CYBERSECURITY
Risk Management and Strategy
We continuously monitor our information systems to assess, identify, and manage risks from vulnerabilities and assess cybersecurity threats. Our process for identifying and assessing material risks from cybersecurity threats operates alongside our broader overall risk assessment process. We monitor risks through routine security assessments and implementation of enhancements to security measures used to protect our systems and data. We address system alerts on an ongoing basis. Depending on the incident, we may utilize third-parties for assistance in investigating and addressing cybersecurity incidents.
We also utilize certain third-party service providers to perform a variety of critical business functions and recognize that we are exposed to cybersecurity threats associated with our use of third-party service providers. We have certain vendor management processes designed to help manage cybersecurity risks associated with our use of certain of these providers. Additionally, we strive to minimize cybersecurity risks when we first select or renew a vendor by including cybersecurity risk as part of our overall vendor evaluation and due diligence process.
We have not had cyber incidents that have materially affected our business or financial condition.
Governance
Management is responsible for identifying and assessing material risks for the business on an ongoing basis, including in relation to cybersecurity. Our Chief Exeuctive Officer oversees our information technology department which monitors the prevention, detection, mitigation, and remediation of cyber incidents, if any.
Our Board of Directors oversees our risk management program as part of its general oversight function.