XML 48 R32.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Strategy and Risk Management

Atkore’s commitment to cybersecurity emphasizes maintaining secure technology and data environments and the cultivation of a security-minded culture and capability. We do this through education and training, and a layered approach to identifying, preventing, detecting, responding to and recovering from cybersecurity threats and incidents. Key elements of our program for assessing, identifying, and managing material risks from cybersecurity threats are anchored in widely used and industry recognized security frameworks and are described below.

We maintain cybersecurity policies that articulate Atkore’s expectations and requirements with respect to topics such as acceptable use of technology and data, data privacy, risk management, education and awareness and event and incident management. We regularly conduct exercises, with the support of outside domain experts, to improve the effectiveness of our processes and we periodically assess our processes against recognized cybersecurity frameworks. Consistent with our position that cybersecurity is the responsibility of every Atkore employee, we regularly educate and share best practices with our employees to raise awareness of cybersecurity threats. Atkore employees participate in monthly training and testing. In addition to training, Atkore conducts table-top exercises as often as twice a year to simulate cybersecurity risk and response scenarios.

Our cybersecurity team implements measures designed to ensure that Atkore can quickly identify and mitigate cybersecurity risks. Our controls are designed to restrict access to locations that house significant physical information technology assets. Other controls include the use of multifactor authentication, various third-party tools, network security technologies, and a crisis playbook. Our notification policies and processes are escalated to the appropriate personnel on a timely basis to support effective review, response, and compliance with legal requirements. Data is also aggregated to support the identification of trends for forward looking oversight.

Key elements of Atkore’s annual Enterprise Risk Management (“ERM”) program include an inventory and classification of key risk areas and topics; a methodology for scoring risks based on the risk’s probability, severity, and velocity of impact, and for trending key risks; and a framework for developing and implementing countermeasures for key risks. Cybersecurity is one of six topical areas required to be addressed as part of the annual ERM program. Cybersecurity risks are scored using the same methodology applied to all other risks. This helps evaluate the significance and prioritization of cyber-related risks relative to wider business risks. Members of Internal Audit present annually to the Atkore Board of Directors a report on the results of the ERM process. This includes cybersecurity risks. We periodically engage external consultants to assess our cybersecurity program.

Based on the information we have as of the date of this Annual Report, we do not believe any risks from cybersecurity threats have materially affected or are likely to materially affect Atkore, including our business strategy, results of operations or financial condition. For more information on risks relating to our cybersecurity threats, see Item 1A, “Risk Factors-Risks Related to Our Business-Interruptions in the proper functioning of our information technology (“IT”) systems and the IT systems of those with whom we do business, including from cybersecurity threats, could disrupt operations and cause unanticipated increases in costs or decreases in revenues, or both.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Atkore’s commitment to cybersecurity emphasizes maintaining secure technology and data environments and the cultivation of a security-minded culture and capability. We do this through education and training, and a layered approach to identifying, preventing, detecting, responding to and recovering from cybersecurity threats and incidents. Key elements of our program for assessing, identifying, and managing material risks from cybersecurity threats are anchored in widely used and industry recognized security frameworks and are described below.

We maintain cybersecurity policies that articulate Atkore’s expectations and requirements with respect to topics such as acceptable use of technology and data, data privacy, risk management, education and awareness and event and incident management. We regularly conduct exercises, with the support of outside domain experts, to improve the effectiveness of our processes and we periodically assess our processes against recognized cybersecurity frameworks. Consistent with our position that cybersecurity is the responsibility of every Atkore employee, we regularly educate and share best practices with our employees to raise awareness of cybersecurity threats. Atkore employees participate in monthly training and testing. In addition to training, Atkore conducts table-top exercises as often as twice a year to simulate cybersecurity risk and response scenarios.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Cybersecurity Governance and Oversight

At the management level, Atkore’s cybersecurity program is led by the Company’s Vice President - Chief Information Officer (“CIO”), who is a member of the Executive Leadership Team. Atkore’s CIO has over 30 years of experience in information technology roles with responsibilities including global cybersecurity strategy, global IT strategy, technology platforms and internal controls. The CIO has a Master of Business Administration from Kellogg School of Management at Northwestern University and
a Bachelor of Science in Computer Information Systems from DeVry Institute of Technology. Reporting to the CIO is a Director of Cybersecurity. The current Director of Cybersecurity has over 20 years of experience in information technology roles with responsibilities including cybersecurity and security architecture and engineering. The CIO is supported by the Cybersecurity Steering Committee (“CSC”), a management committee comprising members of the Executive Leadership Team and the leaders of the information technology, legal, finance, human resources, commercial and communications functions that report to the Chief Executive Officer. The CSC supports the CIO in overseeing and managing information security risks and in the event of a cybersecurity incident provides oversight and leadership with respect to incident investigation, mitigation, and remediation.

