XML 43 R27.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Oct. 26, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
We have implemented processes for assessing, identifying and managing material risks from cybersecurity threats as part of our cybersecurity risk management program. This program includes processes for continuous cybersecurity risk and advanced persistent cybersecurity threat monitoring; cybersecurity attack, vulnerability and cloud security management; and penetration testing. Our cybersecurity risk management program includes a cybersecurity incident response plan and escalation protocols; cybersecurity and data protection policies and training to our employees; a supply chain cybersecurity program to increase awareness, assess supplier security controls, help improve supplier security controls and manage security incidents; a program to protect company, customer and supplier intellectual property by operationalizing strategy, policy and awareness; a privacy and data protection program to keep pace with rapidly evolving global data laws and regulations as well as emerging technologies; engagement of third-party auditors to help assure the effectiveness of internal controls, including cybersecurity controls; and partnership with industry groups, government agencies and third-party experts in an effort to continuously improve our cybersecurity risk management program. We conduct assessments based on the National Institute of Standards and Technology Cybersecurity (NIST) Framework to evaluate our program, and we engage third-parties for assistance and to independently assess, proactively monitor and provide an external view of our cybersecurity program. We conduct risk assessments and tabletop exercises to evaluate the effectiveness of our systems and processes in addressing cybersecurity threats, including threats associated with our use of third-party service providers, and to identify areas for improvements. Our cybersecurity risk management program is integrated with our enterprise risk management (ERM) program, and information about cybersecurity risks and our cybersecurity risk management program is reviewed as part of our ERM program, sharing common risk governance and reporting processes that apply across our ERM program.
While we are not aware of having directly experienced a cybersecurity incident that has materially impacted our business, financial condition or results of operations, we face risks from cybersecurity threats that, if realized, could reasonably likely materially affect us, our business strategy, results of operations, or financial condition. See “Risk Factors - Operational and Financial Risks – We are exposed to cybersecurity threats and incidents” for additional information about cybersecurity related risks.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management program is integrated with our enterprise risk management (ERM) program, and information about cybersecurity risks and our cybersecurity risk management program is reviewed as part of our ERM program, sharing common risk governance and reporting processes that apply across our ERM program.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board of Directors is responsible for overseeing the assessment of major risks facing us, and its Audit Committee oversees our ERM program, including oversight of cybersecurity risks and of our cybersecurity risk management program. The Audit Committee receives quarterly reports from management on our cybersecurity risks and cybersecurity risk management program, and our management regularly updates the Chair of the Audit Committee regarding cybersecurity incidents where appropriate in accordance with our cybersecurity incident response plan and escalation protocols. The Audit Committee reports to the full Board regarding its activities, including those related to cybersecurity, and management reports to the full Board on our cybersecurity risks and cybersecurity risk management program at least annually.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors is responsible for overseeing the assessment of major risks facing us, and its Audit Committee oversees our ERM program, including oversight of cybersecurity risks and of our cybersecurity risk management program.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee receives quarterly reports from management on our cybersecurity risks and cybersecurity risk management program, and our management regularly updates the Chair of the Audit Committee regarding cybersecurity incidents where appropriate in accordance with our cybersecurity incident response plan and escalation protocols. The Audit Committee reports to the full Board regarding its activities, including those related to cybersecurity, and management reports to the full Board on our cybersecurity risks and cybersecurity risk management program at least annually.
Cybersecurity Risk Role of Management [Text Block]
Our management has day-to-day responsibility for assessing and managing material risks from cybersecurity threats, including implementing risk mitigation plans, processes and controls, and managing our cybersecurity risk management program. Our Chief Information Security Officer (CISO), who has extensive experience in cybersecurity and information security management, is primarily responsible for managing our cybersecurity risk management program, cybersecurity incident response plan and escalation protocols, and reports at least quarterly to the Audit Committee and at least annually to the full Board on our cybersecurity, data and intellectual property security programs, policies, risks and controls. The CISO reports to our Chief Information Officer, who is responsible for administering secure and scalable security infrastructure and reports to our Chief Digital Officer, each of whom has extensive experience in information technology.
Our management team’s efforts to prevent, detect, mitigate and remediate cybersecurity risks and incidents are informed by reviews with our information technology security teams, receipt of threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us, periodic assessments against the NIST Framework and through alerts and reports produced by security tools deployed in our information technology environment.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Chief Information Security Officer (CISO), who has extensive experience in cybersecurity and information security management, is primarily responsible for managing our cybersecurity risk management program, cybersecurity incident response plan and escalation protocols, and reports at least quarterly to the Audit Committee and at least annually to the full Board on our cybersecurity, data and intellectual property security programs, policies, risks and controls.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Chief Information Security Officer (CISO), who has extensive experience in cybersecurity and information security management, is primarily responsible for managing our cybersecurity risk management program, cybersecurity incident response plan and escalation protocols, and reports at least quarterly to the Audit Committee and at least annually to the full Board on our cybersecurity, data and intellectual property security programs, policies, risks and controls. The CISO reports to our Chief Information Officer, who is responsible for administering secure and scalable security infrastructure and reports to our Chief Digital Officer, each of whom has extensive experience in information technology.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our management has day-to-day responsibility for assessing and managing material risks from cybersecurity threats, including implementing risk mitigation plans, processes and controls, and managing our cybersecurity risk management program. Our Chief Information Security Officer (CISO), who has extensive experience in cybersecurity and information security management, is primarily responsible for managing our cybersecurity risk management program, cybersecurity incident response plan and escalation protocols, and reports at least quarterly to the Audit Committee and at least annually to the full Board on our cybersecurity, data and intellectual property security programs, policies, risks and controls. The CISO reports to our Chief Information Officer, who is responsible for administering secure and scalable security infrastructure and reports to our Chief Digital Officer, each of whom has extensive experience in information technology.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true