Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Audit Committee (“Audit Committee”) of our Board of Directors (the “Board”) has been delegated with the oversight of our risk management program, which includes the identification, assessment and management of material cybersecurity risks. A cybersecurity threat is any potential unauthorized occurrence, on or conducted through, our information systems that may result in adverse effects on the confidentiality, integrity or availability of our information systems or any information residing therein. In general, we seek to address cybersecurity risks through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, security and availability of the information that we collect and store by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur. Cybersecurity risk management and strategy We have implemented a comprehensive cybersecurity risk management program designed to protect confidentiality, integrity, and availability of critical systems and information. Our cybersecurity program is focused on the following key areas: •Technical Safeguards: We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. •Incident Response and Recovery Planning: We have established and maintain incident response and recovery plans to timely, consistently, and compliantly address cybersecurity threats that may occur despite our safeguards, and such plans are tested and evaluated on a regular basis. •Dedicated Staffing: We maintain a Network Operations Center staffed with dedicated IT security, infrastructure, and compliance professionals who oversee risk assessments, security processes, and incident responses. •Third-Party Risk Management: We maintain a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of our systems, as well as the systems of third parties that could adversely impact our business in the event of a cybersecurity incident affecting those third-party systems. •Outside Consultants: We engage various outside consultants, including contractors, assessors, outside attorneys and other third parties, to among other things: ◦Assist in the design, implementation, and testing of our cybersecurity program, policies and procedures; ◦monitor our networks, servers and endpoints to identify vulnerabilities; ◦perform assessments on our cybersecurity measures, including independent reviews of our information security control environment and operating effectiveness; ◦review and place cyber insurance coverages including access to various third-party vendors to support us, should the need arise; ◦determine and execute mitigation and remediation options and plans; and ◦assist us in ensuring ongoing compliance with applicable legal and regulatory requirements. •Education and Awareness: We provide ongoing and annual training for personnel regarding cybersecurity threats as a means to equip our personnel with effective tools to address cybersecurity threats, and to communicate our evolving information security policies, standards, processes and practices. Governance The Company maintains processes designed to assess, identify, and manage risks arising from cybersecurity threats affecting its information systems and business operations. Responsibility for cybersecurity risk management resides with Company management and IT leadership, which oversee programs intended to prevent, detect, mitigate, and remediate cybersecurity incidents and support timely response and recovery activities. In connection with the Company’s ongoing post-merger integration activities, cybersecurity risk management processes and information security controls are being aligned across the combined organization to support consistent protection of information systems and business operations Management maintains policies and procedures addressing incident response, risk monitoring, and management of information security risks on an ongoing basis. The Company engages third-party cybersecurity specialists, as appropriate, to assist in risk assessment, monitoring activities, and incident response support. The Board of Directors has delegated to the Audit Committee the responsibility for monitoring and overseeing the the Company’s cybersecurity and other information technology risks, controls, strategies and procedures. IT leadership provides the Audit Committee with updates, at least annually, regarding cybersecurity risk exposure, risk management activities, and related developments, and reports material cybersecurity incidents to the Audit Committee as appropriate. The Company is developing an internal audit function that is expected to include periodic evaluation of cybersecurity risks and related internal controls. Management Oversight IT leadership oversees the Company’s information technology infrastructure and cybersecurity activities, including coordination with internal personnel and external service providers. Responsibilities include monitoring evolving cybersecurity threats, assessing potential impacts to Company operations, and overseeing implementation of risk mitigation and remediation measures designed to protect Company information systems and data. Management’s Expertise Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels. Risks from Cybersecurity Threats Our business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have implemented a comprehensive cybersecurity risk management program designed to protect confidentiality, integrity, and availability of critical systems and information. Our cybersecurity program is focused on the following key areas: •Technical Safeguards: We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. •Incident Response and Recovery Planning: We have established and maintain incident response and recovery plans to timely, consistently, and compliantly address cybersecurity threats that may occur despite our safeguards, and such plans are tested and evaluated on a regular basis. •Dedicated Staffing: We maintain a Network Operations Center staffed with dedicated IT security, infrastructure, and compliance professionals who oversee risk assessments, security processes, and incident responses. •Third-Party Risk Management: We maintain a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of our systems, as well as the systems of third parties that could adversely impact our business in the event of a cybersecurity incident affecting those third-party systems. •Outside Consultants: We engage various outside consultants, including contractors, assessors, outside attorneys and other third parties, to among other things: ◦Assist in the design, implementation, and testing of our cybersecurity program, policies and procedures; ◦monitor our networks, servers and endpoints to identify vulnerabilities; ◦perform assessments on our cybersecurity measures, including independent reviews of our information security control environment and operating effectiveness; ◦review and place cyber insurance coverages including access to various third-party vendors to support us, should the need arise; ◦determine and execute mitigation and remediation options and plans; and ◦assist us in ensuring ongoing compliance with applicable legal and regulatory requirements. •Education and Awareness: We provide ongoing and annual training for personnel regarding cybersecurity threats as a means to equip our personnel with effective tools to address cybersecurity threats, and to communicate our evolving information security policies, standards, processes and practices.