 So here's a way to think about ZeroTrust. Previously, we had insiders who were trusted inside of a network and outsiders who were not trusted. With ZeroTrust, we assumed that everything is an outsider. So there is no trust assumed, which means that we have to authenticate users at the device host system that they're accessing and secure the data and transit. Some of the concepts from ZeroTrust date back a dozen or more years ago to work that the Jericho form did inside of the open group on deprimidization. More recently, Google published a number of influential papers on BeyondTrust, which was the ZeroTrust concept. And Gartner and Forrester have talked about ZeroTrust as well. So historically, the security world has grown somewhat reactively. So as new threats came out, there'd be new systems, new boxes, new software to react to given threats. ZeroTrust brings a focus on three things, data centricity, adaptive access control, and asset centricity. The key characteristics of ZeroTrust include adaptive access control, where we take into account the various identifying attributes of that individual or asset that's trying to access our systems. The notion that the ZeroTrust architectures are pervasive across IT as well as OT, all sorts of different networks. And then finally, the notion of continuous improvement, where we're continuously improving what we're doing in terms of security over time. ZeroTrust is needed because things like the ecosystem are changing, business models are changing, and then the technology landscape is always changing. In the area of standards, there's a lot of work to be done, bringing common definitions as to what ZeroTrust is, common reference models and taxonomies, and even technical standards that enable ZeroTrust-capable products to interoperate. The open group has been working in this area for a number of years, carrying on from the work that the Jericho form did on deep perimeterization and its impacts on corporate security models. Our security forum has been doing work now for the last handful of years, and it published two publications, the ZeroTrust Principles, and most recently, the ZeroTrust Commandments. The security forum in the open group works closely with a number of different security standards organizations. In the area of ZeroTrust, NIST in the United States are members of the National Institute of Standards and Technology, and we're working closely with them to align the work that they're doing with the work that comes out of the security forum in this area. Companies that have contributions to make in the area of ZeroTrust security, whether they're supplier organizations or customer organizations, should consider getting involved in the work of the security forum. You can find information on how to join on our website, and companies that do participate directly will influence the direction of our standards work in this area.