Our information technology (IT) and related systems are critical to the efficient operation of our business and essential to our ability to perform day to day processes. We routinely face persistent security threats, including threats to our IT infrastructure and unlawful attempts to gain access to our confidential, classified or otherwise proprietary information via phishing/malware campaigns and other cyberattack methods, as well as threats to the physical security of our facilities and employees. The threats we face vary from those common to most industries, to attacks by more advanced and persistent, highly organized adversaries, including nation state actors, which target us for the national security information in our possession, for our role in developing advanced technology systems or with the goal of committing fraudulent activity. Our customers, suppliers and subcontractors are likewise targeted, and attack methods continue to evolve. Some cyberattacks depend on human error or manipulation, including phishing attacks or schemes that use social engineering or artificial intelligence to gain access to systems or carry out disbursement of funds or other frauds. Developments in artificial intelligence and machine learning provide threat actors with the capability to use more sophisticated means to attack our systems and may exacerbate cybersecurity risk.
While we have experienced cybersecurity attacks, such attacks have not resulted in a material information security breach and we have not suffered any material losses relating to such attacks. Due to the evolving nature of security threats, the possibility of future material incidents cannot be completely mitigated, and we may not always be successful in timely detecting, reporting or responding to cyber incidents. Future attacks or breaches of data security, whether of our systems, the systems of our customers, suppliers, subcontractors or other business partners, or the systems of our service providers or other third parties who may have access to our data for business purposes, could disrupt our operations, cause the loss of business information or compromise confidential information, exposing us to liability or regulatory action. Such an incident also could require significant management attention and resources, increase costs that may not be covered by insurance, and result in reputational damage, potentially adversely affecting our competitiveness and our results of operations. Products and services that we provide to our customers may themselves be subject to cyberthreats which may not be detected or effectively mitigated, resulting in potential losses that could adversely affect us and our customers. In addition, our customers, including the U.S. Government, are increasingly requiring cybersecurity protections and mandating cybersecurity standards in our products, and we may incur additional costs to comply with such demands. For information on our cybersecurity governance, risk management and strategy, see Item 1C. Cybersecurity.