i'm going to go last question to mike combs. >> hi mike combs, department of defense. one of the lessons we earn learned with defense industrial base was the government's signature were not necessarily as valuable -- >> i've never heard -- >> and so we found that there's differences in vectors that come into the industry, and i just wondered if you've seen different vectors in different sectors as well. so there's no one size fits all. certainly, there's some of those like the jazz bug, but in other cases there's not, and just any comment on that. >> well, i think i mean, yes and no, right? or it depends. no i mean the vectors are all, you know there's a short list of low-hanging fruit that works pretty much anywhere right? so your basic vulnerability suites your basic social engineering, spear phishing has become shockingly effective in the last couple years. i don't know why we haven't solved that problem yet, but we don't seem to have. so, you know in that way we're all kind of the same, you know? no matter what industry, what you're doing what your line of business