We have approximately 135 production facilities in 18 countries, primarily located in North America, Europe, and Asia. We rely on several on-premise and cloud-based computerized systems and networks to obtain, secure, process, analyze, and manage data, as well as to facilitate the manufacture and distribution of inventory to and from our production facilities. We receive, process, manufacture, and ship orders, manage the billing of and collections from our customers, and manage the accounting for and payments to our vendors. We manage our production processes with certain industrial control systems. We also have risk associated with the network connectivity and systems for consolidated reporting. Technology failures or security breaches of a new or existing infrastructure, including our industrial control systems, could impede normal operations, create system disruptions, or create unauthorized disclosure or alteration of confidential information.
We have a formal process in place for both incident response and cybersecurity continuous improvement that includes a cross-functional Cybersecurity Oversight Committee. Members of the Cybersecurity Oversight Committee update the Board quarterly on cybersecurity activity, with procedures in place for interim reporting if necessary. Our cybersecurity program, led by our Chief Information Security Officer, is based on industry recognized frameworks and takes a multifaceted approach to protecting our network, systems, and data, including personal information. We deploy a wide range of protective security technologies and tools, including, but not limited to, encryption, firewalls, endpoint detection and response, security information and event management, multi-factor authentication, and threat intelligence feeds. In addition, we use an information security risk management approach that includes monitoring security threats and trends in the industry, analyzing potential security risks that could impact the business, partnering with industry recognized security organizations, and coordinating an appropriate response should the need arise.
From time to time, we have experienced immaterial cybersecurity events and incidents. When these events or incidents occur, we have taken appropriate remediation steps, and through investigation, determined that the events or incidents did not have a material effect on our business, results of operations, or financial results. Although we are not aware of any material cybersecurity incidents, we have enhanced our cybersecurity protection efforts over the last few years. We use a third party to periodically benchmark our information security program against the National Institute of Standards and Technology's Cybersecurity Framework. We provide quarterly cybersecurity training for employees with access to our email and data systems, quarterly reports to our Board of Directors, and we have purchased broad form cyber insurance coverage. Although we believe that our cybersecurity protection systems are adequate, cybersecurity risk has increased due to remote access, remote work conditions, and associated strain on employees, as well as the increased frequency of malware attacks. As such, technology failures or cybersecurity breaches could still create system disruptions or unauthorized disclosure or alterations of confidential information, and disruptions to the systems of our third-party suppliers and providers. We cannot be certain that the attacker's capabilities will not compromise our technology protecting information systems, including those resulting from ransomware attached to our industrial control systems. If these systems are interrupted or damaged by any incident or fail for any extended period of time, then our results of operations could be adversely affected. We may incur remediation costs, increased cybersecurity protection costs, lost revenues resulting from unauthorized use of proprietary information, litigation and legal costs, increased insurance premiums, reputational damage, damage to our competitiveness, and negative impact on our stock price and long-term shareholder value.
In addition, our ability to effectively compete may be impacted by our ability to anticipate and respond effectively to the opportunity and threat presented by new technology disruption and developments, including artificial intelligence.
Finally, burdens associated with regulatory compliance, including regulations adopted by the SEC regarding cybersecurity disclosure, may increase the Company's costs.