Hacking Point of Sale:
How Everyone Can Learn from the Compromise of Mega Retailers
WITH SLAVA GOMZIN, SECURITYAND PAYMENTS TECH., HP
AND KEN WESTIN, PRODUCT MARKETING MANAGER, TRIPWIRE
How Everyone Can Learn from the Compromise of Mega Retailers
Slava Gomzin, CISSP. PCIP, ECSP, Security+
Security and Payments Technologist, HP
 What’s happened at Target
 How PCI failed to protect them
 What can be done to avoid the breach
 Q&A
Hacking Point of Sale
Network IDS/IPS (Intrusion
Detection/Prevention System)?
Antivirus?
Security/IT personnel?
Credit Card Security Pattern
Recognition System?
FBI cyber crime division?
Payment Processor?
File Integrity Monitor?
Brian Krebs
Journalist, blogger,
KrebsOnSecurity.com
40 million – The number of credit and
debit cards thieves stole from Target
between Nov. 27 and Dec. 15, 2013.
70 million – The number of records
stolen that included the name, address,
email address and phone number of
Target shoppers.
46 – The percentage drop in profits at
Target in the fourth quarter of 2013,
compared with the year before.
200 million – Estimated dollar cost to
credit unions and community banks
for reissuing 21.8 million cards — about
half of the total stolen in the Target
breach.
100 million – The number of dollars
Target says it will spend upgrading their
payment terminals to support Chip-and-
PIN enabled cards.
The attackers were able to infect Target’s point-of-sale registers with a
malware strain that stole credit and debit card data. The intruders also set up a
control server within Target’s internal network that served as a central
repository for data hovered up from all of the infected registers.
POS/PA must “touch” the memory and the hard drive of hosting POS machine
in order to process transaction data
POS must communicate with outside world to get authorizations
and process settlements
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
PCI DSS
PCI Data Security
Standard
PTS
PIN Data Security
PCI P2PE
PCI Point-to-Point
Encryption
PA-DSS
Payment Application
Data Security
Standard
Hacking Point of Sale
1
1.1
1.2 1.2.1
2.0
3
2005 2006 2007 2008 2009 2010 2011 2012 2013
0
10
20
30
40
50
60
70
80
90
2005 2006 2007 2008 2009 2010 2011 2012
Source: Privacy Rights Clearinghouse
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
 There is no reliable software technology today that would easily
resolve Memory Scraping problem without investing in new systems
which introduce new protection methods such as encrypting the data
end to end. Therefore, payment software vendors are currently not
obligated by PCI standards to protect the memory of their
applications.
 Instead, the merchants—users of the software—are obligated to protect
the memory of their computers running such applications by
implementing different types of compensating mechanisms, such as
physical and network controls listed in PCI DSS requirements.
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Server
HSM
POS/Payment
application
PED/MSR with
TRSM
Internet
Server Database
LMK
BDK
IPEK
SSL
SSL
Hacking Point of Sale
By the end of 2015, 70% of U.S. credit cards and 41% of U.S. debit cards will be EMV enabled -
according to Aite Group report
 PCI Audit Relief
 PCI audit relief is applicable if 75 percent or more of the merchant transactions are captured at
hybrid EMV terminals (supporting both contact and contactless interfaces). Even if the majority
of transactions are from magnetic stripe-only cards, if they are performed at hybrid EMV
terminals the relief is applicable
 PCI Audit Relief Dates:
 Visa, Amex: October 2013
 MC: October 2012
 Liability Shift
 The party, either the issuer or merchant, who does not support EMV, assumes liability for
counterfeit card transactions.
 Liability Shift Dates:
 Visa, MC, Amex, Discover: October 2015
 October 2017 – for automated fuel dispensers (gas stations)
 EMV does not provide security for online transactions
 EMV card number should be keyed for Internet purchase
 EMV does not require data encryption
 Data is still transferred in clear text between POS and Payment Processor
 P2PE is still recommended to protect the data
 EMV cards still have mag stripe for fallback processing
 Card data can be stolen
 EMV vulnerabilities will be exploited once US adopts EMV Cards
 Currently, there is no need to hack EMV because there is mag stripe in the US
 There are EMV Contactless vulnerabilities already demonstrated on security conferences
Hacking Point of Sale
Hacking Point of Sale
LOG
INTELLIGENCE
SECURITY
CONFIGURATION
MANAGEMENT
VULNERABILITY
MANAGEMENT
Unified
Security
Intelligence
VULNERABILITY DATA
HOSTS & SERVER
DATABASE ACTIVITY
USER ACTIVITY
CONFIGURATION DATA
SECURITY DEVICES
(IDS – FIREWALLS)
ACTIVE DIRECTORY
APP ACTIVITY
PHYSICAL ACCESS
ACTIONABLE INTELLIGENCE
ANALYTICS, FORENSICS & COMPLIANCE
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Hacking Point of Sale
Breach caught before exfiltration
of any credit card data!
Hacking Point of Sale
Hacking Point of Sale



