SecurDigital is a company that develops secure communication software called Secur Voice. Secur Voice allows encrypted voice, data, and video transmission between any devices. It is independent of operating systems, platforms, devices, and carriers. SecurDigital aims to provide highly scalable and affordable secure communication solutions to industries such as healthcare, banking, and government.
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
Near Field Communication (NFC): NFC is in its most common avatar is a Tap & Pay solution that can be used for retail
offline payments, transit, entertainment and numerous other touch points. Any unattended payment situation such
as a parking lot presents huge opportunity. For e.g., clipper card or any cashless cards being used today for public
transport can be integrated into the ubiquitous phones itself thereby making the public transport payments easier
We are an India based Company made up of Security Professionals representing a wide range of the highest quality products and services from a number of countries
We are an India based Company made up of Security Professionals representing a wide range of the highest quality products and services from a number of countries
This presentation was delivered at the HCE+Tokenization Summit Amsterdam by Alexander Rensink, Vice Chairman of NFC Forum.
Presentation reviews:
- NFC and the Connected World
- Latest Market Developments
- HCE in Action
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
Near Field Communication (NFC): NFC is in its most common avatar is a Tap & Pay solution that can be used for retail
offline payments, transit, entertainment and numerous other touch points. Any unattended payment situation such
as a parking lot presents huge opportunity. For e.g., clipper card or any cashless cards being used today for public
transport can be integrated into the ubiquitous phones itself thereby making the public transport payments easier
We are an India based Company made up of Security Professionals representing a wide range of the highest quality products and services from a number of countries
We are an India based Company made up of Security Professionals representing a wide range of the highest quality products and services from a number of countries
This presentation was delivered at the HCE+Tokenization Summit Amsterdam by Alexander Rensink, Vice Chairman of NFC Forum.
Presentation reviews:
- NFC and the Connected World
- Latest Market Developments
- HCE in Action
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive
Identive has announced that it has signed a distribution agreement with Avnet Electronics Marketing Americas, a business region of Avnet, Inc. (NYSE: AVT). The agreement provides Avnet's customers with access to Identive's broad range of RFID and NFC readers and embedded modules, in addition to an extensive array of RFID/NFC passive transponders and tags. Identive's RFID and NFC products enable a wide range of contactless applications including access, payment, ticketing and asset tracking.
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
Left without intervention, mobile money transfers of various forms will continue to proliferate, and product innovation will continue, albeit at different rates and in different directions around the world. Global interoperability, however, would offer significant value to customers and ensure the mobile ecosystem delivers value and scale into this service.
This course will describe by placing mobile operators at the heart of remittances, Mobile Money Transfer has the potential to catalyze the whole mobile financial services market, incorporating mobile payments, mobile banking and mobile transfers.
Mobile Money Business Track: understanding the Model and Market (1 day)
=================================================
Accessing Pay Buy Mobile Model
- NFC M-Payment services
- Proposition
- Ecosystem and Value chain
- Pay-Buy-Mobile Business Models
- Mobile NFC Technical Guidelines
Accessing Mobile Money Transfer
- Introduction to the Remittance Market
- The Opportunity for Mobile in Money Transfer
- Mobile Money Transfer as a Mobile Financial Services Market Catalyst
- Mobile Banking Vendor Analysis
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
NFC, the intuitive contactless technology is finding its way into more and more mobile phone devices. NFC stands for Near Field Communication and is a contactless technology gearing to massively ease information gathering and content sharing. It's very easy to use and allows short range, point to point communication between NFC enabled devices as well as access to content on passive tags and cards. The presentation will focus to provide a technology introduction, some hints on already available applications with a life demonstration of the technology. We will discuss the use cases driving the technology, the level of NFC integration in Android. The NCF API and it's classes will be presented and last but not least we plan to run a little life coding session to show how easy applications can be enabled and can benefit from NFC.
Near field communications (or NFC) is the latest buzz word to hit the marketing community. Now it may be a powerful new direct mail tool. Here we'll explore the pros and cons of NFC for direct mail.
What is a Trusted Service Manager?
A Trusted Service Manager (TSM) plays a vital role in the Near Field Communication (NFC) ecosystem.
A TSM acts as a trusted middle- man within the deployment of mobile payments:
1. Coordinating technical and business relationships of multiple stakeholders: mobile network operators (MNO), banks and other service providers (SP).
2. Securely installing and personalizing applications on the Secure Element (SE).
3. Handling banking and mobile security and securing consumer information.
4. Performing lifecycle management tasks for installed applications.
5. Securely generating, managing and distributing cryptographic keys
TSM models
An SP communicates with an MNO to add an application on an NFC device.
