KKR & Co. Inc. - (KKR)

10-K Filing Date: February 29, 2024
ITEM 1C. CYBERSECURITY
Cybersecurity Governance
KKR has a Chief Information Security Officer (the “KKR CISO”), who leads an information security team (the “KKR information security team”) that is responsible for information security at KKR’s asset management business, including its cybersecurity strategy and program, which includes, among other things, annual employee training about cybersecurity risks and new employee onboarding about KKR’s security policies. The KKR information security team’s mandates can be broadly grouped into three categories: (i) operations and engineering, (ii) threat detection and response and (iii) governance.
The KKR information security team members have a variety of relevant skill sets and expertise. For example, prior to joining KKR, KKR’s CISO was the CISO at another large financial institution where he was responsible for their global information security program. KKR’s CISO also has prior experience in various information security roles, including security architecture, application security, engineering and operations. He holds a Bachelor of Science in computer science from the New York University Polytechnic School of Engineering, is a Certified Information Systems Security Professional (CISSP) and holds a Series 99 – Operations Professional Exam certification. In addition, KKR information security team members have various backgrounds in information security, including in financial services and critical infrastructure, and the team maintains various levels of certifications – including CISSP, GIAC security operations certification, certified information security manager, and other certifications focused on specific technologies.
The KKR CISO chairs the technology and information security risk committee for KKR’s asset management business, which consists of employees from the firm’s technology group and other groups, including risk, legal and compliance. The technology and information security risk committee is responsible for overseeing the cybersecurity risk environment for KKR’s asset management business, which includes identifying and monitoring KKR’s technology risks, including those related to information security, business disruption, fraud and privacy related risks, and also promoting cybersecurity awareness at the firm. The technology and information security risk committee reports to KKR’s risk and operations committee, which consists of senior level employees of KKR who focus on KKR’s overall operations and enterprise risk management, including the Chief Operating Officer, Chief Compliance Officer, Chief Legal Officer and Chief Financial Officer. Periodically, including at least annually and more often as circumstances may require, management will present to the Audit Committee and the Risk Committee of our Board of Directors on various topics relating to KKR's technology risks, including KKR’s cybersecurity program (including the results of an annual cybersecurity table top exercise), cybersecurity issues (including those relating to data protection, insider threats, regulatory changes, and geopolitical cyber threat management), and risk management (including the results of periodic technology audits).
KKR also has a Chief Information Security Officer dedicated to our insurance business (the “GA CISO”), who has more than 20 years of experience in various information security and technology roles. The GA CISO leads an information security team that is focused on overseeing the cybersecurity strategy and program for Global Atlantic. The GA CISO reports periodically, including at least annually and more often as circumstances may require, to the risk committee of Global Atlantic’s board of directors (whose members include non-executive directors unaffiliated with KKR) and members of KKR’s risk and operations committee. The GA CISO also provides ad hoc reporting to Global Atlantic’s management-level committees and Global Atlantic’s board of directors and its risk committee. Material information affecting our insurance business is also reported by the GA CISO or his or her designee to KKR’s risk and operations committee, certain members of which would, as appropriate, report such material information to our Board of Directors or its Audit Committee or Risk Committee.
Cybersecurity Risk Management and Strategy
KKR’s asset management business has a cybersecurity incident response plan as a key component of its cybersecurity program, which is generally incorporated as part of our enterprise risk management program. The KKR CISO and KKR’s Chief Compliance Officer co-chair a cybersecurity incident response team (“KKR CIRT”), which aims to manage and mitigate the risk and impact of cybersecurity breach events at KKR’s asset management business, including those arising from third-party service providers, including those providers that have access to KKR’s customer and employee data. Cybersecurity considerations affect the selection and oversight of our third-party service providers. We perform diligence on third parties that have access to our systems, data or facilities.
127

Table of Contents
Members of the KKR CIRT include members of the firm’s legal, technology, compliance, risk, public affairs, fundraising and finance groups. KKR has established a notification decision framework to determine when the KKR CIRT will provide notifications regarding certain cybersecurity incidents, with different severity thresholds triggering notifications to different recipient groups, including the risk and operations committee, senior members of management, and our Board of Directors or its committees.
The KKR information security team undertakes a variety of measures to monitor and manage the cybersecurity risks of KKR’s asset management business. For example, the KKR information security team monitors our technology infrastructure with tools designed to detect suspicious behavior. Our technology platforms and applications are designed to enable us to monitor user and network behavior at KKR’s asset management business, identify threats using certain analytics, and mitigate attacks across various layers of the enterprise. The KKR information security team conducts regular internal and external audits with third-party cybersecurity experts to identify and evaluate potential weaknesses in our cybersecurity systems. Some of these third-party monitoring functions continue throughout the year while other third-party security experts are periodically retained to audit specific areas of the cybersecurity program. In addition, the KKR information security team conducts periodic phishing simulations, and they also conduct periodic employee training on KKR’s security policies and controls and provide other security trainings as part of new employee onboarding.
KKR also has a cybersecurity incident response plan that is specific to our insurance business. The plan sets forth the roles and responsibilities of the Global Atlantic incident response team, which is comprised of Global Atlantic employees representing key business functions at our insurance business. Global Atlantic utilizes several mechanisms to monitor and manage the cybersecurity risks of our insurance business, including to prevent, and prepare to respond to, an incident. This includes maintaining relationships with external incident response organizations, performing periodic cybersecurity risk assessments, overseeing and monitoring risks from cybersecurity threats associated with third-party service providers, and ensuring that Global Atlantic employees complete security awareness training relating to cybersecurity best practices. Global Atlantic also has a cybersecurity notification framework in place to determine when appropriate notifications and escalations are required to be provided to the senior members of Global Atlantic’s management, members of Global Atlantic’s board of directors and members of KKR’s risk and operations committee, certain member of which would, as appropriate, report such information to our Board of Directors or its Audit Committee or Risk Committee.
As of the date of this filing, we do not believe that our business strategy, results of operations or financial conditions have been materially affected by any cybersecurity incidents for the reporting period covered by this report. However, institutions like us, as well as our employees, service providers and other third parties, have experienced information security and cybersecurity attacks in the past and will likely continue to be the target of increasingly sophisticated cyber actors. For a discussion of how risks from cybersecurity threats may affect us, see “Part 1. Item 1A. Risk Factors—Risks Related to Our Business—Cyber-security failures and data security breaches may disrupt or have a material adverse impact on our businesses, operations and investments” in this Annual Report on Form 10-K.