Edgewise Therapeutics, Inc. 10-K Cybersecurity GRC - 2024-02-22

Page last updated on April 11, 2024

Edgewise Therapeutics, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-02-22 08:07:05 EST.

Filings

10-K filed on 2024-02-22

Edgewise Therapeutics, Inc. filed an 10-K at 2024-02-22 08:07:05 EST
Accession Number: 0001558370-24-001467

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk Management and Strategy We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or 128 Table of Contents conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. We conduct periodic risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, physical controls, and safeguards in place to manage such risks. Following these risk assessments, we evaluate whether and how to re-design, implement, and maintain reasonable safeguards to minimize identified risks and reasonably address any identified gaps in existing safeguards. We also regularly monitor the effectiveness of our safeguards. We devote significant resources and designate high-level personnel to manage the risk assessment and mitigation processes. As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards. Personnel at all levels and departments are made aware of our cybersecurity policies through trainings. We engage third parties in connection with our risk assessment processes. These third parties assist us to design and implement our cybersecurity policies and procedures, as well as to monitor and test our safeguards. In addition, we require each key third-party service provider to certify that it has the ability to implement and maintain appropriate security measures, consistent with all applicable laws, to implement and maintain reasonable security measures in connection with their work with us, and to promptly report any suspected breach of its security measures that may affect our company. We, like any other technology company, have experienced cybersecurity incidents in the past. However, we have not previously been materially impacted by any previous cybersecurity incidents. For additional information regarding whether any risks from cybersecurity threats are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, please refer to Item 1A, Risk Factors, in this annual report on Form 10-K. Governance One of the key functions of our board of directors is informed oversight of our risk management process, including risks from cybersecurity threats. Our board of directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our board of directors administers its cybersecurity risk oversight function through the audit committee. Our General Counsel and our management committee on cybersecurity, which includes IT, Finance, Communications and Human Resource management, are primarily responsible to assess and manage our material risks from cybersecurity threats. Our Senior Director of IT, who is part of our management committee on cybersecurity, has been managing our cybersecurity for the last 7 years and has been certified in cybersecurity through the International Information System Security Certification Consortium. Our General Counsel and our management committee on cybersecurity oversee our cybersecurity policies and processes, including those described in Risk Management and Strategy above. The processes by which our General Counsel and our management committee on cybersecurity are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents include the participation of our Senior Director of IT in the management committee on cybersecurity, as well as the following: 129 Table of Contents Prevention management routinely takes steps to monitor compliance of our employees and third parties with the Company s cybersecurity policies and processes. Detection - reports of potential cybersecurity incidents can come from various sources, including users, system operators, employees, or third parties that have noticed unusual or suspicious behavior in a system, network, or other operations processes. Employees, third parties, or authorities may report a potential incident via a telephone call, email, or other method to the organization. IT management will review the potential incident and determine whether it constitutes a potential incident and requires mitigation and notification of the management committee on cybersecurity. Mitigation - once a cybersecurity incident has been detected, IT management performs a vulnerability analysis and, as applicable and deemed necessary, improves system defense, removes the cause of the threat, and addresses any other vulnerabilities such as viruses, malicious codes or files, trojans, backdoors, and any authorized activity, detected. Remediation - remediation involves providing the technical support that is necessary to update software, repair hardware, and otherwise move our information systems toward recovery, as applicable. Our General Counsel and Chief Financial Officer provide quarterly briefings to the audit committee regarding our company s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. Our audit committee provides regular updates to the board of directors on such reports.


Company Information

NameEdgewise Therapeutics, Inc.
CIK0001710072
SIC DescriptionPharmaceutical Preparations
TickerEWTX - Nasdaq
Website
Category
Emerging growth company
Fiscal Year EndDecember 30