As a provider of products in the aerospace and defense industry, we face a multitude of security threats, including cybersecurity threats ranging from attacks common to most industries, such as ransomware and denial-of-service, to attacks from more advanced and persistent, organizations, including nation state actors, which target the defense industrial base and other critical infrastructure sectors. The risk of cyberattacks has also increased, and is expected to continue to increase, in connection with geopolitical events and dynamics, including ongoing conflicts in Europe and the Middle East and tensions with Russia, China, North Korea, Iran and other states. State-sponsored parties or their supporters may launch retaliatory cyberattacks, and may attempt to cause supply chain disruptions, or carry out other geopolitically motivated retaliatory actions that may adversely disrupt or degrade our operations and may result in data compromise. The sophistication of the threats also continues to evolve and grow, including the risk associated with the use of emerging technologies, such as artificial intelligence and quantum computing, for nefarious purposes. In addition to cybersecurity threats, we could face threats to the security of our facilities and employees from terrorist acts, sabotage or other disruptions, any of which could adversely affect our business. The improper conduct of our employees or others working on behalf of us who have access to export controlled, classified or other sensitive information could also adversely affect our business and reputation.
If we are unable to protect sensitive information, including complying with evolving information security, data protection and privacy regulations, our customers or governmental authorities could investigate the adequacy of our threat mitigation and detection processes and procedures; and could bring actions against us for noncompliance with applicable laws and regulations. Moreover, depending on the severity of an incident, our customers' data, our employees' data, our intellectual property (including trade secrets and research, development and engineering know-how), and other third-party data (such as suppliers and vendors) could be compromised, which could adversely affect our business. Products and services we provide to customers also carry cybersecurity risks, including risks that they could be breached or fail to detect, prevent or combat attacks, which could result in losses to our customers and claims against us, and could harm our relationships with our customers and financial results.
Given the persistence, sophistication, volume and novelty of threats we face, we may not be successful in preventing or mitigating an attack that could have a material adverse effect on us and the costs related to cyber or other security threats or disruptions may not be fully insured or indemnified by other means. The national security aspects of our business and much of the data we protect increase and create different risks relative to other industries. National security considerations may also preclude us from publicly disclosing a cybersecurity incident.
Our customers and suppliers face similar security threats and an incident at one of these entities could adversely impact our business. These entities are typically outside our control and may have access to our information with varying levels of security and cybersecurity resources, expertise, safeguards and capabilities. Their relationships with government contractors may increase the risk that they are targeted by the same threats we face, however, they may not be as prepared for such threats. Adversaries actively seek to exploit security and cybersecurity weaknesses in our supply chain. Breaches in our multi-tiered supply chain has, and could in the future compromise our data and adversely affect customer deliverables. We also must rely on our supply chain for adequately detecting and reporting cyber incidents, which could affect our ability to report or respond to cybersecurity incidents effectively or in a timely manner.
For information on our cybersecurity risk management, strategy and governance, see Item 1C. - Cybersecurity.