Sprinklr, Inc. 10-K Cybersecurity GRC - 2024-03-28

Page last updated on April 11, 2024

Sprinklr, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-03-28 21:56:53 EDT.

Filings

10-K filed on 2024-03-28

Sprinklr, Inc. filed an 10-K at 2024-03-28 21:56:53 EDT
Accession Number: 0001569345-24-000019

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk management and strategy We have implemented and maintain various information security processes designed to identify, assess and manage material risks from cybersecurity threats to our critical computer networks, third-party hosted services, communications systems, hardware and software, and our critical data, including intellectual property, confidential information that is proprietary, strategic or competitive in nature, and customer data ( Information Systems and Data ). Our information security and enterprise risk management function, led by our Chief Information Security Officer ( CISO ) and Chief Compliance Officer ( CCO ), helps identify, assess and manage the Company s cybersecurity threats and risks, including through the use of the Company s information security risk register. The information security function helps to identify, assess, and mitigate risks from cybersecurity threats by monitoring and evaluating the relevant threat environment and the Company s security risk posture using various methods including, for example deploying manual and automated tools in certain environments and systems, subscribing to reports and services that identify certain cybersecurity threats, analyzing reports of certain cybersecurity threats and actors, conducting manual and automated scans of certain environments, evaluating our industry s risk profile, evaluating certain threats reported to us, coordinating with law enforcement concerning certain threats, conducting internal audits and threat assessments in certain environments and systems, conducting vulnerability assessments in certain environments and systems, and engaging third parties to assist with tabletop incident response exercises. Depending on the results of the assessments and the sensitivity of the respective environments and systems, we implement and maintain various technical, physical, and organizational measures, processes, standards and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example, incident response plan, vulnerability management standard, disaster recovery and business continuity plans, risk assessments, encryption of certain data, segregation of certain data, network security and access controls in certain environments, asset management, systems monitoring in certain systems, vendor risk management program, employee training, penetration testing, and cybersecurity insurance. Our assessment and management of material risks from cybersecurity threats are integrated into our overall risk management processes. Cybersecurity risk is identified in our risk register, and our information security function works with management to prioritize our risk management processes and mitigate cybersecurity threats that are more likely to lead to a material impact to our business. We use third-party service providers to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats, including, for example professional services firms (including legal counsel), cybersecurity management consultants, cybersecurity software providers, penetration testing firms, and forensic investigators. We also use third-party service providers to perform a variety of functions throughout our business, such as application providers, hosting companies, and supply chain resources. We have a vendor management standard and underlying processes to manage cybersecurity risks associated with our use of these providers. The processes include risk assessments, security documentation reviews, and review of security questionnaires for certain vendors and security audits of certain vendors. Depending on the nature of the services provided, the sensitivity of the Information Systems and Data at issue, and the identity of the provider, our vendor management process may involve different levels of assessment designed to help identify cybersecurity risks associated with a provider and impose contractual obligations related to cybersecurity on the provider. For a description of the risks from cybersecurity threats that may materially affect us and how they may do so, see our risk factors under Part I. Item 1A. Risk Factors in this Form 10-K, including If we or the third parties upon which we rely experience a cybersecurity breach or other security incident or unauthorized parties otherwise obtain access to our customers data, our data or our Unified-CXM platform, our Unified-CXM platform may be perceived as not being secure, our reputation may be harmed, demand for our Unified-CXM platform may be reduced and we may incur significant liabilities. Governance Our board of directors addresses our cybersecurity risk management as part of its general oversight function. The board of directors audit committee is responsible for overseeing our cybersecurity risk management processes, including oversight of mitigation of risks from cybersecurity threats. Our cybersecurity risk assessment and management processes are implemented and maintained by certain members of management, including our CISO, Chief Compliance Officer and General Counsel. Our CISO, who reports to our General Counsel and has the primary responsibility for our cybersecurity risk assessment and management processes, has over a decade of experience as CISO for public companies, as well as in U.S. government security compliance, architecture and design, and systems and standards development. Our CISO is responsible for hiring appropriate personnel, managing the security budget, helping to integrate cybersecurity risk considerations into our overall risk management strategy, communicating key priorities to relevant personnel, providing security and 43 security-related risk guidance to leadership relating to product management, development, and operations, helping prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. Our incident response and crisis communications plans are designed to escalate certain cybersecurity incidents to members of the crisis management team depending on the circumstances, which includes our CISO, Chief Compliance Officer, General Counsel, corporate communications team and executive leadership as needed. This group works with our incident response team to help triage, contain, remediate, and recover from cybersecurity incidents of which they are notified. In addition, our incident response and crisis management plans include reporting to the audit committee of the board of directors for certain cybersecurity incidents. The audit committee receives periodic reports from the CISO concerning any significant cybersecurity threats and risks and the processes we have implemented to address them. The audit committee also has access to various reports, summaries or presentations related to cybersecurity threats, risk and mitigation.


Company Information

NameSprinklr, Inc.
CIK0001569345
SIC DescriptionServices-Prepackaged Software
TickerCXM - NYSE
Website
CategoryLarge accelerated filer
Fiscal Year EndJanuary 30