XML 59 R37.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Busey maintains a cyber security risk management program designed to prevent, detect, and respond to information security threats. The program is designed to align with the Cyber Risk Institute’s Profile framework, which is based on the National Institute of Standards and Technology’s Cybersecurity Framework. The program is led by Busey’s Chief Information Security Officer (“CISO”). Busey’s CISO has been in the role since September 2020 and has over 15 years of experience across external and internal audit, technology risk management, and cybersecurity matters, spanning various industries primarily within the financial services sector, but also including healthcare, technology, consumer products, and manufacturing for both regional and multinational corporations. Busey’s cyber security risk management program is a key part of the Company’s overall risk management system, which is administered by the Chief Risk Officer.
Busey’s cyber security risk management program includes administrative, technical, and physical safeguards to help ensure the security and confidentiality of customer records and information. Busey has long devoted significant resources to assessing, identifying, and managing risks associated with cybersecurity threats, including:
Establishing an internal cybersecurity team that is responsible for conducting regular assessments of Busey’s information systems, existing controls, vulnerabilities, and potential improvements;
Employing continuous monitoring tools that can detect and help respond to cybersecurity threats in real-time;
Performing due diligence with respect to third-party service providers, including their cybersecurity practices, and requiring contractual commitments from Busey’s service providers to take certain cybersecurity measures;
Ongoing monitoring and assessment of third-party vendors' cybersecurity practices, including regular audits, compliance checks, and incident reporting requirements;
Engaging third-party cybersecurity consultants, who conduct periodic penetration testing, vulnerability assessments, and other procedures to identify potential weaknesses in Busey’s systems and processes;
Mandating periodic cybersecurity training for Busey’s workforce, which includes awareness programs on phishing, social engineering, and other common cyber threats;
Implementing access control measures such as multi-factor authentication, role-based access controls, and regular access reviews to ensure that only authorized personnel have access to critical systems and data;
Using data encryption for both data at rest and data in transit to protect sensitive information; and
Creating an incident response plan that outlines the steps to contain, mitigate, and remediate the impact of cybersecurity incidents, including communication protocols and post-incident analysis.
Busey’s security and privacy policies and procedures are in effect across all of its businesses and geographic locations. Busey adheres to various regulatory requirements and standards, including the Gramm-Leach-Bliley Act to ensure compliance with data protection laws. Additionally, Busey maintains cybersecurity insurance coverage to mitigate potential financial impacts from cyber incidents.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Busey’s security and privacy policies and procedures are in effect across all of its businesses and geographic locations. Busey adheres to various regulatory requirements and standards, including the Gramm-Leach-Bliley Act to ensure compliance with data protection laws. Additionally, Busey maintains cybersecurity insurance coverage to mitigate potential financial impacts from cyber incidents.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Busey’s board of directors, as a whole and through its Enterprise Risk Committee (the “Risk Committee”), is responsible for the oversight of risk management. In that role, Busey’s board of directors and Risk Committee, with support from Busey’s cybersecurity advisors, are responsible for ensuring that the risk management processes developed and implemented by management are adequate and functioning as designed. To carry out those duties, both the board of directors and the Risk Committee receive quarterly reports from Busey’s management team regarding cybersecurity risks, and Busey’s efforts to prevent, detect, mitigate, and remediate any cybersecurity incidents.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Busey’s board of directors, as a whole and through its Enterprise Risk Committee (the “Risk Committee”), is responsible for the oversight of risk management.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] To carry out those duties, both the board of directors and the Risk Committee receive quarterly reports from Busey’s management team regarding cybersecurity risks, and Busey’s efforts to prevent, detect, mitigate, and remediate any cybersecurity incidents.
Cybersecurity Risk Role of Management [Text Block]
Busey’s board of directors, as a whole and through its Enterprise Risk Committee (the “Risk Committee”), is responsible for the oversight of risk management. In that role, Busey’s board of directors and Risk Committee, with support from Busey’s cybersecurity advisors, are responsible for ensuring that the risk management processes developed and implemented by management are adequate and functioning as designed. To carry out those duties, both the board of directors and the Risk Committee receive quarterly reports from Busey’s management team regarding cybersecurity risks, and Busey’s efforts to prevent, detect, mitigate, and remediate any cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The program is led by Busey’s Chief Information Security Officer (“CISO”).
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Busey’s CISO has been in the role since September 2020 and has over 15 years of experience across external and internal audit, technology risk management, and cybersecurity matters, spanning various industries primarily within the financial services sector, but also including healthcare, technology, consumer products, and manufacturing for both regional and multinational corporations.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Busey’s board of directors, as a whole and through its Enterprise Risk Committee (the “Risk Committee”), is responsible for the oversight of risk management. In that role, Busey’s board of directors and Risk Committee, with support from Busey’s cybersecurity advisors, are responsible for ensuring that the risk management processes developed and implemented by management are adequate and functioning as designed. To carry out those duties, both the board of directors and the Risk Committee receive quarterly reports from Busey’s management team regarding cybersecurity risks, and Busey’s efforts to prevent, detect, mitigate, and remediate any cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true