Thank you for that.
You mentioned in your remarks that you saw the Information Commissioner being involved in authorizations for active and for defensive cyber operations. I was wondering if you could elaborate. How would you see that role? How would that look?