stockmarketproxy
/
PTCNasdaq SEC EDGAR

PTC INC.

Services-Prepackaged Software·BOSTON, MA·FY end 09/30·CIK 857005
OverviewFinancialsCompensationGovernanceInsidersFilings

Board of Directors

10 members · 9 independent · FY 2025
DirectorRoleTenureAgeCommitteesIndep.Annual fees
Neil BaruaDirector · CEO2y48
Mark BenjaminDirector4y55CompCybersecurity$327,378
Robert BernshteynDirector1y52Comp$317,233
Janice ChaffinChair12y71CompNCGCybersecurity$317,233
Michal KatzDirector3y58Audit$324,855
Corinna LathanDirector8y58AuditNCGCybersecurity$348,605
James LicoDirector1y60NCG
Trac PhamDirector1y56Audit$632,833
Amar HanspalDirectorNCGCybersecurity$334,855
Paul LacyDirectorAuditCompNCG$361,105

Risk-factor diff

FY 2025 10-K vs. FY 2024
+25 new107 removed

Net-new paragraphs in the most recent 10-K's Item 1A. Companies rarely add risk language without a real reason — additions here are often a leading signal of management concerns.

NEW · FY 2025

We take a holistic, multi-layered approach to cybersecurity and privacy that combines traditional Defense-in-Depth methods with next-generation Zero Trust principles. In

NEW · FY 2025

developing our cybersecurity risk management program, we are informed by industry benchmarks and standards, including the cybersecurity framework created by the National Institute of Standards and Technology (“NIST”) and the Software Assurance Maturity Model developed by the OWASP (the “OWASP SAMM”). We also have various security-related certifications and authorizations, including ISO 27001, SOC 2 Type II and FedRAMP, for certain of our products and services.

NEW · FY 2025

Recognizing that technology alone cannot mitigate all security threats, we focus on developing our most critical resource: our people. Our corporate cybersecurity awareness activities are combined with enterprise-wide and department-specific tools and mandatory employee training, providing our employees with knowledge and resources to support our efforts to mitigate security threats.

NEW · FY 2025

We maintain processes and policies to try to anticipate security risks and facilitate compliance with applicable contractual obligations, regulations, and standards, as well as address any incidents or violations. We focus on continuous improvement and constantly mature our processes to keep pace with the rapidly evolving cybersecurity threat landscape.

NEW · FY 2025

We seek to automate processes and remove the potential for human error to the extent feasible by implementing technology solutions. From fundamental IT security to development of our software products and keeping our customers’ data safe, we aim to maintain a secure infrastructure that is appropriately monitored for possible threats.

+ 20 more new paragraphs not shown

Policies & disclosures

Clawback, anti-hedging, stock ownership, and related-party policies will populate from extracted proxy sections.