Suche senden
Hochladen
Security Awareness in the Enterprise
•
14 gefällt mir
•
1,317 views
A
amiable_indian
Folgen
Security Awareness in the Enterprise
Weniger lesen
Mehr lesen
Technologie
Bildung
Diashow-Anzeige
Melden
Teilen
Diashow-Anzeige
Melden
Teilen
1 von 25
Empfohlen
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
Chandra Sekhar Tondepu
Cyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and Governance
Srinidhi Aithal
Building an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
Cyber security framework
Cyber security framework
Yann Lecourt
Claranetpresentation
Claranetpresentation
des.ward
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
Tripwire
The CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT Executive
Amazon Web Services
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Empfohlen
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
Chandra Sekhar Tondepu
Cyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and Governance
Srinidhi Aithal
Building an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
Cyber security framework
Cyber security framework
Yann Lecourt
Claranetpresentation
Claranetpresentation
des.ward
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
Tripwire
The CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT Executive
Amazon Web Services
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
Ravila White
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
Information security governance
Information security governance
Koen Maris
Information Security Project
Information Security Project
novemberchild
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
ciso_insights
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
Craig Miller
Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
edcervantes
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
PECB
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
A2 ICT Policies
A2 ICT Policies
Ben Williams
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial Sector
Eversheds Sutherland
Sustainable Development 2.0 Governance
Sustainable Development 2.0 Governance
sean.mcclowry
It alignment-who-is-in-charge
It alignment-who-is-in-charge
Tapas Bhattacharya
Cybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
The C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defense
The Economist Media Businesses
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
Trustwave
Iso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
Weitere ähnliche Inhalte
Was ist angesagt?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
Ravila White
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
Information security governance
Information security governance
Koen Maris
Information Security Project
Information Security Project
novemberchild
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
ciso_insights
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
Craig Miller
Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
edcervantes
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
PECB
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
A2 ICT Policies
A2 ICT Policies
Ben Williams
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial Sector
Eversheds Sutherland
Sustainable Development 2.0 Governance
Sustainable Development 2.0 Governance
sean.mcclowry
It alignment-who-is-in-charge
It alignment-who-is-in-charge
Tapas Bhattacharya
Cybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
The C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defense
The Economist Media Businesses
Was ist angesagt?
(20)
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Information security governance
Information security governance
Information Security Project
Information Security Project
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
Infocon Bangladesh 2016
Infocon Bangladesh 2016
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
A2 ICT Policies
A2 ICT Policies
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial Sector
Sustainable Development 2.0 Governance
Sustainable Development 2.0 Governance
It alignment-who-is-in-charge
It alignment-who-is-in-charge
Cybersecurity in the Boardroom
Cybersecurity in the Boardroom
The C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defense
Andere mochten auch
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
Trustwave
Iso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Eric Vanderburg
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
Stephen Cobb
Information security policy_2011
Information security policy_2011
codka
Information security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Atlantic Training, LLC.
Security Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
End User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
INFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
Andere mochten auch
(12)
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
Iso 27001 awareness
Iso 27001 awareness
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
Information security policy_2011
Information security policy_2011
Information security: importance of having defined policy & process
Information security: importance of having defined policy & process
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Security Awareness Training by Fortinet
Security Awareness Training by Fortinet
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
End User Security Awareness Presentation
End User Security Awareness Presentation
INFORMATION SECURITY
INFORMATION SECURITY
Ähnlich wie Security Awareness in the Enterprise
Rothke Patchlink
Rothke Patchlink
Ben Rothke
Security policy.pdf
Security policy.pdf
Md. Sajjat Hossain
Business information security requirements
Business information security requirements
gurneyhal
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
Sem 001 sem-001
Sem 001 sem-001
SelectedPresentations
BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdf
Amb Steve Mbugua
Information Security and your Business
Information Security and your Business
CyberCon Security Solutions, LLC
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
Proactive information security michael
Proactive information security michael
Priyanka Aash
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
Creating a security culture 4
Creating a security culture 4
Robin Patras
Organizational Security: When People are Involved
Organizational Security: When People are Involved
Social Media Performance Group
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
infosec train
3.5 ICT Policies
3.5 ICT Policies
mrmwood
How to Choose the Right Security Training for You
How to Choose the Right Security Training for You
Cigital
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
Testing
Testing
lorenceman
Ähnlich wie Security Awareness in the Enterprise
(20)
Rothke Patchlink
Rothke Patchlink
Security policy.pdf
Security policy.pdf
Business information security requirements
Business information security requirements
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
Sem 001 sem-001
Sem 001 sem-001
BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdf
Information Security and your Business
Information Security and your Business
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Proactive information security michael
Proactive information security michael
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
Creating a security culture 4
Creating a security culture 4
Organizational Security: When People are Involved
Organizational Security: When People are Involved
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
3.5 ICT Policies
3.5 ICT Policies
How to Choose the Right Security Training for You
How to Choose the Right Security Training for You
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Testing
Testing
Mehr von amiable_indian
Phishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
amiable_indian
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
Secrets of Top Pentesters
Secrets of Top Pentesters
amiable_indian
Workshop on Wireless Security
Workshop on Wireless Security
amiable_indian
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
Workshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
Reverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
State of Cyber Law in India
State of Cyber Law in India
amiable_indian
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
amiable_indian
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
amiable_indian
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
amiable_indian
Reverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
Hacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
Web Exploit Finder Presentation
Web Exploit Finder Presentation
amiable_indian
Network Security Data Visualization
Network Security Data Visualization
amiable_indian
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian
What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian
Mehr von amiable_indian
(20)
Phishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
Secrets of Top Pentesters
Secrets of Top Pentesters
Workshop on Wireless Security
Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Workshop on BackTrack live CD
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
Reverse Engineering for exploit writers
State of Cyber Law in India
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
Reverse Engineering for exploit writers
Reverse Engineering for exploit writers
Hacking Client Side Insecurities
Hacking Client Side Insecurities
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Network Security Data Visualization
Network Security Data Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?
What are the Business Security Metrics?
Kürzlich hochgeladen
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Kürzlich hochgeladen
(20)
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Security Awareness in the Enterprise
1.
Security Awareness in
the Enterprise Jacob D. Furst Jean-Philippe Labruyere 22 March 2006
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.