XML 42 R26.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
As one of the critical elements of our overall ERM approach, our cybersecurity program is focused on the following key areas:

Governance—Our audit committee oversees our ERM program, including the management of risks arising from cybersecurity threats, and are supported by the Information Security Steering Committee (the “ISSC”), the Cybersecurity Incident Response Team (the “CSIRT”), and our information security (“InfoSec”) team. Our audit committee receives presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends and information security considerations arising with respect to our peers and third parties. The ISSC oversees the frameworks the InfoSec team uses to benchmark the controls and maturity of our security program. The ISSC is a cross-functional group that has oversight and input into the roadmap and projects reflecting the maturity benchmarks of the frameworks upon which we base our program, and receives monthly updates as to the status of the roadmap projects. The CSIRT monitors the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the ISSC, who then reports up to our audit committee when appropriate. The audit committee is responsible for escalating cybersecurity threats and incidents to the Board if and when appropriate. We have established frameworks so that our ISSC, audit committee, and board of directors also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed.

To facilitate the success of our cybersecurity risk management program, the CSIRT is composed of multidisciplinary teams throughout Redfin who are deployed to address cybersecurity threats and to respond to cybersecurity incidents. The audit committee consists of at least three members of the Board. The ISSC includes our chief financial officer (“CFO”), our chief legal officer (“CLO”), and other key leaders across the company. Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
As one of the critical elements of our overall ERM approach, our cybersecurity program is focused on the following key areas:

Governance—Our audit committee oversees our ERM program, including the management of risks arising from cybersecurity threats, and are supported by the Information Security Steering Committee (the “ISSC”), the Cybersecurity Incident Response Team (the “CSIRT”), and our information security (“InfoSec”) team. Our audit committee receives presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends and information security considerations arising with respect to our peers and third parties. The ISSC oversees the frameworks the InfoSec team uses to benchmark the controls and maturity of our security program. The ISSC is a cross-functional group that has oversight and input into the roadmap and projects reflecting the maturity benchmarks of the frameworks upon which we base our program, and receives monthly updates as to the status of the roadmap projects. The CSIRT monitors the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the ISSC, who then reports up to our audit committee when appropriate. The audit committee is responsible for escalating cybersecurity threats and incidents to the Board if and when appropriate. We have established frameworks so that our ISSC, audit committee, and board of directors also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed.

To facilitate the success of our cybersecurity risk management program, the CSIRT is composed of multidisciplinary teams throughout Redfin who are deployed to address cybersecurity threats and to respond to cybersecurity incidents. The audit committee consists of at least three members of the Board. The ISSC includes our chief financial officer (“CFO”), our chief legal officer (“CLO”), and other key leaders across the company. Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Governance—Our audit committee oversees our ERM program, including the management of risks arising from cybersecurity threats, and are supported by the Information Security Steering Committee (the “ISSC”), the Cybersecurity Incident Response Team (the “CSIRT”), and our information security (“InfoSec”) team. Our audit committee receives presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends and information security considerations arising with respect to our peers and third parties. The ISSC oversees the frameworks the InfoSec team uses to benchmark the controls and maturity of our security program. The ISSC is a cross-functional group that has oversight and input into the roadmap and projects reflecting the maturity benchmarks of the frameworks upon which we base our program, and receives monthly updates as to the status of the roadmap projects. The CSIRT monitors the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the ISSC, who then reports up to our audit committee when appropriate. The audit committee is responsible for escalating cybersecurity threats and incidents to the Board if and when appropriate. We have established frameworks so that our ISSC, audit committee, and board of directors also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our audit committee oversees our ERM program, including the management of risks arising from cybersecurity threats, and are supported by the Information Security Steering Committee (the “ISSC”), the Cybersecurity Incident Response Team (the “CSIRT”), and our information security (“InfoSec”) team. Our audit committee receives presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends and information security considerations arising with respect to our peers and third parties.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
To facilitate the success of our cybersecurity risk management program, the CSIRT is composed of multidisciplinary teams throughout Redfin who are deployed to address cybersecurity threats and to respond to cybersecurity incidents. The audit committee consists of at least three members of the Board. The ISSC includes our chief financial officer (“CFO”), our chief legal officer (“CLO”), and other key leaders across the company. Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Cybersecurity Risk Role of Management [Text Block]
To facilitate the success of our cybersecurity risk management program, the CSIRT is composed of multidisciplinary teams throughout Redfin who are deployed to address cybersecurity threats and to respond to cybersecurity incidents. The audit committee consists of at least three members of the Board. The ISSC includes our chief financial officer (“CFO”), our chief legal officer (“CLO”), and other key leaders across the company. Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Collaborative Approach—We have implemented a comprehensive, cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents, so that decisions regarding the public disclosure and reporting of such incidents can be made in a timely manner. The ISSC and the CSIRT work collaboratively to build and implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response and recovery plans.
Technical Safeguards—We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including rate-limiting and web application firewalls, anti-malware and anti-phishing technology, access controls, and threat detection systems including posture management tooling. We conduct regular security reviews of our technical components, code, libraries, and environments.

Incident Response and Recovery Planning—We maintain incident response and recovery plans that address our response to a cybersecurity incident. These plans are tested and evaluated on a regular basis.

Third-Party Risk Management—We maintain a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and other external users of our systems, as well as the systems of third parties that could adversely impact our business in the event of a cybersecurity incident affecting those third-party systems.

Education and Awareness—We provide mandatory training for our personnel regarding cybersecurity threats as a means to equip our employees with effective tools to address cybersecurity threats, and to communicate our evolving information security policies, standards, processes and practices. We engage in the periodic assessment and testing of our policies, standards, processes and practices that are designed to address cybersecurity threats and incidents. These efforts include a wide range of activities, including audits, assessments, tabletop exercises, threat modeling, vulnerability testing and other exercises focused on evaluating the effectiveness of our cybersecurity measures and planning. We regularly engage third parties to perform assessments on our cybersecurity measures, including information security maturity assessments, audits and independent reviews of our information security control environment and operating effectiveness. We report the results of these assessments, audits and reviews to the ISSC, the audit committee, and the Board, and we adjust our cybersecurity policies, standards, processes and practices as necessary based on the information provided by these assessments, audits and reviews.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The audit committee consists of at least three members of the Board. The ISSC includes our chief financial officer (“CFO”), our chief legal officer (“CLO”), and other key leaders across the company. Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] . Our chief technology officer (“CTO”) oversees our security team. Our CFO has over 30 years of experience managing risks at Redfin, Zappos, Amazon (Home and Garden), Bain & Company and Accenture, including risks arising from cybersecurity threats. Our CLO has 16 years of experience managing risks, including risks arising from cybersecurity threats. Our CTO has over 24 years of experience, including experience managing risks arising from cybersecurity threats across several industries to include health care and business solutions. Our Director of Security has 17 years of experience building and leading cybersecurity teams at Microsoft, Ubisoft, and Citrix Systems.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Collaborative Approach—We have implemented a comprehensive, cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents, so that decisions regarding the public disclosure and reporting of such incidents can be made in a timely manner. The ISSC and the CSIRT work collaboratively to build and implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response and recovery plans.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true