Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk Management and Strategy Cyber criminals are becoming more sophisticated and effective every day, and they are increasingly targeting software companies, including companies like ours that handle sensitive customer and stakeholder data. All companies utilizing technology are subject to threats of breaches of their cybersecurity programs. To mitigate the threat to our business, we take a comprehensive approach to cybersecurity risk management and make securing the data that customers and other stakeholders entrust to us a top priority. Our Board and our management are actively involved in the oversight of our risk management program, of which cybersecurity represents an important component. As described in more detail below, we have established policies, standards, processes and practices for assessing, identifying, and managing material risks from cybersecurity threats. We have devoted financial and personnel resources to implement and maintain security measures to meet regulatory requirements and customer expectations, and we intend to continue to make significant investments to maintain the security of our data and cybersecurity infrastructure. While no cybersecurity program can eliminate all risk or guarantee complete effectiveness, our controls are designed in alignment with industry recognized frameworks such as the NIST Cybersecurity Framework and incorporate key principles of ISO 27001.
While our Risk Factors describe in greater detail the material cybersecurity risks we face, we believe that prior cybersecurity threats, including any previous cybersecurity incidents, have not materially impacted our business to date. However, we cannot guarantee that future incidents will not occur or that, if they do, they will not have a material adverse effect on our business, strategy, results of operations, or financial condition.
Risk Management and Strategy
We understand the critical importance of cybersecurity in protecting our operations, customer data, and the integrity of our services. Our commitment to cybersecurity is unwavering, and we adopt a serious, multi-layered approach to minimize the risks and potential impacts of cyber-attacks which has been integrated into our overall risk management process. Our cybersecurity controls are guided by a formal data classification policy and are supported by a maturing Zero Trust–inspired architecture, which includes least privilege access, continuous authentication and micro segmentation.
Our strategies are designed to ensure the resilience and security of our systems, safeguarding against both internal and external vulnerabilities. We employ state-of-the-art technologies and practices to secure our systems. This includes deploying advanced encryption, securing network infrastructure, and implementing robust access controls and authentication mechanisms. Our information technology infrastructure is designed with security at its core, incorporating full encryption of data in transit and at rest, endpoint detection and response, security information and event management correlation, continuous vulnerability scanning and commercial threat intelligence feeds monitored by our 24/7/365 Security Operations Center.
As part of our risk assessment framework, we have a Vendor Risk Management Program to monitor cybersecurity risks posed by third-party vendors and service providers. This program includes:
Partnerships and Collaboration
We believe in the strength of collaboration in combating cyber threats. We actively engage with cybersecurity communities, industry groups, and regulatory bodies to stay ahead of evolving cyber risks. We also participate in threat sharing programs and use horizon scanning activities to evaluate emerging risks that may impact fintech, payments infrastructure, and healthcare related data environments. By sharing knowledge and best practices, we enhance our defenses and contribute to the broader effort of securing the digital ecosystem. We maintain controls and procedures that are designed to ensure prompt escalation of certain cybersecurity incidents so that decisions regarding public disclosure and reporting of such incidents can be made by management and the Board in a timely manner.
Risk Assessment
We continuously monitor our information technology environment to detect and respond to threats in real-time. Our dedicated cybersecurity team uses sophisticated tools to track anomalies, potential vulnerabilities, and ongoing attacks. In addition to annual penetration and segmentation testing, we conduct periodic threat hunting exercises to proactively identify malicious activity. Semi-annually, we leverage third-party independent consultants to perform penetration and segmentation testing of our internal and externally facing environments. Results from these assessments inform remediation roadmaps, prioritization of security investments, and updates to our enterprise risk register.
Technical Safeguards
Cybersecurity is an ever-evolving field, and we are committed to continuous improvement of our security practices. We regularly review and update our cybersecurity policies, procedures, and technologies to address new challenges and adapt to the changing threat landscape. Technical safeguards also include multi factor authentication (MFA) across all privileged and non-privileged accounts, automated provisioning and de provisioning, periodic access reviews, and comprehensive logging and monitoring to support audit and regulatory obligations.
