agilon health, inc. 10-K Cybersecurity GRC - 2024-02-27

Page last updated on April 11, 2024

agilon health, inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-02-27 16:22:45 EST.

Filings

10-K filed on 2024-02-27

agilon health, inc. filed an 10-K at 2024-02-27 16:22:45 EST
Accession Number: 0001628280-24-007242

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

ITEM 1C. Cybersecurity Risk Management Strategy. Our cybersecurity program is focused on the following key areas: Governance. As discussed in more detail below under Board Oversight of Cybersecurity Risks, the Board s oversight of cybersecurity risk management is supported by the Audit Committee and Compliance and Quality Committee, each of which regularly interacts with the Company s enterprise risk management function, our Chief Technology Officer ( CTO ), Chief Information Security Officer ( CISO ), Chief Legal Officer ( CLO ), and Chief Ethics, Compliance and Risk Officer together with other members of management with responsibility for risk management and cybersecurity. Collaborative Approach. We have implemented a cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner. Technical Safeguards. We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. Incident Response and Recovery Planning. We have established and maintain incident response and recovery plans that address our response to a cybersecurity incident, and such plans are tested and evaluated on a regular basis. Third-Party Risk Management. We maintain a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of our systems, as well as the systems of third parties that could adversely impact our business in the event of a cybersecurity incident affecting those third-party systems. Education and Awareness. We provide regular, mandatory training for personnel regarding cybersecurity threats to equip our personnel with effective tools to address cybersecurity threats, and to communicate our evolving information security policies, standards, processes and practices. Cybersecurity Processes and Risks. In general, we seek to address cybersecurity risks through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, security and availability of the information that we collect and store by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur. We maintain processes for identifying, assessing and managing material risks from cybersecurity threats including: Ongoing development of our understanding of cybersecurity risk and its impact our systems, data, employees and capabilities through assessment of business context of information security, cybersecurity access management, information security governance and risk management strategy such as vulnerability assessments. Ongoing development and implementation of appropriate technical safeguards to ensure delivery of critical infrastructure services through access control, awareness and training, data security, 49 Table of Contents information protection policies and procedures, proactive maintenance and protective technology such as firewalls, intrusion prevention and detection systems, and anti-malware functionality. Ongoing development and implementation of appropriate activities to identify the potential occurrence of a cybersecurity event and actions necessary to address a detected cybersecurity event through anomaly and event detection, continuous monitoring of information security and ongoing detection processes. Ongoing development and implementation of appropriate activities necessary to address a potential detected cybersecurity event through incident response planning, communications, analysis and mitigation. We regularly assess and test our policies, standards, processes, and practices designed to address cybersecurity threats and incidents. These efforts include a wide range of activities, including audits, assessments, tabletop exercises, threat modeling, vulnerability testing and other exercises focused on evaluating the effectiveness of our cybersecurity measures and planning. Ongoing development and implementation of appropriate activities to maintain plans for cybersecurity resilience, remediation of the effects of a potential cybersecurity event and restoration of any capabilities that could be potentially impaired due to a cybersecurity event through incident recovery planning and communications preparedness. Our processes for identifying, assessing and managing material risks from cybersecurity threats are integrated into our overall risk management systems and processes and include cybersecurity risk assessment surveys, interviews of our personnel responsible for cybersecurity and ongoing development of cybersecurity risk mitigation plans based on program assessment. We regularly engage third parties to perform assessments on our cybersecurity measures, including information security maturity assessments, audits, and independent reviews of our information security control environment and operating effectiveness. The results of such assessments, audits and reviews are reported to senior management and the Board, and we adjust our cybersecurity policies, standards, processes, and practices as necessary based on the information provided by these assessments, audits, and reviews. The risks from cybersecurity threats have not to date materially affected us or not reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. Like other companies in the healthcare industry that handle protected health information and companies in all industries that rely on technology to run their operations, a material cybersecurity incident could potentially impact our results of operations and financial condition. Cyber Governance Board Oversight of Cybersecurity Risks . The Board is actively involved in oversight of the Company s risk management program, and cybersecurity represents an important component of our overall approach to enterprise risk management. Our Board, Audit Committee, and Compliance and Quality Committee provide oversight of risks from cybersecurity threats through the following activities: Cybersecurity risk governance including high-level guidance and oversight for us gleaned from each Director s extensive senior level operational management experience; and assessment of whether risks are being appropriately considered, evaluated and managed by management. Oversight of cybersecurity risk ownership through assessment of our requirements and resources; and identification and evaluation of cybersecurity risks impacting our business. Oversight of our cybersecurity risk mitigation operations through deployment of information technology, assessment of our cybersecurity risk management framework and review of our programs to meet business requirements. Our Board, Audit Committee, and Compliance and Quality Committee receive regular presentations and reports on cybersecurity risks from management that address a wide range of topics, including: recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technical trends and information security considerations arising with respect to our peers and third parties; 50 Table of Contents integrating cybersecurity oversight into the work of the Board, Audit Committee and Compliance and Quality Committee, allocating oversight responsibilities and leveraging Director skill sets; and the role of the Board, Audit Committee, and Compliance and Quality Committee in potential incident response and recovery. Oversight of the management of vendor and third-party service provider cybersecurity risks. Oversight of data governance, automated intelligence and machine learning as applied to the Company s operations. The Board, Audit Committee, and Compliance and Quality Committee, also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed. Management s Role in Cybersecurity Risk Management . Our management is responsible for assessing and managing our material risks from cybersecurity threats. The CISO, CTO, and Chief Ethics, Compliance and Risk Officer work collaboratively across the company to implement a program designed to protect the Company s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response and recovery plans. To facilitate the success of our cybersecurity risk management program, multidisciplinary teams throughout the company are deployed to address cybersecurity threats and to respond to cybersecurity incidents. Through ongoing communications with these teams, the CISO and CTO monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time and report such threats and incidents to the Audit Committee and Compliance and Quality Committee when appropriate. Our CTO and CISO lead our management of cybersecurity risks. Our CTO and CISO have a combined over 50 years of experience in managing large company technology operations and extensive expertise in the management of cybersecurity defense. The CTO holds an undergraduate degree in computer science and a master s degree in business administration and has served in various roles in information technology for over 27 years, including serving as either the Chief Technology Officer or Chief Information Officer of large companies. The CISO has served in various roles in information technology and information security for over 25 years, including serving as the Chief Information Security Officer of large companies. The CISO holds a CISSP certification and spent several years in law enforcement addressing computer crimes. Our technology group management uses numerous processes to become informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents. Management regularly reviews the Company s cybersecurity risk management program with the Board, Audit Committee and Compliance and Quality Committee.


Company Information

Nameagilon health, inc.
CIK0001831097
SIC DescriptionServices-Misc Health & Allied Services, NEC
TickerAGL - NYSE
Website
CategoryLarge accelerated filer
Fiscal Year EndDecember 30