But the reality is more complex.
Utopian NFC ecosystem with one TSM.
Different organisation see themselves as TSM and no single organisation is trusted by everyone.
One TSM creates ownership issues regarding relationships and data.
Current NFC ecosystem: Root TSM and SP TSM model
A Root TSM - manages the Root Security Domain (SD) on the NFC device and its keys. - informs SP TSMs of key events on applications. - interacts with the phone. - interacts with service provider TSMs.
An SP TSM - provisions, manages, loads and personalises applications into the SD on behalf of SPs. - manages their own secure environment. - interacts with the phone to install and personalise services. - interacts with Root TSMs to communicate state changes of applications.
Why TSM?
1. Multiple markets becoming part of the mobile ecosystem are required to collaborate.
2. TSMs are their Single Point of Contact.
3. Markets such as payments, transit and access control need to cooperate.
4. TSMs allow stakeholders to effectively communicate and handle transactions securely with each other.
Becoming a TSM?
Service providers can keep control of their customers by becoming their own TSM.
This ensures flexibility and scalability to meet future market demands.
SE Interested in becoming a TSM? Watch our video:
David Worthington – Principle Consultant Payment & Chip Technology
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
The NFC Forum Transport SIG acts as a bridge between all transport industry stakeholders, from identifying NFC roadblocks
to enabling a seamless integration of NFC by providing all players with the information and tools they need to succeed. Significant progress has been made with harmonization efforts over the past year. This presentation by the NFC Forum Transport SIG provides an overview of where we are to date, where we are heading, and how your organization can get involved with our efforts to advance the adoption of NFC in public transport.
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
Due to the #covid19 pandemic, organizations were faced with an unprecedented, novel challenge of ensuring business continuity without endangering employee health and safety. Presenting our latest case study about how we enabled secure remote access to on-premise as well as SaaS applications for the employees of a Fortune 500 Oil and Gas firm subsidiary with minimal changes in their existing IT environment.
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
The purpose of this paper is to introduce a research proposal designed to explore the network security
issues concerning mobile devices protection. Many threats exist and they harm not only computers but
handheld devices as well. The mobility of phones and their excessive use make them more vulnerable.
The findings suggest a list of protections that can provide high level of security for new mobile devices.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
Intre noi, parintii. Seminar "Parintele adolescentului perfect" Alexandra Vasile
Seminarul "Intre noi, parintii - de vorba cu Aurora Liiceanu" din luna noiembrie 2014, o dezbaterea pe tema „Parintele adolescentului perfect” a fost in mod esential o pledoarie pentru intelegere, diversitate si respect.
Prezentare sustinuta de Simona Tofan, psihoterapeut, consultant Intre noi, parintii
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive
Identive has announced that it has signed a distribution agreement with Avnet Electronics Marketing Americas, a business region of Avnet, Inc. (NYSE: AVT). The agreement provides Avnet's customers with access to Identive's broad range of RFID and NFC readers and embedded modules, in addition to an extensive array of RFID/NFC passive transponders and tags. Identive's RFID and NFC products enable a wide range of contactless applications including access, payment, ticketing and asset tracking.
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
Left without intervention, mobile money transfers of various forms will continue to proliferate, and product innovation will continue, albeit at different rates and in different directions around the world. Global interoperability, however, would offer significant value to customers and ensure the mobile ecosystem delivers value and scale into this service.
This course will describe by placing mobile operators at the heart of remittances, Mobile Money Transfer has the potential to catalyze the whole mobile financial services market, incorporating mobile payments, mobile banking and mobile transfers.
Mobile Money Business Track: understanding the Model and Market (1 day)
=================================================
Accessing Pay Buy Mobile Model
- NFC M-Payment services
- Proposition
- Ecosystem and Value chain
- Pay-Buy-Mobile Business Models
- Mobile NFC Technical Guidelines
Accessing Mobile Money Transfer
- Introduction to the Remittance Market
- The Opportunity for Mobile in Money Transfer
- Mobile Money Transfer as a Mobile Financial Services Market Catalyst
- Mobile Banking Vendor Analysis
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
NFC, the intuitive contactless technology is finding its way into more and more mobile phone devices. NFC stands for Near Field Communication and is a contactless technology gearing to massively ease information gathering and content sharing. It's very easy to use and allows short range, point to point communication between NFC enabled devices as well as access to content on passive tags and cards. The presentation will focus to provide a technology introduction, some hints on already available applications with a life demonstration of the technology. We will discuss the use cases driving the technology, the level of NFC integration in Android. The NCF API and it's classes will be presented and last but not least we plan to run a little life coding session to show how easy applications can be enabled and can benefit from NFC.
