v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cyber response strategy
Following the cyber-attack detected in July 2024, the Group enhanced its cyber response strategy which was presented to the Audit
Committee, showcasing the Group’s defences against cyber threats. This strategy reflects a proactive approach to safeguarding our digital
infrastructure. Recognising the ever-evolving nature of cybersecurity challenges, our strategy incorporates robust measures to detect,
respond to, and where required disclose cyber incidents.
The Group's cybersecurity strategy and approach includes:
Mitigation of risks and vulnerabilities through performance of risk assessments to identify and assess potential cyber risks. The cyber
and IT risks is incorporated into the Group’s strategic risk register which forms part of the Group’s risk management process
Ensuring standards and compliance through development and implementation of comprehensive Information Security
Management System policies such as the Information and Communication Technology (ICT) Code of conduct, Information
security, Vulnerability, Backup and ICT disaster recovery policies, in alignment to international standards on ICT security
Responding to cybersecurity incidents through Intrusion detection and prevention by implementation of industry best practice
technologies to protect our network Fostering a cyber awareness culture through conducting security awareness training by
continuously educating and creating awareness amongst users with an equal responsibility with respect to cybersecurity
Defense-in-depth security through regular backup of critical data and testing restoration
To protect against cyber threats, the Group employs various layers of security protection which includes the human layer,
perimeter, network, endpoint, application and data security layers to protect mission critical assets
The Group follows a business impact assessment process (BIA) to ensure that ICT has visibility of business critical systems which are
supported by ICT
Cybersecurity response plan
The Group’s cybersecurity response plan is defined in three steps which includes internal control, external reliance, and increased audit
frequency.
Cyber breach incident response and process
The Group’s cybersecurity response plan is defined in three steps which includes internal control, external reliance, and increased audit
frequency.
To assist with any cyber breach incidents Sibanye-Stillwater has engaged the services of an external consultant for an on-demand cyber
incident response service providing technical support and expertise when required. This external consultant is experienced in incident
investigation, response, containment and has access to world-leading incident response support. Sibanye-Stillwater has incorporated terms
and conditions around privacy, confidentiality, security, integrity and availability of information into the agreements of third parties. All third
parties are notified of their responsibility to report any security incidents to the Sibanye-Stillwater relationship manager. The relationship
manager will then follow the internal incident and response procedure.
The cyber breach internal response process comprises the following:
Assess and contain
Triage by performing an internal impact assessment and categorisation. Based on the severity and complexity, the external
contracted security company might be contacted
Contacting key individuals including but not limited to the CFO, VP Group ICT and management from the affected business area
head of department (HOD) and notifying the Group’s insurer
Core response process triggered through confirmation of alert level and incident categorisation
Core response
Incident management team oversee, communicate and engage support
Capture and analyse data using the contracted external security consultant
Assess materiality of the of the cyber breach and potential impact with limited stakeholders and disclosure counsel
If the breach is determined to be material an assessment is then escalated to an extended team
The extended team includes VP Group ICT, Manager ICT: Infrastructure, Unit Manager Security, Manager ICT: Information
Management, Senior Manager SOX Ethics and Policies, Compliance Manager, Manager Financial Reporting, Manager Risk and
Insurance, VP Protection Services, VP Investor Relations and other relevant party that can add value to the process to be
determined on a case by case basis
A disclosure assessment is performed using evaluation criteria in line with Sibanye-Stillwater's regulatory requirements. Relevant
disclosures are prepared as required
Review solution and remediation steps considering all potentially impacted areas
Contain/mitigate the threat by remediation through fully removing or closing the incident and confirming successful remediation
or recover if required
Close out and review
Close out and review the incident logged
For each incident being closed out, we consider whether the cybersecurity incident has materially affected or is reasonably likely
to materially affect the business strategy, operations, or financial condition and update the risk assessment and strategic register
as required
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Group's cybersecurity strategy and approach includes:
Mitigation of risks and vulnerabilities through performance of risk assessments to identify and assess potential cyber risks. The cyber
