XML 21 R10.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] RISK MANAGEMENT AND STRATEGY

 

Our cybersecurity risk management program is designed to identify, assess, and manage the cybersecurity risks that are relevant to our business and is integrated into our overall enterprise risk management program.

 

Our cybersecurity risk management program includes:

 

 

We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition.

 

Other than our IT Providers who provide general information technology services, assessments, and recommendations including management of cybersecurity processes and associated risk, the Company utilizes Crowd Strike, a well-known cybersecurity service to help mitigate our cybersecurity needs.

 

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management program is designed to identify, assess, and manage the cybersecurity risks that are relevant to our business and is integrated into our overall enterprise risk management program.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block] GOVERNANCE

 

Cybersecurity is an important part of our risk management processes and an area of increasing focus for the Company’s Board of Directors and management, with the Audit Committee responsible for the oversight of risks from cybersecurity threats. The Audit Committee periodically receives updates from our Chief Operating Officer, regarding our cybersecurity threat risk management and mitigation strategies covering topics such as data security posture and potentially material cybersecurity threat risks or incidents, as well as the steps management has taken to respond to such risks. Our Chief Operating Officer is a trained Certified Fraud Examiner.

 

Specifically, our IT Providers communicate directly with our Chief Operating Officer on a real-time basis regarding current and emerging material cybersecurity threat risks that are identified during the provision of their various services. Additionally, certain of the Company’s IT Providers provide applications and services, such as Crowd Strike, to assist in our cybersecurity measures, with reports and incident notifications, if any, directed to the attention of our COO, as well. In this way, management remains informed about and can monitor the prevention, mitigation, detection, and remediation of cybersecurity incidents and can raise a material issue immediately to the Audit Committee with more routine security matters reserved for presentation at their regular meetings.

 

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Cybersecurity is an important part of our risk management processes and an area of increasing focus for the Company’s Board of Directors and management, with the Audit Committee responsible for the oversight of risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee periodically receives updates from our Chief Operating Officer, regarding our cybersecurity threat risk management and mitigation strategies covering topics such as data security posture and potentially material cybersecurity threat risks or incidents, as well as the steps management has taken to respond to such risks.
Cybersecurity Risk Role of Management [Text Block] Specifically, our IT Providers communicate directly with our Chief Operating Officer on a real-time basis regarding current and emerging material cybersecurity threat risks that are identified during the provision of their various services.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] certain of the Company’s IT Providers provide applications and services, such as Crowd Strike, to assist in our cybersecurity measures, with reports and incident notifications, if any, directed to the attention of our COO, as well.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Chief Operating Officer is a trained Certified Fraud Examiner.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] In this way, management remains informed about and can monitor the prevention, mitigation, detection, and remediation of cybersecurity incidents and can raise a material issue immediately to the Audit Committee with more routine security matters reserved for presentation at their regular meetings.