Page last updated on February 18, 2025
WABASH NATIONAL Corp reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-02-18 08:55:00 EST.
Filings
10-K filed on 2025-02-18
WABASH NATIONAL Corp filed a 10-K at 2025-02-18 08:55:00 EST
Accession Number: 0000879526-25-000012
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C-CYBERSECURITY The Company’s Board of Directors (the “Board”) recognizes the critical importance of maintaining the trust and confidence of our customers, clients, business partners and employees. The Board is actively involved in oversight of the Company’s risk management program, and cybersecurity represents an important component of the Company’s overall approach to enterprise risk management (“ERM”). The Company’s cybersecurity policies, standards, processes, and practices are aligned with the National Institute of Standards and Technology Cybersecurity Framework and are fully integrated into the Company’s ERM program. In general, the Company seeks to address cybersecurity risks through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, security and availability of the information that the Company collects and stores by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur. Risk Management and Strategy As one of the critical elements of the Company’s overall ERM approach, the Company’s cybersecurity program is focused on the following key areas: Governance : The Board’s oversight of cybersecurity risk management is supported by the Audit Committee of the Board, which regularly interacts with the Company’s General Counsel, ERM committee, the Sr. Director, IT and executive leadership. The ERM committee is a cross-functional team of high-level leaders that meet at least quarterly to anticipate, identify, prioritize and manage material risks to the Company’s strategic objectives. It conducts an extensive bi-annual survey and interview process to identify the material risks and continues to monitor for any emerging material risks between surveys. The ERM committee reports on its findings and activities twice annually to the Audit Committee of the Board. The Company conducts a self-assessment on an annual basis to evaluate performance against the National Institute of Standards and Technology Cybersecurity Framework’s categories and subcategories to help the Company adapt and improve its management of cybersecurity risks. Collaborative Approach : The Company has implemented a comprehensive, cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures, including an incident response team, that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner. Senior leadership also briefs the Board on information security matters with quarterly updates. Technical Safeguards : The Company deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, like artificial intelligence platforms with an array of technologies, extensive encryption, firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. The Company’s cybersecurity controls are incorporated into our internal control environment, managed and tested in accordance with the Sarbanes-Oxley Act. When a weakness in the Company’s technical safeguards is identified, the Company works to mitigate and prevent exploitation of the Company’s information. Incident Response Planning : The Company has developed a comprehensive incident response plan. This plan outlines specific protocols for identifying, containing and eradicating cybersecurity incidents and threats to minimize their impact on our operations and stakeholders. A dedicated internal incident response team is responsible for executing this plan. The plan is regularly tested and updated to address evolving threats and industry best practices. Additionally, the Company works with relevant authorities and third-party specialists, as needed, to enhance cybersecurity threat response capabilities. The Company also has a cybersecurity risk insurance policy. Third-Party Risk Management : The Company leverages third parties that support various operational and technical functions, some of which require limited access to internal systems and data. The Company has implemented a comprehensive third-party risk management program that includes vendor assessments, contractual requirements and ongoing third-party monitoring to mitigate these risks and ensure compliance with security policies and industry standards. All third-party access is protected and managed by the same security controls, processes and policies used by the Company for internal accounts. Education and Awareness : The Company employs a variety of security-focused training/awareness practices to equip the Company’s personnel with effective tools to address cybersecurity threats. Information Technology (“IT”) and cybersecurity-based training is performed during employee on-boarding to communicate the Company’s evolving information security policies, standards, processes and practices. Additional personnel training occurs on an ongoing basis. The Company also regularly conducts tabletop exercises for security scenarios, including both leadership-focused exercises and IT-driven exercises. Phishing simulations are performed on a monthly basis and Company-wide notifications and/or cyber awareness messages are sent on an as-needed basis. The Audit Committee also surveys data and factors that impact costs and incident response efforts. Governance The Board, in coordination with the Audit Committee, oversees the Company’s ERM process, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks from the Sr. Director, IT. The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed. The Board and the Audit Committee regularly discuss topics that include regulatory compliance, incident response and data privacy and on at least an annual basis, discuss the Company’s approach to cybersecurity risk management with members of management. The Sr. Director, IT , in coordination with management, works collaboratively across the Company to implement a program designed to protect the Company’s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with the Company’s incident response plans. Risks are evaluated with cross functional input using external guidance, risk matrices, governmental guidelines, and other cybersecurity best practices. This evaluation is shared with executive leadership via the ERM committee and through regular updates provided by the Sr. Director, IT. To facilitate the success of the Company’s cybersecurity risk management program, multidisciplinary processes and controls are in place to address cybersecurity threats and to respond to cybersecurity incidents. Through ongoing communications with the ERM committee and the cybersecurity team, management monitors the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time and reports such threats and incidents to the Audit Committee when appropriate. The Sr. Director, IT holds a chief information security officer certification from Heinze College at Carnegie Mellon and has over 15 years of cybersecurity experience. The Company has not experienced a material information security breach in the last three years. The Company has not experienced a material third-party information security breach. Cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, including its business strategy, results of operations or financial condition. For a discussion of whether and how any risks from cybersecurity threats are reasonably likely to materially affect the Company, including our business strategy, results of operations or financial condition, refer to Part I, Item 1A, “Risk Factors” - “We rely significantly on information technology to support our operations and if we are unable to protect against service interruptions or security breaches, it could have a material adverse effect on our business, financial condition, cash flows and results of operations,” which is incorporated by reference into this Item 1C.
Item 1C.
Company Information
Name | WABASH NATIONAL Corp |
CIK | 0000879526 |
SIC Description | Truck Trailers |
Ticker | WNC - NYSE |
Website | |
Category | Large accelerated filer |
Fiscal Year End | December 30 |