TALPHERA, INC. 10-K Cybersecurity GRC - 2024-03-06

Page last updated on October 1, 2024

TALPHERA, INC. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-03-06 17:00:48 EST.

Filings

10-K filed on 2024-03-06

TALPHERA, INC. filed a 10-K at 2024-03-06 17:00:48 EST
Accession Number: 0001437749-24-006849

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk management and strategy We have implemented and maintain various information security processes designed to identify, assess and manage material risks from cybersecurity threats to our critical computer networks, third party hosted services, communications systems, hardware and software, and our critical data, including intellectual property, confidential information that is proprietary, strategic or competitive in nature (“Information Systems and Data”). Our chief financial officer and information technology manager help identify, assess and manage the Company’s cybersecurity threats and risks. Our chief financial officer and information technology manager identify and assess risks from cybersecurity threats by monitoring and evaluating our threat environment using various methods including, for example, the use of manual and automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and actors, evaluating our industry’s risk profile, evaluating threats reported to us, and conducting external audits and vulnerability assessments to identify vulnerabilities. Depending on the environment, we implement and maintain various technical, physical, and organizational measures, processes, standards and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example: incident detection and response, incident response plan, risk assessments, encryption of data, network security controls, data segregation, access controls, physical security, asset management, tracking and disposal, systems monitoring, employee training, penetration testing, and cybersecurity insurance. Our assessment and management of material risks from cybersecurity threats are integrated into the Company’s risk management processes. For example, our chief financial officer evaluates material risks from cybersecurity threats against our overall business objectives and reports to the audit committee of the board of directors, which evaluates our overall enterprise risk. We use third-party service providers to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats, including, for example, professional services firms, including legal counsel, cybersecurity consultants, cybersecurity software providers, penetration testing firms and forensic investigators. We use third-party service providers to perform a variety of functions throughout our business, such as application providers, hosting companies, contract research organizations and contract manufacturing organizations. Depending on the nature of the services provided, the sensitivity of the Information Systems and Data at issue, and the identity of the provider, our process may involve different levels of assessment designed to help identify cybersecurity risks associated with a provider. 47 For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, see our risk factors under Part 1. Item 1A. Risk Factors in this Annual Report on Form 10-K, including “Risks Related to Our Business Operations and Industry - Significant disruptions of our information technology systems or data security incidents could result in significant financial, legal, regulatory, business and reputational harm to us”. Governance Our board of directors’ audit committee is responsible for overseeing the Company’s cybersecurity risk management processes, including oversight and mitigation of risks from cybersecurity threats. Our cybersecurity risk assessment and management processes are implemented and maintained by certain Company management, including our chief financial officer and information technology manager. Our chief financial officer is responsible for hiring appropriate personnel, helping to manage the Company’s risk, and communicating key priorities to relevant personnel. Our chief financial officer and information technology manager are responsible for approving budgets, helping prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. Our cybersecurity incident response processes are designed to escalate certain cybersecurity incidents to members of management depending on the circumstances. Our chief financial officer works with the Company’s incident response team to help the Company mitigate and remediate cybersecurity incidents of which they are notified. In addition, the Company’s incident response processes include reporting to the audit committee of the board of directors for certain cybersecurity incidents. The audit committee receives periodic updates from our chief financial officer concerning the Company’s significant cybersecurity threats and risk and the processes the Company has implemented to address them. The audit committee also receives summaries or presentations related to cybersecurity threats, risk and mitigation.


Company Information

NameTALPHERA, INC.
CIK0001427925
SIC DescriptionPharmaceutical Preparations
TickerTLPH - Nasdaq
Website
CategoryNon-accelerated filer
Smaller reporting company
Fiscal Year EndDecember 30