XML 44 R31.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Glen Burnie Bancorp maintains a cyber risk management program that is designed to prevent, detect, and respond to information security threats.  The Board of Directors is responsible for oversight of the Company’s information security program, which is designed and implemented by management under the direction of the Senior Vice President,  Director of Information Technology.  In addition, the Internal Auditor, Information Security Officer, and Compliance Officer consider cybersecurity threat risks alongside other company risks as part of our overall risk assessment and management process.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have developed processes to identify and oversee risks from cybersecurity threats associated with third-party service providers, which include the Director of IT, vendor management team and the business department head assessing cybersecurity robustness during vendor review before onboarding, the inclusion of protective provisions in vendor agreements, and risk-based monitoring of vendors on an ongoing basis.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Board of Directors is responsible for oversight of the Company’s information security program, which is designed and implemented by management under the direction of the Senior Vice President,  Director of Information Technology.

The Board of Directors receives regular reports from the Senior Vice President, Director of IT and the Information Security Officer on Glen Burnie Bancorp’s cyber risks and threats, the status of projects to strengthen Glen Burnie Bancorp’s information security systems, assessments of Glen Burnie Bancorp’s security program, and the emerging threat landscape.  Additionally, the Information Technology Committee drives awareness, ownership, and alignment across all business functions for effective cybersecurity risk management and reporting.  Glen Burnie Bancorp annually engages third parties to audit its information security programs, whose findings are reported to the Audit and Information Technology Committees of the Board.  The Company also engages with key vendors, industry participants, government agencies, and intelligence and law enforcement communities as part of our efforts, which are reported to the Information Technology Committee and Board of Directors.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Information Technology Committee and Board of Directors
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]

The Board of Directors receives regular reports from the Senior Vice President, Director of IT and the Information Security Officer on Glen Burnie Bancorp’s cyber risks and threats, the status of projects to strengthen Glen Burnie Bancorp’s information security systems, assessments of Glen Burnie Bancorp’s security program, and the emerging threat landscape.  Additionally, the Information Technology Committee drives awareness, ownership, and alignment across all business functions for effective cybersecurity risk management and reporting.  Glen Burnie Bancorp annually engages third parties to audit its information security programs, whose findings are reported to the Audit and Information Technology Committees of the Board.  The Company also engages with key vendors, industry participants, government agencies, and intelligence and law enforcement communities as part of our efforts, which are reported to the Information Technology Committee and Board of Directors.

Cybersecurity Risk Role of Management [Text Block]

The Senior Vice President of Information Technology (“IT”) works with the Managed Service Provider (MSP) information security team, which is responsible for maintaining and implementing our enterprise-wide cybersecurity strategy, standards, and architecture processes.  The Director of IT is responsible for the IT-related security policies.   The Director of IT, in coordination with compliance, the information security officer, and human resources, conducts at least annual and ongoing company-wide information security awareness training.  We have developed processes to identify and oversee risks from cybersecurity threats associated with third-party service providers, which include the Director of IT, vendor management team and the business department head assessing cybersecurity robustness during vendor review before onboarding, the inclusion of protective provisions in vendor agreements, and risk-based monitoring of vendors on an ongoing basis.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Senior Vice President, Director of IT and the Information Security Officer
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Director of IT, in coordination with compliance, the information security officer, and human resources, conducts at least annual and ongoing company-wide information security awareness training.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true