XML 68 R35.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Our cybersecurity program is designed to promote actions that protect our computer systems and networks, delivering safe, secure, and reliable operations. Our digital technology group is led by a dedicated Chief Information Security Officer (“CISO”). Our CISO has 16 years of experience as a chief information security officer, over four decades of experience in the energy industry, a degree in computer science, and manages a team at WES that is responsible for leading enterprise-wide cybersecurity strategy, policy, standards, architecture, governance, and risk management. The CISO also leads WES’s Cybersecurity Council, which is a cross-functional internal team including members of WES senior management, that meets regularly to review current information-technology and cybersecurity issues and initiatives and to collaborate on key decisions. Additionally, the CISO provides quarterly reports to the Audit Committee of the Board of Directors. These reports include updates on WES’s cybersecurity risks and threats, the status of projects to strengthen our information security systems, assessments of the information security program, and the emerging threat landscape. Our cybersecurity program is regularly evaluated by internal and external experts with the results of those reviews reported to senior management and the Audit Committee. In addition, in our continuing commitment to cybersecurity education and preparedness, we also engage with industry peers, vendors, intelligence organizations, and law enforcement communities to evaluate and enhance the effectiveness of our information security policies and procedures.
Our business strategy, results of operations, and financial condition have not been materially affected by risks from cybersecurity threats, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents. For more information on our cybersecurity related risks, see Risk Factors under Part I, Item 1A of this Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity program is designed to promote actions that protect our computer systems and networks, delivering safe, secure, and reliable operations.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Additionally, the CISO provides quarterly reports to the Audit Committee of the Board of Directors. These reports include updates on WES’s cybersecurity risks and threats, the status of projects to strengthen our information security systems, assessments of the information security program, and the emerging threat landscape. Our cybersecurity program is regularly evaluated by internal and external experts with the results of those reviews reported to senior management and the Audit Committee.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Additionally, the CISO provides quarterly reports to the Audit Committee of the Board of Directors. These reports include updates on WES’s cybersecurity risks and threats, the status of projects to strengthen our information security systems, assessments of the information security program, and the emerging threat landscape. Our cybersecurity program is regularly evaluated by internal and external experts with the results of those reviews reported to senior management and the Audit Committee.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Additionally, the CISO provides quarterly reports to the Audit Committee of the Board of Directors. These reports include updates on WES’s cybersecurity risks and threats, the status of projects to strengthen our information security systems, assessments of the information security program, and the emerging threat landscape. Our cybersecurity program is regularly evaluated by internal and external experts with the results of those reviews reported to senior management and the Audit Committee.
Cybersecurity Risk Role of Management [Text Block] The CISO also leads WES’s Cybersecurity Council, which is a cross-functional internal team including members of WES senior management, that meets regularly to review current information-technology and cybersecurity issues and initiatives and to collaborate on key decisions.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Chief Information Security Officer (“CISO”)
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our CISO has 16 years of experience as a chief information security officer, over four decades of experience in the energy industry, a degree in computer science, and manages a team at WES that is responsible for leading enterprise-wide cybersecurity strategy, policy, standards, architecture, governance, and risk management.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The CISO also leads WES’s Cybersecurity Council, which is a cross-functional internal team including members of WES senior management, that meets regularly to review current information-technology and cybersecurity issues and initiatives and to collaborate on key decisions. Additionally, the CISO provides quarterly reports to the Audit Committee of the Board of Directors. These reports include updates on WES’s cybersecurity risks and threats, the status of projects to strengthen our information security systems, assessments of the information security program, and the emerging threat landscape. Our cybersecurity program is regularly evaluated by internal and external experts with the results of those reviews reported to senior management and the Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true