Michaloliakos Michalis Group Head of ICT and Cyber-Security

Bolstering Security
How to Iden fy Cyber Threats Effec vely
Building Influen al Networks
How to Engage with Technology Policy Influencers




Michaloliakos Michalis Group Head of ICT and Cyber-Security
Bolstering Security
How to Iden fy Cyber Threats Effec vely
Building Influen al Networks
How to Engage with Technology Policy Influencers
Inaneradefinedbyrapidtechnologicaladvancement
andincreasingdigitalinterconnectivity,cybersecurity hasemergedasoneofthemostcriticalpillarsof organizationalresilienceandnationalsecurity.The landscapeofcyberthreatsisevolvingwithunprecedented speed,makingtheroleofvisionaryleadershipinthis domainmorecrucialthanever Theseleadersarenotonly safeguardingdigitalinfrastructuresbutarealsoshaping thefutureofglobalcyberdefensethroughthought leadership,policyinfluence,andtechnologicalinnovation.
CIOLookinitsrecenteditiontitledThe10Influential LeadersDrivingExcellenceinCybersecurity,2025 recognizesindividualswhosestrategicforesight, innovativeapproaches,andunwaveringcommitmenthave significantlyadvancedthecybersecurityindustry.It showcasesprofessionalswhorepresentadiverserangeof
sectorsfromgovernmentagenciesandmultinational corporationstocutting-edgestartupsandacademic institutions.Eachdistinguishedleaderexemplifies excellencethroughtheiruniquecontributionswhetherby spearheadinggroundbreakingtechnologicalinnovations, leadingcriticalincidentresponseinitiatives,orcultivating astrongcultureofcybersecurityawarenesswithintheir organizations.
Theseleadersserveasaninspirationforcurrentand aspiringcybersecurityprofessionals,offeringvaluable insightsintothequalitiesthatdefineimpactfulleadership inthisfield.Theirstoriesnotonlyinspire,butalsoprovide valuableinsightsintothemindsetandstrategiesthatdefine effectiveleadershipinoneofthemostdynamicandhighstakesindustriesofourtime.
Haveagreatreadahead!
SecuringtheFuturewithAPeople-First ApproachtoCybersecurity
BolsteringSecurity
How to Iden fy Cyber Threats Effec vely?
BuildingInfluentialNetworks
How to Engage with Technology Policy Influencers?
14 18
Deputy
Managing Editor Prince Bolton
Art & Design Director Davis Mar n
Associate Designer Jameson Carl
Senior Sales Manager Wilson T., Hunter D.
Customer Success Manager Ward M. Sales Execu ves Tim, Smith
TECHNICAL
Technical Head Peter Hayden
Technical Consultant Victor Collins
FeaturedPerson
BrettFlinchum ChiefExecutive Officer
ClaraLee ChiefofPractice, DataScience& DigitalSustainability
Dato'DrAmirudin AbdulWahab CEO
GeorgeMensah DirectorStrategic Projects
Stellar stellar.org
Hamad Alnuaimi Member
KgomotsoMantu HEADOFICT
MartinWilde SeniorVicePresident IT-CIO
MichalisMichaloliakos GroupHeadofICT &CyberSecurity
RajeevDutt General Manager-MiddleEast AfricaandAsiaPacific
SiniPulari
Program Manager-BICTDatabase
NUS-ISS iss.nus.edu
CyberSecurityMalaysia cybersecurity.my
FidelityBankGhana fidelitybank.com
SyracuseUniversity MENAT:MiddleEast, NorthAfricaandTurkey middleeast.syr.edu
BotswanaVaccine InstituteLimited bvi-bw.com
BrettistheChiefExecutiveOfficeratStellardrivingstrategic leadershipandinnovationtoguidecompany’sgrowthin advancedtechnologysolutionsacrossdiverseindustries.
ClaraistheChiefofPracticeforDataScience&Digital SustainabilityatNUS-ISS,drivingindustry-focusededucation andinnovationwhilechampioningdata-drivenapproaches.
Dato'istheCEOofCyberSecurityMalaysia,leadingnational cybersecuritystrategiestoadvancedigitaltrust,resilienceto strengthenMalaysia’scybersecuritylandscape.
GeorgeistheDirectorofStrategicProjectsatFidelityBank Ghanaleadingenterprisetransformationinitiatives,aligning technologywithbusinessgoalstodriveinnovation.
