ACELYRIN, Inc. 10-K Cybersecurity GRC - 2025-03-19

Page last updated on March 19, 2025

ACELYRIN, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-03-19 16:04:33 EDT.

Filings

10-K filed on 2025-03-19

ACELYRIN, Inc. filed a 10-K at 2025-03-19 16:04:33 EDT
Accession Number: 0001962918-25-000022

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity Risk management and strategy We have implemented and maintain various information security processes designed to identify, assess and manage material risks from cybersecurity threats to our critical computer networks, third party hosted services, communications systems, hardware and software, and our critical data, including intellectual property, data related to our clinical trials and other confidential information that is proprietary, strategic or competitive in nature (“Information Systems and Data”). Our assessment and management of material risks from cybersecurity threats are integrated into our overall risk management processes. We have an IT Steering Committee (“ITSC”) made up of cross-disciplinary senior management, including (among others) the Head of IT, Chief Legal Officer, Chief Technical Operations Officer and Chief Commercial Officer, along with IT leadership and representatives from several additional departments. The ITSC meets at least quarterly to oversee our IT risk management framework, including information security, data privacy, and regulatory compliance. It monitors the effectiveness of controls, reviews incident reports and provides guidance on mitigating emerging IT risks and vulnerabilities that are more likely to lead to a material impact to our business. The ITSC investigates incidents and reports its findings to our senior management, which, depending on the severity of the incident, may be reported to our audit committee or board. Our information security function, which is led by our Head of IT with the support of our IT department, helps to identify, assess and manage our cybersecurity threats and risks. Our IT team identifies and assesses risks from cybersecurity threats by monitoring and evaluating our threat environment and our risk profile using various methods including, for example, manual and automated tools, analyzing reports of threats and threat actors, conducting internal and external scans of our environment, periodic penetration tests conducted by third parties, utilization of a 24x7 security operations center (“SOC”) that provides monitoring and alert services, evaluating threats reported to us, and coordinating cross-functionally, with management and externally (e.g., with law enforcement) concerning threats. Depending on the environment, we implement and maintain various technical, physical, and organizational measures, processes, standards and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example: a Cybersecurity Incident Response Policy; various other policies, plans, and frameworks in regards to (without limitations) access, acceptable use, password security and software system development; physical and administrative access and network security controls; data segregation; encryption of certain data; leveraging of certain SOC II-certified vendors; management, tracking and disposal of certain assets; systems monitoring; participating in information sharing and analysis centers to share and receive threat intelligence specifically related to biopharma and healthcare companies; and maintaining cyber insurance. Our Head of IT has served in various roles in information technology for over 22 years, including serving in cybersecurity focused roles for the past 9 years. Our Head of IT holds an undergraduate degree in Computer Information Systems. Our Chief Legal Officer, Chief Technical Operations Officer and Chief Commercial Officer each hold undergraduate and graduate degrees in their respective fields, and each have substantial experience managing risks at the Company and at similar companies, including risks arising from cybersecurity threats. The Head of IT is responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into our overall risk management strategy, and communicating key priorities to relevant personnel. The Head of IT, together with certain other senior management personnel, is responsible for approving functional budgets, implementing approved, phase-appropriate policies, plans and guidelines, helping prepare for potential cybersecurity incidents, reviewing security assessments and other security-related reports and overseeing cybersecurity processes. We also use third-party service providers to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats, including for example, outside consultants, third party penetration testing providers, and threat intelligence and forensic providers. We use third-party service providers to perform a variety of functions throughout our business, such as email and hosting providers, CROs and CMOs. We have certain vendor management processes that we may use as appropriate to manage cybersecurity risks associated with our use of these providers. These processes may include the imposition of information security contractual obligations on vendors, as well as quality control elements for certain vendors. Depending on the nature of the services provided, the sensitivity of the information systems and data at issue, and the identity of the provider, our vendor management processes may involve different levels of assessment designed to help identify cybersecurity risks associated with a provider and impose contractual obligations related to cybersecurity on the provider. Governance Our board of directors addresses our cybersecurity risk management as part of its general oversight function. The board of directors’ audit committee is responsible for overseeing our cybersecurity and information technology risk management, risk assessment and major risk exposures. The audit committee receives periodic reports from the ITSC and our Head of IT concerning the Company’s significant cybersecurity threats and risk and the processes the Company has implemented to address them. The audit committee also has access to advisors, and various other reports, and presentation materials related to cybersecurity threats, risk and mitigation. Our Cybersecurity Incident Response Policy is designed to escalate certain cybersecurity incidents to members of senior management depending on the circumstances, including our disclosure committee, as appropriate. Senior management works with the Company’s cybersecurity incident management team to help the Company mitigate and remediate notified cybersecurity incidents, comply with applicable laws, regulations and contractual provisions and engage advisors as appropriate. In addition, such policy includes reporting to the audit committee of the board of directors for certain cybersecurity incidents. For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, see our risk factors under Part 1. Item 1A. Risk Factors in this Annual Report on Form 10-K, including “If our internal information technology systems, or those used by our CROs, CMOs, clinical sites or other contractors, consultants and service providers upon which we rely, or our data are or were compromised, become unavailable or suffer security breaches, loss or leakage of data or other disruptions, we could suffer material adverse consequences resulting from such compromise, including but not limited to, operational or service interruption, harm to our reputation, litigation, fines, penalties and liability, compromise of sensitive information related our business, and other adverse consequences.”


Company Information

NameACELYRIN, Inc.
CIK0001962918
SIC DescriptionPharmaceutical Preparations
TickerSLRN - Nasdaq
Website
CategoryNon-accelerated filer
Smaller reporting company
Emerging growth company
Fiscal Year EndDecember 30