More Related Content

PDF
Payment trend scouting - Kurt Schmid, Netcetera
PDF
The Path to Payment Security
PDF
EMV Secure Remote Commerce (SRC)
PDF
Digital Payments - Netcetera Innovation Summit 2018
PDF
Digital Payment and 3-D Secure by Netcetera
PDF
Digital Payment in 2020 - Kurt Schmid, Netcetera
PDF
Digital Payment Quo Vadis
PDF
Merchant tokenization and EMV® Secure Remote Commerce
Payment trend scouting - Kurt Schmid, Netcetera
The Path to Payment Security
EMV Secure Remote Commerce (SRC)
Digital Payments - Netcetera Innovation Summit 2018
Digital Payment and 3-D Secure by Netcetera
Digital Payment in 2020 - Kurt Schmid, Netcetera
Digital Payment Quo Vadis
Merchant tokenization and EMV® Secure Remote Commerce

What's hot (20)

PDF
Increase conversion, convenience and security in e-commerce checkouts - Silke...
PDF
The Future of Payments
PDF
key-trends-in-merchant-security
PDF
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
PDF
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
PPTX
Requirement of PCI DSS in India.
PPTX
3-D Secure 2.0
PPTX
Sgsits cyber securityworkshop_4mar2017
PPTX
Payment Card Industry Adjudication Process
PDF
Multiple tokenization schemes meet the merchant
PDF
Seamless 3-D Secure e-commerce experience
PDF
figo at API Days 2016 in Paris
PPTX
So you want to be an EMV Issuer...
PPTX
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
PDF
Secure ip payment networks what's available other than ssl - final
PDF
Secure payments slick
PDF
Mark Buitenhek, 5th Digital Banking Forum
PPTX
Thoughts on the Future of Payments
PDF
Payment Gateway
PPT
Contactless Payment Pp
Increase conversion, convenience and security in e-commerce checkouts - Silke...
The Future of Payments
key-trends-in-merchant-security
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
Requirement of PCI DSS in India.
3-D Secure 2.0
Sgsits cyber securityworkshop_4mar2017
Payment Card Industry Adjudication Process
Multiple tokenization schemes meet the merchant
Seamless 3-D Secure e-commerce experience
figo at API Days 2016 in Paris
So you want to be an EMV Issuer...
apidays LIVE LONDON - Open Banking from incumbent bank point of view - succes...
Secure ip payment networks what's available other than ssl - final
Secure payments slick
Mark Buitenhek, 5th Digital Banking Forum
Thoughts on the Future of Payments
Payment Gateway
Contactless Payment Pp

Viewers also liked (15)

