XML 48 R36.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy

Cybersecurity risk management is a major component of our overall risk management systems and processes. We have a cybersecurity program and governance structure designed to identify and manage cybersecurity risks and threats.

The program includes a well-defined risk assessment and analysis process, identifying critical digital assets, conducting thorough threat and vulnerability assessments, and quantifying risks based on potential impact and likelihood. This information prioritizes risks, allowing us to allocate resources effectively and focus on mitigating the most significant threats. Policies and procedures form the foundation of the cyber risk management program, with comprehensive guidelines covering data protection, access controls, incident response, and employee training. Security controls, such as robust identity governance and access controls, AI-based email security solutions, endpoint protection, and network security measures, are implemented to fortify our defenses. An effective incident response plan ensures a swift and coordinated response to security incidents, minimizing potential damages. Continuous monitoring through MDR (Managed Detect and Respond) solutions and staying informed about the latest threat intelligence feeds enhance our ability to detect and respond to evolving cyber threats.

As part of our cybersecurity program, we assess the cybersecurity posture of our third-party vendors and partners to ensure they meet our security standards. This includes due diligence during the vendor selection and periodic evaluations throughout our partnerships. Third-party risk management, compliance adherence, and the consideration of cyber insurance contribute to a holistic and proactive approach to cyber risk management. Regular reviews and updates to the program ensure its relevance and effectiveness in the face of emerging threats, fostering a culture of continuous improvement and resilience.

We have not identified any risks from cybersecurity threats, including any that resulted from previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Cybersecurity risk management is a major component of our overall risk management systems and processes. We have a cybersecurity program and governance structure designed to identify and manage cybersecurity risks and threats.
The program includes a well-defined risk assessment and analysis process, identifying critical digital assets, conducting thorough threat and vulnerability assessments, and quantifying risks based on potential impact and likelihood. This information prioritizes risks, allowing us to allocate resources effectively and focus on mitigating the most significant threats. Policies and procedures form the foundation of the cyber risk management program, with comprehensive guidelines covering data protection, access controls, incident response, and employee training. Security controls, such as robust identity governance and access controls, AI-based email security solutions, endpoint protection, and network security measures, are implemented to fortify our defenses. An effective incident response plan ensures a swift and coordinated response to security incidents, minimizing potential damages. Continuous monitoring through MDR (Managed Detect and Respond) solutions and staying informed about the latest threat intelligence feeds enhance our ability to detect and respond to evolving cyber threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our cybersecurity program encompasses a comprehensive framework that begins with a clear governance structure lead by our Chief Technical Officer (CTO). Our CTO has spent over twenty-five years in the technology industry specializing in information security, cloud transformation, business intelligence and infrastructure. His cybersecurity experience includes having founded and managed a technology security and infrastructure consulting business catering to Fortune 500 companies.
Our CTO provides our Board of Directors with quarterly reports on cybersecurity risks and any material cybersecurity incidents. These regular updates include topics related to cybersecurity practices, cyber risks and risk management processes, such as updates to our cybersecurity program and other cybersecurity developments. Regular reporting mechanisms to our Board of Directors and senior management keep all stakeholders informed about the evolving cyber risk landscape and the program’s effectiveness.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Board of Directors
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] These regular updates include topics related to cybersecurity practices, cyber risks and risk management processes, such as updates to our cybersecurity program and other cybersecurity developments. Regular reporting mechanisms to our Board of Directors and senior management keep all stakeholders informed about the evolving cyber risk landscape and the program’s effectiveness.
Cybersecurity Risk Role of Management [Text Block] Our CTO provides our Board of Directors with quarterly reports on cybersecurity risks and any material cybersecurity incidents. These regular updates include topics related to cybersecurity practices, cyber risks and risk management processes, such as updates to our cybersecurity program and other cybersecurity developments. Regular reporting mechanisms to our Board of Directors and senior management keep all stakeholders informed about the evolving cyber risk landscape and the program’s effectiveness.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our cybersecurity program encompasses a comprehensive framework that begins with a clear governance structure lead by our Chief Technical Officer (CTO).
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our CTO has spent over twenty-five years in the technology industry specializing in information security, cloud transformation, business intelligence and infrastructure. His cybersecurity experience includes having founded and managed a technology security and infrastructure consulting business catering to Fortune 500 companies.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our CTO provides our Board of Directors with quarterly reports on cybersecurity risks and any material cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true