XML 51 R31.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
The Cybersecurity Incident Response Team (“CIRT”) and/or the Crisis Management Team (“CMT”) utilize a Cybersecurity Incident Response Plan (the “CIRP”) and the Playbook to: (1) prepare for and protect against Incidents; (2) detect and analyze Incidents; and (3) contain, eradicate and appropriately report on cybersecurity events. In the event of an Incident, the CIRP provides a framework to coordinate the response. The CIRP and Playbook also address escalation protocols to senior management with respect to disclosure determinations related to an Incident and provides for Executive Team briefings as appropriate. If the CIRT’s initial investigation of the facts of an Incident indicates the need for escalation for potential disclosure, the CMT will utilize the process in the Playbook and the Cyber Disclosure Procedure will be utilized.
The Playbook provides understandable and flexible processes for analyzing and responding to Incidents. In the event of an Incident, the Playbook provides the CMT with predefined steps to follow to respond to, and escalate, cyber security incidents, as appropriate.
The Cyber Disclosure Procedure establishes a flexible and context-dependent process for determining whether an Incident constitutes a material issue pursuant to the rules and regulations of the SEC. A committee of senior management personnel is established to assess potential Incidents. Standing members of the Cyber Disclosure Committee (“CDC”) include the President and Chief Executive Officer, Chief Financial Officer, General Counsel, Global Privacy Officer and Chief Technology Officer.
In considering the materiality of an Incident the CDC may consider the nature, extent and potential magnitude of the risks to the Company related to the Incident, particularly as it may relate to any compromised information or the business and scope of Company operations. If the CDC determines the Board should be notified, a meeting will be called with the Executive Committee of the Board, the Audit Committee Chair, the Board’s cybersecurity expert or any combination or subset of the foregoing.
EIS conducts cybersecurity evaluations, reviews and due diligence of (i) critical vendors periodically and (ii) all new vendors prior to onboarding. Vulnerabilities in third-party providers’ information security environments and software are monitored and managed through EIS’ vulnerability management program. This program aggregates findings from the vulnerability detection and secure configuration management tools within a dashboard, which allows EIS personnel to focus on high priority matters.
EIS employs a variety of measures to prepare for and protect against, and detect, contain and eradicate cybersecurity incidents and threats. The preparatory and protective measures EIS has in place include, but are not limited to, password
protection, multi-factor authentication, internal and external penetration testing, cybersecurity assessments, industry benchmarking, annual cybersecurity awareness trainings to employees, and social engineering awareness efforts. To detect and prevent Incidents, the cybersecurity program uses automated event-detection technology monitored by the cyber defense team, notifications from employees, vendors or service providers, and other tools. The Company has relationships with a number of third-party service providers to assist with Incident response and containment and remediation efforts, including a forensic investigation firm, insurance providers, auditors, consultants, assessors and various law firms. While the Company maintains a robust cybersecurity program, the techniques used to infiltrate information technology systems continue to evolve. Accordingly, the Company operates with, and plans for, the notion that it is impossible to prevent or detect all Incidents, that Incidents will occur, and that the Company will not always be able to detect threats in a timely manner or anticipate and implement adequate security measures. For additional information, see Item 1A. “Risks Related to the Company’s Information Technology, Cybersecurity and Data Protection.”
The Company is currently not aware of any material cybersecurity incidents or threats that have impacted the Company or its business, financial condition, results of operations, employees or customers in the past fiscal year. However, the Company and its customers routinely face risks of Incidents, as the Company relies heavily on information technology systems. Although the Company makes efforts to maintain the security and integrity of the Company’s information technology systems, these systems and the proprietary, confidential internal and customer information that resides on or is transmitted through them are subject to the risk of a cybersecurity incident or disruption, and there can be no assurance that the Company’s security efforts and measures and those of the Company’s third-party providers will prevent breakdowns or incidents affecting the Company’s or the Company’s third-party providers’ databases or systems that could adversely affect the Company’s business.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
The Company’s cybersecurity strategy and risk management is overseen by the Board of the Directors (the “Board”) and implemented and managed by the Company’s Enterprise Information Security Steering Committee, a cross-functional team of senior executives representing business functions across Robert Half and chaired by the Chief Information Security Officer (“CISO”). The CISO oversees the Enterprise Information Security team (“EIS”).
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
The Board views cybersecurity as part of the Company’s overall enterprise risk management function, which the Board oversees. The Board takes cybersecurity into account as part of the Company’s business strategy, financial planning and capital allocation.
The Board oversees the Company’s information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Board receives annual updates from the Company’s CISO, and/or members of the executive leadership team. Such reports typically address, among other things, the Company’s cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape, and a detailed threat assessment relating to information technology risks. Notice of potential material Incidents to the Board is provided for in the Cybersecurity Incident Playbook (the “Playbook”) and the Cybersecurity Incident Disclosure Control Procedure (the “Cyber Disclosure Procedure”).
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Board views cybersecurity as part of the Company’s overall enterprise risk management function, which the Board oversees. The Board takes cybersecurity into account as part of the Company’s business strategy, financial planning and capital allocation.
The Board oversees the Company’s information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Board receives annual updates from the Company’s CISO, and/or members of the executive leadership team. Such reports typically address, among other things, the Company’s cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape, and a detailed threat assessment relating to information technology risks. Notice of potential material Incidents to the Board is provided for in the Cybersecurity Incident Playbook (the “Playbook”) and the Cybersecurity Incident Disclosure Control Procedure (the “Cyber Disclosure Procedure”).
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
The controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by the Enterprise Information Security Steering Committee, led by the CISO. The CISO leverages his 15-plus years of experience building and leading cybersecurity programs and teams. The CISO has experience as a Chief Information Security Officer in multiple industries and has received Certified Information Systems Security Professional (“CISSP”) and Certification in Risk Management Assurance (“CRMA”) certifications. The CISO is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation and response to cybersecurity threats and incidents and is responsible for determining if the cybersecurity program is functioning effectively in the face of evolving cybersecurity threats.
Members of the Enterprise Information Security Steering Committee also include the Global Data Privacy Officer, Chief Technology Officer, Chief Administrative Officer, the General Counsel and the Global Risk Officer of Protiviti.
Specifically, the Enterprise Information Security Steering Committee typically meets at least four times per year, or with greater frequency as necessary, to:
review with management the Company’s cybersecurity threat landscape, risks and data security programs, and the Company’s management and mitigation of cybersecurity risks and incidents;
review with management the Company’s compliance with applicable information security laws and industry standards;
discuss with management the Company’s cybersecurity, technology and information systems policies, including the guidelines and policies established by the Company to assess, monitor and mitigate the Company’s significant cybersecurity, technology and information systems related risk exposures; and
review and provide oversight on the Company’s crisis preparedness with respect to cybersecurity, including Incident response preparedness, communication plans and business continuity capabilities.
Senior management of many departments in the Company also engage in an annual tabletop exercise in order to test incident preparedness, review the effectiveness of the Playbook and maintain effective coordination in the event of a security incident.
Cybersecurity Risk Role of Management [Text Block]
The controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by the Enterprise Information Security Steering Committee, led by the CISO. The CISO leverages his 15-plus years of experience building and leading cybersecurity programs and teams. The CISO has experience as a Chief Information Security Officer in multiple industries and has received Certified Information Systems Security Professional (“CISSP”) and Certification in Risk Management Assurance (“CRMA”) certifications. The CISO is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation and response to cybersecurity threats and incidents and is responsible for determining if the cybersecurity program is functioning effectively in the face of evolving cybersecurity threats.
Members of the Enterprise Information Security Steering Committee also include the Global Data Privacy Officer, Chief Technology Officer, Chief Administrative Officer, the General Counsel and the Global Risk Officer of Protiviti.
Specifically, the Enterprise Information Security Steering Committee typically meets at least four times per year, or with greater frequency as necessary, to:
review with management the Company’s cybersecurity threat landscape, risks and data security programs, and the Company’s management and mitigation of cybersecurity risks and incidents;
review with management the Company’s compliance with applicable information security laws and industry standards;
discuss with management the Company’s cybersecurity, technology and information systems policies, including the guidelines and policies established by the Company to assess, monitor and mitigate the Company’s significant cybersecurity, technology and information systems related risk exposures; and
review and provide oversight on the Company’s crisis preparedness with respect to cybersecurity, including Incident response preparedness, communication plans and business continuity capabilities.
Senior management of many departments in the Company also engage in an annual tabletop exercise in order to test incident preparedness, review the effectiveness of the Playbook and maintain effective coordination in the event of a security incident.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by the Enterprise Information Security Steering Committee, led by the CISO.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The CISO leverages his 15-plus years of experience building and leading cybersecurity programs and teams. The CISO has experience as a Chief Information Security Officer in multiple industries and has received Certified Information Systems Security Professional (“CISSP”) and Certification in Risk Management Assurance (“CRMA”) certifications.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
The controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by the Enterprise Information Security Steering Committee, led by the CISO. The CISO leverages his 15-plus years of experience building and leading cybersecurity programs and teams. The CISO has experience as a Chief Information Security Officer in multiple industries and has received Certified Information Systems Security Professional (“CISSP”) and Certification in Risk Management Assurance (“CRMA”) certifications. The CISO is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation and response to cybersecurity threats and incidents and is responsible for determining if the cybersecurity program is functioning effectively in the face of evolving cybersecurity threats.
Members of the Enterprise Information Security Steering Committee also include the Global Data Privacy Officer, Chief Technology Officer, Chief Administrative Officer, the General Counsel and the Global Risk Officer of Protiviti.
Specifically, the Enterprise Information Security Steering Committee typically meets at least four times per year, or with greater frequency as necessary, to:
review with management the Company’s cybersecurity threat landscape, risks and data security programs, and the Company’s management and mitigation of cybersecurity risks and incidents;
review with management the Company’s compliance with applicable information security laws and industry standards;
discuss with management the Company’s cybersecurity, technology and information systems policies, including the guidelines and policies established by the Company to assess, monitor and mitigate the Company’s significant cybersecurity, technology and information systems related risk exposures; and
review and provide oversight on the Company’s crisis preparedness with respect to cybersecurity, including Incident response preparedness, communication plans and business continuity capabilities.
Senior management of many departments in the Company also engage in an annual tabletop exercise in order to test incident preparedness, review the effectiveness of the Playbook and maintain effective coordination in the event of a security incident.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true