HamadamemberofSyracuseUniversityMENAT,contributes toacademiccollaborationandregionalengagement,fostering educationalinnovationandcross-culturalpartnerships.
KgomotsoistheHeadofICTatBotswanaVaccineInstitute Limited,drivingdigitaltransformationandinfrastructure modernizationtoensuresecure,efficient,andscalablesystems.
MartinistheSeniorVicePresidentIT-CIOat PFISTERER,drivingdigitaltransformation,optimizing enterpriseITarchitectureandcybersecurity. PFISTERER pfisterer.com TMS tms.com
MichalisistheGroupHeadofICT&CyberSecurityatTMS, leadingdigitalresiliencebyoverseeingsecureinfrastructure, compliance,andinnovationtoprotecttechnologysystems.
SwissGRC swissgrc.com
BahrainPolytechnic polytechnic.bh
RajeevistheGeneralManagerforMiddleEast,Africa,and AsiaPacificatSwissGRC,leadingregionalgrowthby deliveringtailoredgovernance,risk,andcompliancesolutions.
SiniistheProgramManageroftheBICTDatabaseatBahrain Polytechnicwholeadsacademicandtechnicalinitiativesto advancedatabaseeducationwithindustryneeds.
To lead effectively, Michalis focuses on high-impact tasks, prac tices efficient time management, and trusts his team to take owner ship of their responsibilities.”
"Cybersecurity is much more than a technical necessity—it’s a fundamental enabler of trust, innovation, and business growth.”
ForMichaloliakosMichalis,cybersecurityisnotjust
aboutprotectingsystems;it’saboutsafeguarding people,businesses,andthedigitalworldtheyrely on.Heiscommittedtobuildingasecure,resilient,and forward-thinkingtechnologicalenvironmenttoenablethe business.
Withapassionforinnovationandapeople-centric approach,heseamlesslyintegratessecurityintobusiness operations,ensuringitenhancesratherthanhinders productivity.Hisleadershipisdefinedbycollaboration, continuouslearning,andstrategicriskmanagement—empoweringorganizationstonavigatetheevolving cyberlandscapewithconfidence.
Michalis'sjourneyintothefieldoftechnologyand cybersecurityhasalwaysbeendrivenbyadeeppassionfor connectingwithpeople—helping,protecting,andempoweringthemwhileensuringtheycanrelyonthedigitalworld safelytoenhancetheirdailyoperations.Fromanearly stage,herecognizedthattechnologyisnotjustabout systems;itisaboutthepeoplewhoutilisethesystems.
Forhim,thedigitalworldisaplacewhereinnovationand transformationtakeplace—thishasalwaysbeenand continuestobe,hisdrivingforce.Intheearlyyearsofhis career,hewasdrawntocybersecurityafterwitnessingthe significantimpactcyberthreatscouldhaveonindividuals, businesses,andcommunities.Hiseagernesstobepartof thesolutionledhimtocreatesaferdigitalspaceswhere peoplefeelsecure,andtheirexperiencesareenhanced.
Overtime,hiscareerhasevolvedfrommasteringthe technicalaspectsofcybersecuritytofocusingonintegrating securityseamlesslyintoeverydayoperationswithout disruptingproductivity.Hehasworkedcloselywithteams, organizations,andindividualstobuildsecurityawareness, implementuser-friendlypolicies,andfosteraculturewhere cybersecurityisasharedresponsibilityratherthanaburden. Oneofthemostrewardingaspectsofhisjourneyhasbeen seeingnon-technicalusersbecomemoreconfidentin handlingdigitalrisksandactivelyengaginginsecurity practices.
Today,hisworkremainsshapedbyapeople-first approach—bridgingthegapbetweentechnologyand humanbehavior.Heensuresthatcybersecurityisnotjusta technicalnecessitybutafundamentalpartofhowpeople interactinthedigitalworld.
AstheGroupHeadofICTandCyber-SecurityatTMS, hisprimaryresponsibilityistocreateasecure,efficient,and innovativedigitalenvironmentwherecolleaguescanwork seamlesslyandconfidently.Heviewscybersecurityand technologyasenablersofbusinessgrowth,ensuringthat securitymeasuresprotectpeoplewhilefosteringaculture oftrustandproductivity
Hisfocusisonaligningtechnologywithbusinessobjectives,implementinguser-friendlysecuritysolutions, educatingteamsonbestpractices,andproactivelyidentifyingrisksbeforetheybecomethreats.Recognizingthat collaborationiskey,heworkscloselywithbusinessleaders, employees,andstakeholderstointegratesecurityintoevery aspectofdailyoperations.
