XML 43 R26.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Apr. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
As part of our commitment to safeguarding our assets and maintaining the integrity of our operations, C3 AI has established a comprehensive cybersecurity risk management program. This program is designed to identify, assess, and mitigate cybersecurity risks that could potentially impact our business operations, customers, and stakeholders. C3 AI employs a multi-layered approach to identify and assess cybersecurity threats. This includes:
Regular vulnerability scanning: We conduct internal and external vulnerability scans of our systems and applications to identify potential weaknesses that attackers could exploit.
Penetration testing: We engage independent security professionals to conduct simulated cyberattacks on our systems to assess the effectiveness of our security controls.
Threat intelligence monitoring: We subscribe to threat intelligence feeds that provide us with real-time information about the latest cyber threats and vulnerabilities.
Risk assessment framework: We utilize a risk assessment framework to categorize identified threats based on likelihood and potential impact on our business operations, financial stability, and reputation. This framework includes third-party vendor risk assessment to manage cybersecurity risks associated with our use of these providers. The third-party vendor risk assessment framework includes the following:
Perform due diligence of the vendors’ standards, including reviewing security policies, certifications, and third-party attestation and past security incidents.
Request vendors to complete security questionnaires and provide any security and vulnerability scans.
Define security expectations within the vendor contract including data security obligations, access controls, incident reporting procedures, security assessment calls if necessary and review of incident response plan, business continuity and disaster recovery plan.
Network security: Firewalls, intrusion detection/prevention systems (IDS/IPS), and data loss prevention (DLP) solutions are deployed to monitor and filter network traffic.
Endpoint security: Antivirus, anti-malware, and Mobile Device Management solutions are implemented on all company devices.
Access controls: User access controls are implemented to restrict access to sensitive data and systems based on the principle of least privilege.
Data security: Encryption solutions are used to protect sensitive data both at rest and in transit.
Security awareness and training: We provide regular security awareness training to all employees to educate them on cybersecurity best practices and phishing attempts.
For a description of the risks from cybersecurity threats that may materially affect us, see the section titled “Risk Factors” contained in Part I, Item 1A of this Annual Report on Form 10-K.
Cybersecurity risk management is integrated with our overall enterprise risk management framework. Identified cybersecurity risks are reported through established channels to relevant stakeholders, including senior management and the Board of Directors. Mitigation strategies are prioritized and incorporated into the overall risk management plan. We continuously identify and evaluate potential cybersecurity threats. While the nature of cyber threats makes it impossible to predict all future incidents, some currently identified material cybersecurity risks include:
Ransomware attacks that could disrupt business operations and lead to data breaches.
Phishing attacks that could compromise employee credentials and provide unauthorized access to sensitive data.
Supply chain attacks targeting third-party vendors with access to our systems or data.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
As part of our commitment to safeguarding our assets and maintaining the integrity of our operations, C3 AI has established a comprehensive cybersecurity risk management program. This program is designed to identify, assess, and mitigate cybersecurity risks that could potentially impact our business operations, customers, and stakeholders. C3 AI employs a multi-layered approach to identify and assess cybersecurity threats. This includes:
Regular vulnerability scanning: We conduct internal and external vulnerability scans of our systems and applications to identify potential weaknesses that attackers could exploit.
Penetration testing: We engage independent security professionals to conduct simulated cyberattacks on our systems to assess the effectiveness of our security controls.
Threat intelligence monitoring: We subscribe to threat intelligence feeds that provide us with real-time information about the latest cyber threats and vulnerabilities.
Risk assessment framework: We utilize a risk assessment framework to categorize identified threats based on likelihood and potential impact on our business operations, financial stability, and reputation. This framework includes third-party vendor risk assessment to manage cybersecurity risks associated with our use of these providers. The third-party vendor risk assessment framework includes the following:
Perform due diligence of the vendors’ standards, including reviewing security policies, certifications, and third-party attestation and past security incidents.
Request vendors to complete security questionnaires and provide any security and vulnerability scans.
Define security expectations within the vendor contract including data security obligations, access controls, incident reporting procedures, security assessment calls if necessary and review of incident response plan, business continuity and disaster recovery plan.
Network security: Firewalls, intrusion detection/prevention systems (IDS/IPS), and data loss prevention (DLP) solutions are deployed to monitor and filter network traffic.
Endpoint security: Antivirus, anti-malware, and Mobile Device Management solutions are implemented on all company devices.
Access controls: User access controls are implemented to restrict access to sensitive data and systems based on the principle of least privilege.
Data security: Encryption solutions are used to protect sensitive data both at rest and in transit.
Security awareness and training: We provide regular security awareness training to all employees to educate them on cybersecurity best practices and phishing attempts.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Management is responsible for the overall implementation and effectiveness of the cybersecurity program. This includes allocating resources, establishing policies, and ensuring employee adherence to security practices. The VP of Information Security leads the cybersecurity team and reports directly to the VP of Cloud Infrastructure.
The Audit Committee of the Board of Directors has specific oversight responsibilities related to cybersecurity, including review of security controls and incident response plans. Management provides updates to the Audit Committee on cybersecurity risks and the effectiveness of our cybersecurity program.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of the Board of Directors has specific oversight responsibilities related to cybersecurity, including review of security controls and incident response plans.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management provides updates to the Audit Committee on cybersecurity risks and the effectiveness of our cybersecurity program.
Cybersecurity Risk Role of Management [Text Block] Management provides updates to the Audit Committee on cybersecurity risks and the effectiveness of our cybersecurity program.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The VP of Information Security leads the cybersecurity team and reports directly to the VP of Cloud Infrastructure.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true