 Hi, I'm Patty Donovan, the Vice President of Membership and Events at the Open Group, and I am here in Taipei, Taiwan, with Jim Hytella, our VP of Security. Jim, I had a lot of highlights from the week, but I'd like to know what, in particular, were some of your highlights. I noticed there were a lot of security forum folks here, and that's a great thing. Yeah, so we had – we did a security track here, and kind of the highlights of it. We had a fellow by the name of Anthony Lai, who came here from Hong Kong, and he's spoken at conferences like Black Hat and DEF CON in the U.S. He's a well-known security researcher, and he gave an interesting presentation on the advance persistent threat, and some of his research has looked at where does it actually come from. So he collects samples of attacks on specific companies and can track them back to clusters of attackers in different parts of the world. So a fascinating presentation that looked at kind of where the advance persistent threat really emanates from, so that was definitely a highlight. And then we also had a presentation from Steve Whitlock at Boeing, who talked about kind of what's broken in the current internet today and what enterprises need to do from a security standpoint looking forward. So kind of one of the best practices, things that they need to do, and really that the industry needs to do to enhance security for companies. And then the third presentation that was a part of that track was from Dennis Taylor at NASA. He and Steve are both long-time security form members, and Dennis gave a great presentation on what NASA has done around identity and access management and enabling smart cards and biometrics and things in the NASA network. So those were really the highlights here in Taipei from a security standpoint. That's great. You know, one of the buzzwords I've heard recently is hacktivism. Person doesn't know anything about hacktivism is me. Can you tell me a little bit about hacktivism and what we have planned coming up in San Francisco? Sure. So hacktivism is really a pretty recent term and phenomenon that really talks to using hacking to achieve social means and activism, hence the kind of hacking and activism. We thought it'd be interesting given the rise of hacktivism out there in the world with anonymous doing attacks on different organizations for social purposes. Is this like what happened in BART, the Bay Area Rapid Transit in San Francisco? Exactly. Right, okay. So using hacking to try and propagate some sort of social agenda. We thought it'd be interesting to invite a well-known speaker to our San Francisco conference. So we've invited Joe Mann, who's the author of a book called Fatal System Error, a pretty well-known and popular book in the Information Security Community that looked at Russian cybercriminals and their impact on various things. So he actually tracked attacks out of Russia and some of the things there with a UK police officer who went to Russia to try and arrest cybercriminals there. He's recently done kind of an in-depth study on anonymous and what's happened in the hacktivism world. So we thought it'd be a great speaker to come in San Francisco and talk about this trend and then we have another agenda on the conference in San Francisco to look at what can organizations do to protect themselves from hacktivism and these sorts of attacks. That sounds great. You've got a lot of good stuff going on. Another thing that I'd like to have you explain or talk to us about is Togaf and SABSA White Paper. I know you've been working on it for a while, so can you tell us a little bit about that? Sure, yeah. So in the Rome meeting, which is now, I guess, a year and a half ago, folks from the SABSA Institute approached the open group about doing a paper and an effort to help align Togaf, which is a popular enterprise architecture development methodology, with SABSA, which is a secure architecture development methodology. So what they were seeing and what some of our members also were seeing was, in some organizations, Togaf being used to develop enterprise architectures and SABSA being used independently to do security architecture development. And an obvious thing would be to try and make these things work well together so that practitioners of Togaf could plug in SABSA very easily and use artifacts from one with the other. So we've had an 18-month effort with folks from the SABSA Institute who owned the SABSA Intellectual Property methodology with some of the security form and architecture form members to bring that product to market. That's great, because that's taking a project and involving a lot of members from and across forums and things, so that sounds great. Yeah, and even outside of the open group. Right. And other organizations and the group worked very well together and produced a really valuable piece of work. Right. When's that going to be ready? Is it ready now? It is ready now. It's on the website and there'll be a press release about it next week, I think. You've got a lot of good stuff going on, Jim. Yeah. Great. Thank you. All right.