PDF
PCI-DSS Security Awareness
PPTX
Credit fraud prevention on hwx stack
PPT
Data Breach Prevention - Start with your POS Terminal!
PPTX
Cashier's pci security training
PDF
Five mobile security challenges facing the enterprise
PPTX
Eight Months of EMV: Early Fraud Shifts and Trajectory
PDF
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
PDF
Protect Your SMB from Payment Security Breaches
PDF
7 Ways to Make EMV Easier / Webinar
PDF
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PPTX
OTI Cyber warefare
PDF
Robert lewis 4.4_ppp_slideshow_final
KEY
Computer crime hacking
PPTX
In the Line of Fire - The Morphology of Cyber-Attacks
PPTX
Stuxnet worm
PCI-DSS Security Awareness
Credit fraud prevention on hwx stack
Data Breach Prevention - Start with your POS Terminal!
Cashier's pci security training
Five mobile security challenges facing the enterprise
Eight Months of EMV: Early Fraud Shifts and Trajectory
NTXISSACSC3 - EMV and the Future of Payments by Branden Williams
Protect Your SMB from Payment Security Breaches
7 Ways to Make EMV Easier / Webinar
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
OTI Cyber warefare
Robert lewis 4.4_ppp_slideshow_final
Computer crime hacking
In the Line of Fire - The Morphology of Cyber-Attacks
Stuxnet worm

Similar to Hacking Point of Sale (20)

PDF
Point sale-pos-systems-security-35357
PPTX
The Target Breach - Follow The Money EU
PDF
The Target Breach – Follow The Money
DOCX
Target@ Data Breach2edit
PPT
PCI Compliance Seminar
PDF
PCI Compliance Report
PDF
The good, the bad and the ugly of the target data breach
PDF
Evolve Pci Compliance
PPTX
Payment Card Industry Introduction 2010
PPTX
Introduction to PCI APR 2010
PDF
Attacks on Point of Sale systems - By Symantec
PDF
Attacks on Point-of-Sales Systems | RapidSSLonline
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PPT
New technology, revolutionising the same old motives
PPT
PCI DSS
PDF
1. PCI Compliance Overview
PPTX
Trends in electronic crimes and its impact on businesses like yours
PPTX
Payment Card Industry Security Standards
PPTX
PCI Compliance Myths, Reality and Solutions for Retail
DOCX
A Case Study on Payment Card Industry Data Security Standards
Point sale-pos-systems-security-35357
The Target Breach - Follow The Money EU
The Target Breach – Follow The Money
Target@ Data Breach2edit
PCI Compliance Seminar
PCI Compliance Report
The good, the bad and the ugly of the target data breach
Evolve Pci Compliance
Payment Card Industry Introduction 2010
Introduction to PCI APR 2010
Attacks on Point of Sale systems - By Symantec
Attacks on Point-of-Sales Systems | RapidSSLonline
The Easy WAy to Accept & Protect Credit Card Data
New technology, revolutionising the same old motives
PCI DSS
1. PCI Compliance Overview
Trends in electronic crimes and its impact on businesses like yours
Payment Card Industry Security Standards
PCI Compliance Myths, Reality and Solutions for Retail
A Case Study on Payment Card Industry Data Security Standards

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Co-training pseudo-labeling for text classification with support vector machi...
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Custom Battery Pack Design Considerations for Performance and Safety
sustainability-14-14877-v2.pddhzftheheeeee
Module 1 Introduction to Web Programming .pptx
Flame analysis and combustion estimation using large language and vision assi...
Lung cancer patients survival prediction using outlier detection and optimize...
Comparative analysis of machine learning models for fake news detection in so...
4 layer Arch & Reference Arch of IoT.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Advancing precision in air quality forecasting through machine learning integ...
sbt 2.0: go big (Scala Days 2025 edition)
Microsoft User Copilot Training Slide Deck
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
Co-training pseudo-labeling for text classification with support vector machi...
Basics of Cloud Computing - Cloud Ecosystem
future_of_ai_comprehensive_20250822032121.pptx
Rapid Prototyping: A lecture on prototyping techniques for interface design
AI.gov: A Trojan Horse in the Age of Artificial Intelligence

