XML 69 R34.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have adopted processes designed to identify, assess and manage material risks from cybersecurity threats. Those processes include response to and an assessment of internal and external threats to the security, confidentiality, integrity and availability of our data and systems along with other material risks to our operations, at least annually or whenever there are material changes to our systems or operations.
Our Management Risk Committee (MRC) collaborates with our Head of IT and Chief Information Security Officer (CISO) along with the IT Department to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our Head of IT and CISO along with the IT Department implement processes and technologies to provide security monitoring and vulnerability management. We have an incident response plan in place with designated roles and responsibilities for responding to and escalating cybersecurity events and incidents.
As part of our risk management process, we engage outside providers to conduct periodic penetration testing and vulnerability assessments.
We maintain a third-party risk management program that includes vendor due diligence at onboarding, periodic assessments, and continuous risk monitoring. Assessments include reviews of security controls and cybersecurity questionnaires or other technical evaluations. In addition, we maintain a vendor risk register and review risk ratings semi-annually.
As of the date of this report, we have not experienced a cybersecurity incident that resulted in a material effect on our business strategy, results of operations, or financial condition.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We have adopted processes designed to identify, assess and manage material risks from cybersecurity threats. Those processes include response to and an assessment of internal and external threats to the security, confidentiality, integrity and availability of our data and systems along with other material risks to our operations, at least annually or whenever there are material changes to our systems or operations.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board of Directors provides oversight of the Company’s cybersecurity risk management program.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of our Board of Directors has primary responsibility for oversight of cybersecurity and is briefed on cybersecurity risks quarterly and following any material cybersecurity incidents.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Reporting to the Audit Committee of our Board of Directors quarterly, our Head of IT and CISO may address overall assessment of the Company’s compliance with our cybersecurity policies and procedures, risk management, service provider arrangements, testing results and security incident response and makes recommendations for changes and updates to policies, procedures, and technologies related to cybersecurity and IT risk management.
Cybersecurity Risk Role of Management [Text Block]
Our cybersecurity program is managed by our Head of IT and CISO, who reports to our Chief Administrative Officer and has served in this role since 2019. Our Head of IT and CISO has over 20 years of industry experience in information technology and maintains industry certifications such as the ISC2 CISSP.
Reporting to the Audit Committee of our Board of Directors quarterly, our Head of IT and CISO may address overall assessment of the Company’s compliance with our cybersecurity policies and procedures, risk management, service provider arrangements, testing results and security incident response and makes recommendations for changes and updates to policies, procedures, and technologies related to cybersecurity and IT risk management.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our cybersecurity program is managed by our Head of IT and CISO, who reports to our Chief Administrative Officer and has served in this role since 2019. Our Head of IT and CISO has over 20 years of industry experience in information technology and maintains industry certifications such as the ISC2 CISSP.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Head of IT and CISO has over 20 years of industry experience in information technology and maintains industry certifications such as the ISC2 CISSP.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Reporting to the Audit Committee of our Board of Directors quarterly, our Head of IT and CISO may address overall assessment of the Company’s compliance with our cybersecurity policies and procedures, risk management, service provider arrangements, testing results and security incident response and makes recommendations for changes and updates to policies, procedures, and technologies related to cybersecurity and IT risk management.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true