As a U.S. defense contractor, various privacy and security laws require us to protect sensitive, confidential, and controlled unclassified information from disclosure both for us and others. Cybersecurity risks continue to increase as various threat actors including nation states and hackers, focus efforts to compromise our operational and developmental information technology infrastructure. These threat actors attempt to gain access to sensitive, confidential, proprietary or controlled unclassified information, and may pose threats to physical security.
We and our suppliers face a continual risk associated with security events or disruptions, cybersecurity attacks and cyber intrusions by computer hackers, foreign governments, and cyber terrorists as attack vectors and technologies advance in sophistication, including from emerging technologies. In connection with the information technology and network communications services that we provide to our customers, we also may encounter cybersecurity threats at customer sites that we operate. We face an added risk of a security event or other significant disruption of our information technology systems and related systems that we develop, install, operate and maintain for our customers, which may involve managing and protecting controlled unclassified information relating to national security and other sensitive government functions or personally identifiable or protected health information.
Cybersecurity risks are significant and continue to evolve. They include, among others, phishing attempts, ransomware, malware and zero-day attacks attempting to gain unauthorized access to systems or data. Other electronic security events could lead to disruptions in mission critical systems, unauthorized release of personal identifiable information, confidential or otherwise protected unclassified information and corruption of data. In addition to security risks listed, we are also subject to other systems failures, including network, software or hardware failures, whether caused by us, third-party service providers, natural disasters, power shortages, terrorist attacks or other events. Our systems reside within cloud service environments which presents various risks, including platform and software as a service providers' inability to identify or quantify, in a timely manner, specific problems that affect the business functions which impact V2X.
Integration and sustainment of existing or new information technology systems, carry a high risk of delays or integration failures. Such delays, failures, or impacts from security events or disruptions described above, could result in loss of revenues, product development delays, compromise, corruption or loss of confidential, proprietary or sensitive information (including personal information or controlled unclassified information), remediation costs, indemnity obligations and other potential liabilities, regulatory or government action, breach of contract claims, contract termination, class action or individual lawsuits from affected parties, negative media attention, reputational damage, and loss of confidence from our government clients. Any of the foregoing could materially and adversely affect our business, financial condition or operations, and our insurance and other risk mitigation mechanisms may not be sufficient to recover the costs.