Thank you, Mr. Chair.
Mr. Nijjar, you're coined as skilled in multiple areas of cybersecurity, including information security governance and incident management.
Is there a higher risk of information security breaches when you have to run through the main contractor in GC Strategies? Does the risk increase when you're running through other people?