Page last updated on July 16, 2024
PetVivo Holdings, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-06-28 16:44:41 EDT.
Filings
10-K filed on 2024-06-28
PetVivo Holdings, Inc. filed a 10-K at 2024-06-28 16:44:41 EDT
Accession Number: 0001493152-24-025637
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybersecurity Risk Management and Strategy We have established policies and processes for assessing, identifying, and managing risks from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. We conduct periodic risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks. Following these risk assessments, we evaluate whether and how to re-design, implement, and maintain reasonable safeguards to minimize identified risks; reasonably address any identified gaps in existing safeguards; and regularly monitor the effectiveness of our safeguards. We devote significant resources and designate high-level personnel, including our CFO, who reports to our Board, to manage the risk assessment and mitigation process. As part of our overall risk management system, we monitor our safeguards and train our employees on these safeguards. Personnel at all levels and departments are made aware of our cybersecurity policies through trainings integrated into new employee onboarding processes and annual employee re-training. We engage consultants, experts, or other third parties in connection with our risk assessment processes. These third parties assist us in designing and implementing our cybersecurity policies and procedures, as well as in monitoring and testing our safeguards. We require each third-party service provider who may have access to our systems and/or our sensitive data to confirm that it has the ability to implement and maintain appropriate security measures, consistent with all applicable laws, to implement and maintain reasonable security measures in connection with their work with us, and to promptly report any suspected breach of its security measures that may affect our company. We have not experienced any cybersecurity incidents that have been determined to be material in the past, however, like other medical device companies, we have experienced cybersecurity incidents and may continue to experience them in the future. For additional information regarding whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, materially affected or are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, please refer to " Item 1A. Risk Factors" i n this Annual Report on Form 10-K. Governance One of the key functions of our Board is informed oversight of our risk management process, including risks from cybersecurity threats. Our Board is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board administers its cybersecurity risk oversight function directly as a whole, as well as through the Audit Committee. Our CFO and representatives from our management committee on cybersecurity, which includes our Chief Business Development Officer and General Counsel, and our outside consultants, who collectively possess significant experience in evaluating, managing, and mitigating security and other risks, including cybersecurity risks, are primarily responsible to assess and manage our material risks from cybersecurity threats. 22 Our CFO and management committee on cybersecurity oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. The processes by which our CFO and representatives from our management committee on cybersecurity are informed about and monitor the prevention, detection, mitigation, and remediation of cybersecurity incidents includes the following: ● monitoring of Company computer and information systems for potential malware, ransomware and other malicious activity, and remediation of identified issues, including mitigation of identified risks and containment and elimination of any malicious software; ● mandatory cybersecurity training as part of new employee onboarding along with required annual and periodic employee cybersecurity re-training; ● monitoring of systems and network infrastructure by security information and event management application; ● prompt incident reporting directly to the Board; and ● escalation to the Company’s Audit Committee and Board as warranted based upon the nature of the identified issue. Our CFO and/or representatives from our management committee on cybersecurity provide periodic briefings to the Audit Committee and the Board regarding our Company’s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. 23
Company Information
Name | PetVivo Holdings, Inc. |
CIK | 0001512922 |
SIC Description | Surgical & Medical Instruments & Apparatus |
Ticker | PETV - NasdaqPETVW - Nasdaq |
Website | |
Category | Emerging growth company |
Fiscal Year End | March 30 |