Cybersecurity is a critical component of the Company’s enterprise risk management program. Global cybersecurity threats and incidents can range from uncoordinated individual attempts to gain unauthorized access to IT, operational technology, and online services infrastructure to sophisticated and targeted measures known as advanced persistent threats, directed at the Company, its products, its customers, and/or its third-party software and service providers, including cloud providers. Our customers, including the U.S. government, are increasingly requiring cybersecurity protections and mandating cybersecurity standards in our products, and we may incur additional costs to comply with such demands. While we have experienced, and expect to continue to experience, these types of threats and incidents, none of them to date have been material to the Company. We seek to deploy comprehensive measures to deter, prevent, detect, respond to, and mitigate these threats, including identity and access controls, data protection, vulnerability assessments, continuous monitoring of our IT networks and systems, and maintenance of backup and protective systems. Despite these efforts, cybersecurity incidents (against us, parties with whom we contract, or software used in our business), including incidents due to human error, third-party action, including actions of foreign actors, which risk may be exacerbated by the current Russia-Ukraine and Israel-Hamas conflicts and U.S. and international response, insider attacks, the introduction of computer viruses and/or malicious or destructive code, phishing or denial-of-service attacks, the introduction of computer viruses and/or malicious or destructive code, ransomware or other malware, social engineering, malfeasance, other unauthorized physical or electronic access, or other vulnerabilities, depending on their nature and scope, could potentially result in the misappropriation, destruction, corruption or unavailability of critical data and confidential or proprietary information (our own or that of third parties), theft of funds, and the disruption of business operations. In addition, the techniques used to obtain unauthorized access to sensitive data continue to evolve and become more sophisticated and may not be recognized until launched against a target; accordingly, we may be unable to anticipate these techniques or implement adequate preventative measures, and future cybersecurity incidents could go undetected and persist for an extended period of time. Furthermore, to the extent artificial intelligence capabilities continue to improve and are increasingly adopted, they may be used to identify vulnerabilities and craft increasingly sophisticated cybersecurity attacks, including the use of generative artificial intelligence to conduct more sophisticated social engineering attacks on the Company, suppliers, or customers. In addition, vulnerabilities may be introduced from the use of artificial intelligence by us, our financial services providers and other vendors and third-party providers. Our customers, partners (including our suppliers), subcontractors, and other third parties to whom we entrust confidential data, and on whom we rely on to provide products and services, face similar threats and growing requirements. While we aim to perform cybersecurity due diligence on our key vendors and service providers, we do not control such third parties, and our ability to monitor their cybersecurity-related controls, safeguards and processes is limited. Further, we cannot ensure the cybersecurity measures they take will be sufficient to protect any information we share with them or prevent any disruption arising from a technology failure, cyber-attack, or other information or security breach. We depend on such parties to implement adequate controls and safeguards to protect against and report cyber incidents. If such parties fail to deter, detect, or report cybersecurity incidents in a timely manner, we may suffer from financial and other harm, including to our information, operations, performance, employees, and reputation. The potential consequences of a material cybersecurity incident and its effects include financial loss, reputational damage, litigation with third parties, theft of intellectual property, fines levied by the Federal Trade Commission or other government agencies, diminution in the value of our investment in research, development, and engineering, and increased cybersecurity protection and remediation costs due to the increasing sophistication and proliferation of threats, which in turn could have a material impact on our competitiveness, business, financial condition, and results of operations. In addition, cybersecurity laws and regulations continue to evolve, and are increasingly demanding, both in the U.S. and globally, which adds compliance complexity and may increase our costs of compliance and expose us to reputational damage or litigation, monetary damages, regulatory enforcement actions, or fines in one or more jurisdictions. We cannot be certain that our cybersecurity insurance coverage will be adequate for liabilities actually incurred, that insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim.