We rely extensively on communications and information systems to support our business operations. These systems process and store confidential, proprietary, personal, or otherwise sensitive data, including financial and other confidential business information. Like other financial institutions, we and our customers are subject to persistent and increasingly sophisticated cyber threats from a range of threat actors, including organized cybercriminals, hackers, and state-sponsored organizations. The proliferation of advanced technologies-such as AI-alongside widespread internet connectivity and increased sophistication of the activities of threat actors has significantly heightened information security risks across the financial services industry.
Emerging technologies-including generative AI, mobile platforms, quantum computing, and cloud computing-continue to heighten operational and cybersecurity risks. The complexity and unpredictability of these technologies, as well as limited control over certain aspects of their security, present additional challenges. Threat actors employ a variety of tactics, including exploiting system vulnerabilities or misconfigurations, launching denial-of-service attacks, deploying ransomware, compromising business email systems, deceiving employees through email phishing and social engineering, and targeting our suppliers. These threats can be difficult to detect over extended periods and may be further exacerbated by the use of AI.
Third-party providers, including suppliers and their subcontractors, present operational and information security risks. These risks include potential security breaches or failures within their systems or those of their downstream partners. In such instances, we may not receive timely notification of incidents affecting our services or data, nor have the ability to participate in related investigations, disclosures, or remediation efforts. Additional risks may arise from human error, noncompliance with security protocols, or intentional misconduct by employees or third parties. Our ability to control and monitor the operational and cybersecurity measures implemented by third-party providers is limited, and under applicable laws, regulations, or contractual obligations, we may be held responsible for cyber incidents within third-party systems that impact us or our customers.
As cybersecurity threats continue to evolve, we remain committed to allocating the necessary resources in an effort to strengthen our defenses and address any information security vulnerabilities. While past cybersecurity incidents involving our systems and those of our third-party providers have not resulted in material impacts to our data, customers, or operations, we cannot guarantee that future incidents will not occur or that they will be effectively mitigated. The potential severity and consequences of such events are inherently uncertain.
Furthermore, system upgrades and enhancements may introduce risks related to implementation and integration with existing infrastructure. Given the complexity and interdependence of our technology environment, efforts to improve security can inadvertently lead to system disruptions or new vulnerabilities. Additional risks may arise if hardware and software vendors are unable to deliver timely patches or if we are unable to implement necessary updates promptly-particularly in cases where threat actors are actively exploiting known vulnerabilities.
Despite substantial investments in cybersecurity, our systems may remain susceptible to evolving threats, and our mitigation efforts may be deemed inadequate by regulatory authorities or courts. Any failure, disruption, or security incident-whether actual or perceived-affecting our communications and information technology systems or those of our third-party providers could impact our operations and services, damage our reputation, result in loss of customer business, increase regulatory scrutiny, expose us to civil litigation and financial liability, and lead to other material adverse consequences.
Furthermore, any insurance coverage we maintain may be insufficient to fully compensate for losses arising from the foregoing risks. We also cannot assure that such coverage will remain available on acceptable terms, or at all, or that insurers will not deny coverage for future claims.
For information about our cybersecurity risk management practices, see Part I, Item 1C. Cybersecurity on page 26.