Bybuildingaculturewherecybersecurityisashared responsibility,hesafeguardstheorganizationandempowers individualstomakeinformeddecisionsinanevolving digitallandscape.Ultimately,hisroleextendsbeyond managingtechnology—itisaboutdrivinginnovation, resilience,andlong-termsuccesswithahuman-centric approachtodigitalandcybersecurity
Michalis'sbelievesthatamotivatedteamisthebackboneof anysuccessfulorganization.Toensurehisteamremains engagedandalignedwithbusinessgoals,hefocuseson threekeypillars:purpose,growth,andcollaboration.
First,heensuresthateveryteammemberunderstandshow theirworkcontributestothebiggerpicture,asrecognizing theirimpactnaturallyincreasesmotivation.Second,he investsincontinuouslearningandprofessionaldevelopmentbyintroducingnewtechnologies,providingopportunitiestoworkonchallengingprojects,andencouraging ongoingskillenhancement.Hefostersanopenenvironment whereteammemberscanshareideas,experimentwithnew solutions,andtakeownershipoftheirinitiatives.
Michalis views cybersecurity and technology as enablers of business growth, ensuring that security measures protect people while fostering a culture of trust and productivity.”
Finally,heprioritizestrustandcollaborationbyrecognizing achievements,encouragingopencommunication,and ensuringthateveryvoiceisheard.Byaligningpersonal growthwithorganizationalsuccess,hecultivatesateam thatisnotonlymotivatedbutalsoresilient,innovative,and committedtoexcellence.
Michalis'sbelievesthateffectiveleadershipintheCyber Securitydomainrequiresabalanceoftechnicalexpertise andstrong,softskillstomanagediverseteamssuccessfully
Empathyandadaptabilityarecrucialenablers,allowing leaderstounderstanddifferentperspectives,cultural backgrounds,andworkingstyles.Clearandtransparent communicationensuresthatbothtechnicalandnontechnicalstakeholdersgrasptheimportanceofsecurityand remainengagedintheprocess.
Trustandaccountabilityplayavitalroleinempowering teamstotakeownershipwhileknowingtheyhavethe necessarysupport.Astrongcybersecurityleadermustalso haveastrategicvision,aligningsecurityinitiativeswith businessgoalstodriveinnovationratherthanhinderit. Resilienceandalearningmindsetareessentialinthisfastevolvingfield—embracingchange,fosteringcontinuous development,andstayingaheadofemergingthreats.
Michalis’viewssecurityasanenablerratherthanabarrier toinnovation.Byembeddingsecuritybydesign,heensures thatriskmanagementisintegratedearly,allowingteamsto movequicklywithoutcompromisingsafety
Continuousriskassessmenthelpsalignnewtechnologies withbusinessgoalswhilestayingaheadofemerging threats.Insteadofenforcingrigidcontrols,hefostersariskawareculturethatempowersteamstoinnovatesecurely.
Cross-functionalcollaborationandsharedinformationare keytokeepingsecurity,IT,andbusinessteamsaligned. Withthisapproach,heensuresthatsecurityfuelsinnovationratherthanlimitsit,drivingprogresswithconfidence.
Michalisbelievesthatmaintainingawork-lifebalanceina demandingrolerequiresprioritization,delegation,and settingclearboundaries.Toleadeffectively,hefocuseson
high-impacttasks,practicesefficienttimemanagement,and trustshisteamtotakeownershipoftheirresponsibilities.
Ratherthanstrictseparation,heembraceswork-life integration,ensuringthatprofessionaldemandsdonot overshadowpersonalpriorities.Regularexercise,quality timewithfamily,andmomentsofreflectionhelphimstay grounded.
Healsofostersa“healthy”teamculture,whereflexibility andmutualsupportenablebothprofessionalandpersonal growth.Byleadingbyexample,hedemonstratesthat successdoesnothavetocomeatthecostofwell-being.
