Page last updated on December 17, 2024
Amentum Holdings, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-12-17 16:35:39 EST.
Filings
10-K filed on 2024-12-17
Amentum Holdings, Inc. filed a 10-K at 2024-12-17 16:35:39 EST
Accession Number: 0002011286-24-000072
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybersecurity The Company’s Board of Directors (the “Board”) is responsible for overseeing the Company’s risk management program and cybersecurity is a critical element of this program. Management is responsible for the day-to-day administration of the Company’s risk management program and its cybersecurity policies, processes, and practices. The Company’s cybersecurity policies, standards, processes, and practices are based on recognized frameworks established by the National Institute of Standards and Technology, the International Organization for Standardization and other applicable industry standards and are standalone from the Company’s overall risk management system and processes. In general, the Company seeks to address material cybersecurity threats through a company-wide approach that addresses the confidentiality, integrity, and availability of the Company’s information systems or the information that the Company collects and stores, by assessing, identifying and managing cybersecurity issues as they occur. Cybersecurity Risk Management and Strategy The Company’s cybersecurity risk management strategy focuses on several areas: - Identification and Reporting : The Company has implemented a comprehensive, cross-functional approach to assessing, identifying and managing material cybersecurity threats and incidents. The Company’s program includes controls and procedures to properly identify, classify and escalate certain cybersecurity incidents to provide management visibility and obtain direction from management as to the public disclosure and reporting of material incidents in a timely manner. - Technical Safeguards : The Company has implemented technical safeguards that are designed to defend the Company’s information systems from cybersecurity threats. These safeguards include network security capabilities such as firewalls, intrusion prevention and detection systems; endpoint protection capabilities such as anti-malware functionality; and access controls, which are evaluated for accuracy on a quarterly basis. The Company has also implemented email protection to minimize phishing attacks and ensure integrity in digital communications. We baseline our assets according to the technical controls recommended in the National Institute of Standards and Technology Special Publication 800-171 (“NIST SP 800-171”). - Cyber Intelligence & Continuous Monitoring : The Company has established continuous monitoring of our environment through a third party and receives alerts on threats and policy violations to ensure we meet our 96 hour window to report material matters to the SEC. The Company is a member the Defense Industry Base (“DIB”) and receives cyber intelligence based on current threat actors and tactics, techniques and procedures (“TTP’s”) from the DIB organization, the Federal Bureau of Investigation (“FBI”) cyber division, Department of Homeland Security, and the National Security Agency Cybersecurity Collaboration Center (“NSA CCC”). - Incident Response and Recovery Planning : The Company has established and maintains comprehensive incident response, business continuity, and disaster recovery plans designed to address the Company’s response to a cybersecurity incident. The Company conducts annual tabletop exercises that simulate a cyber attack to test these plans and ensure personnel are familiar with their roles in a response scenario. - Third-Party Risk Management : The Company maintains a comprehensive, risk-based approach to identifying and overseeing material cybersecurity threats presented by third parties, including vendors, service providers, and other external users of the Company’s systems, as well as the systems of third parties that could adversely impact our business in the event of a material cybersecurity incident affecting those third-party systems, including any outside auditors or consultants who advise on the Company’s cybersecurity systems. - Education and Awareness : The Company provides regular, mandatory training for all levels of employees regarding cybersecurity threats as a means to equip the Company’s employees with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes, and practices. The Company conducts periodic assessment and testing of the Company’s policies, standards, processes, and practices in a manner intended to address cybersecurity threats and events. The Company performs quarterly penetration tests against both externally facing assets and internal assets. The Company also performs monthly and ad-hoc vulnerability scanning. Lastly, we collaborate with the NSA CCC to scan our public facing assets for vulnerabilities against the latest advanced persistent threats. The results of such assessments, audits, and reviews are evaluated by management and reported to the Board, and the Company adjusts its cybersecurity policies, standards, processes, and practices as necessary based on the information provided by these assessments, audits, and reviews. 42 Governance The Board oversees the Company’s risk management program, including the management of cybersecurity threats. The Board will receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by the Company’s peers and third parties. The Board will receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds, as well as ongoing updates regarding any such risk. On an annual basis, the Board will discuss the Company’s approach to overseeing cybersecurity threats with the Company’s Chief Information Security Officer (“CISO”) and other members of senior management. The CISO, in coordination with senior management, works collaboratively across the Company to implement a program designed to defend the Company’s information systems from cybersecurity threats and to promptly respond to any material cybersecurity incidents in accordance with the Company’s incident response and recovery plans. To facilitate the success of the Company’s cybersecurity program, cross-functional teams throughout the Company address cybersecurity threats and respond to cybersecurity incidents. Through ongoing communications with these teams, the CISO and senior management are informed about and monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and report such threats and incidents to the Board when appropriate. To ensure prompt reporting and compliance with SEC requirements, the Board has adopted a “Cybersecurity Incident Materiality Assessment Policy.” The CISO has served in various roles in information technology and information security for over 20 years, including serving as the Chief Information Security Officer of PAE Incorporated prior to its acquisition by Amentum. The CISO holds an undergraduate degree in computer science from the University of Maryland and a graduate degree in information security and assurance from Carnegie Mellon University. The CISO has attained the professional certifications of Certified Information Systems Security Professional (“CISSP”) and Certified Information Systems Manager. Material Effects of Cybersecurity Incidents Our operations are subject to cybersecurity risks, including unauthorized access, system failures, and breaches that could originate from both internal networks and through third-party suppliers and service providers. While we have not experienced a material impact on our business strategy, results of operations and/or financial condition resulting from cybersecurity threats or previous cybersecurity incidents, such events have the potential to have a material adverse effect on our business strategy, results of operations and financial condition, including by damaging or interrupting access to our information systems or networks, compromising confidential or otherwise protected information, destroying or corrupting data, or otherwise disrupting our operations. We continuously monitor our networks for unauthorized access attempts and maintain defensive measures; however, the dynamic nature of cyber threats means we cannot guarantee prevention of all potential future incidents that could materially impact our business operations, financial condition, or strategic objectives. Even if we successfully defend our own digital technologies and services, we also rely on providers of third-party products, services, and networks, with whom we may share data and services, and who may be unable to effectively defend their digital technologies and services against attack.
Company Information
Name | Amentum Holdings, Inc. |
CIK | 0002011286 |
SIC Description | Services-Business Services, NEC |
Ticker | AMTM - NYSE |
Website | |
Category | |
Fiscal Year End | September 26 |