Our operations (both onshore and offshore) are highly dependent on both IT and OT systems and personnel that implement and maintain such systems, including systems that collect, process, store or use personal information, confidential or proprietary information, and other sensitive information about our business and operations, as well as our customers, employees, suppliers and others. Some of these systems are managed or provided by third-party service providers, including certain cloud platform or cloud software providers. As a result, our business operations could be negatively impacted by a breach or interruption of systems that originates from, or compromises, third-party networks or devices outside of our control.
We have experienced cyber incidents in the past and, although none have been material, we may experience cybersecurity incidents and security breaches in the future. Threats to our IT and OT systems associated with cybersecurity risks, cyber incidents and cyberattacks continue to grow in sophistication and scale. Risks associated with these threats include disruptions of certain systems on our vessels or systems utilized to operate our ROVs; other impairments of our ability to conduct our operations; interruption of internal critical services; interruption of external critical services to customers; interruption of our ability to bill or collect payment from customers; loss of or damage to intellectual property, proprietary information or employee or customer data; disruption of our customers' operations; loss or damage to our employee or customer data delivery systems; damage to our reputation or customer or other business relationships; inability to comply with our contractual or regulatory obligations in a timely manner which could result in civil litigation, regulatory investigations or other enforcement actions by governmental authorities and associated costs, fines or penalties; increased costs to prevent, respond to or mitigate cybersecurity incidents; and diversion of management or work force attention. Such a cyber incident could have a material adverse effect on our business and our consolidated financial condition, results of operations and cash flows.
In addition, certain cyberattacks and related incidents, such as reconnaissance or surveillance by threat actors, may remain undetected for an extended period notwithstanding our monitoring and detection efforts. The increased use of artificial intelligence by threat actors has amplified risks, as AI-driven cyberattacks can automate the discovery of vulnerabilities, generate highly convincing phishing attempts, and evade traditional detection methods. These capabilities may enable attackers to mount more effective and persistent campaigns against our infrastructure. As a result, we may be required to incur additional costs to modify or enhance our IT or OT systems to prevent or remediate any such attacks. While we continue to evaluate potential replacements or upgrades of existing systems, the implementation of new systems or upgrades to existing systems subjects us to inherent costs and risks associated with replacing or changing these systems, including potential disruption of our internal control structure, substantial capital expenditures, demands on management time and other risks. In addition, potential upgrades or updates may not result in productivity improvements at the levels anticipated, or at all. Moreover, the implementation of new, updated, or upgraded systems may cause disruptions in our business operations. Any such disruption, and any other system disruptions, if not anticipated and appropriately mitigated, could have a material adverse effect on our operations.
Finally, laws and regulations we may be subject to governing cybersecurity, such as obligations under the Cyber Incident Reporting for Critical Infrastructure Act, pose increasingly complex compliance challenges, and failure to comply with these laws and regulations could result in fines, penalties, legal liability and damage to our reputation and customer or other business relationships.