XML 50 R27.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
As one of the important elements integrated into our overall enterprise risk management approach, our cybersecurity program includes the following:
Governance: As discussed in more detail below under the heading Governance, our Board’s oversight of cybersecurity risk management is supported by the Audit Committee of the Board, which regularly reviews operational risks. Our Head of Information Technology (HIT), together with our Head of Information Security (HIS), and other members of our management team meet regularly to review current cybersecurity risks. The HIT and management team representatives meet with the Audit Committee routinely to discuss and review our cybersecurity program and risk landscape.
Collaborative Approach: We have implemented a cross-functional approach involving all employees to help in identifying, preventing, and mitigating cybersecurity threats and incidents. We have implemented processes that provide for the prompt escalation of known cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by our management team, together with the Audit Committee, in a timely manner.
Technical Safeguards: We deploy technical safeguards designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, and access controls. We also employ multi-factor authentication and a managed endpoint detection and response solution for malware. These measures are evaluated and improved through vulnerability assessments and penetration testing completed by third party experts, as well as cybersecurity threat intelligence.
Incident Response and Recovery: We have established and maintain an incident response plan that addresses our response to a cybersecurity incident. This plan is evaluated regularly.
Third-Party Risk Management: We maintain a risk-based approach to identifying and overseeing cybersecurity risks presented by third parties, including vendors, service providers and third-party systems.
Education and Awareness: We provide regular training on cybersecurity threats to equip our personnel with effective tools to address them and to communicate our latest information security policies, processes and practices.
We periodically evaluate and test our policies, standards, processes, and practices to address cybersecurity threats and incidents. These efforts include a wide range of activities, including third party assessments, vulnerability testing, and other exercises focused on evaluating the effectiveness of our cybersecurity measures. The results of such assessments and reviews are reported to our management team, the Audit Committee and the Board, and we adjust our cybersecurity program as necessary based on the information provided by these assessments and reviews.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Our Board of Directors (the Board) and management recognize the importance of maintaining the trust and confidence of our patients, investors, business partners and employees. The Board and our Audit Committee are actively involved in oversight of our cybersecurity program as part of our approach to risk management. Our cybersecurity policies, processes and practices are integrated into our operations and are based on recognized standards such as the National Institute of Standards and Technology Cybersecurity Framework. In general, we seek to address cybersecurity risks through a comprehensive, coordinated approach that is focused on preserving the confidentiality, security, and availability of the information that we create through our business operations by identifying, preventing, and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our Board, in coordination with the Audit Committee, oversees our risk management approach, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent expert reviews, the threat environment, technological trends, and any material risks identified with our third parties. The Audit Committee also receives prompt and timely information regarding any significant cybersecurity incidents, as well as ongoing updates regarding any such incidents until they have been remediated. Our HIT, Audit Committee and Board review and discuss our approach to cybersecurity risk on an annual basis.
The HIT and HIS, in coordination with our management team, which includes our Chief Executive Officer (CEO), Chief Financial Officer (CFO) and General Counsel, work collaboratively to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response plan. Through an ongoing process, the HIS monitors the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the HIT, management team, and when appropriate, the Audit Committee.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board, in coordination with the Audit Committee, oversees our risk management approach, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent expert reviews, the threat environment, technological trends, and any material risks identified with our third parties. The Audit Committee also receives prompt and timely information regarding any significant cybersecurity incidents, as well as ongoing updates regarding any such incidents until they have been remediated. Our HIT, Audit Committee and Board review and discuss our approach to cybersecurity risk on an annual basis.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board, in coordination with the Audit Committee, oversees our risk management approach, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent expert reviews, the threat environment, technological trends, and any material risks identified with our third parties. The Audit Committee also receives prompt and timely information regarding any significant cybersecurity incidents, as well as ongoing updates regarding any such incidents until they have been remediated. Our HIT, Audit Committee and Board review and discuss our approach to cybersecurity risk on an annual basis.
The HIT and HIS, in coordination with our management team, which includes our Chief Executive Officer (CEO), Chief Financial Officer (CFO) and General Counsel, work collaboratively to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response plan. Through an ongoing process, the HIS monitors the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the HIT, management team, and when appropriate, the Audit Committee.
Cybersecurity Risk Role of Management [Text Block]
The HIT and HIS, in coordination with our management team, which includes our Chief Executive Officer (CEO), Chief Financial Officer (CFO) and General Counsel, work collaboratively to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response plan. Through an ongoing process, the HIS monitors the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the HIT, management team, and when appropriate, the Audit Committee.
Selected Management and Director Qualifications
The HIS and HIT have both served in various roles in information technology and information security for many years, including serving in similar roles at other publicly traded companies. The HIS holds several industry accreditations, including being a certified Chief Information Security Officer, and has worked in the information technology field for over 25 years, specializing in Information Security for the last 15 years. The HIT has an undergraduate degree in computer science and business administration and has worked in healthcare information technology for over 20 years. Our CEO, CFO and General Counsel each hold undergraduate and graduate degrees in their respective fields, and each have over 20 years of experience managing risks at Vir Bio and at similarly situated companies, including risks arising from cybersecurity threats. For example, our CFO has been responsible for leading and managing Information Technology departments at two separate publicly traded companies, including our Company, and has leadership experience in business continuity planning in various roles. Additionally, one of our directors formerly served as the United States Secretary of Homeland Security, in which capacity she had ultimate responsibility for the cybersecurity of the critical infrastructure of the United States of America, and as President of the University of California with responsibility for cybersecurity matters related to the university’s various networks.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Board, in coordination with the Audit Committee, oversees our risk management approach, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent expert reviews, the threat environment, technological trends, and any material risks identified with our third parties.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The HIS and HIT have both served in various roles in information technology and information security for many years, including serving in similar roles at other publicly traded companies. The HIS holds several industry accreditations, including being a certified Chief Information Security Officer, and has worked in the information technology field for over 25 years, specializing in Information Security for the last 15 years
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our Board, in coordination with the Audit Committee, oversees our risk management approach, including the management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent expert reviews, the threat environment, technological trends, and any material risks identified with our third parties. The Audit Committee also receives prompt and timely information regarding any significant cybersecurity incidents, as well as ongoing updates regarding any such incidents until they have been remediated. Our HIT, Audit Committee and Board review and discuss our approach to cybersecurity risk on an annual basis.
The HIT and HIS, in coordination with our management team, which includes our Chief Executive Officer (CEO), Chief Financial Officer (CFO) and General Counsel, work collaboratively to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with our incident response plan. Through an ongoing process, the HIS monitors the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real time, and reports such threats and incidents to the HIT, management team, and when appropriate, the Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true