Our operations rely on the secure, accurate, and timely receipt, processing, storage, and transmission of confidential and other information in our systems and networks and with counterparties, service providers, and financial institutions. Information risks for companies like ours have significantly increased in recent years, in part because of the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of organized crime, hackers, terrorists, and other external parties, including foreign state-sponsored actors. There have been several highly publicized cases involving financial services companies, consumer-based companies, and other organizations reporting the unauthorized disclosure of client, customer, or other confidential information, as well as cyberattacks involving the dissemination, theft, or destruction of corporate information, intellectual property, cash, or other valuable assets. There have also been several highly publicized cases where hackers have requested "ransom" payments in exchange for not disclosing customer information or for not making the targets' computer systems unavailable. In addition, there have been cases where hackers have misled company personnel into making unauthorized transfers of funds to the hackers' accounts. Like many companies and government entities, from time to time we have been, and likely will continue to be, the target of attempted cyberattacks, including malware, denial-of-service, and phishing, as part of an effort to disrupt operations, potentially test cybersecurity capabilities, or obtain confidential, proprietary, or other information. We could also be adversely affected by cyberattacks that target the infrastructure of the internet, as such attacks could cause widespread unavailability of websites and degrade website performance. Our risk and exposure to these matters remain heightened because of, among other things, the evolving nature of these threats, our role in the financial services industry, the outsourcing of some of our business operations, and the current global economic and political environment. Because we are interconnected with and dependent on third-party vendors, exchanges, clearinghouses, fiscal and paying agents, and other financial institutions, we could be adversely affected if any of them is subject to a successful cyberattack or other information security event. Third parties with which we do business may also be sources of cybersecurity or other technology risks. We routinely transmit and receive personal, confidential, and proprietary information by electronic means. This information could be subject to interception, misuse, or mishandling. Our exposure to these risks could increase as a result of our migration of core systems and applications to a third-party cloud environment. Although we devote significant resources to protecting our critical assets and provide employee awareness training about phishing, malware, and other cyber risks, these measures may not provide effective security. Our computer systems, software, end point devices, and networks may be vulnerable to cyberattack, unauthorized access, supply chain disruptions, computer viruses or other malicious code, or other attempts to harm them or misuse or steal information. We routinely identify cyber threats as well as vulnerabilities in our systems and work to address them, but these efforts may be insufficient. Breaches of our security measures may result from employee error or misconduct. Outside parties may attempt to induce employees, customers, counterparties, service providers, financial institutions, or other users of our systems to disclose sensitive information in order to gain access to our systems and the information they contain. We may not be able to anticipate, detect, or recognize threats to our systems and assets, or implement effective preventative measures against security breaches, especially because the techniques used change frequently or are not recognized until launched. A cyberattack could occur and persist for an extended period of time without detection. We expect that any investigation of a cyberattack would take time, during which we would not necessarily know the extent of the harm or how best to remediate it. Although to date we have not experienced any cyberattacks resulting in significant impacts to the company, our cybersecurity risk management program may not prevent cyberattacks from having significant impacts in the future. We have obtained insurance coverage relating to cybersecurity risks, but this insurance may not be sufficient to provide adequate loss coverage. The occurrence of one or more cyberattacks could result in thefts of important assets (such as cash or source code) or the unauthorized disclosure, misuse, or corruption of confidential and other information (including information about our borrowers, our customers, or our counterparties) or could otherwise cause interruptions or malfunctions in our operations or the operations of our customers or counterparties. This could result in significant losses or reputational damage, adversely affect our relationships with our customers and counterparties, negatively affect our competitive position, or otherwise harm our business. We could also face regulatory and other legal action, including for any failure to provide timely disclosure concerning, or appropriately to limit trading in our securities following, an attack. We might be required to expend significant additional resources to modify our internal controls and other protective measures or to investigate and remediate vulnerabilities or other exposures, and we might be subject to litigation and financial losses that are not fully insured. In addition, customers, counterparties, financial intermediaries, and governmental organizations may not be adequately protecting the information that we share with them. As a result, a cyberattack on their systems and networks, or a breach of their security measures, may result in harm to our business and business relationships.