Near field communications (or NFC) is the latest buzz word to hit the marketing community. Now it may be a powerful new direct mail tool. Here we'll explore the pros and cons of NFC for direct mail.
What is a Trusted Service Manager?
A Trusted Service Manager (TSM) plays a vital role in the Near Field Communication (NFC) ecosystem.
A TSM acts as a trusted middle- man within the deployment of mobile payments:
1. Coordinating technical and business relationships of multiple stakeholders: mobile network operators (MNO), banks and other service providers (SP).
2. Securely installing and personalizing applications on the Secure Element (SE).
3. Handling banking and mobile security and securing consumer information.
4. Performing lifecycle management tasks for installed applications.
5. Securely generating, managing and distributing cryptographic keys
TSM models
An SP communicates with an MNO to add an application on an NFC device.
But the reality is more complex.
Utopian NFC ecosystem with one TSM.
Different organisation see themselves as TSM and no single organisation is trusted by everyone.
One TSM creates ownership issues regarding relationships and data.
Current NFC ecosystem: Root TSM and SP TSM model
A Root TSM - manages the Root Security Domain (SD) on the NFC device and its keys. - informs SP TSMs of key events on applications. - interacts with the phone. - interacts with service provider TSMs.
An SP TSM - provisions, manages, loads and personalises applications into the SD on behalf of SPs. - manages their own secure environment. - interacts with the phone to install and personalise services. - interacts with Root TSMs to communicate state changes of applications.
Why TSM?
1. Multiple markets becoming part of the mobile ecosystem are required to collaborate.
2. TSMs are their Single Point of Contact.
3. Markets such as payments, transit and access control need to cooperate.
4. TSMs allow stakeholders to effectively communicate and handle transactions securely with each other.
Becoming a TSM?
Service providers can keep control of their customers by becoming their own TSM.
This ensures flexibility and scalability to meet future market demands.
SE Interested in becoming a TSM? Watch our video:
David Worthington – Principle Consultant Payment & Chip Technology
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
The NFC Forum Transport SIG acts as a bridge between all transport industry stakeholders, from identifying NFC roadblocks
to enabling a seamless integration of NFC by providing all players with the information and tools they need to succeed. Significant progress has been made with harmonization efforts over the past year. This presentation by the NFC Forum Transport SIG provides an overview of where we are to date, where we are heading, and how your organization can get involved with our efforts to advance the adoption of NFC in public transport.
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
Due to the #covid19 pandemic, organizations were faced with an unprecedented, novel challenge of ensuring business continuity without endangering employee health and safety. Presenting our latest case study about how we enabled secure remote access to on-premise as well as SaaS applications for the employees of a Fortune 500 Oil and Gas firm subsidiary with minimal changes in their existing IT environment.
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
The purpose of this paper is to introduce a research proposal designed to explore the network security
issues concerning mobile devices protection. Many threats exist and they harm not only computers but
handheld devices as well. The mobility of phones and their excessive use make them more vulnerable.
The findings suggest a list of protections that can provide high level of security for new mobile devices.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
Intre noi, parintii. Seminar "Parintele adolescentului perfect" Alexandra Vasile
Seminarul "Intre noi, parintii - de vorba cu Aurora Liiceanu" din luna noiembrie 2014, o dezbaterea pe tema „Parintele adolescentului perfect” a fost in mod esential o pledoarie pentru intelegere, diversitate si respect.
Prezentare sustinuta de Simona Tofan, psihoterapeut, consultant Intre noi, parintii
Ensuring the security of information and applications is a critical priority fir all organizations, particularly those on the healthcare field. The architecture and features of the right enterprise image-viewer enable medical images and information to be securely and conveniently accessible to users from anywhere in the world, without compromising network or information security.
This guide describes strategies to ensure your enterprise images are fully secure, even when you provide the flexibility of mobile health solutions to practitioners.
http://offers.calgaryscientific.com/resolutionmd4-guides
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
Industrial Internet of Things or IIOT utilizes software, hardware, and cloud systems and services to connect the machines used in industrial environments. However, cybersecurity threats are something you need to worry about. You have to know how to keep your apps secure against these threats.
The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs.
Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world.
