Information Security

objective
MINIMIZE THE LIKELIHOOD AND IMPACT OF ADVERSE CYBER SECURITY INCIDENTS TO PROTECT DATA AND EXPAND ACCESS TO TECHNOLOGY WITHIN OUR BUSINESS OPERATIONS AND FOR OUR CUSTOMERS’ MISSIONS
INNOVATION

We rely on security thought leaders, talented cyber analysts, cutting-edge technology, employee vigilance and innovative processes to defend against advanced cyber security threats.

VALUE

Securing operations and infrastructure for ourselves, our customers and our supply chain also strengthens the stability and resilience of our hyper-connected society.

blue divider

overview
Essential systems such as transportation, energy and finance depend heavily on the digital infrastructures behind them.

These technologies have made society more connected and efficient, but also more vulnerable to cyber threats and attacks. We secure these digital infrastructures by protecting customer mission-sensitive data, employees’ personally identifiable information and our intellectual property using our Intelligence Driven Defense® approach to cyber security.

Our latest assessment of sustainability issues identified three prioritized factors for which we set goals: customer information system and network security, employee privacy and data protection, and protection of proprietary data and intellectual property.


core issue factors


Customer information systems and network security

Efforts to ensure that our products and processes capture, store, and transfer data in a secure manner that protects the privacy and security of customer information and prevents the likelihood of data fraud, loss, sabotage, and theft.


Employee privacy and data protection

Efforts to protect the privacy and data integrity of our employees and prevent likelihood of data fraud, loss, sabotage, and theft.


Protection of proprietary data and intellectual property

Efforts to ensure the protection of both company and supplier proprietary information to prevent likelihood of data fraud, loss, sabotage, and theft.