Vroom, Inc. 10-K Cybersecurity GRC - 2025-03-11

Page last updated on March 11, 2025

Vroom, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-03-11 16:57:36 EDT.

Filings

10-K filed on 2025-03-11

Vroom, Inc. filed a 10-K at 2025-03-11 16:57:36 EDT
Accession Number: 0000950170-25-037265

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Cybersecurity Risk Management and Strategy We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. We design and assess our program guided by a number of well-known industry standards, such as the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001, and Center for Internet Security (CIS) Controls V8. This does not imply that we meet all of these standards, specifications, and requirements, only that we use these standards as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. Key features of our cybersecurity risk management program include, but are not limited to, the following: - risk assessments designed to help identify material cybersecurity risks to our critical systems and, information; - an information security program, led by our Chief Technology Officer, principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; - the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security processes; - cybersecurity awareness training of our employees; - a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and - a third-party risk management process for service providers, suppliers, and vendors based on their criticality and risk profile. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. We face certain ongoing risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. See “Risk Factors-Risks Related to Cybersecurity and Privacy- If we or our third-party providers sustain cyber-attacks or other privacy or data security incidents that result in security breaches, we could suffer a loss of sales and increased costs, exposure to significant liability, reputational harm and other negative consequences . " Cybersecurity Governance Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity and other information technology risks. The Committee oversees management’s implementation of our cybersecurity risk management program. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. The Chief Technology Officer has primary responsibility for our overall cybersecurity risk management program and supervises both our internal information security program and personnel and certain of our retained external cybersecurity consultants. She has over twenty-five years of experience in the technology industry. In addition, the Vice President of Engineering has involvement in managing cybersecurity risk and has over 30 years of experience in the technology industry. Vroom’s Chief Technology Officer reports to the Committee on a quarterly basis on our cybersecurity risks. In addition, the Chief Technology Officer updates the Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential. The Committee periodically reports to the full Board regarding its activities, including those related to cybersecurity. Committee members receive presentations on cybersecurity topics from our internal security staff or external experts as part of the Committee’s continuing education on topics that impact public companies. Our management team, including Vroom’s Chief Executive Officer, Chief Financial Officer, Chief Legal Officer, VP of Human Resources, and Chief Technology Officer, stays informed and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal information security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the IT environment.


Company Information

NameVroom, Inc.
CIK0001580864
SIC DescriptionRetail-Auto Dealers & Gasoline Stations
TickerVRM - Nasdaq
Website
CategoryAccelerated filer
Smaller reporting company
Fiscal Year EndDecember 30