Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk Management and Strategy The Company integrates cybersecurity risk management into its broader enterprise risk management processes, which are reviewed periodically by the board of directors. As a newly public organization, we continue to make investments to augment the capabilities of our people, processes, and technologies to address cybersecurity risks. Our cybersecurity risks and controls are integrated into our enterprise risk governance framework and are reviewed by the board of directors. We maintain a comprehensive set of cybersecurity and data protection policies and procedures. We provide regular cybersecurity awareness training, including specific topics related to social engineering and financial email fraud. We engage external consultants with significant expertise and certifications in cybersecurity within our industry to support cybersecurity governance, risk assessment, and program development. These consultants work with internal leadership to identify risks, evaluate controls, and align cybersecurity practices with regulatory expectations. Our information technology (IT) and cybersecurity controls are established based on recognized industry standards and cover areas such as risk management, data backup, disaster recovery, vulnerability management, third-party risk management, network segmentation, identity protection, and continuous monitoring. The primary responsibility for assessing, monitoring, and managing cybersecurity risks rests with the chief operating officer, who oversees the risk assessment and mitigation process. We maintain a dedicated external IT consultant resource with expertise in cybersecurity and risk management within our industry, working alongside internal leadership on cybersecurity oversight. We engage a managed security service provider (MSSP) to deliver operational IT and cybersecurity activities, including endpoint protection, identity monitoring, vulnerability management, network segmentation monitoring, incident response support, encryption enforcement, SaaS monitoring, and workforce awareness training. The MSSP monitors cybersecurity events continuously within our environment to detect, alert, respond to, and minimize cybersecurity threats. The chief operating officer oversees cybersecurity risk management, supported by external cybersecurity leadership and the MSSP. These activities represent an ongoing, continuous-improvement effort to mature our cybersecurity capabilities. Annual penetration testing and periodic red team exercises are identified as 2026 validation priorities as part of our continued cybersecurity maturity roadmap.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | The Company integrates cybersecurity risk management into its broader enterprise risk management processes, which are reviewed periodically by the board of directors. As a newly public organization, we continue to make investments to augment the capabilities of our people, processes, and technologies to address cybersecurity risks. Our cybersecurity risks and controls are integrated into our enterprise risk governance framework and are reviewed by the board of directors.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our board of directors is responsible for overseeing cybersecurity risk management and strategy. The chief operating officer provides periodic briefings to the board of directors regarding cybersecurity risks, monitoring activities, potential incidents, and mitigation efforts. Cybersecurity risk management is integrated into the Company’s broader risk oversight discussions at the board of directors level. Additionally, the Audit Committee reviews and discusses with management and our independent auditor guidelines and policies to identify, monitor, and address enterprise risks, including those related to cybersecurity, and the steps management has taken to monitor and control such exposures. The Audit Committee also oversees and monitors management’s plans to address such risks.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The chief operating officer provides periodic briefings to the board of directors regarding cybersecurity risks, monitoring activities, potential incidents, and mitigation efforts. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The chief operating officer provides periodic briefings to the board of directors regarding cybersecurity risks, monitoring activities, potential incidents, and mitigation efforts. Cybersecurity risk management is integrated into the Company’s broader risk oversight discussions at the board of directors level. Additionally, the Audit Committee reviews and discusses with management and our independent auditor guidelines and policies to identify, monitor, and address enterprise risks, including those related to cybersecurity, and the steps management has taken to monitor and control such exposures. The Audit Committee also oversees and monitors management’s plans to address such risks.
|
| Cybersecurity Risk Role of Management [Text Block] | The chief operating officer oversees cybersecurity risk management, supported by external cybersecurity leadership and the MSSP. These activities represent an ongoing, continuous-improvement effort to mature our cybersecurity capabilities. Annual penetration testing and periodic red team exercises are identified as 2026 validation priorities as part of our continued cybersecurity maturity roadmap.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The chief operating officer provides periodic briefings to the board of directors regarding cybersecurity risks, monitoring activities, potential incidents, and mitigation efforts. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The primary responsibility for assessing, monitoring, and managing cybersecurity risks rests with the chief operating officer, who oversees the risk assessment and mitigation process. We maintain a dedicated external IT consultant resource with expertise in cybersecurity and risk management within our industry, working alongside internal leadership on cybersecurity oversight.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The Company integrates cybersecurity risk management into its broader enterprise risk management processes, which are reviewed periodically by the board of directors. As a newly public organization, we continue to make investments to augment the capabilities of our people, processes, and technologies to address cybersecurity risks. Our cybersecurity risks and controls are integrated into our enterprise risk governance framework and are reviewed by the board of directors. We maintain a comprehensive set of cybersecurity and data protection policies and procedures. We provide regular cybersecurity awareness training, including specific topics related to social engineering and financial email fraud. We engage external consultants with significant expertise and certifications in cybersecurity within our industry to support cybersecurity governance, risk assessment, and program development. These consultants work with internal leadership to identify risks, evaluate controls, and align cybersecurity practices with regulatory expectations. Our information technology (IT) and cybersecurity controls are established based on recognized industry standards and cover areas such as risk management, data backup, disaster recovery, vulnerability management, third-party risk management, network segmentation, identity protection, and continuous monitoring. The primary responsibility for assessing, monitoring, and managing cybersecurity risks rests with the chief operating officer, who oversees the risk assessment and mitigation process. We maintain a dedicated external IT consultant resource with expertise in cybersecurity and risk management within our industry, working alongside internal leadership on cybersecurity oversight. We engage a managed security service provider (MSSP) to deliver operational IT and cybersecurity activities, including endpoint protection, identity monitoring, vulnerability management, network segmentation monitoring, incident response support, encryption enforcement, SaaS monitoring, and workforce awareness training. The MSSP monitors cybersecurity events continuously within our environment to detect, alert, respond to, and minimize cybersecurity threats. The chief operating officer oversees cybersecurity risk management, supported by external cybersecurity leadership and the MSSP. These activities represent an ongoing, continuous-improvement effort to mature our cybersecurity capabilities. Annual penetration testing and periodic red team exercises are identified as 2026 validation priorities as part of our continued cybersecurity maturity roadmap.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |