XML 50 R27.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
The Company has implemented and maintains processes for assessing, identifying and managing material risks from potential unauthorized occurrences on or through its information technology (IT) and industrial control systems (ICS) networks that may result in material adverse effects on the confidentiality, integrity and availability of the Company’s systems and the information residing in those systems. These include a wide variety of mechanisms, controls, technologies, methods, systems, written policies, physical safeguards and other processes designed to prevent or mitigate data loss, theft, misuse or other security incidents or vulnerabilities affecting the Company’s systems and the data it collects, processes, stores and transmits as part of its businesses.
The Company has developed a robust cybersecurity program which is reviewed by senior leadership including its CIO and other stakeholders as part of its standard general IT controls. Business network and ICS cybersecurity risks are handled by separate and dedicated Company teams and are incorporated into the Company’s enterprise risk management program.
The Company’s cybersecurity strategy is intended to mitigate cybersecurity threats identified in the risk management process and provide a framework for the Company to have appropriate administrative, technical and physical safeguards to protect its systems and data and respond effectively to cybersecurity threats. The Company’s cybersecurity program aligns with the National Institute of Standards and Technology framework and leverages people, processes and technology to identify and respond to cybersecurity threats in a timely manner. The Company relies on continuous security monitoring, penetration testing, vulnerability scanning, personnel training and other tools to identify and mitigate potential cybersecurity threats. The Company also has established cybersecurity policies that address its cybersecurity practices and controls. The Company has invested in broad cybersecurity awareness and mandatory training to educate those with access to company networks on the Company’s cybersecurity policies and best practices. The Company conducts regular phishing tests to educate, train and assess the workforce’s ability to identify malicious emails. The Company also conducts internal security audits and other readiness tests, including audits conducted by third parties and tabletop exercises, to assess and improve preparedness and promote communication and monitoring across the organization. In addition to its administrative and technical safeguards, the Company has implemented physical safeguards intended to mitigate risks to its systems. Using a standardized written evaluation and other investigative processes, the Company identifies and assesses cybersecurity risks flowing from its vendors and suppliers, and manages these using a risk-based approach.
The Company has implemented and maintains a cybersecurity incident response plan that provides the organizational and operational protocol for the Company to effectively and timely respond to cybersecurity incidents. In the event of a material cybersecurity incident, the Company’s CIO will receive regular updates and monitor detection, mitigation and remediation through reports from a team of experienced cybersecurity leaders responsible for actioning the Company’s cybersecurity incident response plan. As a material cybersecurity incident is handled by the team, the CIO will maintain communication and information flow to senior leadership as well as the Audit Committee and/or the Board, as appropriate. Cybersecurity risks and associated mitigation strategies and efforts are analyzed by senior leadership as part of the enterprise risk assessments that are reported to and discussed by the Board.
The Company’s business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but the Company cannot provide assurance that it will not be materially affected in the future by such risks or any future material incidents. For more information on the Company’s cybersecurity-related risks, see Risk Factors under Part I, Item 1A of this Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Company has implemented and maintains processes for assessing, identifying and managing material risks from potential unauthorized occurrences on or through its information technology (IT) and industrial control systems (ICS) networks that may result in material adverse effects on the confidentiality, integrity and availability of the Company’s systems and the information residing in those systems. These include a wide variety of mechanisms, controls, technologies, methods, systems, written policies, physical safeguards and other processes designed to prevent or mitigate data loss, theft, misuse or other security incidents or vulnerabilities affecting the Company’s systems and the data it collects, processes, stores and transmits as part of its businesses.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
BOARD
The Audit Committee of the Board oversees the Company’s IT security programs, including cybersecurity, which includes review of possible external threats and potential mitigations. The Board also reviews the Company’s cybersecurity program at least annually. In this review, the CIO briefs the full Board on cybersecurity and data protection matters, including analysis and review of the measures implemented by the Company to identify and mitigate cybersecurity risks. The Company also has protocols by which material cybersecurity incidents are to be reported to the Audit Committee and/or the Board.

