Rent the Runway, Inc. - (RENT)

10-K Filing Date: April 11, 2024
Item 1C. Cybersecurity
Cybersecurity Risk Management and Strategy

We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan.

We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is managed separately from our other risk management programs.

Key elements of our cybersecurity risk management program include but are not limited to the following:

risk assessments designed to help identify material cybersecurity risks to our critical systems and information;

a security team principally responsible for managing our cybersecurity risk assessment processes, our security controls, and our response to cybersecurity incidents;

the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls;

cybersecurity awareness training of our employees, incident response personnel, and senior management;

a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and

a risk management process for certain third-party service providers, suppliers, and vendors based on, among other things, their criticality to our operations, access to RTR data, cybersecurity risk profile, and business requirements.

We describe whether and how risks from identified cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, under the headings: “Any significant technology disruption or failure, cyberattack or data security incident could adversely affect our business, financial condition and operations.” and “Our business relies on third-party cloud infrastructures, and any disruption of, or interference with, our use of cloud infrastructures could adversely affect our business, financial condition or results of operations.” included as part of our risk factor disclosures in Part I, Item 1A of this Annual Report on Form 10-K.

Cybersecurity Governance

Our full Board considers cybersecurity risk as part of its risk oversight function and oversees management’s implementation of our cybersecurity risk management program. The Board receives quarterly reports from management on cybersecurity risks. In addition, management is responsible for updating the Board, where it deems appropriate, regarding any cybersecurity incidents it considers to be significant.
61


Our SVP, Engineering and our VP, Technology & CISO are the members of our management team who are primarily responsible for assessing and managing our material risks from cybersecurity threats. Their team has primary responsibility for our overall cybersecurity risk management program and they supervise our internal cybersecurity personnel and our external cybersecurity consultants. Our management team has deep expertise in e-commerce and consumer retail. In addition, our VP, Technology & CISOs experience includes developing secure products as well as head of security and CISO positions at both public and private companies.

Under the supervision of our SVP, Engineering and our VP, IT, Infra & Security, the security team takes steps to stay informed about and monitor efforts to prevent, detect and respond to, as well as recovery efforts with respect to cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in our IT environment.