The secure and reliable operation of our technology, including our computer systems and communications networks, and those of our service providers, market participants, investments, and other third parties, is a critical element of our operations or our business, financial condition, or operating results. These systems and networks may be subject to various cybersecurity incidents such as improper or inadvertent access to or disclosure of confidential, commercially sensitive, or personally identifiable information, data theft, corruption or destruction, ransomware, supply chain attack, denial of service attack, malware, and other security problems, as well as acts of terrorism, attacks by threat actors including criminal groups,political activist groups and nation-state actors, attacks in connection with geopolitical activity, criminal insider activity, employee error, and service provider, market participant or third-party disruptions or security breaches. Additionally, cyber threats and the techniques used in cyberattacks change, develop and evolve rapidly, including from emerging technologies, such as advanced forms of artificial intelligence ("AI") and quantum computing. Our hybrid work environment, usage of mobile, AI and cloud-based technologies, and ongoing divestitures and wind downs may increase our risk for a cybersecurity incident. Moreover, given our position in the global financial services industry and as critical infrastructure, we may be more likely than other companies to be a direct target, or an indirect casualty, of such events. While we, and the third parties with which we interact, have experienced in the past, and we expect to continue to experience, cybersecurity threats and events of varying degrees, including events impacting personally identifiable information, we are not aware of any of these threats or events having a material impact on our business, financial condition, or operating results to date, however we cannot assure you that we, or the third parties with which we interact, will not experience future threats or events that may be material.
We maintain policies, procedures, and controls designed to safeguard against cybersecurity incidents and unauthorized access by protecting the confidentiality, integrity, availability, and reliability of our systems, networks, and information. These policies, procedures, and controls are subject to monitoring, auditing, and evaluation practices, pursuant to our Enterprise Risk Management program, which is supported by a three lines of defense approach, and our other governance practices. Further, we developed and maintain cybersecurity and data privacy training programs for our employees and our third-party consultants who have access to our systems. We also conduct simulations, tabletop exercises, and response readiness tests and engage independent third parties on a routine basis to perform cybersecurity penetration assessments. Collectively, these safeguards and measures or those of our third-party providers, including any cloud-based technologies, may prove inadequate to prevent the attendant risk posed by cybersecurity incidents, subjecting us to contractual restrictions, liability and damages, loss of business, penalties, unfavorable publicity, increased scrutiny by our regulators, and may materially impact our business, financial condition, and operating results. We may be required to expend significant resources in the event of any real or threatened breaches in security, including to protect against threatened breaches, to alleviate harm caused by an actual breach, and to address any reputational harm or litigation or regulatory liability. Despite our cybersecurity measures, security vulnerabilities or breaches may remain undetected for an extended period of time. As a result of our ongoing risk management and related assurance activities, we have identified, addressed, and continue to address potential security vulnerabilities and/or internal control weaknesses. We are not aware of any of these vulnerabilities having a material impact on our business, financial condition, or operating results to date. However, we cannot provide assurance that any future vulnerabilities, internal control weaknesses, or events that may be experienced will not be material. Such harms also could cause us to lose market participants, experience lower trading volume, and negatively impact our competitive advantage and business, financial condition, and operating results.
Additionally, as threats continue to evolve and increase, as we continue to expand ongoing risk management and related assurance activities, and as the domestic and international regulatory environment related to cybersecurity and data protection becomes increasingly rigorous, we may be required to devote significant additional resources to modify and enhance our security controls and to identify and remediate any security vulnerabilities. Those additional resources could have an adverse effect on our business, financial condition, and operating results.