Again, there were five streams of work, as I mentioned earlier, that were related to vulnerability management, privacy, the cloud, incident response and secure development practices, and each of those—
Partner and National Leader, Cybersecurity, KPMG
Again, there were five streams of work, as I mentioned earlier, that were related to vulnerability management, privacy, the cloud, incident response and secure development practices, and each of those—
See context to find out what was said next.