SENIOR MANAGEMENT
The Company’s CIO, who has over 20 years of IT and cybersecurity experience at the Company and elsewhere, heads the team responsible for implementing and maintaining cybersecurity and data protection practices across the Company’s businesses and reports directly to the President and CEO. The Company has a centrally coordinated team, led by its CIO, responsible for implementing and maintaining cybersecurity and data protection practices across the Company. The Company’s CIO regularly reviews risk management measures and the overall cyber risk strategy implemented and maintained by the Company. The CIO receives regular updates on the Company’s cybersecurity program and monitors the
prevention, detection, mitigation and remediation of cybersecurity incidents through reports from the Company’s cybersecurity leaders, each of whom is supported by a team of trained cybersecurity professionals. In addition to the Company’s extensive in-house cybersecurity capabilities, the Company also engages assessors, consultants, auditors or other third parties when necessary to assist with assessing, identifying and managing cybersecurity risks.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of the Board oversees the Company’s IT security programs, including cybersecurity, which includes review of possible external threats and potential mitigations.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board also reviews the Company’s cybersecurity program at least annually. In this review, the CIO briefs the full Board on cybersecurity and data protection matters, including analysis and review of the measures implemented by the Company to identify and mitigate cybersecurity risks. The Company also has protocols by which material cybersecurity incidents are to be reported to the Audit Committee and/or the Board.
Cybersecurity Risk Role of Management [Text Block]
The Company’s CIO, who has over 20 years of IT and cybersecurity experience at the Company and elsewhere, heads the team responsible for implementing and maintaining cybersecurity and data protection practices across the Company’s businesses and reports directly to the President and CEO. The Company has a centrally coordinated team, led by its CIO, responsible for implementing and maintaining cybersecurity and data protection practices across the Company. The Company’s CIO regularly reviews risk management measures and the overall cyber risk strategy implemented and maintained by the Company. The CIO receives regular updates on the Company’s cybersecurity program and monitors the
prevention, detection, mitigation and remediation of cybersecurity incidents through reports from the Company’s cybersecurity leaders, each of whom is supported by a team of trained cybersecurity professionals. In addition to the Company’s extensive in-house cybersecurity capabilities, the Company also engages assessors, consultants, auditors or other third parties when necessary to assist with assessing, identifying and managing cybersecurity risks.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
The Company’s CIO, who has over 20 years of IT and cybersecurity experience at the Company and elsewhere, heads the team responsible for implementing and maintaining cybersecurity and data protection practices across the Company’s businesses and reports directly to the President and CEO. The Company has a centrally coordinated team, led by its CIO, responsible for implementing and maintaining cybersecurity and data protection practices across the Company. The Company’s CIO regularly reviews risk management measures and the overall cyber risk strategy implemented and maintained by the Company. The CIO receives regular updates on the Company’s cybersecurity program and monitors the
prevention, detection, mitigation and remediation of cybersecurity incidents through reports from the Company’s cybersecurity leaders, each of whom is supported by a team of trained cybersecurity professionals. In addition to the Company’s extensive in-house cybersecurity capabilities, the Company also engages assessors, consultants, auditors or other third parties when necessary to assist with assessing, identifying and managing cybersecurity risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] ’s CIO, who has over 20 years of IT and cybersecurity experience at the Company and elsewhere, heads the team responsible for implementing and maintaining cybersecurity and data protection practices across the Company’s businesses and reports directly to the President and CEO.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Company has a centrally coordinated team, led by its CIO, responsible for implementing and maintaining cybersecurity and data protection practices across the Company. The Company’s CIO regularly reviews risk management measures and the overall cyber risk strategy implemented and maintained by the Company. The CIO receives regular updates on the Company’s cybersecurity program and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents through reports from the Company’s cybersecurity leaders, each of whom is supported by a team of trained cybersecurity professionals. In addition to the Company’s extensive in-house cybersecurity capabilities, the Company also engages assessors, consultants, auditors or other third parties when necessary to assist with assessing, identifying and managing cybersecurity risks.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true