 My name is Mike and I am responsible for security solutions for our products. So we show different solutions. So we have the solutions separated in different sections. For example, basic security requirements, runtime security and physical security. This is the one step, it is an overview of the solutions. So we have a better understanding diagram here. It starts with our hardware and these are the requirements from the customers. So we have different solutions. For example, one important thing is keys and certificates because they are necessary for different kinds of solutions. For example, identification, device identification. So you needed it for cloud and server services. But you have the problem. So there are where created these keys and where stored these keys. And you can use, for example, smart cards or trusted execution environment or for example, NXP COM model. So NXP COM model is for, you can use it. If secure put is activated, then it creates their own symmetric key. This key you can use to encrypt other keys. For example, for fire encryption. So you can build a chain of trust with secure with fire encryption and doing X hardening to protect your know-how, for example. Other physical protection is the temple protection, for example, with encapsulation and housing. So there are different solutions with firewalls and intrusion protection to receive the target for manipulation protection. So in terms of security, is it possible to have 100% security? Is it possible to have 100% security? No, it's not possible. Security is a process and over the lifetime of the product you can never reach 100% because the technical... Yes. There's always some... It's a development because the environment changes, the technical changes. There are some vulnerabilities in the software. So you must update the software. You cannot arrive 100% of security. So we have different solutions to receive different grades of security. So we have always our workshops to explain some different things. For example, law things and technical details and how you can make your system secure, for example. Another important thing is our provisioning system. So you can use our manufacturing to analyze your product. So there are different solutions. For example, it's a standard provisioning. We create a public and private key and grab the public key from the model and give it to you. And you can use it for device identification, for example, or for updates or for rebranding. Or you bring your own device to us and we make the installation with this device. So it's a black box fast and you can analyze your system with your features and our manufacturing. One of the important new ways to do security is a secure element on the chip set itself. Do you work with these solutions or are you not talking about this part of the security? And is it a lot to do with software updates also? Yes, we support exciting devices, for example, smart cards or TPMs too. But we prefer to use the features of the controller. So for example, NXP has an NXP Commodule. It has the same features like a TPM. So it's better to use it from the controller instead of an external device, for example. But if you want or you need to store more keys and so on, it's better to use a smart card until you have a key storage outside the flash and the controller. So when you talk about controller, is it under SoC, the chip, there's a Cortex-R or something like that and you use this for security? Yes, we use the Cortex-R, for example. Or there are additional models on the controller, for example to secure boot or for encryption or for cryptographic isolation. There's this kind of features we use, but some controllers have additional security controller inside the case. So we can use it too. Is there also something that can be said about the embedded world, the embedded industry, not having thought about security enough so far and now everybody's thinking more about it to do better security in the future? We must take security in the future because there are some different laws. It's coming soon, for example, the Cyber Security Act and so on. So we must push some security features in the device.