Page last updated on March 6, 2025
Atea Pharmaceuticals, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-03-06 16:45:27 EST.
Filings
10-K filed on 2025-03-06
Atea Pharmaceuticals, Inc. filed a 10-K at 2025-03-06 16:45:27 EST
Accession Number: 0000950170-25-034808
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
Item 1C. Cybers e curity. Cybersecurity Risk Management and Strategy We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. We design and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the risk management program to other legal, compliance, strategic, operational, and financial risk areas. Key elements of our cybersecurity risk management program include, but are not limited to, the following: - risk assessments designed to help identify material risks from cybersecurity threats to our critical systems and information; - a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; - the use of external service providers, where appropriate, to monitor, assess, test or otherwise assist with aspects of our security processes; - cybersecurity awareness training of our employees, including incident response personnel, and senior management; - a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and - a third-party risk management process for key service providers based on our assessment of their criticality to our operation and respective risk profiles. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, results of operations or financial condition. We face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. For more information, see the section titled " Risk Factors - Our business and operations may suffer in the event of information technology system failures, cyberattacks, or deficiencies, which could materially affect our results. " Cybersecurity Governance Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Audit Committee”) oversight of cybersecurity risks. The Audit Committee oversees management’s implementation of our cybersecurity risk management program. The Audit Committee receives periodic reports from management on our cybersecurity risks. These reports include updates on our processes for preparing for, preventing and detecting cybersecurity incidents. Between such regular updates, the Audit Committee would be notified regarding any significant cybersecurity threat or incident, if applicable. The Audit Committee reports to the full Board regarding its activities, including those related to cybersecurity. Our information technology (“IT”) team, which includes both our internal staff and retained consultants with IT and cybersecurity expertise, is led by our Vice President of IT who has more than 25 years of 105 experience managing and securing technology infrastructure and is certified in cybersecurity by the Information System Security Certification Consortium. The IT team has responsibility for, among other things, developing and implementing practices, procedures and controls designed to identify, assess and manage cybersecurity programs and risks. The IT team takes steps to stay informed about and monitor efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us ; and alerts and reports produced by security tools deployed in the IT environment. Our IT team is supplemented by a security committee, comprised of representatives from key functional areas of our business and includes both our CFO and our Sr. VP of Human Resources to whom the Vice President of IT reports.
Company Information
Name | Atea Pharmaceuticals, Inc. |
CIK | 0001593899 |
SIC Description | Pharmaceutical Preparations |
Ticker | AVIR - Nasdaq |
Website | |
Category | Non-accelerated filer Smaller reporting company |
Fiscal Year End | December 30 |