Michalisstaysupdatedinthefieldofcybersecurityby activelyengagingwithindustrythoughtleaders,research institutes,technologyproviders,andcybercommunities. Attendingconferences,cybersecuritysummits,andbea partofpeerdiscussionshelpshimstayconnectedto emergingtrends.
Heemphasizeshands-onlearningandexperimentswith newtechnologiestoremainproactiveratherthanreactive. Additionally,hefostersaknowledge-sharingculturewithin histeam,ensuringcontinuousgrowth.Forhim,staying updatedisn’tjustaboutacquiringknowledge—it’sabout strategicallyapplyingittodriveinnovationandresilience.
Michalisadvisesaspiringcybersecurityprofessionalsto cultivatecuriosity,adaptability,andaproblem-solving mindset.Masteryincybersecuritygoesbeyondtechnical expertise—itrequirescontinuouslearning,effective communication,adaptabilityandaproactiveapproachto emergingthreats.
Michalis believes that a motivated team is the backbone of any successful organization.”
Buildingastrongfoundationinsecurityprinciplesandrisk managementisessential,butrealgrowthcomesfrom pushingbeyondcomfortzones.Developingsoftskillslike communication,teamwork,andstrategicthinkingisjustas criticalastechnicalknowledge.
Heencouragesprofessionalstoseekmentorship,engage withsecuritycommunities,andembraceinnovative thinking.Aboveall,heemphasizesthatcybersecurityis aboutprotectingpeopleandbusinesses—approachingit withpassionandpurposeleadstomeaningfulsuccessand impact.
Heenvisionsaresilient,proactive,andbusiness-aligned cybersecurityframeworkatTMS—onethatnotonly protectstheorganizationbutalsofuelsgrowthandinnova-
tion.Hebelievescybersecurityshouldbeseamless, effective,andempoweringratherthanrestrictive. Hisstrategyfocusesonthreekeyareas:proactivethreat managementusingadvancedtechnologies,fosteringa security-firstculturewhereeveryemployeeplaysarole, anddevelopingagile,scalablesecuritystrategiesthat evolvewiththebusiness.Bycontinuouslyenhancing securitypostureandfosteringcross-teamcollaboration,he aimstocreateacyber-resilientenvironmentthatsafeguards bothdigitalassetsandpeople.
Effectively?
Inanerawherecyberthreatscontinuetogrowinscale,
complexity,andimpact,proactivedetectionand responsehavebecomefundamentaltomodern cybersecuritystrategies.Attackersarenolongerrelying solelyonbrute-forcemethods;instead,theyexploithuman behavior,privilegemisuse,andsystemvulnerabilitiesto gainunauthorizedaccessanddisruptoperations.Asaresult, organizationsmustevolvetheirdefensesbeyondtraditional perimeter-basedsecurityandfocusonidentifyingthreatsas theyemergefromwithinthenetwork.Thisarticle demonstratesalayeredandinformedapproachtothreat identificationwhichnotonlyenhancesanorganization's resiliencebutalsoenablesswiftcontainmentandrecovery inthefaceofcyberincidents.
MonitoringUserActivityandPrivilegeEscalation
Monitoringuseractivityisacriticalaspectofidentifying andmitigatingcyberthreats,particularlybecauseusers, whethermaliciousinsidersorexternalactorswithstolen credentialscanposesignificantriskstoorganizational security.Cyberattackersoftenaimtocompromiseuser accounts,especiallythosewithelevatedprivileges,to navigatedeeperintonetworkinfrastructuresundetected. Onceaccessisgained,privilegeescalationisacommon tacticusedtoobtainadministrativecontrol,allowing attackerstomanipulatesystems,exfiltratedata,ordisable securityprotocols.Continuoussurveillanceofuseractions helpsorganizationsdetectunusualorunauthorizedactivity early.
Toenhancetheeffectivenessofmonitoringefforts,many organizationsareturningtoUserandEntityBehavior Analytics(UEBA)systems.Theseadvancedtoolsutilize machinelearninganddataanalyticstoestablishbehavioral baselinesforindividualusersandsystementitiesby analyzingtheirtypicalactivities,accesspatterns,andlogin habits.Whenanomaliesoccur,suchasauseraccessing sensitivefilesthey’veneverinteractedwith,loggingin duringoff-hours,orattemptingactionsoutsidetheirrole, UEBAsystemstriggeralertsforsecurityteamsto investigate.Thisapproachallowsfortheearlydetectionof bothexternalbreachesandinsiderthreats,helpingto identifycompromisedaccountsormaliciousintentbefore significantharmisinflicted.
