XML 51 R26.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We understand the importance of maintaining an active cybersecurity risk management and strategy program. As an emerging technology company, we understand that we may face cyber threats that range from common cyberattacks, such as ransomware, to more advanced attacks such as advanced persistent threats perpetrated by nation-state actors and other highly organized actors. Our cybersecurity risk management program is guided by industry standards, such as the National Institute of Standards and Technology (“NIST”). We strategically partner with external vendors to perform cybersecurity assessments to better understand our potential vulnerabilities, threat vectors, and impact on critical assets or operations. As part of these processes, our cybersecurity team identifies and prioritizes risks to devise our annual cybersecurity mitigation strategy and address operational risks.
Our cybersecurity program is organized around the following key areas:
Risk Management and Strategy
Insider Risk Management. We recognize that not all threats are external. We have an insider risk management program and are working to improve our data loss protection technology to protect our critical data.
Security Awareness Education. Understanding the need for regular cybersecurity training, we have instituted a mandatory training program for all employees around information security and data privacy.
Technical Safeguards. We maintain an enterprise mobile management system, and continue to increase our investment in strengthening email, DNS, and other network security services.
Threat Detection and Response. In addition to aligning our cybersecurity risk management program to NIST standards, we have also engaged with third party providers of security information. BETA’s cybersecurity services provide continuous monitoring and operational threat detection and response. We are actively engaged with the Aviation Information Sharing and Analysis Center (“A-ISAC”) which gathers, analyzes and shares information to combat cyber-related threats and weaknesses. We use this information to ensure we are aware of threats actively impacting our industry. Our partners integrate threat intelligence into their platforms, providing us with a proactive view of possible threats.
Incident Response. Our incident response team regularly exercises BETA’s Incident Response Protocol to practice at a tactical level the incident response escalation process. At an enterprise level, we are actively engaged in bringing cross-functional leadership roles into maturating our incident response process and procedures.
Third Party Risk Management. To manage third-party risks, our cybersecurity team evaluates our partners, to provide an additional layer of scrutiny, and monitors and identifies material risks associated with the use of third-party service providers. These processes include a review of security controls and supplier contractual obligations for security and data protection requirements.
Cybersecurity Service Providers and Third-party Consultants. We engage cybersecurity consultants and other third parties to assess and enhance our information security practices. These third parties conduct assessments, penetration testing, and vulnerability assessments to identify weaknesses and recommend improvements. We also utilize third-party tools and technologies to support our efforts to enhance our cybersecurity functions.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Threat Detection and Response. In addition to aligning our cybersecurity risk management program to NIST standards, we have also engaged with third party providers of security information. BETA’s cybersecurity services provide continuous monitoring and operational threat detection and response. We are actively engaged with the Aviation Information Sharing and Analysis Center (“A-ISAC”) which gathers, analyzes and shares information to combat cyber-related threats and weaknesses. We use this information to ensure we are aware of threats actively impacting our industry. Our partners integrate threat intelligence into their platforms, providing us with a proactive view of possible threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our Board is committed to maintaining a well-informed cybersecurity posture, regularly engaging by receiving scheduled and requested updates on our strategy and evolving threat landscape as well as continued education on recent cybersecurity trends. We support this oversight through an internal Cybersecurity Steering Committee that provides cross-functional oversight of our cybersecurity program, supporting management through regular review of strategic initiatives, emerging threats, incident preparedness, and risk mitigation efforts.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our management team plays a pivotal role in assessing and managing material risks from cybersecurity threats, and our Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
We are continuing to develop and refine processes to continuously monitor, analyze emerging threats, and to develop and implement risk mitigation strategies. Our management team plays a pivotal role in assessing and managing material risks from cybersecurity threats, and our Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Role of Management [Text Block]
We are continuing to develop and refine processes to continuously monitor, analyze emerging threats, and to develop and implement risk mitigation strategies. Our management team plays a pivotal role in assessing and managing material risks from cybersecurity threats, and our Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our management team plays a pivotal role in assessing and managing material risks from cybersecurity threats, and our Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our management team plays a pivotal role in assessing and managing material risks from cybersecurity threats, and our Chief Information Officer, who has served in various leadership roles in information technology for over 20 years, provides leadership for our cybersecurity team.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true