Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes For Assessing Identifying And Managing Threats [Text Block] |
Risk Management
Our enterprise risk management program is designed to identify,
Company, including
area given the increasing reliance on technology and potential of cyber
(“CISO”) reports to the CCB President who provides oversight of the information
our management-level Enterprise Risk Oversight Committee
Our objective for managing cybersecurity risk is to avoid or minimize the impacts
penetrate, disrupt or misuse systems or information.
Institute of Standards and Technology
although we cannot guarantee that we meet all technical specifications, or
Security Officers (“ISOs”) along with key members of
and policymakers to discuss cybersecurity trends and issues and identify best practices.
including our cyber risk management policies and procedures and
CISO with the goal of addressing changing threats and conditions.
The parts of our information security program relating to cybersecurity are built
and include the following processes:
◾
Risk-based controls for information systems and information
processes designed to identify,
services we provide to our clients. We
maintain cybersecurity controls. We
and provide alerts regarding suspicious activity,
maintain a risk management infrastructure that implements physical, administrative
designed, based on risk, to protect our information systems and the information
information, intellectual property and proprietary information of our
◾
Incident response program:
We have an
incidents. When a cybersecurity incident occurs, we have cross-functional
assessment of priority and severity and communicating potentially material
members of management and the Board of Directors.
◾
Training and testing:
We have
regular education and training for associates, preparedness simulations and
tests. We also monitor
◾
Internal and external risk assessments:
network architecture using internal experts and
third-party
cybersecurity threats.
review
systems, and controls, including with respect to our information security program,
effectiveness and make recommendations to strengthen
Notwithstanding our defensive measures and processes, threats posed
processes, and controls are designed to mitigate loss from cyber-attacks
in the past, to date, risks from cybersecurity threats have
not materially
the Company, including
can be no assurance that its cybersecurity risk management processes and
complied with, or effective in protecting its systems and information.
that, if realized, are reasonably likely to materially affect
further discussion of risks from cybersecurity threats, see Item 1A. Risk Factors under
incidents, including security breaches and failures of our information
the unintended disclosure or misuse of confidential or proprietary information,
cause losses.”
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] |
Our enterprise risk management program is designed to identify,
Company, including
area given the increasing reliance on technology and potential of cyber
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight And Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected Or Reasonably Likely To Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Materially Affected Or Reasonably Likely To Materially Affect Registrant [Text Block] |
Notwithstanding our defensive measures and processes, threats posed
processes, and controls are designed to mitigate loss from cyber-attacks
in the past, to date, risks from cybersecurity threats have
not materially
the Company, including
can be no assurance that its cybersecurity risk management processes and
complied with, or effective in protecting its systems and information.
that, if realized, are reasonably likely to materially affect
|
| Cybersecurity Risk Board Of Directors Oversight [Text Block] |
Board Oversight of Cybersecurity
The Board of Directors oversee cybersecurity risk and the information security
actions to identify, assess, mitigate
of Directors annually on the status of the information security program and risks, notable
developments related to cybersecurity of the information security program
may also receive from the CISO periodic reports on these activities, as well as the status of
efforts the Company may undertake.
|
| Cybersecurity Risk Board Committee Or Subcommittee Responsible For Oversight [Text Block] |
Our
CISO
including cybersecurity risks.
|
| Cybersecurity Risk Process For Informing Board Committee Or Subcommittee Responsible For Oversight [Text Block] |
On a quarterly basis, and as needed, the CISO reports the status of the information
security program, notable threats or incidents, and other developments related
our ROC.
|
| Cybersecurity Risk Role Of Management [Text Block] |
The responsibilities of this department include cybersecurity risk assessment, defense
incident response, vulnerability assessment, threat intelligence, third-party
compliance and business resilience. The foregoing responsibilities are covered
provided by our CISO, the ISOs and key members of the information security
The department, as a whole, consists of
information security professionals with varying degrees of education and
generally subject to professional education and certification requirements.
relevant expertise and formal training in the areas of information security and cybersecurity
several advisory boards and committees within the financial sector.
Our CISO regularly
reports
security program to the CCB President.
On a quarterly basis, and as needed, the CISO reports the status of the information
security program, notable threats or incidents, and other developments related
our ROC.
Board Oversight of Cybersecurity
The Board of Directors oversee cybersecurity risk and the information security
actions to identify, assess, mitigate
of Directors annually on the status of the information security program and risks, notable
developments related to cybersecurity of the information security program
may also receive from the CISO periodic reports on these activities, as well as the status of
efforts the Company may undertake.
|
| Cybersecurity Risk Management Positions Or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions Or Committees Responsible [Text Block] |
Our
CISO
including cybersecurity risks.
|
| Cybersecurity Risk Management Expertise Of Management Responsible [Text Block] |
The department, as a whole, consists of
information security professionals with varying degrees of education and
generally subject to professional education and certification requirements.
relevant expertise and formal training in the areas of information security and cybersecurity
several advisory boards and committees within the financial sector.
|
| Cybersecurity Risk Process For Informing Management Or Committees Responsible [Text Block] |
Our CISO regularly
reports
security program to the CCB President.
On a quarterly basis, and as needed, the CISO reports the status of the information
security program, notable threats or incidents, and other developments related
our ROC.
|
| Cybersecurity Risk Management Positions Or Committees Responsible Report To Board [Flag] | true |