Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Apr. 26, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The operation of our business is dependent on the secure functioning of our digital information systems and infrastructure. Our cybersecurity risk management program (our “Cybersecurity Program”) has been designed to protect the confidentiality, integrity, and availability of our critical systems and information. We design and assess our Cybersecurity Program based on published frameworks, including the National Institute of Standards and Technology, and routinely evaluate our program for ongoing adherence to those frameworks. Our Cybersecurity Program is aligned with our company strategy and governance processes and is designed to deploy and monitor the prevention, detection, mitigation, and remediation of cyber risks and incidents through various means, including: •A security team responsible for monitoring our infrastructure and managing our cybersecurity risk assessment processes, our security controls, and response to cybersecurity incidents; •Periodic use of outside independent advisors to evaluate the maturity of our cybersecurity program, review processes and policies, conduct penetration and vulnerability tests, and to monitor and help identify potential cybersecurity incidents; •An incident response plan that includes procedures for identifying, evaluating and responding to cybersecurity incidents; •A training and awareness communication series addressed to our employees to help them identify potential cybersecurity threats and attacks; •A risk management process using independent third-party service providers that process and store data. We assess the risks from cybersecurity threats posed by such services; and •An AI committee to set Company-wide policy and drive the safe use of AI technologies. We have not encountered cybersecurity incidents or identified risks from cybersecurity threats that have materially impaired our operations or financial standing. For a discussion of whether and how any risks from cybersecurity threats are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition, refer to Item 1A. Risk Factors – “Our business depends on numerous complex information systems. Any failure to maintain these systems, a network disruption, or breaches in data security could cause a material adverse effect on our business”, which is incorporated by reference into this Item 1C.
|
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Text Block] | The operation of our business is dependent on the secure functioning of our digital information systems and infrastructure. Our cybersecurity risk management program (our “Cybersecurity Program”) has been designed to protect the confidentiality, integrity, and availability of our critical systems and information.
|
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Board of Directors Oversight [Text Block] | The Strategy and Risk Committee of the Board (the “Strategy and Risk Committee”) oversees the Company’s cybersecurity risks and strategy, including our Cybersecurity Program. |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Cybersecurity Program and team of cybersecurity professionals and resources are led and supervised by our Vice President of Information Technology, who has over 25 years of experience in information technology. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Cybersecurity Program and team of cybersecurity professionals and resources are led and supervised by our Vice President of Information Technology, who has over 25 years of experience in information technology. To execute the Cybersecurity Program and promote compliance with applicable cybersecurity laws, regulations, and reporting requirements, we utilize internal and external technical experts in cybersecurity risk management, data and network security structures, and incident response and security operations. |
Cybersecurity Risk Role of Management [Text Block] | Our Cybersecurity Program and team of cybersecurity professionals and resources are led and supervised by our Vice President of Information Technology, who has over 25 years of experience in information technology. To execute the Cybersecurity Program and promote compliance with applicable cybersecurity laws, regulations, and reporting requirements, we utilize internal and external technical experts in cybersecurity risk management, data and network security structures, and incident response and security operations. Our cybersecurity team monitors the prevention, detection, mitigation, management, and remediation of cybersecurity risks and incidents through various means, which may include briefings with internal security personnel threat intelligence and other information obtained from governmental, public, or private sources, including external consultants engaged by us, and alerts and reports produced by security tools deployed in our information technology environment. As part of the Cybersecurity Program, our executive management team is regularly informed about the monitoring, prevention, detection, mitigation, management, and remediation efforts.
|
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our Cybersecurity Program and team of cybersecurity professionals and resources are led and supervised by our Vice President of Information Technology, who has over 25 years of experience in information technology. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Our cybersecurity team monitors the prevention, detection, mitigation, management, and remediation of cybersecurity risks and incidents through various means, which may include briefings with internal security personnel threat intelligence and other information obtained from governmental, public, or private sources, including external consultants engaged by us, and alerts and reports produced by security tools deployed in our information technology environment. |
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our Cybersecurity Program and team of cybersecurity professionals and resources are led and supervised by our Vice President of Information Technology, who has over 25 years of experience in information technology. To execute the Cybersecurity Program and promote compliance with applicable cybersecurity laws, regulations, and reporting requirements, we utilize internal and external technical experts in cybersecurity risk management, data and network security structures, and incident response and security operations. Our cybersecurity team monitors the prevention, detection, mitigation, management, and remediation of cybersecurity risks and incidents through various means, which may include briefings with internal security personnel threat intelligence and other information obtained from governmental, public, or private sources, including external consultants engaged by us, and alerts and reports produced by security tools deployed in our information technology environment. As part of the Cybersecurity Program, our executive management team is regularly informed about the monitoring, prevention, detection, mitigation, management, and remediation efforts.
|
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |