As a defense contractor, we face significant cyber and other security threats. They include, among other things, attempts to gain unauthorized access to sensitive information or otherwise compromise the integrity, confidentiality and/or availability of our systems, hardware and networks, and the information on them; insider threats; ransomware; threats to the safety of our directors, officers and employees; threats to our facilities, infrastructure, products (we produce and use), and subcontractors or other suppliers (referred to inclusively as suppliers); and threats from terrorist acts, espionage, civil unrest and other acts of aggression. We are also subject to increasing government, customer and other cyber and security requirements, including disclosure obligations.
We have robust measures in place to address and mitigate cyber-related risks. However, we have experienced cyber attacks and expect we will continue to experience additional attacks in the future, including from nation states and non-state actors. We continue to invest in the cybersecurity and resiliency of our networks and products and to enhance our internal controls and processes, which are designed to help protect our systems and infrastructure, and the information they contain. These include timely detection of incidents through monitoring, training, incident response capabilities, and mitigating cyber and security risks to our data, systems, products and services. We also partner with the government and others in our industry to help protect national security. However, given the complex, continuing and evolving nature of cyber and other security threats, including threats from targeting by more advanced and persistent adversaries, including nation states and other actors, these efforts may not be fully effective, particularly against previously unknown vulnerabilities that could go undetected for an extended period.
Our customers and partners (including our suppliers and joint ventures) to whom we entrust confidential data, and on whom we rely to provide products and services, face similar threats and growing requirements, including ones for which others may seek to hold us responsible. We depend on our customers, suppliers, and other business partners to implement and verify adequate controls and safeguards to protect against and report cyber incidents. If they fail to deter, detect or report cyber incidents in a timely manner, we may suffer financial and other harm, including to our information, operations, performance, employees and reputation.
Although we implement various measures and controls to monitor and mitigate risks associated with these threats and to increase the cyber resiliency of our infrastructure and products, there can be no assurance that these processes will be sufficient. Successful attacks could lead to losses or misuse of sensitive information or capabilities; theft or corruption of data; harm to personnel, infrastructure or products; financial costs and liabilities; protracted disruptions in our operations and performance; and the misuse of our products, as well as damage to our reputation as a provider of cyber-related or cyber-protected goods and services. We have not always been able to and may in the future not always be able to obtain adequate insurance to cover our losses.
Cyber threats, both on premises and in the cloud, are evolving and include, but are not limited to: malicious software, destructive malware, ransomware, attempts to gain unauthorized access to systems or data, disruption to operations, critical systems or denial of service attacks; unauthorized release of confidential, personal or other protected information (ours or that of our employees, customers or partners); corruption of data, networks or systems; harm to individuals; and loss of assets. We have been and could be impacted by cyber threats or other disruptions or vulnerabilities found in products or services we use or in our internal, partners' or customers' systems that are used in connection with our business. Some of these threats are zero-day attacks associated with previously unknown vulnerabilities in third party software or products we utilize in our business. Cyber events, if not prevented or effectively mitigated, have caused and could cause harm and require remedial actions. They could also damage our reputation, disrupt performance, impact our ability to obtain future insurance coverage, and lead to loss of business, regulatory actions, liabilities or other financial losses, for which we do not have adequate sources of recovery.
We provide systems, products and services to various customers who also face cyber threats. Our systems, products and services may not be able to detect or deter threats, or effectively to mitigate resulting losses. These losses could adversely affect our customers and our company.
We also face increasing and evolving disclosure obligations related to cyber and other security events. Despite rigorous processes, we risk failing to meet all our existing or future disclosure obligations and/or having our disclosures misinterpreted. National security or public safety considerations may also affect, or in limited instances prevent, our public disclosure of a cybersecurity incident in certain circumstances.
We also face threats to our physical security, including to our facilities and the safety and well-being of our people. These threats could involve terrorism, insider threats, workplace violence, civil unrest, natural disasters, damaging weather, or fires, which could adversely affect our company. Our customers and suppliers face similar risks that, if realized, could also adversely impact our operations. Such acts could cause delays, manufacturing downtime, or other impacts that could detrimentally impact our ability to perform our operations. We could also incur unanticipated costs to remediate impacts and lost business.
The occurrence and impact of these various risks are difficult to predict, but one or more of them could have a material adverse effect on our financial position, results of operations and/or cash flows.