Cellectar Biosciences, Inc. - (CLRB)
10-K Filing Date: March 27, 2024
We have implemented processes designed to identify, review and manage risks from potential cybersecurity-related data breaches, unauthorized intrusions of our information technology systems, and other information security losses on or through our information technology systems that could result in adverse effects on the confidentiality, integrity, and availability of our systems and electronic information. These processes are managed and monitored by our third-party information technology service providers, as supervised by our Chief Financial Officer (CFO). Our CFO has experience in overseeing our cybersecurity and information technology programs. We rely heavily on information technology consultants for advice and expertise on monitoring evolving industry standards and to monitor our compliance with applicable policies. Our processes include mechanisms, controls, technologies, and systems designed to prevent or mitigate data loss, theft, misuse, or other security incidents or vulnerabilities affecting the data and maintain a stable information technology environment. With the assistance of our third-party vendors, we conduct regular information technology risk evaluations and security audits. Our information technology team conducts due diligence on key technology vendors, contractors and suppliers. We also provide ongoing education communications on cyber and information security, among other topics, and monitor phishing campaigns or other misrepresented system access requests to identify any employees that might need additional training.
The Board of Directors, with the assistance of the Audit Committee, has oversight for the most significant risks facing us and for our processes to identify, prioritize, assess, manage, and mitigate those risks. As part of its oversight responsibilities, the Audit Committee receives periodic updates on cybersecurity and information technology matters and related risk exposures from our CFO.
As of the date of this report, we have not identified any cybersecurity threats or intrusions that have materially affected our strategy, results of operations or financial condition. We and our third-party service providers have, however, been the target of cybersecurity threats and we expect these threats to continue. For additional information regarding risks from cybersecurity threats, please refer to Item 1A, “Risk Factors,” in this annual report on Form 10-K.