%PDF-1.5
%
1 0 obj
<>
endobj
2 0 obj
<>stream
A Competitive and Innovative Cybersecurity Industry
cybersecurity
industrial policy
cPPP
endstream
endobj
3 0 obj
<>/Metadata 2 0 R>>
endobj
4 0 obj
<>
endobj
7 0 obj
<>/XObject<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/MediaBox[0 0 595.38 841.92]/Contents 27 0 R/Group<>/Tabs/S/StructParents 0>>
endobj
27 0 obj
<>stream
xOk@hBDMBJzĪM۽w5meaaǛ|us:_HiҞ4<tUum#$%F9\F<i>1kQjGV8:
Z4Z7hɈӃa$yjW>QaD-|(q+:I2]ʁԎtn#'s&}ʚ
ߣgn&FI<۶m0%܇܀h\̇y`|6`wP+}݁H_%
endstream
endobj
22 0 obj
<>
endobj
28 0 obj
<>
endobj
23 0 obj
<>
endobj
30 0 obj
<>
endobj
24 0 obj
<>/ExtGState<>/XObject<>>>/BBox[0 0 455.31 351.77]/Matrix[0.15813 0 0 0.20468 0 0]/Filter/FlateDecode/Length 862>>stream
xWMsHS&ƚ#Y#[+C*_tp T7a=3|RHy21\ZPFp`=|~U $=ȝDR@~M;]"T~ߐFɇ~qF_ꞱRx%y D? B&2X!E캸
+x-W>lB)2M<#`?U-7ahtrT2aYFd}܊68WMws撌NI!>\8`mZlC"I
%X
iRU`p
aRŊ.h2SF>~bXmE
qR.ENc͔pZ0<أ~ɭ~~y2sC,* fa̦S6I6C*F4NCx.
#g2L[Fc3&>3\r\y #탬&c>aաZr!(T@6ϋvaólڡAbjh)ÞBeKۉa;5bC1?<;Qw("l6NH)թ>^q|q`]ww駧U\yCZ}ixCfsW傂SΗUE˫59
[mEbPmwe)z^@e~+fwqs3yn,^EcmEnkHԊϋ-^zVVe,+ҢZ(jWlrW{-?fZDڲҹڬZb 6ng--ת-t}RN҃
endstream
endobj
25 0 obj
<>
endobj
26 0 obj
<>
endobj
32 0 obj
<>
endobj
36 0 obj
<>
endobj
35 0 obj
<>stream
x} $Uno *xpy<d[GPO\7D@GPGDZFGTe7>0<}}ܳ2捈Ȍ8Ȉ79瞥脣Ǐ'IG1J+++jB#&ɔV{#P8FM49aA`VjjD#&*;cc vfUhф`8@FETZhQRt͖)v h=4 j//sJE =jG#&N'"=
@|4h"(Dp=
`(?v[AiT,VK༠ڃH#5Z2Mԉ- \f7F')|ǏW{,x")զ4H{}~j;b.ƁX<4hDԙആ
Nπ9]VW{ti4>dGg\fTcH4h4Xpy<'MFZ '"aw{8dFꍆ~ވIlc r:K$0π >i4Xb`o"tObL@ ^\&jiQA:7 6Y~wC!N`dƄC!QP(F)OXNl\^|bqKuj
CPF)IBx&w#;1rRVT$ ''鯷À @$F8;+Oim%N4"}da{~Iw_._86[KKI;0-N
O;щC<8#@b4$2\јɔHZUI#@")ht#TJz~ii ٹ ^TRZJ6-KRz6^{B9 .fX=Z 2 adJZ+++/kNoTydbB2 wFIDR8 ])ɴXr;>(
ࢤJ|Ҕ4ں$6[V@ˤk uςwUBy*e1 DH UFGzd IR9g *gIl.'´0OkK&43U,,H缅csi' ͟h`P|"P**Mhjy^zC!HcL;\$IU=n"iMIj.ryL۾u`4ɝ}=2mn4zjWra`5%AkgdP`
͖RI6O(;o2! 1 NwQfu"g鋝"fh.AB2rPw|r
| )r^D.OB|HM6,&h&E! 'Ë'@Q(tHaviV4LB"V!q5[nQx_2ZKͅBڗi
&$ZظjId3W.W D\{<מTbӋy?jR|/i4 =Pj֧ΰ=$wq":V#?QIeXׅrNTW0KabXbFA