10x Genomics, Inc. - (TXG)

10-K Filing Date: February 15, 2024
Item 1C. Cybersecurity.
Cybersecurity Risk Management and Strategy
We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan.
We design and assess our program based on the Center For Internet Security (“CIS”) Controls. While this does not imply that we meet any particular technical standards, specifications or requirements, we use the CIS Controls framework as a guide to help us identify, assess and manage cybersecurity risks relevant to our business.
Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational and financial risk areas.
73

Our cybersecurity risk management program includes:
risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services and our broader enterprise information technology environment;
a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls and (3) our response to cybersecurity incidents;
the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls;
cybersecurity awareness training of our employees, incident response personnel and senior management;
a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and
a third-party risk management process for service providers, suppliers and vendors who have access to our critical systems and information.
We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations or financial condition. In March 2020, we experienced a ransomware attack in which cybercriminals were able to access our information technology systems. While we isolated the source of the attack and restored normal operations with no material day-to-day impact to us or our ability to access our data, we believe confidential information was stolen. We believe it is possible that the ransomware attack could lead to the disclosure of our trade secrets or other intellectual property, or could lead to the exposure of personal information of our employees. The release of any of this information could have, but is not reasonably likely to have, a material adverse effect on our business, operations, business strategy, results of operations or financial condition. The March 2020 ransomware attack has not, but it is possible that it could, result in legal claims or proceedings, regulatory investigations or actions, and other types of liability under laws that protect the privacy and security of personal information, including federal, state and foreign data protection and privacy regulations, violations of which could, but is not reasonably likely to, result in significant judgements against us, penalties and fines.
For more information, see the section titled “Risk Factor—Risks related to our intellectual roperty, information technology and data security—If we or our critical third-party providers experience a significant disruption in our information technology systems or breaches of data security, our business could be adversely affected.
Cybersecurity Governance
Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee oversight of cybersecurity and other information technology risks. The Audit Committee oversees management’s implementation of our cybersecurity risk management program.
The Audit Committee receives periodic reports from management on our cybersecurity risks, including written reports. In addition, management updates the Audit Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
The Audit Committee reports to the full Board regarding its activities, including those related to cybersecurity.
Our management team, including our Chief Legal Officer, Chief Information Officer, President, Chief Financial Officer and Vice President of Data Analytics and Information Security is responsible for assessing and managing our material risks from cybersecurity threats. The team has primary responsibility for our overall cybersecurity risk management program and supervises both our internal cybersecurity personnel and our external cybersecurity consultants. Our management team’s cumulative experience includes decades of experience managing cybersecurity risks including serving in similar roles leading and overseeing cybersecurity programs at other companies. Our Chief Information Officer has served in various roles in information technology for almost 20 years and has been with us since 2013. He holds undergraduate and postgraduate degrees in computer science from Harvard University. Our Vice President of Data Analytics and Information Security has served in various roles in information technology and information security for more than 10 years. He holds an undergraduate degree in engineering science from Harvard University and postgraduate degrees in computer science from Massachusetts Institute of Technology. Our Chief Legal Officer has over 25 years of experience managing risks, including risks arising from cybersecurity threats, at several large publicly-traded technology companies. Team members who support our information security program have relevant educational and industry experience, including holding similar positions at large technology companies.
74

Our management team supervises efforts to prevent, detect, mitigate and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the information technology environment.