Thank you very much, Ms. Sullivan.
Thank you very much, Madam Gallant.
I'm going to take the liberty—I generally never do—because there is one very important question I'd like to have clarified on the record.
Mr. Horgan, you were talking about a different kind of cybersecurity in the sense of not creating a firewall, but having a monitor that's constantly looking at the traffic that's within your network, so if there are any kinds of anomalies then you can address them specifically. Is that going to be quick enough for the kind of cybersecurity we need for personal information, health, and for banking?