We are reliant on technology to run our business, which is dependent upon financial and operational technology systems to process critical information necessary to conduct various elements of our business, including the generation, transmission and distribution of electricity; operation of our gas pipeline facilities; and the recording and reporting of commercial and financial transactions to regulators, investors and other stakeholders. In addition to general information and cyber risks that all large corporations face (e.g., ransomware, malware, unauthorized access attempts, phishing attacks, malicious intent by insiders, third-party software vulnerabilities and inadvertent disclosure of sensitive information), the utility industry faces evolving and increasingly complex cybersecurity risks associated with protecting sensitive and confidential customer and employee information, electric grid infrastructure, and natural gas infrastructure. Deployment of new business technologies, along with maintaining legacy technology, represents a large-scale opportunity for attacks on our information systems and confidential customer and employee information, as well as on the integrity of the energy grid and the natural gas infrastructure. Increasing large-scale corporate attacks in conjunction with more sophisticated threats continue to challenge power and utility companies. Any failure of our technology systems, or those of our customers, suppliers or others with whom we do business, could materially disrupt our ability to operate our business and could result in a financial loss and possibly do harm to our reputation. Additionally, our information systems experience ongoing, often sophisticated, cyber-attacks by a variety of sources, including foreign sources, with the apparent aim to breach our cyber-defenses. While we have implemented and maintain a cybersecurity program designed to protect our information technology, operational technology, and data systems from such attacks, our cybersecurity program does not prevent all breaches or cyberattack incidents. We have experienced an increase in the number of attempts by external parties to access our networks or our company data without authorization. We have experienced, and expect to continue to experience, cyber intrusions and attacks to our information systems and our operational technology. To our knowledge, none of these intrusions or attacks have resulted in a material cybersecurity intrusion or data breach. The risk of a disruption or breach of our operational technology, or the compromise of the data processed in connection with our operations, through cybersecurity breach or ransomware attack has increased as attempted attacks have advanced in sophistication and number around the world. Technological complexities combined with advanced cyber-attack techniques, lack of cyber hygiene and human error can result in a cyber incident, such as a ransomware attack. Supplier non-compliance with cyber controls can also result in a cyber incident. Attacks can occur at any point in the supply chain or with any suppliers. In addition, we collect and retain personally identifiable information of our customers, stockholders, and employees. Customers, stockholders, and employees expect that we will adequately protect their personal information. The regulatory environment surrounding information security and privacy is increasingly demanding. Although we attempt to maintain adequate defenses to these attacks and work through industry groups and trade associations to identify common threats and assess our countermeasures, a security breach of our information systems and/or operational technology, or a security breach of the information systems of our customers, suppliers or others with whom we do business, could (i) adversely impact our ability to safely and reliably deliver electricity and natural gas to our customers through our generation, transmission and distribution systems and potentially negatively impact our compliance with certain mandatory reliability and gas flow standards, (ii) subject us to reputational and other harm or liabilities associated with theft or inappropriate release of certain types of information such as system operating information or information, personal or otherwise, relating to our customers or employees, (iii) impact our ability to manage our businesses, and/or (iv) subject us to legal and regulatory proceedings and claims from third parties, in addition to remediation costs, any of which, in turn, could have a material adverse effect on our businesses, cash flows, financial condition, results of operations and/or prospects. Although we do maintain cyber insurance, it is possible that such insurance will not adequately cover any losses or liabilities we may incur as a result of a cybersecurity incident.