XML 48 R32.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan.

We leverage guidance from the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF”), which provides an outline of enterprise security processes and controls, to inform the design and assessment of our cybersecurity risk management program. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.

Our cybersecurity risk management program is overseen by a cross-functional team comprised of our business-functional and IT employees. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas.

Our cybersecurity risk management program includes:

risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services, and our broader enterprise IT environment;

evaluations of our readiness to assess, respond and, as applicable, recover from potential cybersecurity incidents;

the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls;

cybersecurity training to educate our employees (including senior management and incident response personnel), consultants, and other users about their individual responsibilities regarding protecting our IT systems and data;

a third-party risk management process for service providers, suppliers and vendors who have access to our critical systems and information.

We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. For more information, see the section titled “Risk Factor—Market and Other External Risks—Failure to protect our information technology systems against security breaches, service interruptions, or misappropriation of data could disrupt operations, compromise sensitive data, and expose us to liability, possibly causing our business and reputation to suffer.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee oversight of cybersecurity and other information technology risks. Our Audit Committee oversees management’s implementation of our cybersecurity risk management program. On a quarterly basis, our Audit Committee receives updates from our CISO with respect to the status of our cybersecurity initiatives to strengthen our cybersecurity risk management. In addition, our CISO updates the Audit Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential. Our Audit Committee discusses the potential impact of cybersecurity risks on our financial condition, results of operations or our reputation. Our Audit Committee periodically reports to the Board regarding its activities, including those related to cybersecurity. The Board also periodically receives briefings from management on our cyber risk management program. Board members receive periodic presentations on cybersecurity topics from our CISO, internal security staff or external experts as part of the Board’s continuing education on topics that impact public companies.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Our ISC members includes our Chief Information Security Officer ("CISO") and our Director of IT Security, Risk and Compliance who have a combined 20 years of risk management experience encompassing cybersecurity and technology security, such as threat assessments, risk management, cybersecurity insurance, incident response, end user awareness and vulnerability management.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true