Page last updated on July 16, 2024
UroGen Pharma Ltd. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-03-14 08:17:53 EDT.
Filings
10-K filed on 2024-03-14
UroGen Pharma Ltd. filed a 10-K at 2024-03-14 08:17:53 EDT
Accession Number: 0001437749-24-007753
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybersecurity Risk management and strategy We have implemented and maintain various information security processes designed to identify, assess and manage material risks from cybersecurity threats to our critical computer networks, third-party hosted services, communications systems, hardware and software, and our critical data, including intellectual property, clinical trial data, customer data, manufacturing data, and confidential information that is proprietary, strategic or competitive in nature (“Information Systems and Data”). Our Chief Financial Officer supervises our Information Technology Department (the “IT Department”) which coordinates with third-party service providers that perform security management roles, including those of a chief information security officer, to identify, assess and manage our cybersecurity threats and risks. Our IT Department and security management team, including third-party service providers, identify and assess risks from cybersecurity threats by monitoring and evaluating our threat environment using various methods including, for example: manual and automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and actors, conducting scans of the threat environment, internal audits relating to cybersecurity, conducting threat assessments for internal and external threats, third-party threat assessments, conducting vulnerability assessments to identify vulnerabilities, use of external intelligence feeds, evaluating our and our industry’s risk profile, and evaluating threats reported to us. Depending on the environment, we implement and maintain various technical, physical, and organizational measures, processes, standards and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example: a cybersecurity incident response policy; asset management, tracking and disposal; incident detection and response; systems monitoring; vulnerability management policy; risk assessments; encryption of certain of our data; third-party cybersecurity staff; network security controls; segregation of certain of our data; access controls; physical security; employee training; penetration testing; and cybersecurity insurance. Our assessment and management of material risks from cybersecurity threats are integrated into our overall risk management processes. For example, our IT Department works with management to prioritize our risk management processes and mitigate cybersecurity threats that are expected to be more likely to lead to a material impact to our business. In addition, our management evaluates material risks from cybersecurity threats against our overall business objectives and reports to the audit committee of our board of directors, which, together with our board of directors, evaluates our overall enterprise risk. We use third-party service providers to assist us to identify, assess, and manage material risks from cybersecurity threats, including, for example: a third-party IT and cybersecurity consultant; professional services firms, including legal counsel; threat intelligence service providers; cybersecurity software providers; managed cybersecurity service providers; penetration testing firms; dark web monitoring services; and forensic investigators. We use third-party service providers to perform a variety of functions throughout our business, such as: conducting nonclinical and clinical trials; supplying certain raw materials, compounds and components; delivering materials to our facilities; and shipping products to our customers. Additionally, we rely on third-party service providers and technologies to operate critical business systems to process sensitive information in a variety of contexts, including, without limitation, cloud-based infrastructure, data center facilities, encryption and authentication technology, employee email, and content delivery. Third-party service providers we rely on include: application providers, distributors, hosting companies, supply chain resources, contract research organizations, and contract manufacturing organizations. Our vendor assessment process is generally limited to reputational due diligence of the vendor and, in some cases, examination of the vendor’s security certifications. For a description of the risks from cybersecurity threats that may materially affect us and how they may do so, see our risk factors under Part I, Item 1A. Risk Factors in this Annual Report on Form 10-K, including " Risk Factors - If our information technology systems or data, or those of third parties upon whom we rely, are or were compromised, this could result in adverse consequences resulting from such compromise including but not limited to regulatory investigations or actions; litigation; fines and penalties; a material disruption of our drug development program; compromise sensitive information related to our business; harm our reputation; triggering our breach notification obligations; prevent us from accessing critical information; disruptions of our business operations; loss of revenue or profits; loss of customers or sales and expose us to liability or other adverse effects to our business. " Governance Our board of directors addresses our cybersecurity risk management as part of its general oversight function. The audit committee of our board of directors is responsible for overseeing our cybersecurity risk management processes, including oversight of risks from cybersecurity threats. Our cybersecurity risk assessment and management processes are implemented and maintained by certain members of our management, including, among others, the Chief Financial Officer, Head of IT, and Associate Director of IT Operations. Our Head of IT is an IT security professional and members of our IT Department have certain credentialling in cybersecurity. We also rely on third-party security analysts who have certain certifications related to cybersecurity. Our Chief Financial Officer and Head of IT are responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into our overall risk management strategy, and communicating key priorities to relevant personnel. Additionally, they are responsible for approving budgets, helping prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. Our cybersecurity incident response policy is designed to escalate certain cybersecurity incidents to members of management depending on the circumstances, including our Chief Financial Officer and General Counsel and Chief Compliance Officer. Our management works with our incident response team to help us mitigate and remediate cybersecurity incidents of which they are notified. In addition, our cybersecurity incident response policy includes reporting to the audit committee of our board of directors for certain cybersecurity incidents. The audit committee periodically reviews and discusses with the appropriate members of our management material risks relating to cybersecurity threats and our processes for assessing, identifying, and managing material risks from cybersecurity threats, as well as our internal controls and disclosure controls and procedures relating to cybersecurity incidents. Our board of directors and audit committee are also provided with reports, summaries or presentations related to cybersecurity threats, risk and mitigation.
Company Information
Name | UroGen Pharma Ltd. |
CIK | 0001668243 |
SIC Description | Pharmaceutical Preparations |
Ticker | URGN - Nasdaq |
Website | |
Category | Non-accelerated filer Smaller reporting company |
Fiscal Year End | December 30 |