Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We have processes designed to assess, identify and
manage material risks from cybersecurity threats affecting our information systems and the information maintained by us or on our behalf.
These processes are intended to help protect the confidentiality, integrity and availability of our systems and information and include
technical, administrative and organizational measures that we believe are appropriate for our size, operations and risk profile. We also
consider cybersecurity risks associated with third-party service providers that support our operations.Our cybersecurity risk management processes may include,
as appropriate, security assessments, vulnerability monitoring, incident response procedures, employee awareness and training measures,
and the use of third-party service providers or consultants to assist in evaluating and managing cybersecurity risks.
Cybersecurity matters are overseen by senior leadership, including our Chairman, Michael D. Farkas, and material cybersecurity risks are reported to the Board as appropriate. The Board oversees management’s processes for identifying and managing material cybersecurity risks and for responding to material cybersecurity incidents. To date, we are not aware of any cybersecurity incidents that have materially affected, or are reasonably likely to materially affect, our business strategy, results of operations or financial condition. However, future cybersecurity incidents could materially adversely affect us. See “We rely heavily on information technology. Any interruption or lapse related to that technology, including any cybersecurity incidents, could harm our ability to operate our business effectively.” |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | These processes are intended to help protect the confidentiality, integrity and availability of our systems and information and include technical, administrative and organizational measures that we believe are appropriate for our size, operations and risk profile. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |