Page last updated on July 16, 2024
Denali Therapeutics Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-02-27 20:16:14 EST.
Filings
10-K filed on 2024-02-27
Denali Therapeutics Inc. filed a 10-K at 2024-02-27 20:16:14 EST
Accession Number: 0001714899-24-000086
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C. CYBERSECURITY Denali’s approach to cybersecurity seeks to defend the confidentiality, integrity and availability of our systems and information for our people and our patients. Risk Management and Strategy We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We r outinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. We conduct periodic risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks. Following these risk assessments, we re-design, implement, and maintain reasonable safeguards to minimize identified risks; reasonably address any identified gaps in existing safeguards; and regularly monitor the effectiveness of our safeguards. We devote significant resources and designate high-level personnel, including our Head of IT and Cybersecurity, to manage the risk assessment and mitigation process. As part of our overall risk management system, we conduct annual security awareness training for personnel at all levels and functions, issue periodic simulated social engineering tests, and have established protocols to escalate cybersecurity incidents from identification through remediation. These activities are undertaken in collaboration with human resources, IT, and management. We also engage consultants to assist us in monitoring and testin g our safeguards. Performance of our cybersecurity controls for certain systems is periodically reviewed by our internal quality functions. We further require third-party service providers who will be handling our company’s sensitive information to certify that they implement appropriate security measures, consisten t with all applicable laws, to maintain reasonable security measures in connection with their work with us, and to promptly report any suspected breach of its security measures that may affect our company. Additional information regarding whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, are included in this Annual Report on Form 10-K in Item 1A, “Risk Factors”. Governance One of the key functions of our board of directors is informed oversight of our risk management process, including risks from cybersecurity threats. Our board of directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our board of directors administers its cybersecurity risk oversight function directly as a whole, as well as through the audit committee. Our Head of IT is primarily responsible to assess and manage our material risks from cybersecurity threats and has prior work experience in cybersecurity, holds relevant degrees, and current industry recognized cybersecurity certifications. Our Head of IT oversees our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. The processes by which our Head of Information Technology is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents includes the following the identification and assessment of assets and assessing potential associated risks, implementation of protective measures, continuous monitoring and detection of unusual or suspicious activities, incident response and recovery management, regular security awareness and training, review and alignment of cybersecurity practices with industry recognized cybersecurity practices, compliance and regulation concerns Our Head of IT provides quarterly briefings to the audit committee regarding our company’s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. Our audit committee provides regular updates to the board of directors on such reports; the Head of IT may be called upon to brief the board as well.
Company Information
Name | Denali Therapeutics Inc. |
CIK | 0001714899 |
SIC Description | Biological Products, (No Diagnostic Substances) |
Ticker | DNLI - Nasdaq |
Website | |
Category | Large accelerated filer |
Fiscal Year End | December 30 |