Solid Power, Inc. - (SLDP)
10-K Filing Date: February 28, 2024
We use various tools and methodologies, including third-party services, to assess, identify, and manage cybersecurity threats. For example, we utilize third-party services to monitor the security and integrity of our information systems and the other third-party information systems upon which we rely on an ongoing basis. We also engage a third-party cybersecurity auditor for regular penetration and vulnerability testing and assessment of our processes. Our information technology department oversees cybersecurity risk management and reports significant incidents to management. We consult with our advisors as appropriate, including on materiality analysis and disclosure matters, and management makes the final materiality determinations and disclosure and other compliance decisions.
The Board has delegated primary responsibility for oversight of our cybersecurity risk exposures to the Audit Committee, and the Audit Committee receives routine updates on cybersecurity matters from management. Our Chief Financial Officer, Mr. Paprzycki, oversees our information technology department and has helped to develop our information systems and processes. Our information technology department works closely with Mr. Paprzycki and other members of management to continuously evaluate and address cybersecurity risks in alignment with our business objectives and operational needs.
We have not identified risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, but we cannot guarantee that we will not be materially affected in the future by such risks or any future cybersecurity incidents. For more information, see “Part I, Item A. Risk Factors—Risks Related to Legal and Regulatory Compliance—We may be adversely impacted by a disruption or failure of our information technology infrastructure, data security breach, or failure to comply with privacy laws.”