mr. mandia this point, we will not catch everything. in the face of a sophisticated attacker that is well resourced, that is very deep roots of sponsorship, we will not be able necessarily to address those kinds at a pta and threats. so it has to happen is really a mash or standard risk management approach. we've got to address this through, and risk management principles that includes technology, training of personnel, awareness of critical infrastructure owners and operators that this threat is real. they're starting to get that now that we have more high-profile conversations around this with events like the recent code issue with the breaking of more than 30,000 constraint system devices they are, and major pipeline. they're starting to have this awareness on this search around the importance of it. a couple other areas we need to address and that is information sharing. information sharing is a tool, but it can certainly help but the warning and preparedness at this critical infrastructure owners and operators in the common standar