification Act (S.139), were passed by the Senate Judiciary Committee Nov. 5 … ( link ) The European Council has approved a data breach notification rule for Europe's telecoms firms. … Security breach notification laws force companies which have lost customers' or employees' personal data to announce the loss. Information Society Commissioner Viviane Reding said. &quot;The Commission will … extend the debate to generally applicable breach notification requirements and work on possible legislative solutions … In 2010 , the Commission intends … a major initiative to modernise and strengthen network and information security policy in the EU ,&quot; ( link )
  • 6.
  • 7.
  • 8.
  • 9. ITIL COBIT ISO PCI Security Strategy on an Enterprise-wide Level
  • 10.
  • 11.
  • 12. ISO <According to our friends at ISO27kfaq >
  • 13. PCI PCI is certainly not a strategy One of PCI’s biggest criticisms: “ It is too prescriptive ” Is one of its biggest strengths… PCI is, at its heart, basic housekeeping Not New Not Complicated Not Rocket Science <and, as we all know, not a guarantee> PCI is a list of procedures and explicit instructions implementable by a decent IT security practitioner and/or competent engineers/sysadmins and relatively easily verifiable
  • 14.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Dear Mr. Retail Director , wish to speak with you about PCI DSS, the Data Security Standard … Wait a minute, let me get the IT guys on the phone … Dear Ms. Risk Manager , wish to discuss our Certificate of Compliance – Wait a minute, let me call the auditors … Dear Mssr. Regional Store Manager , we need to discuss Requirement 12 : Maintain a policy that addresses information security for employees and contractors , Section 12.3.10 when accessing cardholder data via remote access technologies – Wait a minute, let me get a pillow … Where is the business?
  • 21. … An uncomfortable discussion with the Vice President of Audit … … an even more uncomfortable meeting with the Enterprise Risk Manager … … Meeting with a fifth generation billionaire chairman emeritus business owner … Where is the business?
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.