Hacking Point of Sale

  • 1. Hacking Point of Sale: How Everyone Can Learn from the Compromise of Mega Retailers WITH SLAVA GOMZIN, SECURITYAND PAYMENTS TECH., HP AND KEN WESTIN, PRODUCT MARKETING MANAGER, TRIPWIRE
  • 2. How Everyone Can Learn from the Compromise of Mega Retailers Slava Gomzin, CISSP. PCIP, ECSP, Security+ Security and Payments Technologist, HP
  • 3.  What’s happened at Target  How PCI failed to protect them  What can be done to avoid the breach  Q&A
  • 5. Network IDS/IPS (Intrusion Detection/Prevention System)? Antivirus? Security/IT personnel? Credit Card Security Pattern Recognition System? FBI cyber crime division? Payment Processor? File Integrity Monitor? Brian Krebs Journalist, blogger, KrebsOnSecurity.com
  • 6. 40 million – The number of credit and debit cards thieves stole from Target between Nov. 27 and Dec. 15, 2013. 70 million – The number of records stolen that included the name, address, email address and phone number of Target shoppers. 46 – The percentage drop in profits at Target in the fourth quarter of 2013, compared with the year before. 200 million – Estimated dollar cost to credit unions and community banks for reissuing 21.8 million cards — about half of the total stolen in the Target breach. 100 million – The number of dollars Target says it will spend upgrading their payment terminals to support Chip-and- PIN enabled cards.
  • 7. The attackers were able to infect Target’s point-of-sale registers with a malware strain that stole credit and debit card data. The intruders also set up a control server within Target’s internal network that served as a central repository for data hovered up from all of the infected registers.
  • 8. POS/PA must “touch” the memory and the hard drive of hosting POS machine in order to process transaction data
  • 9. POS must communicate with outside world to get authorizations and process settlements
  • 15. PCI DSS PCI Data Security Standard PTS PIN Data Security PCI P2PE PCI Point-to-Point Encryption PA-DSS Payment Application Data Security Standard
  • 17. 1 1.1 1.2 1.2.1 2.0 3 2005 2006 2007 2008 2009 2010 2011 2012 2013
  • 18. 0 10 20 30 40 50 60 70 80 90 2005 2006 2007 2008 2009 2010 2011 2012 Source: Privacy Rights Clearinghouse
  • 22.  There is no reliable software technology today that would easily resolve Memory Scraping problem without investing in new systems which introduce new protection methods such as encrypting the data end to end. Therefore, payment software vendors are currently not obligated by PCI standards to protect the memory of their applications.  Instead, the merchants—users of the software—are obligated to protect the memory of their computers running such applications by implementing different types of compensating mechanisms, such as physical and network controls listed in PCI DSS requirements.
  • 30. By the end of 2015, 70% of U.S. credit cards and 41% of U.S. debit cards will be EMV enabled - according to Aite Group report  PCI Audit Relief  PCI audit relief is applicable if 75 percent or more of the merchant transactions are captured at hybrid EMV terminals (supporting both contact and contactless interfaces). Even if the majority of transactions are from magnetic stripe-only cards, if they are performed at hybrid EMV terminals the relief is applicable  PCI Audit Relief Dates:  Visa, Amex: October 2013  MC: October 2012  Liability Shift  The party, either the issuer or merchant, who does not support EMV, assumes liability for counterfeit card transactions.  Liability Shift Dates:  Visa, MC, Amex, Discover: October 2015  October 2017 – for automated fuel dispensers (gas stations)
  • 31.  EMV does not provide security for online transactions  EMV card number should be keyed for Internet purchase  EMV does not require data encryption  Data is still transferred in clear text between POS and Payment Processor  P2PE is still recommended to protect the data  EMV cards still have mag stripe for fallback processing  Card data can be stolen  EMV vulnerabilities will be exploited once US adopts EMV Cards  Currently, there is no need to hack EMV because there is mag stripe in the US  There are EMV Contactless vulnerabilities already demonstrated on security conferences
  • 35. VULNERABILITY DATA HOSTS & SERVER DATABASE ACTIVITY USER ACTIVITY CONFIGURATION DATA SECURITY DEVICES (IDS – FIREWALLS) ACTIVE DIRECTORY APP ACTIVITY PHYSICAL ACCESS ACTIONABLE INTELLIGENCE ANALYTICS, FORENSICS & COMPLIANCE
  • 40. Breach caught before exfiltration of any credit card data!

