TerrAscend Corp. 10-K Cybersecurity GRC - 2025-03-06

Page last updated on March 6, 2025

TerrAscend Corp. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-03-06 16:05:42 EST.

Filings

10-K filed on 2025-03-06

TerrAscend Corp. filed a 10-K at 2025-03-06 16:05:42 EST
Accession Number: 0000950170-25-034600

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk management and strategy The Company has implemented and maintain various information security processes designed to identify, assess, and manage material risks from cybersecurity threats to its critical computer networks, third-party hosted services, communications systems, hardware and software, and its critical data, including intellectual property, confidential information that is proprietary, strategic or competitive in nature, and patient data (“Information Systems and Data”). The Company’s cybersecurity function, led by its Chief Information Officer (“CIO”) and Senior Director of Information Technology (“IT”), as well as its Enterprise Security Architect and third-party service providers, helps identify, assess, and manage the Company’s cybersecurity threats and risks. The Company’s CIO has over twenty-five years of technology leadership experience including infrastructure design and management, software development, system implementation, cybersecurity, and network design administration. The Company’s CIO also has experience in data protection for systems and has supported a complex global public enterprise environment with operations in over 200 countries. The Company’s Senior Director of IT has over 11 years of experience developing and leading healthcare solutions and has led the development in web and infrastructure design, serverless architecture, database integrations, SMS, mass-email and mass phone notification solutions and holds a Sarbanes-Oxley Act (SOX) certification. The Company’s Enterprise Security Architect has over seven years of experience in assessing risk and protecting data in various technologies from client/server software to cloud based solutions and holds a Certified Information Systems Security Professional designation, a GIAC Certified Incident Handler Certification, and Sarbanes-Oxley Act (SOX) certifications. The Company’s Senior Director of IT and the Enterprise Security Architect also have experience dealing directly with numerous cyber security threats, breaches, detection and containment activities and strategies under strict requirements and expectations for HIPAA covered entities. The Company’s cybersecurity function works, in certain circumstances, in partnership with its managed security service provider (“MSSP”) and managed service provider (“MSP”) to help identify, assess, and respond to risks from cybersecurity threats, including by monitoring and evaluating its threat environment using various methods including, for example: manual tools, automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and actors, conducting scans of the threat environment, evaluating the Company’s and its industry’s risk profile, evaluating certain threats reported to us, coordinating with law enforcement concerning certain threats, conducting internal and/or external audits, conducting threat assessments for certain internal and external threats, third-party threat assessments, conducting vulnerability assessments to identify vulnerabilities, and use of external intelligence feeds. The Company’s Security Incident Response Team leverages a cybersecurity managed detection and response partner, which monitors certain of its endpoints, cloud infrastructure, and networks for irregular activity. Depending on the environment and system, the Company implements and maintains various technical, physical, and organizational measures, processes, standards, and policies designed to manage and mitigate material risks from cybersecurity threats to its Information Systems and Data, including, for example: an incident response plan, incident detection and response measures, monitoring and response services, network and system access controls, physical security measures, an employee cybersecurity training program, dedicated cybersecurity personnel, asset management and recovery processes, encryption of certain data, segregation of certain data, implementation of security standards/certifications, a vendor risk management program, penetration testing, dark web monitoring, monthly environment risk reviews, external threat intelligence reports, regular digital infrastructure scans, internally reported threats, data back-up measures, and cybersecurity insurance. The Company’s assessment and management of material risks from cybersecurity threats are integrated into the Company’s overall risk management processes. For example, cybersecurity risk is identified in the Company’s risk register detailing certain known and potential risk items; the Company’s IT operations department works with its MSSP/MSP vendor partners to review certain identified threats and its cybersecurity practices in an effort to prioritize and mitigate cybersecurity threats that are more likely to lead to a material impact on its business; and its CIO regularly presents to senior management, the Board and Audit Committee to evaluate material risks relative to its overall business objectives. The Company uses third-party service providers to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats including, for example, managed cybersecurity service providers, cybersecurity software providers, penetration testing firms, threat intelligence service providers, cybersecurity consultants, dark web monitoring services, forensic investigators, and professional services firms, including legal counsel. 52 The Company uses third-party service providers to perform a variety of functions throughout its business, such as enterprise resource planning, point of sale, eCommerce, wholesale sales, application providers, and web hosting. The Company has a vendor management program to manage cybersecurity risks associated with its use of these providers. The Company’s vendor management program includes completion of a cybersecurity questionnaire and review of the vendor’s security program for certain vendors designed to help us evaluate the potential cybersecurity risks associated with its use of the vendor. Depending on the nature of the services provided, the sensitivity of the Information Systems and Data at issue, and the identity of the provider, its vendor management process may involve different levels of assessment designed to help identify cybersecurity risks associated with a provider and imposition of contractual obligations related to cybersecurity on the provider. For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, see the risk factors under Item 1A. “Risk Factors” in this Annual Report, including “The Company (and the third parties with whom it works) faces physical security risks, as well as risks related to its information technology systems, data, potential cyber or phishing-attacks, and security incidents.” Governance The Board addresses the Company’s cybersecurity risk management as part of its general oversight function. The Company’s Audit Committee is responsible for overseeing the Company’s cybersecurity risk management processes, including oversight and mitigation of risks from cybersecurity threats. The Company’s cybersecurity risk assessment and management processes are implemented and maintained by certain Company management, including the CIO and the Senior Director of IT. The CIO is responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into the Company’s overall risk management strategy, and communicating key priorities to relevant personnel. The CIO is responsible for approving budgets, helping prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. Our cybersecurity incident response and vulnerability management processes are designed to escalate certain cybersecurity incidents to members of management depending on the circumstances, including the security management department, CIO, Chief Financial Officer (“CFO”), Chief Executive Officer (“CEO”) and others. The security management department, CIO, CFO, CEO, and others work with the Company’s incident response team to help the Company mitigate and remediate cybersecurity incidents of which they are notified. In addition, the Company’s incident response and vulnerability management processes includes reporting to the Board for certain cybersecurity incidents. The Board receives regular reports from the CIO concerning the Company’s significant cybersecurity threats and risks and the processes the Company has implemented to address them. These reports also include materials related to certain cybersecurity trends the Company has identified, potential cybersecurity threats and risk, and proposed mitigation measures.


Company Information

NameTerrAscend Corp.
CIK0001778129
SIC DescriptionAgricultural Production-Crops
TickerTSNDF - OTC
Website
CategoryAccelerated filer
Emerging growth company
Fiscal Year EndDecember 30