Phishingcontinuestobeoneofthemostpervasiveand effectiveinitialattackvectorsusedbycybercriminalsto infiltratesystemsandcompromisesensitivedata.These attackstypicallyinvolvedeceptivecommunicationsmost commonlyemailsthataredesignedtoappearlegitimate whilecontainingharmfullinks,attachments,orrequestsfor confidentialinformation.Threatactorshavebecome increasinglysophisticatedintheirtactics,employingemail spoofingtomimictrustedsources,creatingconvincing counterfeitwebsites,andevenleveragingcurrenteventsor internalcompanythemestoincreasethelikelihoodofuser interaction.
Whiletechnologyplaysacrucialroleinfilteringoutalarge portionofphishingattempts,humanvigilanceremainsthe firstandlastlineofdefense.Regularandcomprehensive trainingprogramsareessentialtoteachemployeeshowto spotredflagssuchasurgentlanguage,mismatchedURLs, andunexpectedattachments.Inparallel,organizationsmust implementrobustsecuritytools,includingemailsecurity gateways,real-timeURLanalysis,andsandboxing technologiesthatcansafelytestpotentiallydangerous content.Beyondtraditionalphishing,socialengineering attacksexploitpsychologicalmanipulation,preyingon trust,fear,orcuriositytobypasssecurityprotocols.
Identifyingacyberthreatisonlythefirststepinan effectivesecuritystrategy;withoutawell-definedand rehearsedresponseplan,detectionaloneofferslimited protection.Whenathreatisdiscovered,timebecomesa criticalfactor.Delaysormisstepscanresultindataloss,
servicedisruptions,financialconsequences,and reputationalharm.Torespondeffectively,organizations mustintegratetheirthreatdetectioncapabilitieswitha formalizedincidentresponseplan.Thisplanshouldoutline clearprotocols,communicationchannels,escalation procedures,anddefinedresponsibilitiesforeverymember oftheresponseteam.
Thealignmentbetweenthreatdetectionandincident responsetransformssecurityalertsintoactionable outcomes.Ratherthanreactinginafragmentedoradhoc manner,teamscanexecutepredeterminedstrategiesto containthethreat,neutralizemaliciousactivity,andbegin recoveryoperationswithoutunnecessarydelays.Regular incidentresponsesimulationsandtabletopexercisesare instrumentalintestingthereadinessofpersonneland refiningtheefficiencyofprotocolsundercontrolled conditions.Thesedrillsnotonlyrevealpotentialgapsinthe responseprocessbutalsobuildconfidenceandagility withinsecurityteams.
Effectivelyidentifyingcyberthreatsrequiresmorethan isolatedtoolsorreactivemeasures,itdemandsacohesive strategythatcombinesreal-timemonitoring,behavioral analytics,usereducation,andstructuredincidentresponse. Monitoringuserbehavior,especiallyconcerningprivileged access,allowsorganizationstodetectsuspiciousactions early,whilestayingalerttophishingandsocialengineering attacksaddressesoneofthemostexploitedvulnerabilities: humanerror.Equallyimportantistheneedtobridge detectionwitharobustresponseframeworktoensurethat securityteamscanactquicklyanddecisively.Asthreat actorscontinuetoinnovate,organizationsmustremain vigilant,adaptive,andprepared,transformingthreat detectionfromapassiveactivityintoanactivelineof defenseagainstever-evolvingcyberrisks.
Engagingwithtechnologypolicyinfluencersisan
essentialstepforthoselookingtohaveavoicein shapingthefutureoftechnologyregulation.These influencers,whethertheyarepolicymakers,industry leaders,oracademics,playacrucialroleinshapingthe directionofdigitalinnovation,privacylaws,andotherkey policyareas.However,toeffectivelyinteractwiththese individualsandmakeameaningfulimpact,it'svitaltobe well-informedandprepared.Adeepunderstandingofthe issuesathand,combinedwithstrategicengagement,can helpbuildrelationships,establishcredibility,andcontribute totheongoingdialogueontechnologypolicy.
