Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We are committed to protecting the security and integrity of our systems, networks, databases, and applications and, as a result, have implemented processes designed to prevent, assess, identify, and manage material risks associated with cybersecurity threats. Cybersecurity and risks related to our IT are an important focus of our board of directors’ risk oversight. Our board of directors, with assistance from its audit committee, oversees our cybersecurity risk assessment and response program. The audit committee receives reports at least quarterly from executive management, including our Senior Vice President of IT and Cybersecurity, on the identification and status of cybersecurity incidents, resolution, recovery, and post incident management. Managing Material Risks and Integrated Overall Risk Management We have implemented a risk-based approach to identify and assess the cybersecurity threats that could affect our business and information systems. Our cybersecurity risk assessment process evaluates our maturity across key areas of cybersecurity, and incorporates industry standard framework considerations, including the National Institute of Standards and Technology. The cybersecurity risk management program employs a multi-layered approach including: •Awareness and training for employees involving phishing campaigns, informational sessions at management meetings, and annual mandatory training with simulations of common cybersecurity threats; •Evaluation of our technical, administrative, and end-point security, including encryption, firewalls, security scans, and anti-virus systems and logical security controls, along with control policies and active review procedures which strengthen authentication and access protection; •Third-party risk management process and monitoring procedures for service providers, suppliers, and vendors who have access to critical systems and information; •Risk and vulnerability management encompassing both proactive and predictive defenses, which provides opportunities to assess, remediate, and validate; and •Managed detection and incident response, including advanced endpoint protection. We continue to promote a company-wide culture of cybersecurity risk management awareness, and cybersecurity considerations are integrated in our decision-making processes. We have an experienced IT team led by our Senior Vice President of IT and Cybersecurity, who has more than 20 years of industry experience. Our Senior Vice President of IT and Cybersecurity reports directly to the executive team and works closely with our management team, and where necessary, engages external experts to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our Senior Vice President of IT and Cybersecurity provides regular updates on cybersecurity to the audit committee of our board of directors.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We are committed to protecting the security and integrity of our systems, networks, databases, and applications and, as a result, have implemented processes designed to prevent, assess, identify, and manage material risks associated with cybersecurity threats. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Cybersecurity and risks related to our IT are an important focus of our board of directors’ risk oversight. Our board of directors, with assistance from its audit committee, oversees our cybersecurity risk assessment and response program. The audit committee receives reports at least quarterly from executive management, including our Senior Vice President of IT and Cybersecurity, on the identification and status of cybersecurity incidents, resolution, recovery, and post incident management. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our board of directors, with assistance from its audit committee, oversees our cybersecurity risk assessment and response program. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The audit committee receives reports at least quarterly from executive management, including our Senior Vice President of IT and Cybersecurity, on the identification and status of cybersecurity incidents, resolution, recovery, and post incident management. |
| Cybersecurity Risk Role of Management [Text Block] | We continue to promote a company-wide culture of cybersecurity risk management awareness, and cybersecurity considerations are integrated in our decision-making processes. We have an experienced IT team led by our Senior Vice President of IT and Cybersecurity, who has more than 20 years of industry experience. Our Senior Vice President of IT and Cybersecurity reports directly to the executive team and works closely with our management team, and where necessary, engages external experts to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our Senior Vice President of IT and Cybersecurity provides regular updates on cybersecurity to the audit committee of our board of directors.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Cybersecurity and risks related to our IT are an important focus of our board of directors’ risk oversight. Our board of directors, with assistance from its audit committee, oversees our cybersecurity risk assessment and response program. The audit committee receives reports at least quarterly from executive management, including our Senior Vice President of IT and Cybersecurity, on the identification and status of cybersecurity incidents, resolution, recovery, and post incident management. Managing Material Risks and Integrated Overall Risk Management We have implemented a risk-based approach to identify and assess the cybersecurity threats that could affect our business and information systems. Our cybersecurity risk assessment process evaluates our maturity across key areas of cybersecurity, and incorporates industry standard framework considerations, including the National Institute of Standards and Technology. The cybersecurity risk management program employs a multi-layered approach including: •Awareness and training for employees involving phishing campaigns, informational sessions at management meetings, and annual mandatory training with simulations of common cybersecurity threats; •Evaluation of our technical, administrative, and end-point security, including encryption, firewalls, security scans, and anti-virus systems and logical security controls, along with control policies and active review procedures which strengthen authentication and access protection; •Third-party risk management process and monitoring procedures for service providers, suppliers, and vendors who have access to critical systems and information; •Risk and vulnerability management encompassing both proactive and predictive defenses, which provides opportunities to assess, remediate, and validate; and •Managed detection and incident response, including advanced endpoint protection. We continue to promote a company-wide culture of cybersecurity risk management awareness, and cybersecurity considerations are integrated in our decision-making processes. We have an experienced IT team led by our Senior Vice President of IT and Cybersecurity, who has more than 20 years of industry experience. Our Senior Vice President of IT and Cybersecurity reports directly to the executive team and works closely with our management team, and where necessary, engages external experts to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our Senior Vice President of IT and Cybersecurity provides regular updates on cybersecurity to the audit committee of our board of directors.
|
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | We have an experienced IT team led by our Senior Vice President of IT and Cybersecurity, who has more than 20 years of industry experience. Our Senior Vice President of IT and Cybersecurity reports directly to the executive team and works closely with our management team, and where necessary, engages external experts to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our Senior Vice President of IT and Cybersecurity provides regular updates on cybersecurity to the audit committee of our board of directors. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |