Management’s Expertise 27 Our IT AVP also ensures he is continually informed about the latest developments in cybersecurity, including potential threats and innovative risk management techniques. Staying informed on developments in the cyber industry is crucial to the Company’s effective prevention, detection, mitigation and remediation of any cybersecurity incidents.
Management’s Expertise Our IT AVP also ensures he is continually informed about the latest developments in cybersecurity, including potential threats and innovative risk management techniques. Staying informed on developments in the cyber industry is crucial to the Company’s effective prevention, detection, mitigation and remediation of any cybersecurity incidents.
In general, the Company seeks to address cybersecurity risks through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, security and availability of the information that the Company collects and stores by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur.
In general, the Company seeks to address cybersecurity risks through a comprehensive, cross-functional approach that is focused on preserving the 27 confidentiality, security and availability of the information that the Company collects and stores by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur.
The ISC is charged with developing and implementing policies and procedures for incident response handling, monitoring, and addressing security risks on an ongoing basis. The ISC is responsible for deploying technology and information security experts to monitor security risks and advise, contain, analyze, and report on security incidents, as necessary.
The ISC is charged with developing and implementing policies and procedures for incident response handling, monitoring, and addressing security risks on an ongoing basis. The ISC is responsible for deploying technology and information security experts to monitor security risks and advise, contain, analyze, and report on security 28 incidents, as necessary.
Cybersecurity risk management and strategy As one of the elements of the Company’s overall risk management program, the Company’s cybersecurity program is focused on the following key areas: 26 • Technical Safeguards: The Company deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. • Incident Response and Recovery Planning: The Company has established and maintains incident response and recovery plans to timely, consistently, and compliantly address cybersecurity threats that may occur despite the Company’s safeguards , and such plans are tested and evaluated on a regular basis. • Third-Party Risk Management: The Company maintains a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of the Company’s systems, as well as the systems of third parties that could adversely impact the Company’s business in the event of a cybersecurity incident affecting those third-party systems. • Outside Consultants: The Company engages various outside consultants, including contractors, assessors, auditors, outside attorneys and other third parties, to among other things : • Assist in the design, implementation, and testing of our cybersecurity program, policies and procedures; • monitor Company networks, servers and endpoints to identify vulnerabilities; • perform assessments on the Company’s cybersecurity measures, including audits and independent reviews of the Company’s information security control environment and operating effectiveness; • obtain information of a cybersecurity incident and isolate compromised systems and electronic data from further exposure; • determine and execute mitigation and remediation options and plans; and • ensure ongoing compliance with applicable legal and regulatory requirements, including notification to required individuals and regulatory bodies in the event of the discovery of an information security breach as defined under applicable laws, and timely and adequate disclosure under applicable SEC rules. • Education and Awareness: The Company provides annual training for personnel regarding cybersecurity threats as a means to equip the Company’s personnel with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes and practices.
Cybersecurity risk management and strategy As one of the elements of the Company ’s overall risk management program, the Company’s cybersecurity program is focused on the following key areas: • Technical Safeguards: The Company deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. • Incident Response and Recovery Planning: The Company has established and maintains incident response and recovery plans to timely, consistently, and compliantly address cybersecurity threats that may occur despite the Company’s safeguards , and such plans are tested and evaluated on a regular basis. • Third-Party Risk Management: The Company maintains a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of the Company’s systems, as well as the systems of third parties that could adversely impact the Company’s business in the event of a cybersecurity incident affecting those third-party systems. • Outside Consultants: The Company engages various outside consultants, including contractors, assessors, auditors, outside attorneys and other third parties, to among other things : ◦ Assist in the design, implementation, and testing of our cybersecurity program, policies and procedures; ◦ monitor Company networks, servers and endpoints to identify vulnerabilities; ◦ perform assessments on the Company’s cybersecurity measures, including audits and independent reviews of the Company’s information security control environment and operating effectiveness; ◦ obtain information of a cybersecurity incident and isolate compromised systems and electronic data from further exposure; ◦ determine and execute mitigation and remediation options and plans; and ◦ ensure ongoing compliance with applicable legal and regulatory requirements, including notification to required individuals and regulatory bodies in the event of the discovery of an information security breach as defined under applicable laws, and timely and adequate disclosure under applicable SEC rules. ◦ Education and Awareness: The Company provides annual training for personnel regarding cybersecurity threats as a means to eq uip the Company’s personnel with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes and practices .
Item 1C. Cybersec urity The Audit Committee (“Audit Committee”) of the Company’s Board of Directors (the “Board”) is actively involved in oversight of the Company’s risk management program, which includes the identification, assessment and management of material cybersecurity risks.
Item 1C. Cybersecurity The Audit Committee (“Audit Committee”) of the Company’s Board of Directors (the “Board”) is actively involved in oversight of the Company’s risk management program, which includes the identification, assessment and management of material cybersecurity risks.