Incident Response and Recovery Planning
Cybersecurity is a foundational element of our operations. Our multi-layered approach—encompassing system security, vigilant monitoring, comprehensive training, and collaborative engagement—demonstrates our dedication to protecting our company, our clients, and the financial ecosystem. Our incident response program includes ransomware specific playbooks, cross functional tabletop exercises involving senior leadership, and tight integration with our business continuity (BCP) and disaster recovery (DR) plans. We have established comprehensive incident response and recovery plans and continue to regularly test and evaluate the effectiveness of those plans.
Education and Awareness
Recognizing that human error can often be a weak link in cybersecurity defenses, we are committed to regular and comprehensive training for all employees and executives. We also conduct periodic phishing simulations, evaluate key performance indicators such as employee susceptibility rates, and track cybersecurity awareness metrics as part of our overall risk management dashboard.
Cybersecurity Threats
We are not aware of any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition.
|
|||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | We understand the critical importance of cybersecurity in protecting our operations, customer data, and the integrity of our services. Our commitment to cybersecurity is unwavering, and we adopt a serious, multi-layered approach to minimize the risks and potential impacts of cyber-attacks which has been integrated into our overall risk management process. | |||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | We are not aware of any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition. | |||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance
Board Oversight
Our Board, in coordination with the Audit Committee, oversees our management of cybersecurity risk. They receive regular reports from management about the prevention, detection, mitigation, and remediation of cybersecurity incidents, including material security risks and information security vulnerabilities. Our Audit Committee directly oversees our cybersecurity program. The Audit Committee receives regular updates from management on cybersecurity risk resulting from risk assessments, progress of risk reduction initiatives, external auditor feedback, control maturity assessments, and relevant internal and industry cybersecurity incidents. The Board receives quarterly cybersecurity briefings, including key risk indicators, remediation metrics, third party risk insights, and updates to our threat landscape assessment.
Management’s Role
Our Chief Technology Officer, Information Security Officer, and General Counsel have primary responsibility for assessing and managing material cybersecurity risks and are members of our management’s Information Technology Steering Committee (the “Security Committee”), which is a governing body that drives alignment on security decisions across the Company. Such individuals have experience in various roles for public companies involving managing information security, managing risk, implementing effective information and cybersecurity programs, and adhering to relevant compliance requirements. The Security Committee meets at least quarterly to review security performance metrics, identify security risks, and assess the status of approved security enhancements. The Security Committee also considers and makes recommendations on security policies and procedures, security service requirements, and risk mitigation strategies. The Security Committee is responsible for a cybersecurity risk report which is presented to the Board at each quarterly meeting, ensuring continuous oversight of cybersecurity risks and mitigation efforts at the highest levels of governance. Management evaluates the cybersecurity program using defined key risk indicators, including patch timeliness metrics, vulnerability severity reduction intervals, access review completion rates, phishing resilience metrics and third party assurance results. |
|||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board, in coordination with the Audit Committee, oversees our management of cybersecurity risk. They receive regular reports from management about the prevention, detection, mitigation, and remediation of cybersecurity incidents, including material security risks and information security vulnerabilities. | |||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Audit Committee directly oversees our cybersecurity program. The Audit Committee receives regular updates from management on cybersecurity risk resulting from risk assessments, progress of risk reduction initiatives, external auditor feedback, control maturity assessments, and relevant internal and industry cybersecurity incidents. | |||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | Our Chief Technology Officer, Information Security Officer, and General Counsel have primary responsibility for assessing and managing material cybersecurity risks and are members of our management’s Information Technology Steering Committee (the “Security Committee”), which is a governing body that drives alignment on security decisions across the Company. | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Security Committee is responsible for a cybersecurity risk report which is presented to the Board at each quarterly meeting, ensuring continuous oversight of cybersecurity risks and mitigation efforts at the highest levels of governance. | |||||||||||||||
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Such individuals have experience in various roles for public companies involving managing information security, managing risk, implementing effective information and cybersecurity programs, and adhering to relevant compliance requirements. | |||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The Security Committee meets at least quarterly to review security performance metrics, identify security risks, and assess the status of approved security enhancements. The Security Committee also considers and makes recommendations on security policies and procedures, security service requirements, and risk mitigation strategies. | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |