ARTELO BIOSCIENCES, INC. - (ARTL)
10-K Filing Date: March 25, 2024
Risk Management and Strategy
We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
We conduct periodic risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks.
Following these risk assessments, we re-design, implement, and maintain reasonable safeguards to minimize identified risks; reasonably address any identified gaps in existing safeguards; and regularly monitor the effectiveness of our safeguards. We devote significant resources and designate key personnel, including our Director of Operations, who reports to our Chief Financial Officer, to manage the risk assessment and mitigation process.
As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards, in collaboration with human resources, IT, and management. Personnel at all levels and departments are expected to be in compliance with our cybersecurity policies.
We engage consultants and auditors in connection with our risk assessment processes. These service providers assist us designing and implement our cybersecurity policies and procedures, as well as to monitor and test our safeguards. We require each third-party service provider to affirm that it has the ability to implement and maintain appropriate security measures, consistent with all applicable laws, to implement and maintain reasonable security measures in connection with their work with us, and to promptly report any suspected breach of its security measures that may affect our company.
For additional information regarding whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, please refer to Item 1A, “Risk Factors,” in this Annual Report on Form 10-K.
Governance
One of the key functions of our Board is informed oversight of our risk management process, including risks from cybersecurity threats. Our Board is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board administers its cybersecurity risk oversight function through its audit committee.
Our Chief Financial Officer and members of our audit committee are primarily responsible to assess and manage our material risks from cybersecurity threats with assistance from third-party service providers that may bring more expertise regarding cybersecurity matters.
Our Chief Financial Officer and members of our audit committee oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. The processes by which our Chief Financial Officer and members of our audit committee are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents includes the following:
48 |
Prevention: Our cyber security consultants operate a remote monitoring and management system which enables continuous monitoring of IT components, provides IT maintenance, and installs and maintains security and recovery capabilities including: patch management, antivirus, cloud data back up, and mobile device management.
Detection: Our cyber security consultants continuously monitor our environment for issues and alerts. The security tools that are installed in our systems and devices give them insight into possible suspicious behaviors. When warranted, the cyber security consultants will work with the IT support team to respond to possible security incidents as rapidly as possible.
Remediation: When necessary, our cyber security consultants are prepared to respond as a CIRT (Computer Incident Response Team). If necessary, security experts are prepared to perform DFS (Digital Forensics Sciences) on devices that might have been compromised.
Our Chief Financial Officer and key personnel provide quarterly briefings to the audit committee regarding our company’s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. Our audit committee provides regular updates to the Board on such reports.