Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have processes designed to assess, identify and manage material risks from cybersecurity threats affecting our information systems and the information maintained by us or on our behalf. These processes are intended to help protect the confidentiality, integrity and availability of our systems and information and include technical, administrative and organizational measures that we believe are appropriate for our size, operations and risk profile. We also consider cybersecurity risks associated with third-party service providers that support our operations.Our cybersecurity risk management processes may include, as appropriate, security assessments, vulnerability monitoring, incident response procedures, employee awareness and training measures, and the use of third-party service providers or consultants to assist in evaluating and managing cybersecurity risks.

 

Cybersecurity matters are overseen by senior leadership, including our Chairman, Michael D. Farkas, and material cybersecurity risks are reported to the Board as appropriate. The Board oversees management’s processes for identifying and managing material cybersecurity risks and for responding to material cybersecurity incidents.

 

To date, we are not aware of any cybersecurity incidents that have materially affected, or are reasonably likely to materially affect, our business strategy, results of operations or financial condition. However, future cybersecurity incidents could materially adversely affect us. See “We rely heavily on information technology. Any interruption or lapse related to that technology, including any cybersecurity incidents, could harm our ability to operate our business effectively.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] These processes are intended to help protect the confidentiality, integrity and availability of our systems and information and include technical, administrative and organizational measures that we believe are appropriate for our size, operations and risk profile.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true