Significantly larger organizations with much greater resources than us have been the victim of cybercrimes. We routinely receive emails probing our Internet security, and our Internet security systems have detected outside organizations attempting to install Trojan virus software packages in our systems. We rely on our electronic information systems to perform routine transactions to run our business. We transact business over the Internet with customers, vendors and our subsidiaries and have implemented security measures to protect against unauthorized access to this information. We have also implemented security policies that limit access via the Internet from the Company to the outside world based on the individual's position in the Company. We routinely receive security patches from software providers for the software we use. Our primary concerns are inappropriate access to personnel information, information covered under the International Traffic in Arms Regulation, product designs and manufacturing information, financial information and our intellectual property, trade secrets and know-how. Our business may be impacted by disruptions to our own or third-party information technology (IT) infrastructure, which could result from, among other causes, cyberattacks on or failures of such infrastructure or compromises to its physical security. Cybersecurity threats are continuously evolving and include, but are not limited to, both attacks on our IT infrastructure and attacks on the IT infrastructure of our customers, suppliers, subcontractors and other third parties with whom we do business routinely, both on premises and in the cloud, attempting to gain unauthorized access to our confidential, proprietary, or otherwise protected information, classified information, or information relating to our employees, customers and other third parties, or to disrupt our systems or the systems of third parties. We are also exposed to the risk of insider threat attacks. Any such attacks could disrupt our systems or those of third parties, impact business operations, result in unauthorized release of confidential, proprietary, or otherwise protected information, and corrupt our data or that of third parties. The threats we face are continuous and evolving and vary in degree of severity and sophistication. These threats include advanced persistent threats from highly organized adversaries, including but not limited to cyber criminals, nation states and so-called hacktivists, particularly those adverse to the security interests of the U.S. and its allies, which target us and other defense contractors. These types of threats are related to the geopolitical environment and have, therefore, grown in number due to recent geopolitical conflicts. In addition, as a result of the rapid pace of technological change, we and our customers, suppliers, subcontractors and other third parties with whom we conduct business continue to rely on legacy systems and software, which can be more vulnerable to cyber threats and attacks. Moreover, we, like other companies, are seeing an unprecedented number of previously unknown vulnerabilities, for which there are no known mitigations, being revealed by new attacks. Further, the sophistication, availability and use of artificial intelligence by threat actors present an increased level of risk. Due to the evolving threat landscape, we have experienced and expect to continue to experience more frequent and increasingly advanced cyber-attacks. In addition, changes in domestic and international cybersecurity-related laws and regulations have expanded cybersecurity-related compliance requirements, and cybersecurity regulatory enforcement activity has grown. We expect the regulatory environment to continue to evolve, and staying apace with these regulatory changes could increase our operational and compliance expenditures and those of our suppliers, and lead to new or additional information technology and product development expenses. We also face reputational, litigation and financial risks in relation to potential required disclosures and increased risk of enforcement. We continue to make investments and adopt measures designed to enhance our protection, detection, response, and recovery capabilities, and to mitigate potential risks to our technology, products, services and operations from potential cybersecurity threats, as well as to comply with evolving regulations. However, given the unpredictability, nature and scope of cyber-attacks, it is possible that we are unable to defend against all cyber-attacks, that potential vulnerabilities could go undetected and persist in the environment for an extended period, or that we may otherwise be unable to mitigate customer losses and other potential consequences of these attacks. In some cases, we must rely on the safeguards put in place by our customers, suppliers, subcontractors and other third parties to protect against and report cyber threats and attacks. We could potentially be subject to production downtimes, operational delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise of confidential information, intellectual property or otherwise protected information, misappropriation, destruction or corruption of data, security breaches, other manipulation or improper use of our or third-party systems, networks or products, financial losses from remedial actions, loss of business, or potential liability, penalties, fines and/or damage to our reputation. Any of these could have a material adverse effect on our competitive position, results of operations, financial condition or liquidity. Due to the evolving nature of such risks, the impact of any potential incident cannot be predicted.