XML 53 R37.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity is a part of our risk management framework, and we have established policies and processes designed to manage cybersecurity defenses, controls and programs, including ISO 27001 compliant security procedures. Our processes are evaluated by expert cybersecurity firms through various security assessments and audits, which help us identify and mitigate cyber-related risks to our businesses. We also engage with providers of information systems as part of our continuing efforts to enhance the effectiveness of our security measures. Our vendor risk management (VRM) program, through which we screen external providers, helps us identify and evaluate known risks associated with these third parties.
Our information security program is led by our Chief Information Security Officer (CISO) who manages a global information security team responsible for assessing and mitigating cyber-related threats. The cybersecurity expertise of our CISO and his team includes information security management as well as governance, risk and compliance (GRC) roles, hands-on cyber incident response experience, forensic and network intrusion investigations and security risk assessments.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Cybersecurity is a part of our risk management framework, and we have established policies and processes designed to manage cybersecurity defenses, controls and programs, including ISO 27001 compliant security procedures. Our processes are evaluated by expert cybersecurity firms through various security assessments and audits, which help us identify and mitigate cyber-related risks to our businesses. We also engage with providers of information systems as part of our continuing efforts to enhance the effectiveness of our security measures. Our vendor risk management (VRM) program, through which we screen external providers, helps us identify and evaluate known risks associated with these third parties.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our CISO regularly reports to senior management on cybersecurity risks and incidents, including the nature of threats, the state of our defense and detection capabilities, incident response plans and employee training activities, as applicable. In addition, as part of the Board’s oversight of the Company’s risk management program, our CISO provides periodic updates to the Board on the state of our cybersecurity management program in addition to, when needed, ad hoc information about any significant cybersecurity matters and/or strategic risk management decisions.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our information security program is led by our Chief Information Security Officer (CISO) who manages a global information security team responsible for assessing and mitigating cyber-related threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our CISO regularly reports to senior management on cybersecurity risks and incidents, including the nature of threats, the state of our defense and detection capabilities, incident response plans and employee training activities, as applicable. In addition, as part of the Board’s oversight of the Company’s risk management program, our CISO provides periodic updates to the Board on the state of our cybersecurity management program in addition to, when needed, ad hoc information about any significant cybersecurity matters and/or strategic risk management decisions.
Cybersecurity Risk Role of Management [Text Block]
Our information security program is led by our Chief Information Security Officer (CISO) who manages a global information security team responsible for assessing and mitigating cyber-related threats. The cybersecurity expertise of our CISO and his team includes information security management as well as governance, risk and compliance (GRC) roles, hands-on cyber incident response experience, forensic and network intrusion investigations and security risk assessments.
Our CISO regularly reports to senior management on cybersecurity risks and incidents, including the nature of threats, the state of our defense and detection capabilities, incident response plans and employee training activities, as applicable. In addition, as part of the Board’s oversight of the Company’s risk management program, our CISO provides periodic updates to the Board on the state of our cybersecurity management program in addition to, when needed, ad hoc information about any significant cybersecurity matters and/or strategic risk management decisions.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our information security program is led by our Chief Information Security Officer (CISO) who manages a global information security team responsible for assessing and mitigating cyber-related threats.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The cybersecurity expertise of our CISO and his team includes information security management as well as governance, risk and compliance (GRC) roles, hands-on cyber incident response experience, forensic and network intrusion investigations and security risk assessments.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our CISO regularly reports to senior management on cybersecurity risks and incidents, including the nature of threats, the state of our defense and detection capabilities, incident response plans and employee training activities, as applicable. In addition, as part of the Board’s oversight of the Company’s risk management program, our CISO provides periodic updates to the Board on the state of our cybersecurity management program in addition to, when needed, ad hoc information about any significant cybersecurity matters and/or strategic risk management decisions.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true