XML 29 R11.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and Strategy

 

We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.

 

We leverage guidance from the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF”), which provides an outline of enterprise security processes and controls, to inform the design and assessment of our cybersecurity risk management program. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.

 

As part of our risk management process, we may engage third-party experts to help identify and assess risks from cybersecurity threats. Our risk management process also encompasses cybersecurity risks associated with our use of third-party service providers.

 

Our cybersecurity risk management program includes:

 

  · risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services and our broader IT environment;

 

  · evaluations of our readiness to assess, respond and, as applicable, recover from potential cybersecurity incidents;

 

  · periodic tabletop exercises to simulate a response to a cybersecurity incident and use the findings to improve our processes, technologies and incident response plan;

 

  · the use of external service providers, where appropriate, to assess, test, or otherwise assist with the aspects of our security controls;

 

  · cybersecurity training to educate our employees, consultants and other users about their individual responsibilities regarding our IT systems and data;

 

  · weekly briefings on cybersecurity incidents, threats, and related matters;

 

  · a third-party risk management process for service providers, suppliers and vendors who have access to our critical systems and information; and

 

  · cybersecurity risk insurance that provides protection against certain potential costs and losses arising from a cybersecurity incident.

 

As of the date of this report, we do not believe that known risks from cybersecurity threats, including as a result of any previous cybersecurity incidents that we are aware of, have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. However, we can give no assurance that we have detected or protected against all such cybersecurity incidents or threats or that we will not experience such an incident in the future. Further details about the cybersecurity risks we face are described under the heading “Risks Related to Technology, Cybersecurity and Intellectual Property,” included as part of our risk factor disclosures in Part I, Item 1A of this Report, which disclosures are incorporated by reference herein.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] we do not believe that known risks from cybersecurity threats, including as a result of any previous cybersecurity incidents that we are aware of, have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block] Governance

 

The Board is responsible for the oversight of risks from cybersecurity threats. Our Board oversees management’s implementation of our cybersecurity risk management program. On a quarterly basis, and more frequently as needed, our Board receives updates from our senior management concerning, among other relevant information, the status of our cybersecurity initiatives to strengthen our cybersecurity risk management and are apprised, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.

 

While the Board reviews and oversees the Company’s information security efforts, our Director of IT, under the oversight of our executive officers, is responsible for the day-to-day management of cybersecurity risk and the design and implementation of policies, processes and procedures to identify and mitigate this risk. Our Director of IT, in coordination with the executive officers, is responsible for assessing and managing material risks from cybersecurity threats, as well as managing and responding to material cybersecurity incidents if any occur. Our Director of IT has over 28 years of experience in various information technology roles, which includes over 10 years of management of cybersecurity matters.

 

Our Director of IT provides weekly briefings to the Chief Financial Officer, General Counsel and other members of our cross-functional incident response team. The weekly briefings are focused on our cybersecurity risks and activities, including cybersecurity incidents and responses, cybersecurity systems testing, third-party activities and related topics. In the event that threats and incidents are identified as potentially significant, the Chief Financial Officer and General Counsel promptly report to our Board.

Cybersecurity Risk Management Expertise of Management Responsible [Text Block] While the Board reviews and oversees the Company’s information security efforts, our Director of IT, under the oversight of our executive officers, is responsible for the day-to-day management of cybersecurity risk and the design and implementation of policies, processes and procedures to identify and mitigate this risk. Our Director of IT, in coordination with the executive officers, is responsible for assessing and managing material risks from cybersecurity threats, as well as managing and responding to material cybersecurity incidents if any occur. Our Director of IT has over 28 years of experience in various information technology roles, which includes over 10 years of management of cybersecurity matters.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] the Chief Financial Officer and General Counsel promptly report to our Board.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true