XML 25 R11.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management

Our Enterprise Risk Management program (ERM) is designed to identify, assess, and mitigate risks across various aspects of the Company, including financial, operational, regulatory, reputational, and legal. The ERM program includes an annual risk prioritization process to identify key enterprise risks. Each key risk is assigned a risk owner to establish action plans and implement risk mitigation strategies. Cybersecurity is a critical component of this program, given the increasing reliance on technology and potential cyber threats. The Company uses a cybersecurity framework to aid management in understanding, managing, and reducing cybersecurity risk. This framework aids management in identifying gaps within cybersecurity infrastructure and evaluating maturity of processes. Cybersecurity frameworks use maturity levels to gauge the strength of cybersecurity controls. Our information technology and vendor risk management functions assess information technology and cybersecurity third party providers as part of the initial determination process and then periodically thereafter. We use a variety of methods and tools to assess a third-party vendor’s controls related to cybersecurity threats, including obtaining proof of a provider’s independent testing of data protection controls, imposition of contractual obligations and reviews of data protection controls such as backups, encryption standards and disaster recovery. Our Information Security Officer is primarily responsible for this cybersecurity component and is a key member of the risk management organization, coordinating with our Chief Risk Officer with board oversight through our Information Technology Steering Committee and the Audit Risk and Compliance Committee. Aside from the Information Security Officer, cybersecurity support is provided by our Director of Information Technology and our Chief Information Officer. Each of these persons has over twenty years of financial sector information technology and information security administration and management backed by undergraduate and/or post-graduate degrees in information technology, as well as various information technology and network certifications.

Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Management Processes Integrated [Text Block] The ERM program includes an annual risk prioritization process to identify key enterprise risks. Each key risk is assigned a risk owner to establish action plans and implement risk mitigation strategies. Cybersecurity is a critical component of this program, given the increasing reliance on technology and potential cyber threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] We maintain an Incident Response Plan that provides a documented framework for responding to actual or potential cybersecurity incidents, including timely notification of and escalation to the appropriate Board-approved management committees, and to the Information Technology Steering Committee. The Incident Response Plan facilitates coordination across multiple parts of our organization. Business Continuity, Disaster Recovery, and Incident Response plans are updated and tested at least annually. Management performs a variety of tests on the plans including tabletop, simulation, and technical testing to ensure key personnel are prepared, recovery systems and data are viable, and Recovery Time and Point Objectives can be met. Weaknesses identified during testing are monitored until they are fully remediated. The Information Technology Steering Committee provides oversight for the Business Continuity Management Program, which includes ratification of plans and Business Impact Analysis, plan testing frequency, and remediation of identified weaknesses. The Committee ensures, based on testing, that plans are adequate to meet the Company’s objectives.
Cybersecurity Risk Role of Management [Text Block] We engage various third parties to assist us in identifying, assessing and responding to cybersecurity threats. This includes around-the-clock managed firewall services and managed detection and response services. In addition, we engage third parties to test the vulnerability of our cybersecurity infrastructure on a regular basis and we have a third-party assessment performed annually. A third party provides social engineering and phishing testing on a subset of bank employees annually. These third-party service providers are in regular contact with our information technology personnel, and we monitor other sources for information that any of these providers may have encountered cybersecurity threats.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] All employees receive initial and ongoing training in cybersecurity awareness including such topics as email protocols, social engineering, phishing tactics and security of Bank issued computers and other devices. Management conducts regularly phishing testing on all employees and assigns additional training when necessary. Employees with privileged access receive additional relevant training. Key personnel pursue training in their respective disciplines on a continual basis
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true