As an online platform, we rely on computer systems, hardware, software, technology infrastructure and online sites and networks for both internal and external operations that are critical to our business. Despite the implementation of security measures, we and our third-party providers are vulnerable to power outages, telecommunications failures, interruptions or shutdowns of our platform and catastrophic events, as well as cybersecurity risks that threaten the confidentiality, integrity and availability of our and third party providers' information systems, technology, and confidential information (including information about our creators, consumers, employees and others, intellectual property and proprietary information such as trade secrets) through diverse attack vectors, including computer viruses, bugs or other vulnerabilities in software that is integrated into our (or our providers') systems and products, break-ins, intentional or accidental actions or inaction by employees or others with authorized access to our or our providers' networks, social engineering/phishing attacks, denial-of-service attacks, malicious or destructive code, malware, ransomware attacks, and other cyber attacks, data breaches and cybersecurity incidents.
Cyber attacks and security incidents (including through security breaches, computer malware and computer hacking attacks) upon information systems are accelerating on a global basis in their frequency, magnitude, levels of persistence, intensity and sophistication, and threat actors are using rapidly changing techniques and tools – including AI – that circumvent security controls, evade detection and remove forensic evidence, and are being conducted by diverse threat actors, including sophisticated and organized groups, state-sponsored organizations and individuals with a wide range of motives and expertise. A successful cyber attack or cybersecurity incident could occur and persist for an extended period of time before being detected.
As we continue to grow our business, expand to new geographical locations, and gain greater public visibility, we will continue to face a higher risk of being targeted by cyber attacks. As a result of our (and some of our providers') transition to a primarily remote workforce, we face increased cybersecurity risks due to our reliance on Internet technology and the number of our employees who are working remotely, which may create additional opportunities for threat actors to exploit vulnerabilities. Additionally, any current or future integration of AI in our or any of our providers' operations, products or services is expected to pose new or unknown cybersecurity risks and challenges. Moreover, we have acquired and may continue to acquire companies with cybersecurity vulnerabilities and/or unsophisticated security measures, which exposes us to significant cybersecurity, operational and financial risks. We have experienced in the past, and could experience in the future, credential stuffing attacks in which malicious third parties used or attempted to use credentials compromised in data breaches suffered by other companies to access accounts on our platform. These credential stuffing attacks have in the past, and may in the future,result in the unauthorized takeover of a customer's account and the illegal abuse of account privileges to misdirect funds to bank accounts owned or controlled by such criminal actors, which may subject us to liability for illegal transactions. It is possible that such incidents of account takeover fraud could increase in the future. The misuse of our products or services for illegal or improper purposes could subject us to claims, individual and class action lawsuits, and government and regulatory investigations, prosecutions, enforcement actions, inquiries, or requests that could result in liability and reputational harm for us.
While we employ security measures intended to prevent, detect, and mitigate potential for harm to our users from the theft of or misuse of credentials on our network, these security measures may not be effective in every instance and may require significant costs. Furthermore, the prevalent use of mobile devices increases the risk of cybersecurity incidents. Misplaced, stolen or compromised mobile devices used at events for ticket scanning, or otherwise, could lead to unauthorized access to the device and data stored on or accessible through such device. We have in the past experienced breaches of our security measures, and our platform and systems are at risk for future breaches and incidents, including as a result of third-party action or employee, service provider, partner or contractor error or malfeasance. In the future, our financial performance may be impacted further if we face additional costs and expenses from customer compensation and retention incentives, creator loss, regulatory inquiries, litigation and further remediation and upgrades to our security infrastructure. Although we have insurance coverage, our policy may not cover all financial expenses related to cybersecurity incidents, and there is no guarantee that applicable insurance will be available to us in the future on economically reasonable terms or at all.
