Camping World Holdings, Inc. - (CWH)

10-K Filing Date: February 26, 2024
ITEM 1C. CYBERSECURITY

Cybersecurity Risk Management and Strategy

We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan.

We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF”). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.

Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, operational, and financial risk areas.

Our cybersecurity risk management program includes:

risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services, and our broader enterprise IT environment;
a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, (3) our cybersecurity operations center and third party service providers responsible for monitoring and measuring threats, and (4) our response to cybersecurity incidents;

the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls;
regular testing of our critical systems to identify and address potential vulnerabilities;

cybersecurity awareness training of our employees, incident response personnel, and senior management;
a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and
a third party risk management process for certain service providers, suppliers, and vendors.

There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information.

We regularly experience cyberattacks and other incidents, and will continue to experience varying degrees of attacks and incidents in the future. To date, we have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition, however we cannot guarantee that material incidents will not occur in the future.

46

Cybersecurity Governance

Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (“Committee”) oversight of cybersecurity and other information technology risks. The Committee oversees management’s implementation of our cybersecurity risk management program.

The Committee receives briefings from our Chief Information Security Officer (“CISO”) on our cybersecurity risks no less than annually. In addition, management updates the Committee in addition to the full Board, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.

The Company’s information security team, led by our CISO, is responsible for leading enterprise-wide cybersecurity strategy, policy, standards, architecture, and processes. The CISO reports to the Chief Administrative and Legal Officer, who, together with other members of our management team, including the Chief Financial Officer, Chief Operating Officer, and Chief Accounting Officer are responsible for assessing and managing our material risks from cybersecurity threats based on regular reports from the CISO and Chief Information Officer. The CISO together with the Chief Information Officer regularly report on the status of projects to strengthen the security of our information technology systems and efforts regarding the prevention, detection, mitigation, and remediation of cybersecurity events. Reports may include briefings that have been informed by internal security personnel, threat intelligence and other information obtained from governmental, public, or private sources in addition to alerts and reports produced by security tools deployed in the IT environment.

Our CISO has 25 years of experience in industries including government, retail, and manufacturing, and industry certifications including CISSP and GIAC. Our CISO also has experience in forensic investigations, strategic risk management, and security program development. The information security team has an average of 15 years of prior work experience in roles including incident response, forensics, vulnerability management network security administration, fraud prevention, and other governance, risk, and compliance areas. The team maintains subject matter expert level knowledge in cybersecurity frameworks and governance organizations such as NIST, ISO27001, and PCI along with industry certifications commensurate with their roles.

47