Mr. Chairman, perhaps I could add a brief comment. Thanks again for that question.
I'd just like to broaden the context a tad, and Artur may want to add to this.
We tend to talk a little bit more about cyberincidents than attacks. Again, I work at the Department of National Defence, and I don't want to sound like I'm not concerned about defence. I am. But not every incident is an attack and not every attack requires a military response.
The thing about cyber, of course, is that it's so complex. Where does it come from? What's its intent? Is it simply a modern variation on a theme of spying? That doesn't make it any better, but there are a couple of old professions in the world, and spying is one of them. The question is, how do you best deal with that? How do you make your systems robust? How do you take preventive action? How do you mitigate that if indeed you do believe you're under any sort of attack? As you say, it can come from a non-state actor or from a state actor. It can come from a company too. There's a lot of diffusion in cyberspace.
I don't know, Artur, if you'd like to add to that.