Editor's Notes

  • #13: WinHex Forensic Utility
  • #14: WireShark Network Sniffer
  • #35: Combining log intelligence, vulnerability data and security configuration information, we are then able to answer key security questions important to the business, for true security intelligence. Instead of simply providing reports we are able to answer specific questions with confidence, such as what systems are vulnerable, what systems are being attacked, which have already been compromised, which should we fix first, have we seen this before, when was it in a trusted state.
  • #36: The basic idea of log intelligence is to make sense of the seemingly disparate events that are happening in your environment. <change slide> Usually this consists of log data from user systems, security devices, applications and other sources <change slide> In addition to this data, Tripwire also brings in additional layers of information including data from our Vulnerability Management solution as well as Security Configuration data. We are able then to correlate events, vulnerabilities and system state which provides higher resolution and business context around what is happening in your environment. <change> Through our powerful integrated correlation engine we provide actionable real-time intelligence which can trigger alerts, or actions such as automated remediation, or work with additional tools such as our certified integration with ArcSight, or a number of our other Technology Alliance Partners and other systems. <change> Tripwire also provides secure archives of this data paired with powerful security analytics and forensics tools for security and compliance.
  • #37: The fact they did not have the network their vendors had access separated from their POS is troubling. Additionally they should have had logging in place to monitor and keep track of vendor activitiy on their network. With Tripwire Log Center we have rules out of the box that helps organizations monitor user activity closely on the network and correlate events across the network. Tripwire IP360 is our vulnerability management solution that is used by organizations to monitor and track where their systems are weak.
  • #38: Hypothetical Target Attack – post on our blog in December before the breach was discovered. Important to cathc attackers in the act. When can you catch them and where is your best chance. Recon, enumeration. In this case they found an HVAC vendor with access to target. Small chance to detect at the recon phase. Exploitation and entrechment: 2 weeks they could exfiltrate data, greater and greater chance of catching them Then they will cover their tracksif they are a good attacker
  • #40: Loaded a piece of malware onto a patch server, distributed to 1,800 stores across north america, 30 POS Malware pulled the credit card data out of memory, but it was updating a file share 40 million credit cards Online Retailer: Plagued by outages on their webservers Security story: SQL injection at department store, batch file. Automated cyber-security intelligence, including: Security gap analysis Proof of compliance Executive reports for risk and compliance trending. Sharing the techniques to: Eliminate security gaps Become compliant Improve risk ratings Automated Remediation: Fix compliance issues with the push of a button Approval workflows Device Support: “You can go big with TW” – think enterprise with us.
  • #41: 50K devices being changed n black Friday. A lot of file integrity monitoring solutions simply run a scan at a set interval, some even a month apart. Continuous monitoring is critical in retail given the velocity and change Everytime a cards was swiped they could have detected. Configured to no create fileshares the data could not have been exfiltrated. It took 7 days for them to send this infomation, they could have caught it in 6 days and would have avoided the breach. We would have caught it in the first credit card swipe. Online Retailer: Plagued by outages on their webservers Security story: SQL injection at department store, batch file. Automated cyber-security intelligence, including: Security gap analysis Proof of compliance Executive reports for risk and compliance trending. Sharing the techniques to: Eliminate security gaps Become compliant Improve risk ratings Automated Remediation: Fix compliance issues with the push of a button Approval workflows Device Support: “You can go big with TW” – think enterprise with us.
  • #43: Thank you for your questions Thanks again to Charles Kolodgy from IDC for joining us today and sharing his thoughts on Vulnerability Management, and thanks to all of you for attending. We hope that you found the presentation informative and interesting. Remember to rate and comment on this webcast, in the Ratings section. And be on the lookout for an email from me with the on-demand link to this event. Have a great week!