There are a few approaches that we can use in the development of cyber-policy and cyber-infrastructure given the “short arm” of predictive knowledge. Here are some of the approaches. The first approach is a risk-based approach. Adopt a risk-based approach to cyber policy and infrastructure development that prioritizes the identification, assessment, and mitigation of cyber risks based on their likelihood and potential impact. This involves performing comprehensive risk assessments, scenario planning, and vulnerability analysis to inform decision-making and resource distribution. The next approach is to be flexible. Build agility and flexibility into cyber-policy and infrastructure frameworks to accommodate emerging threats, technological advancements, and changing risk landscapes. This includes regularly reviewing and updating policies, procedures, and technical controls to address evolving threats and vulnerabilities on time. The next approach we can use is evidence-based decision-making. Base cyber-policy and infrastructure decisions on solid evidence, data analysis, and expert insights whenever possible. Invest in research, data collection, and analytics capabilities to better understand cyber threats, trends, and impact, and use this information to inform policy formulation and investment priorities. The next approach that we could use is ethical considerations. We could integrate ethical considerations into cyber-policy and infrastructure development to ensure that technology is used responsibly, ethically, and in alignment with human rights principles. Address issues such as privacy, data protection, digital rights, and the ethical use of emerging technologies to reduce potential risks and unintended consequences. The final approach that we could use is an internationally collaborative approach. People could engage in international cooperation to develop common cyber norms, standards, and principles that promote responsible behavior in cyberspace and reduce the risk of conflict or escalation. People could also participate in international forums, treaties, and agreements to address shared cyber challenges and build mutual trust and confidence among nations. Overall, there are many different approaches that we could use and combine to provide the best possible outcome.