XML 49 R30.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 27, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Risk Management and Strategy:
We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things, operational risks; intellectual property theft; fraud; extortion; harm to employees, customers or consumers; violation of data privacy or data security laws and other litigation and legal risk; and reputational risks.
We also maintain an incident response plan to coordinate the activities we take to protect against, detect, respond to and remediate cybersecurity incidents, as such term is defined in Item 106(a) of Regulation S-K, as well as to comply with potentially applicable legal obligations and mitigate risk, including reputational damage.
We have implemented several cybersecurity processes, technologies, and controls to aid in our efforts to identify, assess, and manage material risks, as well as to test and improve our incident response plan. Our approach includes, among other things:
conducting regular network and endpoint monitoring, vulnerability assessments, and penetration testing to improve our information systems, as such term is defined in Item 106(a) of Regulation S-K;
running tabletop exercises to simulate a response to a cybersecurity incident and use the findings to improve our processes and technologies;
regular, mandatory cybersecurity training programs for relevant employees;
comparing our processes to standards set by the International Organization for Standardization (“ISO”);
leveraging the ISO information security incident management model to help us identify, protect, detect, respond, and recover when there is an actual or potential cybersecurity incident;
leveraging third-party threat intelligence services designed to model and research our adversaries;
closely monitoring emerging data protection laws and implementing changes to our processes designed to comply;
periodically reviewing our consumer facing policies and statements related to cybersecurity;
conducting regular phishing email simulations for relevant employees and all contractors with access to corporate email systems to enhance awareness and responsiveness to such possible threats;
through policy, practice and contract (as applicable) requiring employees, as well as third parties who provide services on our behalf, to treat customer information and data with care; and
carrying information security risk insurance that provides protection against the potential losses arising from a cybersecurity incident.
These approaches vary in maturity across the business and we work to continually improve them.
Our process for identifying and assessing material risks from cybersecurity threats operates alongside our broader overall risk assessment process, covering all company risks. As part of this process appropriate disclosure personnel will collaborate with subject matter specialists, as necessary, to gather insights for identifying and assessing material cybersecurity threat risks, their severity, and potential mitigations.
As part of the above approach and processes, we periodically engage with assessors, consultants, auditors, and other third-parties, for purposes of evaluating our cybersecurity posture and identifying areas for continued focus, improvement and/or compliance.
We describe how risks associated with a potential cybersecurity incident are reasonably likely to materially affect us, including our business, results of operations and financial condition, under the heading “A significant information security or operational technology incident, including a cyberattack or a data breach, could disrupt our operations and adversely impact our operating results, cash flows and reputation,” included as part of our risk factor disclosures at Item 1A of this Annual Report on Form 10-K, which disclosures are incorporated by reference herein.
In the last three fiscal years, we have not experienced any material cybersecurity incidents and the expenses we have incurred from cybersecurity incidents were immaterial. This includes penalties and settlements, of which there were none.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things, operational risks; intellectual property theft; fraud; extortion; harm to employees, customers or consumers; violation of data privacy or data security laws and other litigation and legal risk; and reputational risks.
We also maintain an incident response plan to coordinate the activities we take to protect against, detect, respond to and remediate cybersecurity incidents, as such term is defined in Item 106(a) of Regulation S-K, as well as to comply with potentially applicable legal obligations and mitigate risk, including reputational damage.
We have implemented several cybersecurity processes, technologies, and controls to aid in our efforts to identify, assess, and manage material risks, as well as to test and improve our incident response plan. Our approach includes, among other things:
conducting regular network and endpoint monitoring, vulnerability assessments, and penetration testing to improve our information systems, as such term is defined in Item 106(a) of Regulation S-K;
running tabletop exercises to simulate a response to a cybersecurity incident and use the findings to improve our processes and technologies;
regular, mandatory cybersecurity training programs for relevant employees;
comparing our processes to standards set by the International Organization for Standardization (“ISO”);
leveraging the ISO information security incident management model to help us identify, protect, detect, respond, and recover when there is an actual or potential cybersecurity incident;
leveraging third-party threat intelligence services designed to model and research our adversaries;
closely monitoring emerging data protection laws and implementing changes to our processes designed to comply;
periodically reviewing our consumer facing policies and statements related to cybersecurity;
conducting regular phishing email simulations for relevant employees and all contractors with access to corporate email systems to enhance awareness and responsiveness to such possible threats;
through policy, practice and contract (as applicable) requiring employees, as well as third parties who provide services on our behalf, to treat customer information and data with care; and
carrying information security risk insurance that provides protection against the potential losses arising from a cybersecurity incident.
