Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Risk Management and Strategy
We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity program is informed by industry standard cybersecurity frameworks. We benchmark against these frameworks and our internal risk assessment process to inform how we identify, protect, detect, respond to, and recover from risks, threats, vulnerabilities, and cybersecurity incidents.
Our cybersecurity risk management program is part of and integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. Members of our cybersecurity team collaborate with employees and management across our organization on an ongoing basis to assess and refine our cybersecurity processes, and we conduct cybersecurity awareness training of our employees, incident response personnel, and senior management. Our cybersecurity risk management program includes an incident response plan, which includes procedures for responding to cybersecurity incidents.
We also utilize external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls. We have in place a third-party risk management process for third-party IT service providers, suppliers, and vendors.
Notwithstanding the foregoing, there can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information.
As of December 31, 2024, we have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. For more information about our cybersecurity related risks (including as a result of any prior cybersecurity incidents), see Part 1, Item 1A, Risk Factors under the risk titled “We have in the past and may in the future experience threats and breaches to our data and information technology systems, including malicious software codes, viruses, phishing, ransomware and other cyber-attacks, that disrupt our information systems or operations, or result in the dissemination of sensitive personal or confidential information or unauthorized financial access, theft or crimes, which could result in increased costs, economic losses, exposure to significant liability, reputational harm, loss of business, and other serious negative consequences.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management program is part of and integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. Members of our cybersecurity team collaborate with employees and management across our organization on an ongoing basis to assess and refine our cybersecurity processes, and we conduct cybersecurity awareness training of our employees, incident response personnel, and senior management. Our cybersecurity risk management program includes an incident response plan, which includes procedures for responding to cybersecurity incidents.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity and other information technology risks. The Committee receives periodic reports from management on the Company’s cybersecurity management program as well as our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Our management team is responsible for assessing and managing our material risks from cybersecurity threats. The team has primary responsibility for our overall cybersecurity risk management program and supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants. Our management team’s experience includes technical and managerial expertise, enabling them to proficiently design, engineer, and oversee the organization’s overall security stance. Their capabilities encompass a wide range of skills, including experience in security and risk management, vulnerability management, as well as backgrounds in network security and operations, and security architecture.
Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us, and alerts and reports produced by security tools deployed in the IT environment.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity and other information technology risks. The Committee receives periodic reports from management on the Company’s cybersecurity management program as well as our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Committee receives periodic reports from management on the Company’s cybersecurity management program as well as our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Cybersecurity Risk Role of Management [Text Block]
Our management team is responsible for assessing and managing our material risks from cybersecurity threats. The team has primary responsibility for our overall cybersecurity risk management program and supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants. Our management team’s experience includes technical and managerial expertise, enabling them to proficiently design, engineer, and oversee the organization’s overall security stance. Their capabilities encompass a wide range of skills, including experience in security and risk management, vulnerability management, as well as backgrounds in network security and operations, and security architecture.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity and other information technology risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our management team’s experience includes technical and managerial expertise, enabling them to proficiently design, engineer, and oversee the organization’s overall security stance. Their capabilities encompass a wide range of skills, including experience in security and risk management, vulnerability management, as well as backgrounds in network security and operations, and security architecture.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Committee receives periodic reports from management on the Company’s cybersecurity management program as well as our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true