Page last updated on February 27, 2026
Camping World Holdings, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2026-02-27 16:07:22 EST.
Filings
10-K filed on 2026-02-27
Camping World Holdings, Inc. filed a 10-K at 2026-02-27 16:07:22 EST
Accession Number: 0001104659-26-021548
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C. CYBERSECURITY Cybersecurity Risk Management and Strategy We have developed and implemented a cybersecurity risk management program designed to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan. We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework ("NIST CSF"). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program , and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, operational, and financial risk areas. Our cybersecurity risk management program includes: ● risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services, and our broader enterprise IT environment; ● a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, (3) our cybersecurity operations center and third party service providers responsible for monitoring and measuring threats , and (4) our response to cybersecurity incidents; ● the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls; ● regular testing of our critical systems to identify and address potential vulnerabilities; ● cybersecurity awareness training of our employees, incident response personnel, and senior management; ● a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and ● a third party risk management process for certain service providers that is calibrated based on our assessment of each provider's operational criticality, level of access to our systems and data, and respective risk profile. There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information. We regularly experience cyberattacks and other incidents and will continue to experience varying degrees of attacks and incidents in the future. To date, we have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition , however we cannot guarantee that material incidents will not occur in the future. See "Risk Factors ─ Risks Relating to Regulation and Litigation ─ "A failure in our e-commerce operations, security breaches and cybersecurity risks could disrupt our business and lead to reduced sales and growth prospects and reputational damage." and "Disruptions or breaches involving our or our third-party providers' IT Systems or Confidential Information could interrupt our operations, compromise our reputation, expose us to litigation, government enforcement actions and costly response measures and could have a material adverse effect on our business, financial condition and results of operations." included in Part I, Item 1A of this Form 10-K. Cybersecurity Governance Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee ("Committee") oversight of cybersecurity and other information technology risks. The Committee oversees management's implementation of our cybersecurity risk management program. The Committee receives briefings from our information security team ("Information Security") on our cybersecurity risks no less than annually. In addition, management updates the Committee in addition to the full Board, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential. Our Chief Information Security Officer ("CISO") is primarily responsible for leading enterprise-wide cybersecurity strategy, policy, standards, architecture, and processes. Our CISO reports to the Chief Administrative and Legal Officer, and together with our Chief Technology Officer, regularly updates our management team on efforts regarding the prevention, detection, mitigation, and remediation of cybersecurity events and security enhancements. Reports may include briefings that have been informed by internal security personnel, threat intelligence and other information obtained from governmental, public, or private sources in addition to alerts and reports produced by security tools deployed in the IT environment. Our CISO has approximately 30 years of IT and cybersecurity leadership. With a strong foundation in risk management and oversight, his previous roles included overseeing technology infrastructure and secured operations in addition to leading IT audit and assurance teams at multi-billion-dollar manufacturers. Our CISO holds an MBA, a B.S. in Computer Engineering, is CISSP, CISM, CISA, and CRISC certified and is a specialist in securing operational technology. Information Security has significant experience in incident response, forensics, vulnerability management, network security administration, fraud prevention, and other governance, risk, and compliance areas. Information Security maintains subject matter expert level knowledge in cybersecurity frameworks and governance organizations such as NIST, ISO 27001, and PCI-DSS, along with industry certifications commensurate with their roles.
Company Information
| Name | Camping World Holdings, Inc. |
| CIK | 0001669779 |
| SIC Description | Retail-Auto Dealers & Gasoline Stations |
| Ticker | CWH - NYSE |
| Website | |
| Category | Large accelerated filer |
| Fiscal Year End | December 31 |