BeInformedandPrepared
Beforereachingouttotechnologypolicyinfluencers,itis importanttoensureyouarewell-versedinthetopicsthey focuson.Thisincludesstayinginformedaboutcurrent trends,issues,anddebatessurroundingtechnologypolicy
Byreadingresearchpapers,policybriefs,andthelatest newsontechnologyregulations,youcanbetterunderstand thelandscapeandspecificconcernsthatareshaping discussionsinthefield.
Beingknowledgeableaboutthesetopicswillnotonlyhelp youengageinmoremeaningfulandinformed conversations,butitwillalsoestablishyourcredibility Wheninfluencersseethatyouarewell-preparedand understandthenuancesoftheissuesathand,theyaremore likelytorespectyourviewpointandengagewithyou thoughtfully Thisapproachfostersaproductiveand professionalrelationshipfromtheoutset.
AttendConferencesandForums
Conferences,seminars,andindustryforumsserveasideal venuesformeetingandengagingwithtechnologypolicy influencers.
Theseeventstypicallyfocusontheintersectionoflaw, technology,andpolicy,attractingthoughtleadersfromboth publicandprivatesectors.Withkeynotespeakers,panel discussions,andnetworkingopportunities,thesegatherings allowfordirectinteractionswithindividualswhohavea significantinfluenceontechnologypolicy.Suchevents fosteranenvironmentforknowledgeexchangeandoffera platformtoengageinmeaningfulconversationswith influentialfigures.
Attendingtheseeventsnotonlyfacilitatesnetworkingbut alsoprovidesvaluableinsightsintotheevolvinglandscape oftechnologypolicy.Byparticipating,yougainadeeper understandingofemergingtrendsandthedirectionin whichpolicyisheading.Furthermore,theseeventsoften opendoorstocollaborationsandnewopportunities, enablingyoutocontributetodiscussionsandshapethe ongoingconversationsurroundingthefutureoftechnology regulation.
SocialmediaplatformssuchasTwitter,LinkedIn,and specializedforumsprovidevaluableopportunitiesfordirect interactionwithtechnologypolicyinfluencers.Many policymakers,academics,andindustryleadersactively engageontheseplatforms,sharingtheirthoughts,research, andopinionsoncurrentpolicymatters.Thesespacesallow forreal-timeexchangesandachancetoengagein discussionsonthelatestdevelopmentsintechnology regulation.
Tobuildmeaningfulrelationships,it’simportanttoengage thoughtfullywiththeirposts—whetherbycommenting, sharing,orcontributingyourperspective.However,it’s crucialtoapproachtheseinteractionswithrespectand professionalism,aimingtofosterconstructivedialogue ratherthansimplypromotingpersonalinterests.By maintainingacollaborativetone,youcanestablish credibilityandcontributetodeeper,moreimpactful conversationsabouttechnologypolicy.
Governmentsandregulatorybodiesfrequentlyopenpublic consultationsorseekfeedbackonproposedregulationsor policychanges,offeringstakeholdersaformalchannelto engagewithpolicymakers.Byparticipatinginthese consultationsandsubmittingwell-thought-outresponses,
youcandirectlyinfluencethedevelopmentandrefinement ofpolicyproposals.Thesecontributionsallowyouto presentyourperspectivesandexpertiseoncriticalissues, ensuringyourvoiceisheardinthepolicymakingprocess.
Inadditiontoformalconsultations,engaginginindustry discussionsthrougharticles,blogposts,oropinionpiecesis anothereffectivewaytoraiseyourprofileamong technologypolicyinfluencers.Bysharingyourinsightsand analysis,youcanpositionyourselfasacrediblethought leaderinthefield,increasingyourvisibilityand strengtheningyourinfluence.Thisproactiveapproachnot onlycontributestoongoingpolicydebatesbutalsohelps establishyouasatrustedsourceofinformationwithinthe industry
Engagingwithtechnologypolicyinfluencersrequiresmore thanjustreachingout,it'saboutbeinginformed,prepared, andstrategicallyinvolvedinkeydiscussions.Whether throughstayingupdatedoncurrenttrends,attending industryevents,orcontributingtopublicconsultations, eachavenueoffersvaluableopportunitiestomakeyour voiceheardandinfluencethefutureoftechnology regulation.Byapproachingtheseinteractionswith professionalismandacollaborativespirit,youcanforge meaningfulconnectionsandcontributetotheshapingof policiesthatwillgoverntechnologicaladvancementsfor yearstocome.