Our information technology (IT) and related systems are critical to the efficient operation of our business and essential to our ability to perform day to day processes. As a U.S. defense contractor, we face persistent security threats, including threats to our IT infrastructure and unlawful attempts to gain access to our information via phishing/malware campaigns and other cyberattack methods, as well as threats to the physical security of our facilities and employees, as do our customers, suppliers, subcontractors and joint venture partners. Attempts to gain unauthorized access to our confidential, classified or otherwise proprietary information or that of our employees or customers, as well as other security breaches, are persistent, continue to evolve and require highly skilled IT resources.
While we have experienced cybersecurity attacks, such attacks have not resulted in a material information security breach and we have not suffered any material losses relating to such attacks. Due to the evolving nature of security threats, the possibility of future material incidents cannot be completely mitigated, and we may not always be successful in timely detecting, reporting or responding to cyber incidents. Future attacks or breaches of data security, whether of our systems or the systems of our service providers or other third parties who may have access to our data for business purposes, could disrupt our operations, cause the loss of business information or compromise confidential information, exposing us to liability or regulatory action. Such an incident also could require significant management attention and resources, increase costs that may not be covered by insurance, and result in reputational damage, potentially adversely affecting our competitiveness and our results of operations. Products and services that we provide to our customers may themselves be subject to cyberthreats which may not be detected or effectively mitigated, resulting in potential losses that could adversely affect us and our customers. In addition, our customers, including the U.S. Government, are increasingly requiring cybersecurity protections and mandating cybersecurity standards in our products, and we may incur additional costs to comply with such demands.