Biggest changeRisk Management and Strategy As one of the critical elements of the Company’s overall ERM approach, the Company’s cybersecurity program is focused on the following key areas: • Governance: As discussed in more detail under the heading “Governance,” The Board’s oversight of cybersecurity risk management is supported by the Audit Committee of the Board (the “Audit Committee”), which regularly interacts with the Company’s General Counsel ("GC"), Chief Technology Officer ("CTO"), other members of management and relevant management committees, including Company’s Senior Leadership Team (“SLT”), regarding cybersecurity oversight and risk management. • Collaborative Approach: The Company, through its information technology partner , has implemented a comprehensive, cross-functional approach to identifying, preventing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner. • Technical Safeguards: The Company, through its information technology partner, deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti- malware functionality and access controls, which are evaluated and improved through vulnerability assessments, penetration testing, and cybersecurity threat intelligence. • Incident Response and Recovery Planning: The Company, with its information technology partner, maintains comprehensive incident response and recovery plans that fully address the Company’s response to a cybersecurity incident. • Education and Awareness: The Company, through its information technology partner, provides regular, mandatory training for personnel regarding cybersecurity threats to equip the Company’s personnel with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes, and practices.
Biggest changeRisk Management and Strategy As one of the critical elements of the Company’s overall ERM approach, the Company’s cybersecurity program is focused on the following key areas: • Governance: As discussed in more detail under the heading “Governance,” The Board’s oversight of cybersecurity risk management is supported by the Audit Committee of the Board (the “Audit Committee”), which regularly interacts with the Company’s General Counsel ("GC"), Chief Technology Officer ("CTO"), Director of Information Technology, and other members of management and relevant management committees, including the Company’s Senior Leadership Team (“SLT”), regarding cybersecurity oversight and risk management. • Collaborative Approach: The Company, through its information technology partner , has implemented a comprehensive, cross-functional approach to identifying, preventing, and mitigating cybersecurity threats and incidents, while also implementing 71 controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner. • Technical Safeguards: The Company, through its information technology partner, deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti- malware functionality and access controls, which are evaluated and improved through vulnerability assessments, penetration testing, and cybersecurity threat intelligence. • Incident Response and Recovery Planning: The Company, with its information technology partner, maintains comprehensive incident response and recovery plans that fully address the Company’s response to a cybersecurity incident. • Education and Awareness: The Company, through its information technology partner, provides regular, mandatory training for personnel regarding cybersecurity threats to equip the Company’s personnel with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes, and practices. • Third-Party Risk Management: The Company recognizes that cybersecurity risks may arise from third-party service providers, including its information technology partners and other vendors that process, store, or have access to Company information.
The Company’s information technology partner has worked in information technology and information security for over 30 years with over 300 employees with six locations in the United States. A virtual Chief Information Officer (“vCIO”) from the partner works directly with the Company to align business and technical strategies, decisions, and implementations.
The Company’s information technology partner has worked in information technology and information security for over 30 years with over 300 employees with six locations in the United States. A virtual Chief Information Officer from the partner works directly with the Company to align business and technical strategies, decisions, and implementations.
The Company’s Chief Executive Officer, CFO and General Counsel each hold undergraduate and graduate degrees in their respective fields, and each have over 25 years of experience managing risks at similar companies, including risks arising from cybersecurity threats.
The Company’s Chief Executive Officer, CFO and General Counsel each hold undergraduate and graduate degrees in their respective 72 fields, and each have over 25 years of experience managing risks at similar companies, including risks arising from cybersecurity threats.
Cybersecurity threats, including the results of any previous cybersecurity incidents, have not materially affected or are reasonably likely to affect the Company, including its business strategy, results of operations or financial condition.
Cybersecurity threats, including the results of any previous cybersecurity incidents, have not materially affected nor are reasonably likely to affect the Company, including its business strategy, results of operations or financial condition.
The Company engages in the periodic assessment and testing of the Company’s policies, standards, processes, systems, and practices that are designed to address cybersecurity threats and incidents. These efforts include a wide range of activities, including audits, assessments, tabletop exercises, threat modeling, vulnerability and penetration testing and other exercises focused on evaluating the effectiveness of our cybersecurity measures and planning.
These efforts include a wide range of activities, including audits, assessments, tabletop exercises, threat modeling, vulnerability and penetration testing and other exercises focused on evaluating the effectiveness of our cybersecurity measures and planning.
On an annual basis, the Audit Committee and the Board discuss the Company’s approach to cybersecurity risk management with the members of the SLT, which includes the Company’s CTO, GC, and Chief Financial Officer (“CFO”). 67 The CTO, in coordination with the SLT, works collaboratively across the Company to implement a program designed to protect the Company’s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with the Company’s incident response and recovery plans.
The CTO, in coordination with the SLT, works collaboratively across the Company to implement a program designed to protect the Company’s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with the Company’s incident response and recovery plans.