Page last updated on February 10, 2025
Rexford Industrial Realty, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-02-07 21:52:46 EST.
Filings
10-K filed on 2025-02-07
Rexford Industrial Realty, Inc. filed a 10-K at 2025-02-07 21:52:46 EST
Accession Number: 0001571283-25-000006
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybersecurity Cybersecurity Risk Management and Strategy. We have developed and implemented a cybersecurity and information security risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity and information security risk management program: (a) is developed by, and in conjunction with, a third-party managed security service provider (MSSP), who helps audit, assess, administer and monitor implementation; (b) once developed, is then integrated into our overall enterprise risk management program, and shares common: methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas; and (c) consists of leveraging a third-party vendor to routinely and periodically stress test our program for system vulnerabilities (including cyber penetration, vulnerability assessment, NIST framework score and compliance) across our cybersecurity and information security risk management program environment. Key elements of our cybersecurity risk management program include: - Risk assessments designed to help identify significant cybersecurity risks to our critical systems and information; - A security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; - The use of external service providers to assess, test or otherwise assist with aspects of our security controls; - Cybersecurity awareness training of our employees and senior management, including specific training on emerging AI-driven threats; - A cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; 31 - A third-party information security risk management process for certain critical service providers, suppliers and vendors based on our assessment of their criticality to our business and risk profile; and - Quarterly third-party internal and external vulnerability assessments from our cybersecurity firm leveraging the Common Vulnerability Scoring System (CVSS). Bi-annual third-party social engineering and cyber penetration testing with third-party information security company that specializes in conducting such tests. There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information. As AI technology advances, attackers are leveraging AI to automate and enhance cyberattacks, creating more sophisticated and evasive threats. Our cybersecurity program is designed to adapt to these evolving risks by integrating AI-powered security analytics and threat intelligence. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. We face certain ongoing risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. See “Risk Factors - We face risks associated with security breaches through cyber-attacks, cyber intrusions or otherwise, as well as other significant disruptions of our IT networks and related systems.” Cybersecurity Governance. Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (Committee) oversight of cybersecurity and other information technology risks. The Committee oversees management’s implementation of our cybersecurity risk management program. The Board regularly receives information security and cybersecurity updates, and the Committee receives quarterly reports from management, including the Vice President & Head of Technology and the Director of Cybersecurity and Technology Operations, on our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding significant cybersecurity incidents. The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also receives briefings from management on our cyber risk management program. Board members receive presentations on cybersecurity topics from our Director of Cybersecurity and Technology Operations (who reports directly to the Vice President & Head of Technology), internal security staff or third-party experts as part of the Board’s continuing education on topics that impact public companies. Our management team, including, among others, our Chief Financial Officer, General Counsel and Vice President of Risk Management , has overall responsibility for assessing and managing our material risks from cybersecurity threats and plays an integral role participating in direct oversight of information and cybersecurity risks. The team has primary responsibility for our overall cybersecurity risk management program and supervises both our internal cybersecurity personnel and our retained third-party cybersecurity consultants. The management team works closely with our Vice President & Head of Technology, as well as the Director of Cybersecurity and Technology Operations who has over eight years of experience in IT security, industry certifications, specialized training, and over fifteen years of experience in commercial real estate technology. Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include: - Briefings from internal security personnel; - Threat intelligence and other information obtained from governmental, public or private sources, including third-party consultants engaged by us; and - Alerts and reports produced by security tools deployed in the IT environment. 32
Company Information
Name | Rexford Industrial Realty, Inc. |
CIK | 0001571283 |
SIC Description | Real Estate Investment Trusts |
Ticker | REXR - NYSEREXR-PB - NYSEREXR-PC - NYSE |
Website | |
Category | Large accelerated filer |
Fiscal Year End | December 30 |