These approaches vary in maturity across the business and we work to continually improve them.
Our process for identifying and assessing material risks from cybersecurity threats operates alongside our broader overall risk assessment process, covering all company risks. As part of this process appropriate disclosure personnel will collaborate with subject matter specialists, as necessary, to gather insights for identifying and assessing material cybersecurity threat risks, their severity, and potential mitigations.
As part of the above approach and processes, we periodically engage with assessors, consultants, auditors, and other third-parties, for purposes of evaluating our cybersecurity posture and identifying areas for continued focus, improvement and/or compliance.
We describe how risks associated with a potential cybersecurity incident are reasonably likely to materially affect us, including our business, results of operations and financial condition, under the heading “A significant information security or operational technology incident, including a cyberattack or a data breach, could disrupt our operations and adversely impact our operating results, cash flows and reputation,” included as part of our risk factor disclosures at Item 1A of this Annual Report on Form 10-K, which disclosures are incorporated by reference herein.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Audit Committee of our Board of Directors is responsible for the oversight of risks from cybersecurity threats. At least annually, the Audit Committee receives an overview from management of our cybersecurity threat risk management, including topics such as data security posture, results from third-party assessments, and material cybersecurity threat risks or incidents and developments, as well as the steps management has taken to respond to such risks. In such sessions, the Audit Committee generally receives materials indicating current and emerging material cybersecurity threat risks, and describing the company’s ability to mitigate those risks, and discusses such matters with our Information Security Leadership Team, comprised of Chris Walter, our Chief Information Officer, Frank Madigan, our Vice President, Information Technology and Security and Kelvin James, our Senior Manager, Information Security (the “InfoSec Leadership Team”).
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of our Board of Directors is responsible for the oversight of risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] At least annually, the Audit Committee receives an overview from management of our cybersecurity threat risk management, including topics such as data security posture, results from third-party assessments, and material cybersecurity threat risks or incidents and developments, as well as the steps management has taken to respond to such risks. In such sessions, the Audit Committee generally receives materials indicating current and emerging material cybersecurity threat risks, and describing the company’s ability to mitigate those risks, and discusses such matters with our Information Security Leadership Team, comprised of Chris Walter, our Chief Information Officer, Frank Madigan, our Vice President, Information Technology and Security and Kelvin James, our Senior Manager, Information Security (the “InfoSec Leadership Team”).
Cybersecurity Risk Role of Management [Text Block]
Our cybersecurity risk management and strategy processes, which are discussed in greater detail above, are led by our InfoSec Leadership Team. The executives on this team have collectively over 60 years of prior work experience in the management of information security, developing cybersecurity strategy and implementing effective information and cybersecurity programs. In addition to their work experience, Mr. Madigan has a Master of Business Administration in Information Technology Management and Mr. James has a Master of Science in Information Security and Assurance.
The InfoSec Leadership Team is informed about and monitors the prevention, mitigation, detection, and remediation of cybersecurity incidents through their management of, and participation in, the cybersecurity risk management and strategy processes described above, including the operation of our incident response plan. If a cybersecurity incident is determined to be a material cybersecurity incident, our incident response plan and cybersecurity disclosure controls and procedures define the process to disclose such material cybersecurity incident.
As discussed above, the InfoSec Leadership Team reports about cybersecurity threat risks, among other cybersecurity related matters, to senior management and the Audit Committee, which provides updates to the full Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Audit Committee of our Board of Directors is responsible for the oversight of risks from cybersecurity threats.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The executives on this team have collectively over 60 years of prior work experience in the management of information security, developing cybersecurity strategy and implementing effective information and cybersecurity programs.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Audit Committee of our Board of Directors is responsible for the oversight of risks from cybersecurity threats. At least annually, the Audit Committee receives an overview from management of our cybersecurity threat risk management, including topics such as data security posture, results from third-party assessments, and material cybersecurity threat risks or incidents and developments, as well as the steps management has taken to respond to such risks. In such sessions, the Audit Committee generally receives materials indicating current and emerging material cybersecurity threat risks, and describing the company’s ability to mitigate those risks, and discusses such matters with our Information Security Leadership Team, comprised of Chris Walter, our Chief Information Officer, Frank Madigan, our Vice President, Information Technology and Security and Kelvin James, our Senior Manager, Information Security (the “InfoSec Leadership Team”).
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true