 Why is cyber warfare became an attractive option for any government? Well, the answer is simple, because it is an effective and efficient way of getting access to somebody's, I mean, opponent's resources by, first of all, trying to find out what they're doing, spying, then trying to disturb the communication system, so in other words, the enemy cannot function in the normal way or physically damage their equipment. And the internet and all the tools which we are using on internet are great in accomplishing that sort of objective in a really cheap way. Well, they are evolving in a number of directions. The first one is, of course, improvement of tools which are used for penetrating the enemy's systems. And those tools are highly sophisticated and they are not popular. You can't get it on internet, whether for free or for money. Nevertheless, for instance, there's about 6,000 programmers employed by the Chinese army and they are trained in attacking the other side. So these are definitely a way of improving the tools which are used for penetrating the other side. And the objective of the tool is to extract information, but at the same time being invisible, so the other side will not find out what's happening. But simultaneously, each of those countries are developing something which may be called a software bomb. So if something goes wrong, we will explode the bomb, so in the other way we will crash the other system functioning. And you could imagine if somebody would be able to crash the communication system of any country's military network. The second part is developing a tool which would influence the proper functioning of devices which are connected to internet. And perhaps the most famous example of that, which happens in 2007, was the development of this virus called Stuxnet. This virus was developed by, let's say, western countries, not known which country, to destroy functioning of the Iranian centrifugals. Centrifugals are devices which are used to produce enriched uranium, which then is used for atomic bomb. And this virus, Stuxnet virus, was planted on a USB stick which was handed to one Iranian scientist who visited one of the western countries. And why on a USB stick? Because this electronic system which was controlling work of centrifugals was totally isolated from internet. But unfortunately the scientist plugged in the USB stick to the system and infected those controllers to simply blow up those centrifugals. So practically a virus resulted in destroying of physical devices. Cyber warfare generally is associated with military activities. Also internet may be used as a tool for carrying, as a medium of carrying tools for creating social disturbance. And perhaps the best example of that was happening in 2008 when Estonian government decided to move a monument which was erected in their capital to commemorate Russian soldiers which were killed during the Second World War. They wanted to move this monument from the central place of the city to the not so exposed place. And the point is that about one fourth of the population of Estonia are Russians. And for obvious reasons they were unhappy about that sort of plans. And a massive distributed the night of service attack was launched against the government and industrial organization in Estonia. Practically for a number of days a number of ministries were unable to work. The website of the parliament was blocked. The number of the banksite were also suspended. Probability of New Zealand being a target of a cyber attack on a mass scale is rather remote. What is probable is the attack from some individuals which for some reasons has something against particular person, organization or group of people. But there is another chance, but there is another problem which is quite, which exists even right now. And that is a problem of collateral damage. The point is that when there is a distributed the night of attack planned it requires participation of thousands of different parties. And those parties may come from different parts of the world. And it may come that for some reasons somebody pick up some installation in New Zealand as a launching part for attack against other targets. And this is something which is real, which could happen. We are trusted and we are trusting. In other words, the security measures which we introduce into our systems are not very, very tight. And we may involuntary participate in somebody else's attacks against the other targets. And this is something which required us as a society, as an organization, as a government to pay attention how we secure in a traditional information system way our installation. The best way to protect organization is first of all to motivate people. Because many specialties in security says that people are the weakest link in security chain. This means that we need to teach people what are the requirements to keep our system secure. Still for instance the question of bring of your own devices, how to protect them. How to protect the installation if you plug your laptop. And these are those issues which are nothing unknown that simply has to be introduced to keep our system secure. And not necessarily against cyber warriors in the terms that some foreign country will try to invite our system, but simply against hackers. And this is what we need to do.