Page last updated on March 5, 2026
Atea Pharmaceuticals, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2026-03-05 16:50:51 EST.
Filings
10-K filed on 2026-03-05
Atea Pharmaceuticals, Inc. filed a 10-K at 2026-03-05 16:50:51 EST
Accession Number: 0001193125-26-094159
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybers e curity. Cybersecurity Risk Management and Strategy We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the risk management program to other legal, compliance, strategic, operational, and financial risk areas. Key elements of our cybersecurity risk management program include, but are not limited to, the following: - risk assessments designed to help identify material risks from cybersecurity threats to our critical systems and information; - continuous monitoring of information systems for vulnerabilities, and a process to effectively remediate those vulnerabilities based on criticality level; - a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; - the use of external service providers, where appropriate, to monitor, assess, test or otherwise assist with aspects of our security processes; - cybersecurity awareness training of our employees, including incident response personnel, and senior management; - an incident response team trained on our cybersecurity incident response plan and the procedures detailed in the plan for responding to cybersecurity incidents; and - a third-party risk management process for key service providers based on our assessment of their criticality to our operation and respective risk profiles. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, results of operations or financial condition. We face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. For more information, see the section titled " Risk Factors - Our business and operations may suffer in the event of information technology system failures, cyberattacks, or deficiencies, which could materially affect our results. " Cybersecurity Governance Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the "Audit Committee") oversight of cybersecurity risks. The Audit Committee oversees management's implementation of our cybersecurity risk management program. The Audit Committee receives periodic reports from management on our cybersecurity risks. These reports include updates on our processes for preparing for, preventing and detecting cybersecurity incidents. Between such regular updates, the Audit Committee would be notified by management if a 112 significant cybersecurity threat or incident were to occur. The Audit Committee reports to the full Board regarding its activities, including those related to cybersecurity. Our information technology ("IT") team has responsibility for, among other things, developing and implementing practices, procedures and controls designed to identify, assess and manage cybersecurity programs and risks. In addition to continuous professional development, the IT team takes further steps, to stay informed about and monitor efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us ; and alerts and reports produced by security tools deployed in our IT environment. Led by our Vice President of IT , our IT team, includes both internal staff and retained consultants who possess expertise and collective experience that spans several decades managing and securing technology infrastructure. Our internal staff who are on the IT team hold industry-recognized certifications, including but not limited to CC and CISSP, underscoring their commitment to continuous professional development and adherence to the highest standards in the field. Our IT team is supplemented by a security committee, comprised of representatives from key functional areas of our business and includes both our CFO and our Sr. VP of Human Resources to whom the Vice President of IT reports.
Company Information
| Name | Atea Pharmaceuticals, Inc. |
| CIK | 0001593899 |
| SIC Description | Pharmaceutical Preparations |
| Ticker | AVIR - Nasdaq |
| Website | |
| Category | Non-accelerated filer Smaller reporting company |
| Fiscal Year End | December 31 |