high match confidence
Sentence-level differences:
- Reworded sentence: "In the conduct of our business, we and certain of our third-party providers collect, use, transmit and store data on information systems and networks, including systems, software, hardware and networks owned and maintained by KLA and/or by third-party providers (collectively, “IT Systems”)."
- Reworded sentence: "These attacks crafted with AI tools could directly attack our IT Systems with greater speed and/or efficiency than a human threat actor or create more effective phishing emails."
- Reworded sentence: "Similar events could cause disruptions in the future."
Current (2024):
In the conduct of our business, we and certain of our third-party providers collect, use, transmit and store data on information systems and networks, including systems, software, hardware and networks owned and maintained by KLA and/or by third-party providers (collectively,…
Read full text
In the conduct of our business, we and certain of our third-party providers collect, use, transmit and store data on information systems and networks, including systems, software, hardware and networks owned and maintained by KLA and/or by third-party providers (collectively, “IT Systems”). This data includes confidential information, transactional information and IP belonging to us, our customers and our business partners, as well as personal information of individuals (collectively, “Confidential Information”). We also integrate and use third-party services and products, including software, in our IT Systems, and such third-party products, services and systems are beyond our control. We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and Confidential Information, including from diverse threat actors, such as state-sponsored organizations, opportunistic hackers and hacktivists, as well as diverse attack vectors, such as computer viruses, bugs, ransomware and other malware, technological errors and known and unknown vulnerabilities in our software and systems and those of third parties, cyber-related security breaches and similar disruptions from unauthorized intrusions, tampering, misuse or criminal acts made directly against our systems or networks, or through our third-party providers or the supply chain, including social engineering, phishing, or other events or developments that we may be unable to anticipate or fail to mitigate, including, but not limited to, financial fraud, including check fraud, vulnerabilities or misconfigurations in our IT Systems. In addition, insider actors, malicious or otherwise, could misappropriate our Confidential Information, compromise our IT Systems, tamper with our products or otherwise cause disruptions to our business operations. Moreover, we have acquired and continue to acquire companies with cybersecurity vulnerabilities and/or unsophisticated security measures, which may expose us to significant cybersecurity, operational and financial risks. Remote and hybrid working arrangements at our company (and at many third-party providers) also increase cybersecurity risks due to the challenges associated with managing remote computing assets and security vulnerabilities that are present in many non-corporate and home networks. We and our third-party providers regularly experience cyber-attacks and events and on occasion incidents involving unauthorized access to systems and data and, although no such attacks, events or incidents have materially impacted our operations or financial results, there can be no assurance that such attacks, events or incidents will not be material to KLA in the future. Because the techniques used to obtain unauthorized access to our IT Systems change frequently and increasingly leverage technologies such as AI, cyber-attacks may not be recognized until launched against a target and are increasingly designed to circumvent controls, avoid detection and remove or obfuscate forensic artifacts. As such, we may be unable to anticipate these techniques, implement adequate preventative measures, or adequately identify, investigate and recover from cybersecurity incidents. There can also be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information. We prioritize the remediation of identified security vulnerabilities based on known and anticipated risks, and we aim to patch vulnerabilities within reasonable timeframes. However, we are unable to comprehensively identify all vulnerabilities (particularly as related to third-party software and systems), apply patches or 20 20 20 Table of Contents Table of Contents confirm that mitigating measures are in place, or ensure that any patches will be applied by us or our third parties before exploitation by a threat actor. If attackers are able to exploit vulnerabilities before patches are installed or mitigating measures are implemented, significant compromises could impact our systems and data. AI may be used to generate cyberattacks as AI capabilities improve and are increasingly adopted. These attacks crafted with AI tools could directly attack our IT Systems with greater speed and/or efficiency than a human threat actor or create more effective phishing emails. In addition, the threat could be introduced from the result of us, our customers and business partners incorporating the output of an AI tool that includes a threat, such as introducing malicious code by incorporating AI generated source code. Any cybersecurity incident or occurrence could impact our business directly, or indirectly by impacting third parties in the supply chain, in many potential ways: disruptions to operations; misappropriation, corruption or theft of Confidential Information; misappropriation of funds and Company assets; reduced value of our investments in research, development and engineering; litigation (including class action lawsuits) with, or payment of damages to, third parties; reputational damage; costs to comply with regulatory inquiries or actions; data privacy issues; costs to rebuild our information systems and networks; and increased cybersecurity protection and remediation costs. Cybersecurity incidents affecting our customers could result in substantial delays in our ability to ship to those customers or install our products, which could result in delays in revenue recognition or the cancellation of orders, and cybersecurity incidents affecting our suppliers could result in substantial delays in our ability to obtain necessary components for our products from those suppliers, which could hamper our ability to ship our products to our customers and service them, harming our results of operations. For example, in February 2023, one of our suppliers experienced a ransomware event that caused delays in its manufacturing operations, resulting in its shipment delays to us for components we ordered, which in turn caused delays in some of our outbound shipments during the quarter. Similar events could cause disruptions in the future. We carry insurance that provides limited protection against the potential losses arising from a cybersecurity incident, but it will not likely cover all such losses, and the losses it does not cover may be significant.
