Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |||||||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Risk
Management and Strategy
Our cybersecurity
strategy emphasizes detection, protection, analysis, and rapid recovery from cybersecurity threats, while increasing our
resilience against cybersecurity incidents and effective management of cybersecurity risks and events as they arise. Cybersecurity threat
management forms an integral part of our broader enterprise risk management process and constitutes a core component of strong and responsible
corporate governance. Our strategy is built on two verticals across three continents, namely protection of our operational assets (generation
and storage) and protection of the organizational network, each across MENA, Europe, and the U.S.
Based
on this, Enlight’s cybersecurity strategy:
In
addition, our cybersecurity program incorporates the following specific elements:
Cyberattack
risk assessments include evaluation of facility size, intrusion frequency, geography and potential impact, including possible harm to
organizational systems and those of our business partners. Based on assessed risk levels, we develop appropriate prevention and mitigation
plans. For high‑risk systems, risk surveys and penetration tests are conducted at least annually and following a major system change
or data‑breach event. Other systems are tested at varying intervals according to their sensitivity. These
regular risk assessments are conducted either internally or by qualified third‑party service providers. In addition,
from time to time, the Israeli Ministry of Energy reviews our network vulnerability to cybersecurity risks and provides us with findings
and instructions on how to improve our network protection and resilience.
Exposure
of our data and systems to external parties is minimized and generally granted on a need‑to‑know basis.
Employees
receive information‑security training upon hiring and annually, with additional dedicated training for employees with access to
sensitive Company systems and information. The Company’s training includes phishing simulations, ransomware‑event drills,
and business‑continuity exercises. Employees are required to complete the training through educational software, and we monitor
completion. We also leverage partnerships, industry and government associations, third‑party benchmarking, results from regular
internal and third‑party audits, threat‑intelligence feeds, and other similar resources to inform our cybersecurity processes
and allocate resources.
In
2025, we engaged independent, leading third‑party consultants to assist in assessing, enhancing, implementing, and monitoring comprehensive
cybersecurity risk‑management programs, regular system‑resilience maintenance, and responding to any incidents. The consultant
also prepared a protection plan based on the said risk analysis.
In
addition, we have implemented a requirement for our suppliers to adopt security‑control principles based on industry‑recognized
standards, and we maintain a due‑diligence procedure for engagement with third parties across our supply chain, as well as in connection
with partnerships, acquisitions, and business integrations. Under these procedures, we assess the compliance of such parties with relevant
regulations and with our information‑security and privacy‑protection standards. As our portfolio of projects has increased
in size, the size and scope of our technology footprint has similarly increased, and we have had to improve and expand our IT and OT defensive
infrastructure. For example, in 2024 we enhanced the security of our corporate servers, added better Multi‑Factor Authentication
to our Virtual Private Networks, implemented a new Network Access Control solution, and connected our office network to a specified SIEM/SOC
service.
In
recent years, our assets in Israel have become more vulnerable due to ongoing regional conflicts. Since the recent outbreak of renewed
hostilities involving Hamas, Hezbollah, and Iran, we have identified an increase in attempted cybersecurity attacks on energy facilities
in the Middle East, including in Israel. We have adjusted our alertness levels, monitoring, and tracking of intrusion attempts to help
ensure safety of critical‑asset endpoint systems. In addition, we have obtained appropriate insurance coverage for cyber‑related
events for the majority of our Israeli assets, particularly for our critical facilities.
We
utilize artificial‑intelligence tools in our business operations, which may increase information‑security and cyber‑risk
exposure. We have implemented and will continue to implement protective measures to safeguard our assets and organizational networks against
such emerging risks. |
||||||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | We have not identified any material impact on our business stemming from cybersecurity threats, including from any concrete cybersecurity incidents. While to date no incidents have had a material impact on our operations or financial results, we cannot guarantee that material incidents will not occur in the future. | ||||||||||||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] |
Governance
Our
board of directors has overall responsibility for risk oversight, with its committees assisting the board in performing this function
based on their respective areas of expertise. Our
board of directors has delegated certain oversight of risks related to cybersecurity to our audit committee. Key aspects of the board’s
role include: Cybersecurity Policy development and approval, risk management, budgetary approval, compliance oversight, crisis management
including ransomware events, and continuous improvement.
Ms.
Michal Ma’aravi, our Chief Information Systems Officer (CISO), is formally designated as the Company’s CISO
under our internal governance framework and is responsible for overseeing the implementation of our Cybersecurity Policy. Ms.
Ma’aravi has served as our CISO since 2022 and has completed an external 300‑hour training program for CISOs.
In the course of performing her duties as our CISO, Ms. Ma’arravi makes use of services
provided by third-party CISO experts.
In
cases of significant cybersecurity events, the CISO notifies our Chief Operating Officer, who notifies our Chief Executive Officer. In
each such case, the IT team reviews the incident and suggests a remediation plan. In the event of a potentially material cybersecurity
event, the chair of the audit committee is notified and briefed, and meetings of the audit committee and/or full board of directors are
held, as appropriate. We maintain an incident response team which is responsible for coordinated response, containment, investigation,
documentation, and communication during cybersecurity events.
Our
CISO periodically briefs the audit committee and board of directors on information technology and data analytics matters,
including cybersecurity risks, practices, and real-time reports on cybersecurity incidents. The audit committee and/or the Chief Executive
Officer brief the full board of directors on cybersecurity matters discussed during audit committee meetings.
|
||||||||||||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our board of directors has overall responsibility for risk oversight, with its committees assisting the board in performing this function based on their respective areas of expertise. Our board of directors has delegated certain oversight of risks related to cybersecurity to our audit committee. Key aspects of the board’s role include: Cybersecurity Policy development and approval, risk management, budgetary approval, compliance oversight, crisis management including ransomware events, and continuous improvement. | ||||||||||||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our board of directors has delegated certain oversight of risks related to cybersecurity to our audit committee. Key aspects of the board’s role include: Cybersecurity Policy development and approval, risk management, budgetary approval, compliance oversight, crisis management including ransomware events, and continuous improvement. | ||||||||||||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] |
In
cases of significant cybersecurity events, the CISO notifies our Chief Operating Officer, who notifies our Chief Executive Officer. In
each such case, the IT team reviews the incident and suggests a remediation plan. In the event of a potentially material cybersecurity
event, the chair of the audit committee is notified and briefed, and meetings of the audit committee and/or full board of directors are
held, as appropriate. We maintain an incident response team which is responsible for coordinated response, containment, investigation,
documentation, and communication during cybersecurity events.
Our
CISO periodically briefs the audit committee and board of directors on information technology and data analytics matters,
including cybersecurity risks, practices, and real-time reports on cybersecurity incidents. The audit committee and/or the Chief Executive
Officer brief the full board of directors on cybersecurity matters discussed during audit committee meetings.
|
||||||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | ||||||||||||||||||||||||
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Ms. Ma’aravi has served as our CISO since 2022 and has completed an external 300‑hour training program for CISOs. | ||||||||||||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our CISO periodically briefs the audit committee and board of directors on information technology and data analytics matters, including cybersecurity risks, practices, and real-time reports on cybersecurity incidents. The audit committee and/or the Chief Executive Officer brief the full board of directors on cybersecurity matters discussed during audit committee meetings. | ||||||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |