Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | ||||||||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | ||||||||||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Cybersecurity Risk Management and Strategy We, like other companies in our industry, face several cybersecurity risks in connection with our business. Our business strategy, results of operations, and financial condition have not, to date, been materially affected by risks from cybersecurity threats. During the reporting period, we have not experienced any material cyber incidents, nor have we experienced a series of immaterial incidents, which would require disclosure. We are in the process of implementing our cybersecurity program, which is aimed at safeguarding the confidentiality, integrity, and availability of our essential systems and information, and is designed to detect and mitigate risks from cybersecurity threats to our data and our systems. Central to our cybersecurity efforts is a robust incident response plan designed to address potential cyber incidents swiftly and effectively. In designing and evaluating our cybersecurity program, we have adopted the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF 2.0”) as a guiding principle. It is important to clarify that our use of the NIST CSF 2.0 is for guidance purposes to frame our risk identification, assessment, and management processes and does not equate to compliance with any specific technical standards or requirements. The key components of our cybersecurity program will include:
|
|||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | Our business strategy, results of operations, and financial condition have not, to date, been materially affected by risks from cybersecurity threats. | |||||||||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] | Cybersecurity Governance The governance of cybersecurity risks is a critical function of our Board, with the Audit Committee playing a key role in the oversight of cybersecurity and related technology risks. The Audit Committee is tasked with monitoring the effectiveness of our cybersecurity risk management program as implemented by management. The Audit Committee receives regular updates from management on the state of cybersecurity risks facing the Company. This includes briefings on any significant cyber incidents and ongoing risk management efforts. These updates enable the Audit Committee to provide informed reports on cybersecurity matters to the full Board. The responsibility for day-to-day management of cybersecurity risks lies with our management team, including the Interim Chief Financial Officer. This team is at the forefront of our cybersecurity initiatives, coordinating both internal and external resources to anticipate, identify, and mitigate cyber threats. Our approach includes regular updates from our third-party security expert consultant, leveraging intelligence from various sources, and utilizing advanced security tools to protect our digital environment. Our third-party security expert consultant has over 30 years of experience with cybersecurity, information technology development and deployment, and information technology risk assessment and management, including information security management. |
|||||||||||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The governance of cybersecurity risks is a critical function of our Board, with the Audit Committee playing a key role in the oversight of cybersecurity and related technology risks | |||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||||||||
Cybersecurity Risk Role of Management [Text Block] | Our third-party security expert consultant has over 30 years of experience with cybersecurity, information technology development and deployment, and information technology risk assessment and management, including information security management. |