XML 53 R29.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Assessing, Identifying, and Managing Material Risks
Trinity’s IRM program is aligned to the National Institute of Science and Technology (“NIST”) Cybersecurity Framework (“CSF”) and conducts maturity assessments against the NIST CSF on a quarterly basis. Our IRM program encompasses the full lifecycle of information risk, from creation through disposition, and is guided by policies, processes, standards, and procedures in vulnerability management, incident response, information governance, risk management, and security awareness. Additionally, Trinity exercises a variety of testing approaches to assess the state of systems and personnel, including annual penetration testing by independent third parties, ad hoc penetration testing by internal personnel, and tabletop exercises for executive and senior leadership, information technology, IRM, and legal employees. Trinity also maintains an incident response relationship with an industry-leading provider to ensure resource availability if a significant event were to occur.
As cybersecurity touches all employees, we include formal training on cybersecurity in the annually required Code of Business Conduct training. The training focuses on awareness of cybersecurity risks and requirements. For targeted groups, we conduct phishing email response checks.
Cybersecurity Risk Management Processes Integrated [Text Block]
Integration Into Overall Risk Management
Cybersecurity risk management is integrated into our broader enterprise risk management framework to promote a culture of cybersecurity awareness. This integration ensures that cybersecurity considerations are an integral part of our decision-making processes throughout Trinity. Our IRM team works closely with our information technology department to continuously evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Cybersecurity risks are assessed by Trinity’s IRM team, and the risk assessment is aligned with business-level processes and is consistent with Trinity’s standard enterprise risk management methods and thresholds. Our IRM organization regularly consumes a variety of threat intelligence and information security news sources to inform and align risk management decisions to current threats and threat landscapes.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block]
Risks From Cybersecurity Threats
To date, we have not experienced any risks from cybersecurity threats or incidents that have materially affected us or are reasonably likely to materially affect us, our business strategy, results of operations, or financial condition.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
Board of Directors Oversight and Reporting
The Audit Committee of our Board of Directors reviews the Company’s risks related to data privacy, cybersecurity, and information technology. The Audit Committee periodically reviews and assesses the adequacy of the security for the Company's information systems and the Company's contingency plans in the event of a systems breakdown or security breach. The CISO reports to the Audit Committee twice per year and to the Board of Directors once per year on cybersecurity risks, activities, policies and procedures.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The CISO reports to the Audit Committee twice per year and to the Board of Directors once per year on cybersecurity risks, activities, policies and procedures.
Cybersecurity Risk Role of Management [Text Block]
Management’s Role
Our CISO and Chief Legal Officer oversee all cybersecurity efforts and lead our IRM organization. Our CISO has over two decades of experience in the cybersecurity and information security fields, including experience with both private businesses and the military. In addition, he has degrees in both information technology and business administration. Our IRM professionals include multiple personnel with more than ten years of experience and expertise in information security and are continually building their professional knowledge through local information systems communities and an available set of educational materials.
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our CISO and Chief Legal Officer oversee all cybersecurity efforts and lead our IRM organization.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our CISO has over two decades of experience in the cybersecurity and information security fields, including experience with both private businesses and the military. In addition, he has degrees in both information technology and business administration. Our IRM professionals include multiple personnel with more than ten years of experience and expertise in information security and are continually building their professional knowledge through local information systems communities and an available set of educational materials.