Page last updated on July 16, 2024
BOYD GAMING CORP reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-02-26 16:02:20 EST.
Filings
10-K filed on 2024-02-26
BOYD GAMING CORP filed a 10-K at 2024-02-26 16:02:20 EST
Accession Number: 0001437749-24-005525
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C. Cybersecurity Cybersecurity represents a critical component of the Company’s overall approach to risk management. The Company’s cybersecurity policies, standards and practices are fully integrated into our enterprise risk management (“ERM”) approach, and cybersecurity risks are among the core enterprise risks that are subject to oversight by our Board of Directors (the “Board”). The Company uses recognized frameworks from the National Institute of Standards and Technology as guidelines to inform its cybersecurity policies, standards, and practices. We generally approach cybersecurity matters through a cross-functional, multilayered approach, with specific goals of: (i) identifying, preventing and mitigating cybersecurity threats to the Company; (ii) preserving the confidentiality, security and availability of the information that we collect and store to use in our business; (iii) protecting our intellectual property; (iv) maintaining the confidence of our customers, clients and business partners; and (v) providing appropriate public disclosure of cybersecurity risks and incidents when required. Risk Management and Strategy Consistent with our overall ERM policies and practices, our cybersecurity program focuses on the following areas: ● Vigilance: We maintain an extensive presence, with cybersecurity threat operations functioning continuously and uninterrupted with the specific goal of identifying, preventing, and mitigating cybersecurity threats and responding to cybersecurity incidents in accordance with our established incident response and recovery plans. ● Systems Safeguards: We deploy systems safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through ongoing vulnerability assessments and cybersecurity threat intelligence. ● Collaboration: We use collaboration mechanisms established with public and private entities, including intelligence and enforcement agencies, industry groups and third-party service providers, to identify, assess and respond to cybersecurity risks. ● Third-Party Risk Management: We maintain a comprehensive, risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of our systems, as well as third-party systems that could adversely impact our business in the event of a cybersecurity incident affecting those third-party systems. ● Training: We provide periodic mandatory training for personnel regarding cybersecurity threats, which reinforces our information security policies, standards and practices, and such training is scaled to reflect the roles, responsibilities and information systems access of such personnel. We additionally publish an internal newsletter on a monthly and ad-hoc basis for enterprise-wide consumption to promote awareness of trends in cybersecurity threats and attack techniques. ● Incident Response and Recovery Planning: We have established and maintain comprehensive incident response and recovery plans that fully address our response to a cybersecurity incident and the recovery from a cybersecurity incident, and such plans are tested and evaluated on a periodic basis. ● Communication, Coordination and Disclosure: We take a cross-functional approach to address the risk from cybersecurity threats, involving management personnel from our technology, operations, legal, risk management, internal audit and other key business functions and engage with our Board in an ongoing dialogue regarding cybersecurity threats and incidents, while also implementing controls and procedures for the assessment and escalation of cybersecurity incidents pursuant to established thresholds so that decisions regarding the disclosure and reporting of such incidents can be made by management in a timely manner. ● Governance: Our Board regularly interacts with our Chief Information Security Officer and other members of management on cybersecurity risk management. A key part of our strategy for managing risks from cybersecurity threats is the ongoing assessment and testing of our processes and practices through auditing, assessments, tabletop exercises, threat modeling, vulnerability testing, and other exercises focused on evaluating the effectiveness of our cybersecurity measures. We regularly engage third parties to perform assessments on our cybersecurity measures, including information security maturity assessments, audits and independent reviews of our information security control environment and operating effectiveness. The results of such assessments, audits and reviews are reported to the Board, and we adjust our cybersecurity policies, standards, processes, and practices as necessary based on the information provided by the assessments, audits and reviews. Governance Our Board oversees the management of risks from cybersecurity threats, including the policies, standards, processes and practices that management implements to address risks from cybersecurity threats. The Board receives regular presentations and reports on cybersecurity risks, which address a wide range of topics including, for example, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends and information security considerations arising with respect to our peers and third parties. The Board also receives prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding such incident until it has been addressed. At least quarterly each year, the Board discusses the Company’s approach to cybersecurity risk management with our Chief Information Security Officer. Our Chief Information Security Officer is the member of our management team that is principally responsible for overseeing our cybersecurity risk management program, in partnership with other business leaders across the Company. The Company’s Chief Information Security Officer has served in various roles in information technology and information security for over 25 years. The Chief Information Security Officer holds an undergraduate degree in Business Administration with a major in Accounting and Finance and a graduate degree in International Management. The Chief Information Security Officer also holds advanced certifications as a Certified Information Systems Security Professional and as a Qualified Technology Executive granted by Digital Directors Network. The Chief Information Security Officer works in coordination with the other members of management, which includes, but is not limited to, the Company’s President and Chief Executive Officer, Chief Financial Officer, Chief Technology Officer, Chief Digital Officer, Chief Information Officer, and General Counsel. The Company’s Chief Information Officer has served in various roles in information technology and information security for over 29 years. The Chief Information Officer holds an undergraduate degree in Electronic Engineering from DeVry University and graduate degree in Technology Management. The Company’s Chief Technology Officer holds an undergraduate degree in computer science and economics from Northwestern and has served in various roles in information technology for over 33 years with Boyd Gaming and numerous other public companies. The Company’s Chief Digital Officer has served in various roles in information technology and information security for over 25 years. The Chief Digital Officer holds a degree in political science with a minor in accounting from Belmont University. The Company’s President and Chief Executive Officer, Chief Financial Officer, and General Counsel each hold undergraduate and graduate degrees in their respective fields, and each have years of experience with managing risks at the Company and in environments similar to the Company’s, including risks arising from cybersecurity threats. Our Chief Information Security Officer works collaboratively across the Company to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents. To facilitate the success of this program, multidisciplinary teams are deployed to address cybersecurity threats and to respond to cybersecurity incidents in accordance with our incident response and recovery plans. Through the ongoing communications from these teams, the Chief Information Security Officer monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents in real time, and reports such incidents to the Board when appropriate. Cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, including its business strategy, results of operations, or financial condition. We believe with the cybersecurity and governance program we have in place that we have implemented effective processes and controls to prevent cybersecurity incidents from being reasonably likely to materially affect the Company. Refer to “Item 1A. Risk Factors” in this annual report on Form 10-K, including “Failure to maintain the integrity of our information technology systems, protect our internal information, or comply with applicable privacy and data security regulations could adversely affect us”, for additional discussion about cybersecurity-related risks.
Company Information
Name | BOYD GAMING CORP |
CIK | 0000906553 |
SIC Description | Hotels & Motels |
Ticker | BYD - NYSE |
Website | |
Category | Large accelerated filer |
Fiscal Year End | December 30 |