Our information security activities involve enhancing and expanding our information infrastructure with an eye towards business continuity in the event of a large-scale disaster, strengthening our technical measures for information systems, and introducing and operating management systems. Technical efforts include enhancing our protective measures for preventing damage from attacks that leverage known vulnerabilities, as well as our risk reduction measures, which include enhancing defense in depth and the early detection of damage from new threats such as targeted attacks. In order to counter the rising threat of ransomware, we have introduced a system for forcibly applying updates and patches for vulnerabilities of the Group and all Group companies, including overseas companies.
On the management end, we strive to maintain and improve our level of security by implementing the PDCA cycle of performance evaluations and employee education on a continual basis.
In the fiscal year ended March 2024, we expanded the scope of monitoring to include individual PCs. In the fiscal year ended March 2025, we further extended monitoring to the operational technology (OT) domain and promoted the stable operation of the Security Operations Center (SOC) while expanding the monitored areas. We will continue these initiatives as measures for the fiscal year ending March 2026. In addition, we aim to institutionalize the activities of the Computer Security Incident Response Team (CSIRT) and to enhance and standardize security awareness through information security education and training.
Furthermore, in addition to complying with domestic personal information protection laws and the GDPR, we will comply with the personal information protection laws of relevant countries, while planning the implementation of new security measures in the OT domain in preparation for digitalization and the transition to smart factories, and strengthening supply chain risk management. We have also established guidelines for the use of AI, including external AI services, and intend to make an overview of these guidelines publicly available in due course. At the same time, for cases where we develop and operate AI in-house, we will advance the development of frameworks and rules to ensure transparency, fairness, and safety, and to minimize security risks.
As security threats continue to intensify, we will continue to comprehensively, efficiently, and appropriately investigate and implement a variety of technical countermeasures.