XML 44 R29.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Risk Management and Strategy
Our cybersecurity risk management strategy focuses on several areas:
Identification and Reporting: We have implemented a cross-functional approach to assessing, identifying, and managing material cybersecurity threats and incidents. Our program includes controls and procedures to identify, classify, and escalate certain cybersecurity incidents to provide management visibility and obtain direction from management as to the public disclosure and reporting of material incidents in a timely manner.
Technical Safeguards: We implement technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality, and access controls, which are evaluated and improved through routine vulnerability assessments and cybersecurity threat intelligence, as well as outside audits and certifications.
Incident Response and Recovery Planning: We have established and maintain an incident response plan designed to address our response to a cybersecurity incident, and a business continuity and disaster recovery plan. We conduct annual tabletop exercises to test these plans.
Third-Party Risk Management: We maintain a risk-based approach to identifying and overseeing material cybersecurity threats presented by third parties, including vendors, service providers, as well as the systems of third parties that could adversely impact our business in the event of a material cybersecurity incident affecting those third-party systems, including any outside auditors or consultants who advise on our cybersecurity systems.
Education and Awareness: We provide regular, mandatory training for all employees regarding cybersecurity threats as a means to equip our employees with tools to make employees aware of and to address cybersecurity threats, as well as to communicate our evolving information security policies, standards, processes, and practices.
We conduct periodic assessments and testing of our policies, standards, processes, and practices in a manner designed to address cybersecurity threats and events. The results of such assessments, audits, and reviews are evaluated by management and reported to the Audit and Finance Committee of the Board, or the Audit and Finance Committee, and we adjust our cybersecurity policies, standards, processes, and practices as necessary based on the information provided by these assessments, audits, and reviews.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity program is fully integrated into our overall risk management system and processes.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Governance
The Board, in coordination with the Audit and Finance Committee, oversees our risk management program, including the management of cybersecurity threats. The Board and the Audit and Finance Committee each receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by our peers and third parties. The Board and the Audit and Finance Committee also receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds. Annually, the Board and the Audit and Finance Committee discuss our approach to overseeing cybersecurity threats with our Chief Technology Officer, or CTO, and other senior management members.
The CTO, in coordination with senior management including the Chief Executive Officer, Chief Financial Officer, and General Counsel, works collaboratively across our company to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any material cybersecurity incidents in accordance with our incident response and recovery plans. To facilitate the success of our cybersecurity program, cross-functional teams have been established to address cybersecurity threats and respond to cybersecurity incidents. Through ongoing communications with these teams, the CTO and senior management are informed about and monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents, and report such threats and incidents to the Audit and Finance Committee when appropriate.
The CTO has served in various roles in information technology and information security for over 25 years. The CTO holds undergraduate and graduate degrees in Management Information Systems and Masters in Business Administration. Our Chief Executive Officer, Chief Financial Officer, and General Counsel each hold undergraduate and graduate degrees in their respective fields. Collectively, they have several decades of experience managing risk at our company and in similar organizations or settings and assessing cybersecurity threats.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board, in coordination with the Audit and Finance Committee, oversees our risk management program, including the management of cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board and the Audit and Finance Committee each receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by our peers and third parties. The Board and the Audit and Finance Committee also receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds. Annually, the Board and the Audit and Finance Committee discuss our approach to overseeing cybersecurity threats with our Chief Technology Officer, or CTO, and other senior management members.
Cybersecurity Risk Role of Management [Text Block] The CTO, in coordination with senior management including the Chief Executive Officer, Chief Financial Officer, and General Counsel, works collaboratively across our company to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any material cybersecurity incidents in accordance with our incident response and recovery plans
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The CTO, in coordination with senior management including the Chief Executive Officer, Chief Financial Officer, and General Counsel,
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The CTO has served in various roles in information technology and information security for over 25 years. The CTO holds undergraduate and graduate degrees in Management Information Systems and Masters in Business Administration. Our Chief Executive Officer, Chief Financial Officer, and General Counsel each hold undergraduate and graduate degrees in their respective fields. Collectively, they have several decades of experience managing risk at our company and in similar organizations or settings and assessing cybersecurity threats.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] To facilitate the success of our cybersecurity program, cross-functional teams have been established to address cybersecurity threats and respond to cybersecurity incidents. Through ongoing communications with these teams, the CTO and senior management are informed about and monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents, and report such threats and incidents to the Audit and Finance Committee when appropriate.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true