XML 44 R27.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 28, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Our risk management program includes focused efforts on identifying, assessing and managing cybersecurity risk, including the following:
A robust information security training program that requires all company employees with access to our networks to participate in regular and mandatory training on how to be aware of, and help defend against, cyber risks, combined with periodic testing to measure the efficacy of our training efforts.
Alignment of our program with the National Institute of Standards and Technology Cybersecurity Framework to identify, protect, detect, respond and recover from cyberattacks.
Real-time and robust testing of our systems to assess our vulnerability to cyber risk, which includes targeted penetration testing, tabletop incident response exercises, disaster recovery, periodic audits of our systems by outside industry experts and continuous vulnerability scanning.
Engaging external cybersecurity experts in incident response development and management.
Business continuity plans and critical recovery backup systems.
Maturity assessment and roadmap to sustain/improve security posture based on risk profile.

The Company’s cyber risk management program is supervised by a dedicated Chief Information Officer whose team is responsible for leading enterprise-wide information security strategy, policy, standards, architecture, and processes, as well as managing the Company’s information security and risk management awareness program. We provide regular awareness training to our employees, including periodic phishing tests, to help identify, avoid and mitigate cybersecurity threats. We also periodically perform simulations and tabletop exercises at a management level and incorporate external resources and advisors as needed.
Cybersecurity Incident Response Process
We maintain and actively update a cybersecurity incident response plan that outlines the steps we take to identify, investigate and take action in response to any potentially material cyber incidents. Our incident response plan ensures that our Chief Information Officer, members of our senior management team and select members of our legal staff, are timely informed of and consulted with respect to any potentially material cyber incidents.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Company’s cyber risk management program is supervised by a dedicated Chief Information Officer whose team is responsible for leading enterprise-wide information security strategy, policy, standards, architecture, and processes, as well as managing the Company’s information security and risk management awareness program.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board is engaged in the oversight of cybersecurity threat risk management. As reflected in the Audit Committee’s charter, the Board has specifically delegated responsibility for oversight of cybersecurity matters to the Audit Committee, which provides advice and guidance on the adequacy of the Company’s initiatives on, among other things, cybersecurity risk management. The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board is engaged in the oversight of cybersecurity threat risk management. As reflected in the Audit Committee’s charter, the Board has specifically delegated responsibility for oversight of cybersecurity matters to the Audit Committee, which provides advice and guidance on the adequacy of the Company’s initiatives on, among other things, cybersecurity risk management. The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape.
Cybersecurity Risk Role of Management [Text Block] As reflected in the Audit Committee’s charter, the Board has specifically delegated responsibility for oversight of cybersecurity matters to the Audit Committee, which provides advice and guidance on the adequacy of the Company’s initiatives on, among other things, cybersecurity risk management. The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Company’s cyber risk management program is supervised by a dedicated Chief Information Officer whose team is responsible for leading enterprise-wide information security strategy, policy, standards, architecture, and processes, as well as managing the Company’s information security and risk management awareness program. We provide regular awareness training to our employees, including periodic phishing tests, to help identify, avoid and mitigate cybersecurity threats. We also periodically perform simulations and tabletop exercises at a management level and incorporate external resources and advisors as needed.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our Board is engaged in the oversight of cybersecurity threat risk management. As reflected in the Audit Committee’s charter, the Board has specifically delegated responsibility for oversight of cybersecurity matters to the Audit Committee, which provides advice and guidance on the adequacy of the Company’s initiatives on, among other things, cybersecurity risk management. The Chief Information Officer presents regular updates to the Audit Committee and the full Board of Directors, on, among other things, the Company’s cyber risks and threats, and the status of projects in the Company’s multi-year roadmap to strengthen the Company’s information security systems to address the emerging threat landscape. The Company also engages third parties to periodically evaluate and audit aspects of the Company’s information security programs, including by conducting vulnerability assessments and penetration testing, and the results of those findings are reported to the Audit Committee and used to help identify potentially material risks and prioritize certain security initiatives.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true