XML 57 R44.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
The Company maintains a documented Information Security Risk Management Program (“Program”) that includes risk assessments regularly conducted by the Company and third-party experts, assessors and auditors to evaluate potential security threats that may have a negative impact on the organization, detect potential vulnerabilities and mitigate any identified security risks. The Program is integrated into the Company’s overall risk management system. The Program is informed by industry standards and frameworks and is evaluated on an ongoing basis to address the evolving cyber threat landscape and seek alignment with industry standards such as applicable legal and regulatory guidance and mandates. In addition, the Company regularly self-assesses the Program against its internal policies.
As part of the Program, the Company deploys technical and organizational safeguards designed to protect the Company’s networks, systems, and data from cybersecurity threats; maintains a threat management program that continuously monitors evolving cybersecurity risks; has established and maintains incident response plans that address the Company’s response to a cybersecurity incident; maintains a third-party risk management program that includes a due diligence and ongoing assessment process for service providers based on the risk they present and the adequacy of their safeguards; and provides ongoing education and training to employees regarding information security threats. The Company also conducts periodic penetration testing and tabletop exercises.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Program is integrated into the Company’s overall risk management system.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee. Our Chief Information Security Officers and The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee. Our Chief Information Security Officers and The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Role of Management [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee. Our Chief Information Security Officers and The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee. Our Chief Information Security Officers and The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Company’s Chief Information Security Officers, experienced information systems security professionals with many years of experience across a variety of technology sub-specialties, provide oversight and direction for the Program and regularly communicates the information security risk posture and the prevention, detection, mitigation, and remediation of cybersecurity incidents to the Company’s executive team and the Company’s Audit and Risk Management Committee. Our Chief Information Security Officers and The Audit and Risk Management Committee oversees the Program and management of risks from cybersecurity threats and reviews and monitors the Company’s business and technology strategy.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true