We rely on information technology (IT) systems, including third-party "cloud based" service providers and rely on our electronic information systems to perform routine transactions to run our business. We transact business over the Internet with customers and suppliers and have implemented security measures to protect against unauthorized access to this information. We have also implemented security policies that limit access via the Internet to the Company's systems through geofencing. We routinely receive security patches from software providers for the software we use. Our primary concerns are inappropriate access to personnel information, information covered under the International Traffic in Arms Regulation, product designs and manufacturing information, financial information and our intellectual property, trade secrets and know-how. Our business may be impacted by disruptions to our own or third-party information technology infrastructure, which could result from, among other causes, cyberattacks on or failures of such infrastructure or compromises to its physical security. Cybersecurity threats are continuously evolving and include, but are not limited to, both attacks on our IT infrastructure and attacks on the IT infrastructure of our customers, suppliers, subcontractors and other third parties with whom we do business routinely, attempting to gain unauthorized access to our confidential, proprietary, or otherwise protected information, classified information, or information relating to our employees, customers and other third parties, or to disrupt our systems or the systems of third parties. We are also exposed to the risk of insider threat attacks. Any such attacks could disrupt our systems or those of third parties, impact business operations, result in unauthorized release of confidential, proprietary, or otherwise protected information, and corrupt our data or that of third parties. The threats we face are continuous and evolving and vary in degree of severity and sophistication. In addition, as a result of the rapid pace of technological change, we and our customers, suppliers, subcontractors and other third parties with whom we conduct business continue to rely on legacy systems and software, which can be more vulnerable to cyber threats and attacks. The sophistication, availability and use of artificial intelligence by threat actors present an increased level of risk. Due to the evolving threat landscape, we expect to experience more frequent and increasingly advanced cyber-attacks. In addition, changes in domestic and international cybersecurity-related laws and regulations have expanded cybersecurity-related compliance requirements, and cybersecurity regulatory enforcement activity has grown. We expect the regulatory environment to continue to evolve, and staying apace with these regulatory changes could increase our operational and compliance expenditures and those of our suppliers, and lead to new or additional information technology and product development expenses. We also face reputational, litigation and financial risks in relation to potential required disclosures and increased risk of enforcement. We continue to make investments and adopt measures designed to enhance our protection, detection, response, and recovery capabilities, and to mitigate potential risks to our technology, products, services and operations from potential cybersecurity threats, as well as to comply with evolving regulations. However, given the unpredictability, nature and scope of cyber-attacks, it is possible that we are unable to defend against all cyber-attacks, that potential vulnerabilities could go undetected and persist in the environment for an extended period, or that we may otherwise be unable to mitigate customer losses and other potential consequences of these attacks. In some cases, we must rely on the safeguards put in place by our customers, suppliers, subcontractors and other third parties to protect against and report cyber threats and attacks. We could potentially be subject to production downtimes, operational delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise of confidential information, intellectual property or otherwise protected information, misappropriation, destruction or corruption of data, security breaches, other manipulation or improper use of our or third-party systems, networks or products, financial losses from remedial actions, loss of business, or potential liability, penalties, fines and/or damage to our reputation. Any of these could have a material adverse effect on our competitive position, results of operations, financial condition or liquidity. Due to the evolving nature of such risks, the impact of any potential incident cannot be predicted.