Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We
have a range of security measures that are designed to protect against the unauthorized access to and misappropriation of our information,
corruption of data, intentional or unintentional disclosure of confidential information, or disruption of operations. These security
measures include controls, security processes and monitoring of our manufacturing systems. We have cloud security tools and governance
processes designed to assess, identify and manage material risks from cybersecurity threats. In addition, we maintain an information
security training program designed to address phishing and email security, password security, data handling security, cloud security,
operational technology security processes, and cyber-incident response and reporting processes. Our Company is committed to maintaining the highest standards of cybersecurity to protect our data, intellectual property, and customer information from cyber threats. As part of this commitment, we leverage a sophisticated cybersecurity framework that integrates the robust capabilities of the Microsoft cloud ecosystem with the specialized services of a leading third-party cybersecurity service provider.
The Microsoft cloud ecosystem, including Microsoft 365, Azure, SharePoint Online, Microsoft Defender, and Microsoft InTune, forms the backbone of our cybersecurity infrastructure. These platforms offer advanced security features such as data encryption in transit and at rest, network security controls, identity and access management, and threat protection capabilities. Microsoft’s constant investment in cybersecurity research and development ensures that we benefit from cutting-edge security technologies and practices.
In addition to utilizing the Microsoft cloud ecosystem, we have engaged a third-party service provider to enhance our cybersecurity posture further. This provider brings additional layers of security through services including:
Our approach to cybersecurity is proactive and multifaceted, combining the scalability and reliability of the Microsoft cloud services with the agility and expertise of our third-party cybersecurity partner. Together, these resources form a comprehensive defense mechanism against a wide range of cyber threats, from phishing and malware attacks to sophisticated nation-state sponsored cyber-attacks. We continuously evaluate and adapt our cybersecurity strategy to respond to evolving threats and to align with best practices and regulatory requirements. Our commitment to cybersecurity is integral to our business operations, and we believe our strategic investments in this area significantly mitigate the risk of cybersecurity incidents that could impact our company’s reputation, financial position, or operational capabilities. |
||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | range of security measures that are designed to protect against the unauthorized access to and misappropriation of our information, corruption of data, intentional or unintentional disclosure of confidential information, or disruption of operations. These security measures include controls, security processes and monitoring of our manufacturing systems. We have cloud security tools and governance processes designed to assess, identify and manage material risks from cybersecurity threats. In addition, we maintain an information security training program designed to address phishing and email security, password security, data handling security, cloud security, operational technology security processes, and cyber-incident response and reporting processes. | ||||||||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance The management of the Company is responsible for overseeing risk for the Company and has delegated to the VP, Engineering & Technology (“VPE&T”) the responsibility for overseeing the cybersecurity risk management strategy for the Company. Management receives regular updates on our cybersecurity risk management process from the VPE&T. The VPE&T reviews our comprehensive cybersecurity framework, including reviewing our cybersecurity reporting protocol that provides for the notification, escalation and communication of significant cybersecurity events to the management team. The Company’s cybersecurity program is overseen by our VPE&T, who is responsible for global information technology, including cybersecurity. Our VPE&T, is primarily responsible for assessing and managing material risks from cybersecurity threats, including monitoring the measures used for prevention, detection, mitigation and remediation of cybersecurity incidents. The information security organization is comprised of internal IBO employees and external security suppliers who provide security monitoring and response. |
||||||||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | The management of the Company is responsible for overseeing risk for the Company and has delegated to the VP, Engineering & Technology (“VPE&T”) the responsibility for overseeing the cybersecurity risk management strategy for the Company. Management receives regular updates on our cybersecurity risk management process from the VPE&T. The VPE&T reviews our comprehensive cybersecurity framework, including reviewing our cybersecurity reporting protocol that provides for the notification, escalation and communication of significant cybersecurity events to the management team. | ||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | ||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | management of the Company is responsible for overseeing risk for the Company and has delegated to the VP, Engineering & Technology (“VPE&T”) the responsibility for overseeing the cybersecurity risk management strategy for the Company | ||||||||||||||||||||
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Company’s cybersecurity program is overseen by our VPE&T, who is responsible for global information technology, including cybersecurity | ||||||||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our VPE&T, is primarily responsible for assessing and managing material risks from cybersecurity threats, including monitoring the measures used for prevention, detection, mitigation and remediation of cybersecurity incidents. | ||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |