In the ordinary course of business, we rely on centralized and local information technology networks and systems, some of which are provided, hosted, or managed by vendors and other third parties, to process, transmit, and store electronic information, and to manage or support various aspects of our business. Additionally, we collect and store certain data, including proprietary business information, and has access to confidential or personal information in certain of our businesses that is subject to privacy and cybersecurity laws, regulations, and other controls. Third parties and threat actors, including organized criminals, nation-state entities, and/or nation-state supported actors, regularly attempt to gain unauthorized access to information and operational technology networks and infrastructure, data, and other information, and many such attempts are becoming increasingly sophisticated. Despite our cybersecurity counter measures (including employee and third-party training, monitoring of networks and systems, patching, maintenance, and backup of systems and data), our information and operational technology systems, networks and infrastructure are still potentially susceptible to cyber-attack, insider threat, compromise, damage, disruption, or shutdown, including as a result of the exploitation of known or unknown hardware or software vulnerabilities, or zero day attacks, in our systems or the systems of our vendors and third-party service providers, the introduction of computer viruses, malware or ransomware, service or cloud provider disruptions or security breaches, phishing attempts, employee error or malfeasance, power outages, telecommunication or utility failures, systems failures, natural disasters, or other catastrophic events. Despite our cybersecurity counter measures, it is possible for security vulnerabilities or a cyberattack to remain undetected for an extended time period, up to and including several months, and the prioritization of decisions with respect to security measures and remediation of known vulnerabilities that we and the vendors and other third parties upon which we rely make may prove inadequate to protect against these attacks. Any cybersecurity incident or information or operational technology network disruption could result in numerous negative consequences, including the risk of legal claims or proceedings, investigations or enforcement actions by regulators; liabilities or penalties under applicable laws and regulations, including privacy laws and regulations in the United States interference with the our operations; the incurrence of remediation costs; loss of intellectual property protection; the loss of customer, supplier, or employee relationships; and damage to our reputation, any of which could adversely affect the our business.