In addition, our platform involves the storage and transmission of personal information of our creators and consumers in our facilities and on our third-party equipment, computer systems, hardware, software, technology infrastructure and online sites and networks. Cybersecurity incidents expose us to legal claims or proceedings (such as class actions), remediation costs, increased costs for security measures, loss of revenue, damage to our reputation, customer loss and potential liability. Information and corporate information systems and security measures may be breached or adversely impacted due to the actions of outside parties, employee error or misconduct, malfeasance, a combination of these or otherwise, and, as a result, an unauthorized party may obtain access to our information systems and confidential information, including information relating to our creators and consumers. Additionally, outside parties may attempt to fraudulently induce employees, creators or consumers to disclose sensitive information in order to gain access to creator or consumer data. We will continuously examine and modify our security controls and business policies to address the use of new devices and technologies, and the increasing focus by consumers and regulators on controlling and protecting personal data. We may need to expend significant resources to protect against and remedy any potential cybersecurity incidents and their consequences, including making notifications to governmental authorities and affected individuals. For example, laws in the EU and UK and all 50 U.S. states require businesses to provide notice to individuals whose personal information has been disclosed as a result of certain data security breaches. Any cybersecurity incident or adverse impact to the availability, integrity or confidentiality of our platform or information systems, the systems or networks of our third-party service providers or partners, or any unauthorized access to information we or our providers and partners process or maintain, could harm our business, financial condition and results of operations.
As any investigation of a cybersecurity incident is inherently unpredictable, the extent of a particular cybersecurity incident and the path of investigating, remediating or recovering from the incident may not be immediately clear. It may take a significant amount of time and resources before an investigation can be completed and full and reliable information about the incident is known. While an investigation is ongoing, we may not necessarily know the extent of the harm or how best to remediate or recover from the incident, certain vulnerabilities could remain and errors or actions could be repeated or compounded before they are discovered and remediated, and communication to the public, regulators, creators, consumers and other stakeholders may be delayed, inaccurate or incomplete, any or all of which could further increase the costs and consequences of a cybersecurity incident. Additionally, applicable rules requirements regarding how to respond, required notices to users, and reporting obligations to creators, consumers, regulators and others vary by jurisdiction.
While we have a cybersecurity risk management program and have implemented security policies and controls intended to protect our information systems, infrastructure and confidential information, there can be no assurance that such measures or our third-party service providers' and partners' security measures will successfully anticipate new or existing techniques used by threat actors, protect our systems and information, prevent service interruptions, software or hardware vulnerabilities or other security incidents. Further, if our employees or employees of our third-party service providers fail to comply with our internal security policies and practices, or fully implement our cybersecurity risk management program, our information systems and creator, consumer, employee and other confidential information stored thereon may be improperly accessed, used, disclosed or processed.
Although it is difficult to determine what harm may directly result from any specific interruption or incident, any actual or perceived failure to maintain performance, reliability, security and availability of our network infrastructure, or of any third-party networks or systems used or supplied by our third-party service providers or partners, to the satisfaction of creators and consumers may harm our reputation and our ability to retain existing creators and consumers and attract new creators and consumers.
Examples of situations which have in the past and may in the future lead to unauthorized access to or an adverse impact on the availability, integrity or confidentiality of our information systems or information include, but are not limited to the following:
- employees inadvertently sending financial information of one creator, consumer or employee to another creator, consumer or employee;- employee malfeasance;- creators' failure to properly password protect their leased ticket scanning and site operations devices leaving the data available to anyone using the device;- a device stolen from an event and data access, alteration or acquisition occurring prior to our remote wiping of the data;- an employee losing their computer or mobile device or otherwise, allowing for access to our email and/or administrative access, including access to guest lists to events;- external breaches leading to the circulation of "dark web" lists of user name and password combinations openly vulnerable to attack without immediate detection;- a hack of one of our databases;- account takeovers;- a hack of a third-party service provider's or partner's database; and - unauthorized access to our offices or other properties.
If an actual or perceived breach of our security or other cybersecurity incident occurs, the market perception of the effectiveness of our cybersecurity risk management program and measures could be harmed, and we could lose existing or future creators and consumers, face lawsuits (including class actions), regulatory investigations and enforcement actions, other legal or regulatory proceedings, damage to our reputation, suffer financial exposure due to such events or in connection with regulatory fines and penalties, incident response, remediation or system restoration efforts, investigation costs, changes or augmentation of our security measures, the expense of taking additional protection measures and future compliance costs. Any or all of the foregoing could materially adversely affect our business, financial condition and results of operations.