We rely extensively on information technology ("IT") systems for the storage, processing, and transmission of our electronic, business-related information assets used in or necessary to conduct business. We leverage our internal information technology infrastructures, and those of our business partners, to enable, sustain, and support our global business activities. In addition, we rely on networks and services, including internet sites, data hosting and processing facilities and tools and other hardware, software and technical applications and platforms, some of which are managed,hosted, provided and/or used by third-parties or their vendors, to assist in conducting our business. All third parties contracted by the Company have been vetted and have significant reputations in the industry. As such, controls from the third party vendors have been deemed to be adequate prior to any goods or services having been provided. The data we store, and process may include customer payment information, personal information concerning our employees, confidential financial information, and other types of sensitive business-related information. Numerous and evolving cybersecurity threats pose potential risks to the security of our IT systems, networks and services, as well as the confidentiality, availability and integrity of our technology systems and data. In addition, the laws and regulations governing security of data on IT systems are evolving and adding another layer of complexity in the form of new requirements. In the past, we have had cybersecurity incidents and we have made, and continue to make investments, seeking to address these threats, including monitoring of networks and systems, hiring of experts to evaluate and test our systems, employee training and security policies for employees and third-party providers.
The frequency and the techniques used in these attacks have increased significantly and may be difficult to detect for periods of time and we may face difficulties in anticipating and implementing adequate preventative measures. While the breaches of our IT systems to date have not been material to our business or results of operations, the costs of attempting to protect our IT systems and data will increase, and there can be no assurance that these added security efforts will prevent all breaches of our IT systems or thefts of our data. If our IT systems are damaged or cease to function properly, the networks or service providers we rely upon fail to function properly, or we or one of our third-party providers suffer a loss or disclosure of our business or stakeholder information due to any number of causes ranging from catastrophic events or power outages to improper data handling or security breaches (including ransomware, denial-of-service attacks, a malicious website, the use of social engineering and other means to affect the confidentiality, integrity and availability of our technology systems and data) and our business continuity plans do not effectively address these failures on a timely basis, we may be exposed to potential disruption in operations, loss of customers, reputational, competitive and business harm as well as significant costs from remediation, ransom payments, litigation and regulatory actions.
We are also subject to an increasing number of evolving data privacy and security laws and regulations. Failure to comply with such laws and regulations could result in the imposition of fines, penalties and other costs. The European Union ("EU") and United Kingdom's General Data Protection Regulations and the EU's pending ePrivacy Regulation could disrupt our ability to sell products and solutions or use and transfer data because such activities may not be in compliance with applicable laws. Additionally, cybersecurity incidents related to export control technology information of our Aerospace & Defense customers could subject us to additional reporting requirements, could disrupt our ability to sell products to those customers and could subject us to additional costs, penalties, and fines all of which may be material to our operating results.
The Board of Directors and Audit Committee are responsible for information security oversight and the Audit Committee is comprised entirely of independent directors. Additionally, two members of the Company's Board of Directors have relevant information security and cybersecurity experience. As part of their oversight, senior leadership meets with the Audit Committee at least annually to discuss information security and cybersecurity matters.
Over the last three years, the Company has experienced one known information security breach, in connection with a ransomware incident that occurred in June 2021. Costs incurred related to the information security breach did not have a material adverse effect on our results of operations in the years ended December 31, 2023, 2022, and 2021. However, as cybersecurity incidents continue to increase in scope, complexity, and frequency, we may be unable to prevent a significant incident in the future which may materially impact our results of operations. The Company regularly undertakes audits and evaluations (including to the National Institute of Standards and Technology (NIST) SP 800-171 standards) and enhances its security framework based upon the results of those audits and evaluations. For new associates, and on an annual basis therefore the Company requires associates to take security awareness training and has an on-going phishing recognition training and testing programs.