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance The Company maintains processes designed to assess, identify, and manage risks arising from cybersecurity threats affecting its information systems and business operations. Responsibility for cybersecurity risk management resides with Company management and IT leadership, which oversee programs intended to prevent, detect, mitigate, and remediate cybersecurity incidents and support timely response and recovery activities. In connection with the Company’s ongoing post-merger integration activities, cybersecurity risk management processes and information security controls are being aligned across the combined organization to support consistent protection of information systems and business operations Management maintains policies and procedures addressing incident response, risk monitoring, and management of information security risks on an ongoing basis. The Company engages third-party cybersecurity specialists, as appropriate, to assist in risk assessment, monitoring activities, and incident response support. The Board of Directors has delegated to the Audit Committee the responsibility for monitoring and overseeing the the Company’s cybersecurity and other information technology risks, controls, strategies and procedures. IT leadership provides the Audit Committee with updates, at least annually, regarding cybersecurity risk exposure, risk management activities, and related developments, and reports material cybersecurity incidents to the Audit Committee as appropriate. The Company is developing an internal audit function that is expected to include periodic evaluation of cybersecurity risks and related internal controls. Management Oversight IT leadership oversees the Company’s information technology infrastructure and cybersecurity activities, including coordination with internal personnel and external service providers. Responsibilities include monitoring evolving cybersecurity threats, assessing potential impacts to Company operations, and overseeing implementation of risk mitigation and remediation measures designed to protect Company information systems and data. Management’s Expertise Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Governance The Company maintains processes designed to assess, identify, and manage risks arising from cybersecurity threats affecting its information systems and business operations. Responsibility for cybersecurity risk management resides with Company management and IT leadership, which oversee programs intended to prevent, detect, mitigate, and remediate cybersecurity incidents and support timely response and recovery activities. In connection with the Company’s ongoing post-merger integration activities, cybersecurity risk management processes and information security controls are being aligned across the combined organization to support consistent protection of information systems and business operations Management maintains policies and procedures addressing incident response, risk monitoring, and management of information security risks on an ongoing basis. The Company engages third-party cybersecurity specialists, as appropriate, to assist in risk assessment, monitoring activities, and incident response support. The Board of Directors has delegated to the Audit Committee the responsibility for monitoring and overseeing the the Company’s cybersecurity and other information technology risks, controls, strategies and procedures. IT leadership provides the Audit Committee with updates, at least annually, regarding cybersecurity risk exposure, risk management activities, and related developments, and reports material cybersecurity incidents to the Audit Committee as appropriate. The Company is developing an internal audit function that is expected to include periodic evaluation of cybersecurity risks and related internal controls. Management Oversight IT leadership oversees the Company’s information technology infrastructure and cybersecurity activities, including coordination with internal personnel and external service providers. Responsibilities include monitoring evolving cybersecurity threats, assessing potential impacts to Company operations, and overseeing implementation of risk mitigation and remediation measures designed to protect Company information systems and data.
|
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels.
|
| Cybersecurity Risk Role of Management [Text Block] | Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels.
|
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Management’s Expertise Our CIO departed on December 31, 2025. Our VP of IT has over 25 years of industry experience involving information technology, including security, auditing, compliance, systems, and programming. The VP of IT remains continuously informed on emerging cybersecurity threats, industry developments, and evolving risk management techniques, ensuring our ability to prevent, detect, mitigate, and remediate cybersecurity incidents. The VP of IT supervises internal cybersecurity teams and external service providers, assesses and manages material cybersecurity risks, and oversees risk mitigation strategies. With extensive global experience in managing complex information systems and deploying advanced cybersecurity technologies, the VP of IT also holds a recognized certification from a leading cybersecurity training and research institute. Additionally, our CEO and CFO each have over 15 years of experience managing enterprise risks, including cybersecurity threats, either at our Company or in similar organizations. Each executive holds undergraduate and graduate degrees in their respective fields, further reinforcing our commitment to cybersecurity governance at the highest levels.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Risks from Cybersecurity Threats Our business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents.
|