v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jul. 31, 2025
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]    
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]   Cybersecurity risk management and strategy 

Our cybersecurity risk management is based on recognized cybersecurity industry frameworks and standards, including those of the National Institute of Standards and Technology, the Center for Internet Security Controls, and the International Organization for Standardization. We use these frameworks, together with information collected from internal assessments, to develop policies for the use of our information assets (for example, business information and information resources such as mobile phones, computers and workstations), access to specific intellectual property or technologies, and protection of personal information. We protect these information assets through industry-standard techniques, such as multifactor authentication and malware defenses. We also work with internal stakeholders across the company to integrate foundational cybersecurity principles throughout our organization’s operations, including the employment of multiple layers of cybersecurity defenses, restricted access based on business needs, and integrity of our business information. We also regularly train our employees on cybersecurity awareness, confidential information protection and simulated phishing attacks.

 

We regularly engage third-party assessors to conduct penetration testing and measure our program to industry standard frameworks. We also have standing engagements with incident response experts and external counsel. We frequently collaborate with industry experts and cybersecurity practitioners at other companies to exchange information about potential cybersecurity threats, best practices and trends.

 

Our cybersecurity risk management extends to risks associated with our use of third-party service providers. For instance, we conduct risk and compliance assessments of third-party service providers that request access to our information assets.

 

Our cybersecurity risk management is an important part of our comprehensive business continuity program and enterprise risk management. Our global information security team periodically engages with a cross-functional group of subject matter experts and leaders to assess and refine our cybersecurity risk posture and preparedness. For example, we regularly evaluate and update contingency strategies for our business in the event that a portion of our information resources were to be unavailable due to a cybersecurity incident. We practice our response to potential cybersecurity incidents through regular tabletop exercises, threat hunting and red team exercises.

 
Cybersecurity Risk Management Processes Integrated [Flag] true  
Cybersecurity Risk Management Third Party Engaged [Flag] true  
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true  
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false  
Cybersecurity Risk Board of Directors Oversight [Text Block]   Governance of cybersecurity risk management 

Our Board of Directors, as a whole, has oversight responsibility for our strategic and operational risks. Our Audit Committee of our Board of Directors assists the Board of Directors with this responsibility by reviewing and discussing our risk assessment and risk management practices, including cybersecurity risks, with members of management. The Audit Committee, in turn, periodically reports on its review with the Board of Directors.

 

Management is responsible for day-to-day assessment and management of cybersecurity risks and reports regularly to our Audit Committee.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors, as a whole, has oversight responsibility for our strategic and operational risks. Our Audit Committee of our Board of Directors assists the Board of Directors with this responsibility by reviewing and discussing our risk assessment and risk management practices, including cybersecurity risks, with members of management. The Audit Committee, in turn, periodically reports on its review with the Board of Directors.  
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Audit Committee of our Board of Directors assists the Board of Directors with this responsibility by reviewing and discussing our risk assessment and risk management practices, including cybersecurity risks, with members of management. The Audit Committee, in turn, periodically reports on its review with the Board of Directors.  
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for day-to-day assessment and management of cybersecurity risks and reports regularly to our Audit Committee.