Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Company’s cybersecurity measures are primarily focused on ensuring the security and protection of its IT systems and data. The Company’s information security program is managed by a dedicated Chief Information Security Officer (CISO), whose group is responsible for leading enterprise-wide cybersecurity risk management, strategy, policy, standards, architecture, and processes. The Company’s interim CISO has over 22 years of experience in cybersecurity and national security, including distinguished service in the U.S. Army and the National Security Agency. He holds a Master’s degree in Cyber Intelligence Studies and a Bachelor’s degree in Mathematical Physics, and maintains the Certified Information Systems Security Professional (CISSP) credential. Oversight of the information security program remains fully integrated into the Company’s overall enterprise risk management framework. The CISO provides periodic reports to the Audit Committee (Audit Committee) of the Board of Directors (Board), the full Board, as well as to the Company’s Chief Executive Officer and other members of senior management, as appropriate. These reports include updates on the Company’s cybersecurity risks and threats, the status of projects intended to strengthen its information security systems, assessments of the information security program (including remediation, mitigation, and management of identified vulnerabilities), and the emerging threat landscape. The information security program is regularly evaluated by internal and external consultants and auditors with the results of those reviews reported to senior management and the Audit Committee, which is comprised entirely of independent directors and has oversight responsibility for these risks. The Company’s information security group monitors the Company’s information systems to prevent, detect, mitigate, and remediate cybersecurity incidents. The Company uses tools and techniques to continually assess and monitor, manage and mitigate cybersecurity threats to its IT systems in a manner consistent with industry practice. The Company engages with key vendors, industry participants, and intelligence and law enforcement communities as part of its continuing efforts to obtain current threat intelligence, collaborate on security enhancements, and evaluate and improve the effectiveness of its information security program. As part of this program, the Company conducts periodic tabletop and red-teaming exercises to assess its cybersecurity incident response processes and defenses. The Company also maintains vendor management diligence and oversight processes to identify and monitor potential risks from cybersecurity threats attendant to its use of third-party service providers. Additionally, the Company monitors cybersecurity threat intelligence received from key third-party service providers associated with the Company.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | The Company’s cybersecurity measures are primarily focused on ensuring the security and protection of its IT systems and data. The Company’s information security program is managed by a dedicated Chief Information Security Officer (CISO), whose group is responsible for leading enterprise-wide cybersecurity risk management, strategy, policy, standards, architecture, and processes. The Company’s interim CISO has over 22 years of experience in cybersecurity and national security, including distinguished service in the U.S. Army and the National Security Agency. He holds a Master’s degree in Cyber Intelligence Studies and a Bachelor’s degree in Mathematical Physics, and maintains the Certified Information Systems Security Professional (CISSP) credential. Oversight of the information security program remains fully integrated into the Company’s overall enterprise risk management framework.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | The CISO provides periodic reports to the Audit Committee (Audit Committee) of the Board of Directors (Board), the full Board, as well as to the Company’s Chief Executive Officer and other members of senior management, as appropriate. These reports include updates on the Company’s cybersecurity risks and threats, the status of projects intended to strengthen its information security systems, assessments of the information security program (including remediation, mitigation, and management of identified vulnerabilities), and the emerging threat landscape. The information security program is regularly evaluated by internal and external consultants and auditors with the results of those reviews reported to senior management and the Audit Committee, which is comprised entirely of independent directors and has oversight responsibility for these risks. In the event of a cybersecurity incident, the Company has a process in place whereby members of the information security group will alert the CISO and the CISO will alert the appropriate levels of management, including an incident assessment team, as well as the legal and finance departments so that the materiality of any such event can be assessed in furtherance of fulfilling any reporting requirements. If warranted, senior management will notify the Audit Committee or the full Board, as appropriate.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The information security program is regularly evaluated by internal and external consultants and auditors with the results of those reviews reported to senior management and the Audit Committee, which is comprised entirely of independent directors and has oversight responsibility for these risks. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The CISO provides periodic reports to the Audit Committee (Audit Committee) of the Board of Directors (Board), the full Board, as well as to the Company’s Chief Executive Officer and other members of senior management, as appropriate. These reports include updates on the Company’s cybersecurity risks and threats, the status of projects intended to strengthen its information security systems, assessments of the information security program (including remediation, mitigation, and management of identified vulnerabilities), and the emerging threat landscape. The information security program is regularly evaluated by internal and external consultants and auditors with the results of those reviews reported to senior management and the Audit Committee, which is comprised entirely of independent directors and has oversight responsibility for these risks. In the event of a cybersecurity incident, the Company has a process in place whereby members of the information security group will alert the CISO and the CISO will alert the appropriate levels of management, including an incident assessment team, as well as the legal and finance departments so that the materiality of any such event can be assessed in furtherance of fulfilling any reporting requirements. If warranted, senior management will notify the Audit Committee or the full Board, as appropriate.
|
| Cybersecurity Risk Role of Management [Text Block] | The Company’s cybersecurity measures are primarily focused on ensuring the security and protection of its IT systems and data. The Company’s information security program is managed by a dedicated Chief Information Security Officer (CISO), whose group is responsible for leading enterprise-wide cybersecurity risk management, strategy, policy, standards, architecture, and processes. The Company’s interim CISO has over 22 years of experience in cybersecurity and national security, including distinguished service in the U.S. Army and the National Security Agency. He holds a Master’s degree in Cyber Intelligence Studies and a Bachelor’s degree in Mathematical Physics, and maintains the Certified Information Systems Security Professional (CISSP) credential. Oversight of the information security program remains fully integrated into the Company’s overall enterprise risk management framework. In the event of a cybersecurity incident, the Company has a process in place whereby members of the information security group will alert the CISO and the CISO will alert the appropriate levels of management, including an incident assessment team, as well as the legal and finance departments so that the materiality of any such event can be assessed in furtherance of fulfilling any reporting requirements. If warranted, senior management will notify the Audit Committee or the full Board, as appropriate.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Company’s information security program is managed by a dedicated Chief Information Security Officer (CISO), whose group is responsible for leading enterprise-wide cybersecurity risk management, strategy, policy, standards, architecture, and processes. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The Company’s interim CISO has over 22 years of experience in cybersecurity and national security, including distinguished service in the U.S. Army and the National Security Agency. He holds a Master’s degree in Cyber Intelligence Studies and a Bachelor’s degree in Mathematical Physics, and maintains the Certified Information Systems Security Professional (CISSP) credential. Oversight of the information security program remains fully integrated into the Company’s overall enterprise risk management framework |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The CISO provides periodic reports to the Audit Committee (Audit Committee) of the Board of Directors (Board), the full Board, as well as to the Company’s Chief Executive Officer and other members of senior management, as appropriate. These reports include updates on the Company’s cybersecurity risks and threats, the status of projects intended to strengthen its information security systems, assessments of the information security program (including remediation, mitigation, and management of identified vulnerabilities), and the emerging threat landscape. The information security program is regularly evaluated by internal and external consultants and auditors with the results of those reviews reported to senior management and the Audit Committee, which is comprised entirely of independent directors and has oversight responsibility for these risks. In the event of a cybersecurity incident, the Company has a process in place whereby members of the information security group will alert the CISO and the CISO will alert the appropriate levels of management, including an incident assessment team, as well as the legal and finance departments so that the materiality of any such event can be assessed in furtherance of fulfilling any reporting requirements. If warranted, senior management will notify the Audit Committee or the full Board, as appropriate.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |