Page last updated on February 27, 2025
GRID DYNAMICS HOLDINGS, INC. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-02-27 16:43:55 EST.
Filings
10-K filed on 2025-02-27
GRID DYNAMICS HOLDINGS, INC. filed a 10-K at 2025-02-27 16:43:55 EST
Accession Number: 0001628280-25-008723
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C. CYBERSECURITY Risk Management and Strategy Managing Material Risks & Integrated Risk Management We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. We conduct regular risk assessments to identify cybersecurity threats. We also conduct assessments as part of our regular process in the event of a material change in our business practices or established procedures that may affect information systems, which are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, attack surface state and threat modeling, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks. We regularly perform internal audits of our cybersecurity procedures, review role-based data access rights, conduct system vulnerability scans and prepare incident logs, alerts and threat reviews. We have maintained our ISO 27001 certification since 2014 and are subject to annual ISO 27001 standard compliance monitoring audits and periodic customer security audits. During the year ended December 31, 2024, we completed the transition to the latest version of the standard and added two additional locations to the certification scope. We incorporate results of these risk assessments to our policies and procedures, to maintain reasonable safeguards on an ongoing basis to minimize identified risks; reasonably address any identified gaps in existing safeguards; and regularly monitor the effectiveness of our safeguards. As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards, in collaboration with human resources, IT, and a dedicated “Grid University” training department. Personnel at all levels and departments are made aware of our cybersecurity policies through multiple channels of communication and training. Engage Third-Parties on Risk Management We typically engage third party auditors in connection with our risk assessment processes. These service providers assist us with designing and implementing our cybersecurity policies and procedures, as well as with monitoring and testing our safeguards at different levels. To address and mitigate potential risks associated with our use of such third parties, we require each third-party service provider to ensure that it has the ability to implement and maintain appropriate security measures, consistent with all applicable laws, to implement and maintain reasonable security measures in connection with their work with us, and to promptly report any suspected breach of its security measures that may affect our company. Risks from Cybersecurity Threats We have not experienced any cybersecurity events, including cybersecurity incidents, that have had or which are likely to have any material impact on our business strategy, results of operations or financial position. For additional information regarding risks related to cybersecurity threats, please refer to Item 1A, “Risk Factors,” in this Annual Report on Form 10-K, including the risk factor entitled “Failure to comply with laws and regulations relating to privacy, data protection, and cybersecurity could lead to government enforcement actions, private litigation and adverse publicity.” Governance Board of Directors Oversight Our board of directors is responsible for monitoring and assessing strategic risk exposure, including cybersecurity risks, and our executive officers are responsible for the day-to-day management of the material risks we face. Our board of directors administers its cybersecurity risk oversight function directly as a whole, as well as through the audit committee. 32 Management’s Role Managing Risk We devote significant resources, and designate high-level personnel, including our Chief Information Security Officer (“CISO”) and Data Protection Officer (“DPO”), who each report to our Chief Operations Officer (“COO”) , to manage cyber-related risk assessment and mitigation processes. Our CISO, who has been leading the team for over a decade, has over 20 years of industry experience, is a Certified Information Systems Security Professional and lead ISO 27001 auditor, and has authored five books on information security auditing strategy, wired and wireless network security, and penetration testing Our CISO and our management committee on cybersecurity, which includes our Chief Executive Officer (“CEO”), COO and IT Director, are primarily responsible for assessing and managing our material risks from cybersecurity threats. They are assisted by dedicated information security and IT staff, our DPO, HR Director, and legal and finance representatives. Our current management committee on cybersecurity includes dedicated full-time specialists in relevant fields ranging from code, application, system, and network security to computer forensics, data privacy and applied cryptography, physical security, social engineering and red teaming. Our CISO and management committee on cybersecurity oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. Our formal information security program includes measures to address: risk assessment and management, policy development and implementation, prevention strategies, detection mechanisms, incident response and mitigation, remediation and recovery, reporting and communication, compliance and legal considerations, efforts at continuous improvement, and training and awareness. Through these measures, our CISO and management committee on cybersecurity are informed about and monitor the lifecycle (i.e., prevention, detection, mitigation, and remediation) of cybersecurity threats or incidents. Reporting to Board of Directors Our COO reports to our audit committee on a quarterly basis regarding the Company’s current cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, customer escalations and requests, cybersecurity systems testing, relevant threat landscape and activities of third parties, security controls implementation status and the implementation of any new cybersecurity tools. Our audit committee regularly reports its activities, including review of cybersecurity matters, to our board of directors. There is also an annual senior management meeting and report to our CEO and COO that follows our internal information security audit, which is overseen by the CEO.
Company Information
Name | GRID DYNAMICS HOLDINGS, INC. |
CIK | 0001743725 |
SIC Description | Services-Prepackaged Software |
Ticker | GDYN - Nasdaq |
Website | |
Category | Accelerated filer |
Fiscal Year End | December 30 |