Entrust provides comprehensive identity-based security solutions that safeguard
enterprises, consumers, citizens and websites. More than 4,000 organizations in 60
countries across the globe leverage Entrust's world-class security solutions, which
include strong authentication, physical and logical access, public key infrastructure
(PKI), cloud and mobile security, citizen eID, employee credentialing, SSL and
more.
How Government-Level Encryption For Telecommunications Ensures Data Confident...VOROR
cards owned by them.
How Can Government-Level Encryption For Telecommunications Help Prevent Cyberattacks?
Cybersecurity risks can come in many forms, from malware infections to ransomware attacks. The following, in particular, shows an increased interest in insurance companies.
Visit Us : https://voror.io/government-level-encryption-for-telecommunications/
The wireless industry has baked security into our networks since the beginning, and works diligently to continually update and build on our security capabilities with every generation of wireless. Today’s 4G LTE networks have the most advanced security features to date, and 5G will further improve upon them.
We don’t blink when you want to be safe and secure!
What you “need” to be safe may not be the same as
what you “want” to feel safe.
At International Armour we can provide you with both “need” and want”
INTERNATIONAL ARMOUR Co.
DEFENSE & SAFETY
125 Menelaus Street
17676 Kallithea - Athens - Greece
T: +30 210 9577743
F: +30 211 2219310
E: info@armour.gr
W: www.armour.gr
www.international-armour.com
18. Confidential Secur communications for all Secur Digital, Inc. July, 2010 Frank R. Mitchell EVP Advanced Programs SecurDigital Inc. Phone: (928) 642-2262 Email: fmitchell@securdigital.com Skype: mitchellfr_sd www.securdigital.com
Editor's Notes
Disclaimer: This presentation serves marketing purposes only. This presentation is made by SecurDigital, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date.
Would you mind if you knew someone was listening to all of your calls on your home phone? Did you know that your cell phone can be turned on in the off position and the microphone will pick up your private conversations at home? Did you know that your phone is sending its signal numbers out to wireless towers 24/7? Did you know the only way to shut down your cell phone is to pull out the battery? Did you know that our government listens to every cell conversation on Route #95? Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the phone receives s put on record. There is no way to dump that info. If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a secure source. Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You-Tube. Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone. Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of your eyes. That person that says he does not see the need for personal cell security does not understand the world he is living in today…
True, reported in on June 7 th , 2010 in Dispatch Magazine, for which the event happened in Oakland, CA, one week prior.
A device called an IMSI-catcher pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network, subjecting the communication between the phone and the network to a man-in-the-middle attack. This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. Once the mobile phone has accepted the IMSI-catcher as its base station the IMSI-catcher can deactivate GSM encryption using a special flag.
Multiple environments including Conferences and Presentations, Telecon’s, Sporting events including The Olympics, Joint Operations and coordinated pursuits, corporate IT infrastructures and issued devices, and personal security
Mathematical Algorithms At the heart of any voice biometric engine are mathematical functions or algorithms that are used to model unique speech patterns. There are several different algorithms commonly used today. Examples include: Dynamic Time Warping (DTW), Hidden Markov Model (HMM), Gaussian Mixture Model (GMM), and Support Vector Machines (SVM). These different algorithms each have strengths and weaknesses. We believe that no single algorithm is appropriate for all application scenarios. So, our decision engine can use one or more algorithms to provide greater flexibility across a wider range of voice authentication scenarios. Control . The control section is our internal interface to all voice biometric engine functions. Communications occur with our main service logic to coordinate all customer requests, move voiceprints back and forth between memory and data storage, and perform other management functions. Analyis and Filtering . We've developed a custom pre-processor that evaluates all signals before they are sent to the voice biometric engine for additional processing. A number of audio quality checks are performed to ensure that the enrollment, verification, or identification process will be successful. A variety of different signal filtering techniques are invoked as appropriate. Feature Extraction . Following analysis and filtering, various audio features (MFCC and others) are extracted from the signal -- depending on the underlying algorithm(s) being used. The features are then modeled and synthesized into a voiceprint. GMM, LBG, DTW, SVM, Other . Multiple engine algorithms can be invoked to help support feature extraction and modeling of voiceprints. Voice Biometrics Group currently supports GMM, LBG, and DTW algorithms within the VMM-1 engine. SVM and other variants are currently being evaluated for future releases. Enroll, Verify, Identify . VBG's multi-mode VMM-1 engine allows customers to support both automated authentication use cases as well as offline (or batch) identification tasks. Segmentation is also performed at lower levels to assist with identification and verification tasks.
Disclaimer: This presentation serves marketing purposes only. This presentation is made by SecurDigital, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date.