I have no solid idea on how "best" this sort of thing could/should be handled... so, i'm more than happy to go along with whatever organizational structure eventually gets implemented (if any).

Thanks (cyn) for separating this part out from "THE CYBER-SECURITY THREAD", and perhaps the title could even be tweaked now (as i've attempted with this post).