XML 57 R32.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jan. 26, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
As part of our overall enterprise risk management strategy, our cybersecurity processes seek to help the Company prevent or mitigate potential cybersecurity incidents, and to detect and remediate them quickly when they occur. To achieve this, the Company uses a broad selection of security tools and methodologies to assess, identify and manage material risks from cybersecurity threats.
Key aspects of our cybersecurity risk management and threat mitigation strategy include:
Maintaining our ISO/IEC 27001:2022 certification and using it along with other common security frameworks to help assess, identify, and manage material risks from cybersecurity;
Utilizing dedicated IT Security Operations and Product Security teams focused on monitoring, enforcing and improving cybersecurity throughout the enterprise;
Engaging and training internal stakeholders from representative aspects of the business (product and functional teams) on our Incident Response and Reporting plan on a quarterly basis;
Maintaining and regularly testing our disaster recovery and business continuity plans; and
Creating information security awareness among our employees and partners through the use of phishing exercises and regular cyber-awareness articles & newsletter campaigns.
The Company evaluates our third-party vendors and service providers to ensure appropriate oversight and to identify any risks from cybersecurity threats associated with the use of their tools or services. To that end, as part of the onboarding process, our internal IT Security Operations team:
Collects and evaluates self-certification information about each vendor’s cybersecurity program and external certifications;
Reviews independent security reports that inform us about each vendor’s security posture and historical incidents; and
Provides a timely evaluation of whether to move forward with the vendor’s engagement based on their cybersecurity risk profile.
As part of our processes, we also engage third parties and industry experts to conduct audits and other assessments of our cybersecurity system. These assessments include vulnerability assessments, penetration testing and table-top exercises. The results of these reviews help to identify areas for continued focus, improvement and/or compliance. We also regularly evaluate our cybersecurity position against benchmarks of our peers and industry leaders, and expect our strategy and management approach to change as the general cybersecurity landscape evolves.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
As part of our overall enterprise risk management strategy, our cybersecurity processes seek to help the Company prevent or mitigate potential cybersecurity incidents, and to detect and remediate them quickly when they occur. To achieve this, the Company uses a broad selection of security tools and methodologies to assess, identify and manage material risks from cybersecurity threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Consistent with our overall risk management governance structure, the Vice President of IT Infrastructure and Security ("VP of IT Security") is responsible for the day-to-day management of cybersecurity risk, while our Board of Directors and its Audit Committee play an active, ongoing oversight role.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee or the full Board of Directors receive quarterly cybersecurity updates, which are prepared by our VP of IT Security.
Cybersecurity Risk Role of Management [Text Block]
The VP of IT Security works directly with the IT Security Operation Team and the Product Security Team to ensure effective and timely monitoring, prevention, detection, mitigation, and remediation of cybersecurity incidents. In line with our incident response plan, the VP of IT Security informs executive management regarding cybersecurity risks and incidents and provides regular updates about cybersecurity incidents to the Board, the Chief Operating Officer and other members of the executive management team as well as to the Audit Committee and the Board of Directors, as appropriate.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
The VP of IT Security works directly with the IT Security Operation Team and the Product Security Team to ensure effective and timely monitoring, prevention, detection, mitigation, and remediation of cybersecurity incidents. In line with our incident response plan, the VP of IT Security informs executive management regarding cybersecurity risks and incidents and provides regular updates about cybersecurity incidents to the Board, the Chief Operating Officer and other members of the executive management team as well as to the Audit Committee and the Board of Directors, as appropriate.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Our VP of IT Security has held IT security and leadership roles at the Company for over 24 years and maintains a wide range of industry certifications including Certified Information Systems Security Professional.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Audit Committee or the full Board of Directors receive quarterly cybersecurity updates, which are prepared by our VP of IT Security. The report provides comprehensive cybersecurity updates, including topics such as security incidents, our threat landscape, compliance, key performance metrics and material risks, along with updates on general cybersecurity project execution.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true