At the Board level, Atkore’s cybersecurity is overseen by a subset of the full Board of Directors, specifically the independent board members. This oversight includes a quarterly review of Atkore’s cybersecurity program, including key program metrics, initiatives, and developments. In addition, in the event of a significant cybersecurity incident, Atkore’s policy and process require engagement of, and consultation with, the Board of Directors.
Additional information about cybersecurity risks we face is discussed in “Item 1A. Risk Factors,” which should be read in conjunction with the information above.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
At the management level, Atkore’s cybersecurity program is led by the Company’s Vice President - Chief Information Officer (“CIO”), who is a member of the Executive Leadership Team. Atkore’s CIO has over 30 years of experience in information technology roles with responsibilities including global cybersecurity strategy, global IT strategy, technology platforms and internal controls. The CIO has a Master of Business Administration from Kellogg School of Management at Northwestern University and
a Bachelor of Science in Computer Information Systems from DeVry Institute of Technology. Reporting to the CIO is a Director of Cybersecurity. The current Director of Cybersecurity has over 20 years of experience in information technology roles with responsibilities including cybersecurity and security architecture and engineering. The CIO is supported by the Cybersecurity Steering Committee (“CSC”), a management committee comprising members of the Executive Leadership Team and the leaders of the information technology, legal, finance, human resources, commercial and communications functions that report to the Chief Executive Officer. The CSC supports the CIO in overseeing and managing information security risks and in the event of a cybersecurity incident provides oversight and leadership with respect to incident investigation, mitigation, and remediation.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
At the management level, Atkore’s cybersecurity program is led by the Company’s Vice President - Chief Information Officer (“CIO”), who is a member of the Executive Leadership Team. Atkore’s CIO has over 30 years of experience in information technology roles with responsibilities including global cybersecurity strategy, global IT strategy, technology platforms and internal controls. The CIO has a Master of Business Administration from Kellogg School of Management at Northwestern University and
a Bachelor of Science in Computer Information Systems from DeVry Institute of Technology. Reporting to the CIO is a Director of Cybersecurity. The current Director of Cybersecurity has over 20 years of experience in information technology roles with responsibilities including cybersecurity and security architecture and engineering. The CIO is supported by the Cybersecurity Steering Committee (“CSC”), a management committee comprising members of the Executive Leadership Team and the leaders of the information technology, legal, finance, human resources, commercial and communications functions that report to the Chief Executive Officer. The CSC supports the CIO in overseeing and managing information security risks and in the event of a cybersecurity incident provides oversight and leadership with respect to incident investigation, mitigation, and remediation.

At the Board level, Atkore’s cybersecurity is overseen by a subset of the full Board of Directors, specifically the independent board members. This oversight includes a quarterly review of Atkore’s cybersecurity program, including key program metrics, initiatives, and developments. In addition, in the event of a significant cybersecurity incident, Atkore’s policy and process require engagement of, and consultation with, the Board of Directors.
Cybersecurity Risk Role of Management [Text Block]
At the management level, Atkore’s cybersecurity program is led by the Company’s Vice President - Chief Information Officer (“CIO”), who is a member of the Executive Leadership Team. Atkore’s CIO has over 30 years of experience in information technology roles with responsibilities including global cybersecurity strategy, global IT strategy, technology platforms and internal controls. The CIO has a Master of Business Administration from Kellogg School of Management at Northwestern University and
a Bachelor of Science in Computer Information Systems from DeVry Institute of Technology. Reporting to the CIO is a Director of Cybersecurity. The current Director of Cybersecurity has over 20 years of experience in information technology roles with responsibilities including cybersecurity and security architecture and engineering. The CIO is supported by the Cybersecurity Steering Committee (“CSC”), a management committee comprising members of the Executive Leadership Team and the leaders of the information technology, legal, finance, human resources, commercial and communications functions that report to the Chief Executive Officer. The CSC supports the CIO in overseeing and managing information security risks and in the event of a cybersecurity incident provides oversight and leadership with respect to incident investigation, mitigation, and remediation.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] At the management level, Atkore’s cybersecurity program is led by the Company’s Vice President - Chief Information Officer (“CIO”), who is a member of the Executive Leadership Team.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Atkore’s CIO has over 30 years of experience in information technology roles with responsibilities including global cybersecurity strategy, global IT strategy, technology platforms and internal controls. The CIO has a Master of Business Administration from Kellogg School of Management at Northwestern University and a Bachelor of Science in Computer Information Systems from DeVry Institute of Technology.The current Director of Cybersecurity has over 20 years of experience in information technology roles with responsibilities including cybersecurity and security architecture and engineering.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
At the Board level, Atkore’s cybersecurity is overseen by a subset of the full Board of Directors, specifically the independent board members. This oversight includes a quarterly review of Atkore’s cybersecurity program, including key program metrics, initiatives, and developments. In addition, in the event of a significant cybersecurity incident, Atkore’s policy and process require engagement of, and consultation with, the Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true