Blend Labs, Inc. 10-K Cybersecurity GRC - 2024-03-14

Page last updated on July 16, 2024

Blend Labs, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-03-14 16:09:31 EDT.

Filings

10-K filed on 2024-03-14

Blend Labs, Inc. filed a 10-K at 2024-03-14 16:09:31 EDT
Accession Number: 0001855747-24-000015

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

ITEM 1C. CYBERSECURITY Risk Management and Strategy We have established processes and policies for assessing, identifying, and managing material risks arising from cybersecurity threats and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on, or conducted through, our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. We conduct annual risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks. We also utilize threat modeling to evaluate changes to our applications or environments for new threats or risks, and our cybersecurity team monitors the threat landscape regularly using security industry sources and certain threat intelligence information. Blend conducts daily vulnerability assessments, prioritizes remediation, and engages in routine system and application patching as well as other proactive measures, where deemed appropriate, to mitigate reasonably foreseeable risks. Blend maintains an incident response plan that is designed to contain and resolve any suspected security incident identified by the Company. This plan is tested at least annually. Our security operations team triages issues and invokes the incident response plan when necessary. This plan includes provisions for notifications of internal and external parties, including Blend leadership and the Audit Committee as required. Following these risk assessments, or when we otherwise identify cybersecurity risks through the processes described in this “Risk Management and Strategy” section, we evaluate whether and how to re-design, implement, and maintain reasonable safeguards to minimize identified risks and reasonably address any identified gaps in existing safeguards. We devote significant resources and designate high-level personnel, including our Information Security Officer, who reports to our Head of Finance and Administration, to manage the risk assessment and mitigation process. As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards, in collaboration with our human resources and information technology functional groups. Personnel at all levels and departments are made aware of our cybersecurity policies through training. Specific training is required for users of higher-risk systems or individuals associated with specific security processes such as incident response. Our cybersecurity program includes processes for identifying and managing risks from third parties and is integrated into our overall risk management framework. Our program defines key risk objectives and if cybersecurity risk exceeds defined thresholds, risks are documented and escalated into the enterprise risk program and Blend’s internal audit team. We require all third-party service providers with access to our systems or processing sensitive data on our behalf to align with our cybersecurity objectives and adhere to industry best practices via contractual obligations that are entered into in connection with as a mandated review prior to engaging such service providers. We re-evaluate each such service provider at least annually and when the role or purpose of a service provider changes, and have processes to require service providers maintaining sensitive data on our behalf to delete such data at the time of termination of the contract. We engage assessors or other third-party service providers in connection with our risk assessment and cybersecurity assessment or audit processes. These service providers assist us to evaluate risks and identify where our current security program may be 56 improved. We consult with these service providers as required to verify mitigation approaches, to compare Blend’s security posture against industry peers, and to provide overall feedback for the security program. Additionally, we utilize outside service providers, as well as a bug bounty program, to penetration test our network infrastructure and applications and provide prioritized security vulnerability findings reports that we include as part of our risk assessment processes. Some Blend customers also perform annual security testing on Blend’s infrastructure and applications. Like other technology companies, we have experienced cybersecurity incidents in the past. We have not, however, been materially impacted by any previous cybersecurity incidents. For additional information regarding whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, please refer to Item 1A, “Risk Factors,” in this Annual Report on Form 10-K,including the risk factors entitled “Risks Related to Our Business and Operations: A cyberattack, security breach, or incident affecting us or the third parties we rely on or partner with could expose us or our customers and consumers to a risk of loss or misuse of confidential information and have an adverse effect on our reputation, brand, business, financial condition, and results of operations .” Governance One of the key functions of our board of directors is informed oversight of our risk management process, including risks from cybersecurity threats. Our board of directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our board of directors administers its cybersecurity risk oversight function through the Audit Committee. Our Information Security Officer and our cybersecurity team (which consists of our security policy manager, security operations manager, and red team lead) are primarily responsible for assessing and managing our material risks from cybersecurity threats. Our Information Security Officer has over 20 years of expertise within the cybersecurity field, and manages an experienced team with expertise in relevant security practices such as penetration testing, security operations, policy, etc. Our Information Security Officer and our cybersecurity team oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. The processes by which our Information Security Officer and our cybersecurity team are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents include monitoring of network, system and application logs, review of vulnerability scans and penetration test results, review of industry sources for vulnerability and threat indicators, and use of third-party service providers for audit or assessment purposes. In the event of a significant cybersecurity incident that is identified by the Company, Blend leadership and the Audit Committee is informed by the Information Security Officer or our manager of security operations to support swift and informed decision-making. Our Information Security Officer provides quarterly briefings to the Audit Committee regarding our cybersecurity risks and activities, including our progress on mitigating threats identified by external cybersecurity risk audits, any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like, in each case as applicable. Our Audit Committee provides regular updates to the board of directors on such reports.


Company Information

NameBlend Labs, Inc.
CIK0001855747
SIC DescriptionServices-Computer Programming, Data Processing, Etc.
TickerBLND - NYSE
Website
Category
Emerging growth company
Fiscal Year EndDecember 30