It is very difficult to repair what has been done. If we take the case of Nortel, it is one example of technology thriving in the 2000s. It made Nortel one of the foremost technological companies in the world, and made today what is Huawei, because it transferred all the technology over to Huawei. The cherry on the sundae was finding the microphones in the Kanata HQ when DND took over the infrastructure. That's one.
Two, is the Telvent codes. What's mesmerizing is that these codes are present in manufactured valves and installed in pipelines, so they cannot be replaced overnight. They cannot be updated, so if there is a flaw found in one code, it has to be communicated over an infrastructure. The advantage is to the attackers. You have to mitigate that vulnerability so that they won't be able to attain it. If they have access to it, and we saw a few attacks in Turkey almost 10 years ago in which they were able to create overpressure and blow up the pipeline.
That's the kind of critical infrastructure security we have to think about. We have to review completely where we are vulnerable or not. Every time there is a cyber-attack and there is a leak of information, the threat risk assessment has to be done all over again, which is absent in most cases.