View prior text (2023)
In the conduct of our business, we collect, use, transmit and store data on information systems and networks, including systems and networks owned and maintained by KLA and/or by third-party providers. This data includes confidential information, transactional information and IP belonging to us, our customers and our business partners, as well as personally identifiable information of individuals. We also integrate and use third-party services and products, including software, in our systems, networks and operations. Despite network security and other measures, our, our customers’, suppliers’ and other third-party providers’ information systems and networks are susceptible to computer viruses, ransomware, cyber-related security breaches and similar disruptions from unauthorized intrusions, tampering, misuse or criminal acts made directly against our systems or networks, or through our third-party providers or the supply chain, including phishing, or other events or developments that we may be unable to anticipate or fail to mitigate, including, but not limited to, financial fraud, including check fraud, vulnerabilities or misconfigurations in information systems, networks, software or hardware. In addition, insider actors, malicious or otherwise, could misappropriate our, our customers’ or business partners’ data, tamper with our products or 19 19 19 Table of Contents Table of Contents otherwise cause disruptions to our business operations. We have experienced cyber-related attacks in the past, and expect to experience cyber-related attacks and incidents in the future. Our security measures may also be breached due to employee errors, malfeasance, or otherwise. Third parties may also attempt to influence employees, users, suppliers or customers to disclose sensitive information in order to gain access to our, our customers’ or business partners’ data. Because the techniques used to obtain unauthorized access to the information systems change frequently and increasingly leverage on technologies such as artificial intelligence (“AI”), may not be recognized until launched against a target and are increasingly designed to circumvent controls, avoid detection and remove or obfuscate forensic artifacts, we may be unable to anticipate these techniques, implement adequate preventative measures, or adequately identify, investigate and recover from cybersecurity incidents. AI may be used to generate cyberattacks as AI capabilities improve and are increasingly adopted. These attacks crafted with AI tools could directly attack information systems with greater speed and/or efficiency than a human threat actor or create more effective phishing emails. In addition, the threat could be introduced from the result of our customers and business partners incorporating the output of an AI tool that includes a threat, such as introducing malicious code by incorporating AI generated source code. Any cybersecurity incident or occurrence could impact our business directly, or indirectly by impacting third parties in the supply chain, in many potential ways: disruptions to operations; misappropriation, corruption or theft of confidential information, including IP and other critical data, of KLA, our customers or other business partners; misappropriation of funds and Company assets; reduced value of our investments in research, development and engineering; litigation with, or payment of damages to, third parties; reputational damage; costs to comply with regulatory inquiries or actions; data privacy issues; costs to rebuild our information systems and networks; and increased cybersecurity protection and remediation costs. Cybersecurity incidents affecting our customers could result in substantial delays in our ability to ship to those customers or install our products, which could result in delays in revenue recognition or the cancellation of orders, and cybersecurity incidents affecting our suppliers could result in substantial delays in our ability to obtain necessary components for our products from those suppliers, which could hamper our ability to ship our products to our customers, harming our results of operations. For example, in February 2023, one of our suppliers experienced a ransomware event that caused delays in its manufacturing operations, resulting in its shipment delays to us for components we ordered, which in turn caused delays in some of our outbound shipments during the quarter. Such events could cause disruptions in the future. We carry insurance that provides limited protection against the potential losses arising from a cybersecurity incident, but it will not likely cover all such losses, and the losses it does not cover may be significant.