XML 24 R10.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management, Strategy, and Governance
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. CYBERSECURITY

Cybersecurity Risk Management and Strategy. We recognize the critical role that cybersecurity plays in protecting our operations, customers, and digital assets. As part of our broader technology and information security risk management framework, our cybersecurity strategy is designed to safeguard the confidentiality, integrity and availability of our systems and data. We continuously assess, strengthen and refine our cybersecurity practices to adapt to an evolving threat landscape.

Our cybersecurity risk management program is built on a foundation of monitoring, proactive risk mitigation and adherence to industry best practices. Over the past year, we have implemented several key enhancements to further bolster our cybersecurity defenses. A security awareness training program has been introduced across our company to educate employees on cybersecurity threats and best practices. Additionally, we have expanded our asset management capabilities, improving visibility into our technology infrastructure and evaluating advanced solutions for more comprehensive oversight.

To protect against unauthorized access, our identity and access management framework continues to evolve, incorporating multi-factor authentication and single sign-on to enhance access security. In parallel, our vulnerability management program is actively managed to identify, assess, and remediate security risks before they can be exploited. To further secure our infrastructure, we have deployed an advanced endpoint security solution, ensuring that all company devices are protected against malware and other cyber threats.

A core component of our security framework is our threat detection and response capability. We have implemented an extended detection and response system that provides continuous monitoring, real-time threat detection and automated response mechanisms to mitigate cybersecurity risks. Our governance, risk and compliance initiatives have also advanced, with ongoing efforts to standardize security policies and align with regulatory and industry standards. Penetration testing is conducted to assess our security posture and identify potential vulnerabilities, ensuring that our defenses remain resilient against emerging threats.

Understanding the risks posed by external partners, we have strengthened our third-party risk management program. This initiative focuses on evaluating and monitoring the cybersecurity practices of our vendors, service providers, and business partners to mitigate potential supply chain risks. Additionally, our incident response plan has been enhanced to support swift detection,

containment, and remediation of cybersecurity incidents, ensuring operational continuity and minimal disruption with the addition of an incident response retainer.

As of the date of this report, we have not identified any cybersecurity threats, including any past cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, financial condition, or results of operations. We continue to monitor cybersecurity risks closely and remain committed to taking proactive measures to address evolving threats.

Cybersecurity Governance. We have established a cybersecurity governance framework to ensure effective oversight, accountability, and strategic alignment across the organization. The Audit Committee of our Board of Directors oversees cybersecurity-related risks as part of its broader risk management responsibilities. The Audit Committee of the Board of Directors receives periodic reports from executive management and external cybersecurity advisors on our security initiatives, emerging threats and risk mitigation efforts.

Day-to-day management of our cybersecurity program is led by our Chief Information Security Officer, or CISO, who is responsible for overseeing information security policies, threat mitigation strategies, and compliance initiatives. The CISO provides periodic updates to management and the Audit Committee of the Board of Directors, ensuring that cybersecurity remains a key focus of our risk management framework. Our incident response protocols are structured to provide clear escalation pathways for cybersecurity incidents, ensuring that appropriate leadership is engaged in a timely manner to coordinate an effective response.

We also maintain stringent security requirements for third-party service providers, ensuring that vendors comply with our cybersecurity policies and controls. Our third-party risk management program includes due diligence assessments prior to engagement and ongoing security evaluations to mitigate external risks that could impact our operations.

As cybersecurity threats continue to evolve, we remain committed to strengthening our cybersecurity governance model, enhancing transparency and implementing best-in-class security measures. Our approach reflects a proactive commitment to protecting our digital infrastructure, ensuring business continuity and upholding the trust of our stakeholders.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Cybersecurity Governance. We have established a cybersecurity governance framework to ensure effective oversight, accountability, and strategic alignment across the organization. The Audit Committee of our Board of Directors oversees cybersecurity-related risks as part of its broader risk management responsibilities. The Audit Committee of the Board of Directors receives periodic reports from executive management and external cybersecurity advisors on our security initiatives, emerging threats and risk mitigation efforts.

Day-to-day management of our cybersecurity program is led by our Chief Information Security Officer, or CISO, who is responsible for overseeing information security policies, threat mitigation strategies, and compliance initiatives. The CISO provides periodic updates to management and the Audit Committee of the Board of Directors, ensuring that cybersecurity remains a key focus of our risk management framework. Our incident response protocols are structured to provide clear escalation pathways for cybersecurity incidents, ensuring that appropriate leadership is engaged in a timely manner to coordinate an effective response.

We also maintain stringent security requirements for third-party service providers, ensuring that vendors comply with our cybersecurity policies and controls. Our third-party risk management program includes due diligence assessments prior to engagement and ongoing security evaluations to mitigate external risks that could impact our operations.

As cybersecurity threats continue to evolve, we remain committed to strengthening our cybersecurity governance model, enhancing transparency and implementing best-in-class security measures. Our approach reflects a proactive commitment to protecting our digital infrastructure, ensuring business continuity and upholding the trust of our stakeholders.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of our Board of Directors oversees cybersecurity-related risks as part of its broader risk management responsibilities.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of the Board of Directors receives periodic reports from executive management and external cybersecurity advisors on our security initiatives, emerging threats and risk mitigation efforts.

Day-to-day management of our cybersecurity program is led by our Chief Information Security Officer, or CISO, who is responsible for overseeing information security policies, threat mitigation strategies, and compliance initiatives. The CISO provides periodic updates to management and the Audit Committee of the Board of Directors, ensuring that cybersecurity remains a key focus of our risk management framework. Our incident response protocols are structured to provide clear escalation pathways for cybersecurity incidents, ensuring that appropriate leadership is engaged in a timely manner to coordinate an effective response.

Cybersecurity Risk Role of Management [Text Block] Day-to-day management of our cybersecurity program is led by our Chief Information Security Officer, or CISO, who is responsible for overseeing information security policies, threat mitigation strategies, and compliance initiatives. The CISO provides periodic updates to management and the Audit Committee of the Board of Directors, ensuring that cybersecurity remains a key focus of our risk management framework.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Day-to-day management of our cybersecurity program is led by our Chief Information Security Officer, or CISO, who is responsible for overseeing information security policies, threat mitigation strategies, and compliance initiatives.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The CISO provides periodic updates to management and the Audit Committee of the Board of Directors, ensuring that cybersecurity remains a key focus of our risk management framework.