Our business may be impacted by disruptions to our own or third-party IT infrastructure, and the products and services that we provide our customers are also at risk of being adversely affected by cyber-attacks. Like other companies, we regularly experience cyber-based attacks. Cybersecurity threats are continuously evolving and may have an impact on our customers, suppliers, subcontractors, and other third parties with whom we do business routinely, both on premises and in the cloud, attempting to gain unauthorized access to our confidential, proprietary, or otherwise protected information, classified information, or personal data or other information relating to our employees, customers, and other third parties, or to disrupt our systems or the systems of third parties. Cybersecurity threats also include attacks targeting the security, confidentiality, integrity, and/or availability of the hardware, software, and information installed, stored, or transmitted in our products, including after the purchase of those products and when they are incorporated into third-party products, facilities, or infrastructure. We are also exposed to the risk of insider threat attacks. Any such attacks could disrupt our systems or those of third parties (including mission and safety critical systems), impact business operations, result in unauthorized release of confidential, proprietary, or otherwise protected information, and corrupt our data or that of third parties. The threats we face are continuous and evolving, and vary in degree of severity and sophistication. These threats include advanced persistent threats from highly organized adversaries, including but not limited to cyber criminals, nation states, and so-called hacktivists, particularly those adverse to the security interests of the U.S. and its allies, which target us and other defense contractors. These types of threats are related to the geopolitical environment and have, therefore, grown in number due to recent geopolitical conflicts. In addition, as a result of the rapid pace of technological change, we and our customers, suppliers, subcontractors, and other third parties with whom we conduct business continue to rely on legacy systems and software, which can be more vulnerable to cyber threats and attacks. Moreover, we, like other companies, are seeing an unprecedented number of previously unknown vulnerabilities, for which there are no known mitigations, being revealed by new attacks. Further, the sophistication, availability, and use of artificial intelligence by threat actors present an increased level of risk. Due to the evolving threat landscape, we have experienced and expect to continue to experience more frequent and increasingly advanced cyber-attacks. In addition, changes in domestic and international cybersecurity-related laws and regulations have expanded cybersecurity-related compliance requirements, and cybersecurity regulatory enforcement activity has grown. We expect the regulatory environment to continue to evolve, and these regulatory changes could increase our operational and compliance expenditures and those of our suppliers, and lead to new or additional IT and product development expenses. We also face reputational, litigation, and financial risks in relation to potential required disclosures and increased risk of enforcement. We continue to make investments and adopt measures designed to enhance our protection, detection, response, and recovery capabilities, and to mitigate potential risks to our technology, products, services, and operations from potential cybersecurity threats, as well as to comply with evolving regulations. However, given the unpredictability, nature, and scope of cyber-attacks, it is possible that we are unable to defend against all cyber-attacks, that potential vulnerabilities could go undetected and persist in the environment for an extended period, or that we may otherwise be unable to mitigate customer losses and other potential consequences of these attacks. In addition, some products and services that we provide to customers, particularly those related to public security, may raise potential liabilities related to privacy and intellectual property. In some cases, we must rely on the safeguards put in place by our customers, suppliers, subcontractors, and other third parties to protect against and report cyber threats and attacks. We could potentially be subject to production downtimes, operational delays, other detrimental impacts on our operations, or ability to provide products and services to our customers, the compromise of confidential information, intellectual property or otherwise protected information, misappropriation, destruction, or corruption of data, security breaches, other manipulation or improper use of our or third-party systems, networks, or products, financial losses from remedial actions, loss of business, or potential liability, penalties, fines, and/or damage to our reputation. Any of these could have a material adverse effect on our competitive position, results of operations, financial condition, or liquidity. Due to the evolving nature of such risks, the impact of any potential incident cannot be predicted. Further, our insurance coverage, which may exclude losses from war or cyber operations, may not be adequate to cover all related costs and we may not otherwise be fully indemnified for them.