and IT risks is incorporated into the Group’s strategic risk register which forms part of the Group’s risk management process
Ensuring standards and compliance through development and implementation of comprehensive Information Security
Management System policies such as the Information and Communication Technology (ICT) Code of conduct, Information
security, Vulnerability, Backup and ICT disaster recovery policies, in alignment to international standards on ICT security
Responding to cybersecurity incidents through Intrusion detection and prevention by implementation of industry best practice
technologies to protect our network Fostering a cyber awareness culture through conducting security awareness training by
continuously educating and creating awareness amongst users with an equal responsibility with respect to cybersecurity
Defense-in-depth security through regular backup of critical data and testing restoration
To protect against cyber threats, the Group employs various layers of security protection which includes the human layer,
perimeter, network, endpoint, application and data security layers to protect mission critical assets
The Group follows a business impact assessment process (BIA) to ensure that ICT has visibility of business critical systems which are
supported by ICT
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Board and Audit committee oversee the ICT governance in Sibanye-Stillwater. The Board and Audit Committee delegate responsibility
for the implementation of an ICT Governance framework to the Vice President Group ICT who is held accountable for the effectiveness of
the cybersecurity programme and strategy. The Audit committee is informed quarterly about any change in cybersecurity risks or upon
recognition of any material cybersecurity incident which may need to be reported.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board and Audit committee oversee the ICT governance in Sibanye-Stillwater. The Board and Audit Committee delegate responsibility
for the implementation of an ICT Governance framework to the Vice President Group ICT who is held accountable for the effectiveness of
the cybersecurity programme and strategy.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit committee is informed quarterly about any change in cybersecurity risks or upon
recognition of any material cybersecurity incident which may need to be reported.
Cybersecurity Risk Role of Management [Text Block] The Sibanye-Stillwater management team responsible for cybersecurity has extensive experience in all areas required to maintain an
effective and safe ICT landscape. ICT team members responsible continuously engage in seminars, security forums and security briefs to
ensure we remain up to date with industry developments. The VP group ICT reports the Cybersecurity strategy and posture directly to the
Audit Committee. Members of the ICT team have undergone formal training and certification of auditor on ISO27001:2013 with the 2022
version transition.
Management have created a cybersecurity strategy which involves leveraging several technologies, processes, skill sets, and risk mitigation
products to manage the cyber risk holistically. Preventative and detective security measures are in place to reduce the risk of an incident
occurring and causing business disruptions. Disaster recovery processes are in place and tested annually to ensure the continuity of business
systems.
Vulnerability assessments conducted by contracted specialised third parties provide Group ICT management with an independent view of
the capabilities to respond to an incident and whether the appropriate controls are in place to mitigate against offensive threats. Following
the assessment, the issues identified are tracked and remediated. Management then focuses on remediating the issues raised in the report.
The main focus is to ensure continuous improvement and preventing reoccurrence of the same incident in the environment. The results of
the independent assessments over the past financial periods have indicated a strong security posture.
Management reviews cyber risks in several forums as part of the Group ICT Risk Management process. Whilst the risk of a cybersecurity
incident event cannot be fully mitigated, Sibanye-Stillwater has taken further measures to receive technical, legal, and forensic support
should a significant incident occur.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Sibanye-Stillwater management team responsible for cybersecurity has extensive experience in all areas required to maintain an
effective and safe ICT landscape. ICT team members responsible continuously engage in seminars, security forums and security briefs to
ensure we remain up to date with industry developments. The VP group ICT reports the Cybersecurity strategy and posture directly to the
Audit Committee. Members of the ICT team have undergone formal training and certification of auditor on ISO27001:2013 with the 2022
version transition.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Sibanye-Stillwater management team responsible for cybersecurity has extensive experience in all areas required to maintain an
effective and safe ICT landscape. ICT team members responsible continuously engage in seminars, security forums and security briefs to
ensure we remain up to date with industry developments.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The VP group ICT reports the Cybersecurity strategy and posture directly to the Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true