Brand Engagement Network Inc. 10-K Cybersecurity GRC - 2024-04-01

Page last updated on April 11, 2024

Brand Engagement Network Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-04-01 17:08:30 EDT.

Filings

10-K filed on 2024-04-01

Brand Engagement Network Inc. filed an 10-K at 2024-04-01 17:08:30 EDT
Accession Number: 0001193125-24-083577

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk management and strategy We have implemented and maintain various information security processes designed to identify, assess and manage material risks from cybersecurity threats to our critical computer networks, third-party hosted services, communications systems, hardware and software, and our critical data, including intellectual property, confidential information that is proprietary, strategic or competitive in nature, and sensitive personal information such as health information ( Information Systems and Data ). Our Chief Information Security Officer ( CISO ), Chief Technology Officer ( CTO ), Chief Information and Data Officer ( CIDO ), information security function, Information and Data Organization Department, and engineering operations help identify, assess and manage the Company s cybersecurity threats and risks. They also identify and assess risks from cybersecurity threats by monitoring and evaluating our threat environment using various methods including, for example, manual tools, automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and actors, conducting scans of the threat environment, evaluating the risk profile of the Company and its industry, evaluating threats reported to the Company, and coordinating with law enforcement concerning threats. 44 Table of Contents Depending on the environment, systems, and data at issue, we implement and maintain various technical, physical, and organizational measures, processes, standards and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example, an incident response policy, incident detection and response, a vulnerability management policy, risk assessments, a disaster recovery and business continuity plan, implementation of security standards/certifications, encryption of data, network security controls, data segregation, access controls, and physical security. Our assessment and management of material risks from cybersecurity threats are integrated into the Company s overall risk management processes. For example, security management works with management to prioritize our risk management processes and mitigate cybersecurity threats that are more likely to lead to a material impact to our business and our senior management evaluates material risks from cybersecurity threats against our overall business objectives and reports to the board of directors, which evaluates our overall enterprise risk. We use third-party service providers to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats, including for example professional services firms (including legal counsel), threat intelligence service providers, cybersecurity consultants, cybersecurity software providers, and managed cybersecurity service providers. We use third-party service providers to perform a variety of functions throughout our business, such as hosting companies. We have a vendor management program to manage cybersecurity risks associated with our use of these providers. The program includes a risk assessment for each vendor, a security questionnaire, review of the vendor s written security program, review of security assessments, and reports. Depending on the nature of the services provided, the sensitivity of the Information Systems and Data at issue, and the identity of the provider, our vendor management process may involve different levels of assessment designed to help identify cybersecurity risks associated with a provider and impose contractual obligations related to cybersecurity on the provider. For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, see our risk factors under Part 1. Item 1A. Risk Factors in this Annual Report on Form 10-K, including the risk factor captioned If our information technology systems or those of third parties upon which we rely, or our data are or were compromised, we could experience adverse consequences resulting from such compromise, including but not limited to regulatory investigations or actions litigation fines and penalties disruptions of our business operations reputational harm loss of revenue or profits and other adverse consequences. Governance Our board of directors addresses the Company s cybersecurity risk management as part of its general oversight function. Our cybersecurity risk assessment and management processes are implemented and maintained by certain Company management, including our CISO and our CIDO. Our CISO has over 23 years of experience in cybersecurity, including expertise in the CIS Controls and MITRE ATT&CK frameworks and experience as a Core Team Member of the OWASP Top 10 for LLM Applications Project. Our CIDO s qualifications include seven years of experience as a Data Officer in the healthcare industry. Our CISO and CIDO are responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into the Company s overall risk management strategy, and communicating key priorities to relevant personnel. Our CISO and CIDO, subject to the approval of the Chief Financial Officer, are responsible for approving budgets, helping prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. Our cybersecurity incident response and vulnerability response policies are designed to escalate certain cybersecurity incidents to members of management depending on the circumstances, including to our CISO, 45 Table of Contents CIDO, the Chief Executive Officer and the Chief Financial Officer. Our CISO and CIDO work with the Company s incident response team to help the Company mitigate and remediate cybersecurity incidents of which they are notified. In addition, the Company s incident response and vulnerability management policies include reporting to the board of directors for certain cybersecurity incidents. The board of directors receives periodic reports from Company management, including our CISO and our CIDO, concerning the Company s significant cybersecurity threats and risk and the processes the Company has implemented to address them. The board of directors also has access to various reports, summaries or presentations related to cybersecurity threats, risk and mitigation.


Company Information

NameBrand Engagement Network Inc.
CIK0001838163
SIC DescriptionServices-Computer Integrated Systems Design
TickerDHCA - NasdaqDHCAU - NasdaqDHCAW - Nasdaq
Website
Category
Emerging growth company
Fiscal Year EndDecember 30