Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 201 -
220 of 42455 results
ZIFF DAVIS, INC.
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form 10...
J2 GLOBAL COMMUNICATIONS INC
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form 10...
ZEBRA TECHNOLOGIES CORP
CIK: 877212
...Cybersecurity Risk Management The underlying controls of our cybersecurity risk management program are based on recognized industry practices and standards for cybersecurity and information technology, including the National Institute of Standards and Technology Cybersecurity Framework. Our approach to cybersecurity risk management includes the following key elements: • Defense and On-going...
MAGNA LAB INC
CIK: 895464
...45 Table of Contents The cybersecurity function within Yubo Beijing helps identify, assess and manage its cybersecurity threats and risks. The cybersecurity function identifies and assesses risks from cybersecurity threats by monitoring and evaluating the threat environment using various methods including, for example manual tools, internal or external audits, automated...
YUBO INTERNATIONAL BIOTECH LTD
CIK: 895464
...45 Table of Contents The cybersecurity function within Yubo Beijing helps identify, assess and manage its cybersecurity threats and risks. The cybersecurity function identifies and assesses risks from cybersecurity threats by monitoring and evaluating the threat environment using various methods including, for example manual tools, internal or external audits, automated...
ENTREPRENEUR UNIVERSE BRIGHT GROUP
CIK: 1171326
...Cybersecurity Measures On December 28, 2021, the CAC and several other administrations jointly published the Measures for Cybersecurity Review (2021), which became effective on February 15, 2022 and replace the current Measures for Cybersecurity Review promulgated on April 13, 2020. The Measures for Cybersecurity Review (2021) specifies that the procurement...
PUBLIC SERVICE ENTERPRISE GROUP INC
CIK: 788784
...The Cybersecurity Council meets at least six times annually to receive reports on the state of PSEG’s cybersecurity program, provide guidance on the strategic direction of the program, discuss emerging cybersecurity issues, and review the cybersecurity scorecard to measure performance of key risk indicators. The Cybersecurity Council receives presentations...
CISO GLOBAL, INC.
CIK: 1777319
...We provide a full range of cybersecurity consulting, related services, and cybersecurity software, encompassing all four pillars of proprietary software stack, compliance, cybersecurity, and organizational culture. Our comprehensive cybersecurity services include managed security, compliance services, security operations center (“SOC”) services, virtual Chief Information Security Officer (“vCISO”) services, incident response, certified...
CERBERUS CYBER SENTINEL CORP
CIK: 1777319
...We provide a full range of cybersecurity consulting, related services, and cybersecurity software, encompassing all four pillars of proprietary software stack, compliance, cybersecurity, and organizational culture. Our comprehensive cybersecurity services include managed security, compliance services, security operations center (“SOC”) services, virtual Chief Information Security Officer (“vCISO”) services, incident response, certified...
MAYS J W INC
CIK: 54187
...Notwithstanding the effort we place on cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on the Company. As of the date of this Annual Report on Form 10-K, we are not aware of any cybersecurity threats or...
MASTECH DIGITAL, INC.
CIK: 1437226
...Managing Material Risks & Integrated Overall Risk Management The Company has strategically integrated cybersecurity risk management into its broader risk management framework to promote a company-wide culture of cybersecurity risk management. This integration ensures that cybersecurity considerations are an integral part of our decision-making processes at every level. In...
MASTECH HOLDINGS, INC.
CIK: 1437226
...Managing Material Risks & Integrated Overall Risk Management The Company has strategically integrated cybersecurity risk management into its broader risk management framework to promote a company-wide culture of cybersecurity risk management. This integration ensures that cybersecurity considerations are an integral part of our decision-making processes at every level. In...
IRONSTONE GROUP INC
CIK: 723269
...We compensate for this by: ● Utilizing our external IT support provider for technical guidance ● Accessing free cybersecurity resources available to small businesses through organizations such as the Small Business Administration (SBA) and the Federal Trade Commission (FTC) ● Subscribing to cybersecurity alert services relevant to small businesses ● Considering basic cybersecurity training...
IRONSTONE PROPERTIES, INC.
CIK: 723269
...We compensate for this by: ● Utilizing our external IT support provider for technical guidance ● Accessing free cybersecurity resources available to small businesses through organizations such as the Small Business Administration (SBA) and the Federal Trade Commission (FTC) ● Subscribing to cybersecurity alert services relevant to small businesses ● Considering basic cybersecurity training...
SOUTHWEST AIRLINES CO
CIK: 92380
...The National Institute of Standards and Technology Cybersecurity Framework helps the Company inform its cybersecurity agenda and prioritize its cybersecurity activities. The Company takes a risk-based approach to cybersecurity, which begins with the identification and evaluation of cybersecurity risks or threats that could affect the Company’s operations, finances...
CONAGRA BRANDS INC.
CIK: 23217
...Members of our cybersecurity team provide cybersecurity reports to our Board, SLT, and cross-functional leaders and teams. The internal cybersecurity team is responsible for implementing our cybersecurity strategy including policies, standards, architecture, and processes including our processes for identifying cybersecurity risks and threats and recommending mitigating actions to strengthen...
CONAGRA FOODS INC /DE/
CIK: 23217
...Members of our cybersecurity team provide cybersecurity reports to our Board, SLT, and cross-functional leaders and teams. The internal cybersecurity team is responsible for implementing our cybersecurity strategy including policies, standards, architecture, and processes including our processes for identifying cybersecurity risks and threats and recommending mitigating actions to strengthen...
ENTREPRENEUR UNIVERSE BRIGHT GROUP
CIK: 1171326
...14 Recent Regulatory Developments Draft Cybersecurity Measures On December 28, 2021, the Cyberspace Administration of China published the Measures for Cybersecurity Review (2021), which became effective on February 15, 2022 and replace the current Measures for Cybersecurity Review promulgated on April 13, 2020. The Measures for Cybersecurity Review (2021) specifies...
VERTIV HOLDINGS CO
CIK: 1674101
...Risk Management and Strategy Processes for Assessing, Identifying, and Managing Cybersecurity Threats: The Company maintains a fully-defined set of documentation for assessing, identifying, and managing material risks from cybersecurity threats. We recognize the risk that cybersecurity threats pose to our operations, and cybersecurity is an integral component of our...
GS ACQUISITION HOLDINGS CORP
CIK: 1674101
...Risk Management and Strategy Processes for Assessing, Identifying, and Managing Cybersecurity Threats: The Company maintains a fully-defined set of documentation for assessing, identifying, and managing material risks from cybersecurity threats. We recognize the risk that cybersecurity threats pose to our operations, and cybersecurity is an integral component of our...