Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 241 -
260 of 42455 results
UNISYS CORP
CIK: 746838
...We engage third-party service providers to assist us with our cybersecurity risk management system Third-party cybersecurity experts regularly supplement our cybersecurity risk management efforts, including those we engage to conduct periodic cybersecurity risk assessments. During 2023, Unisys engaged cybersecurity risk experts and external legal counsel to conduct a...
ALBANY INTERNATIONAL CORP /DE/
CIK: 819793
...This multi-layered approach enables early detection and facilitates prompt response to potential cybersecurity threats. We regularly review and update our cybersecurity strategies, policies and procedures, taking into consideration the latest advancements in cybersecurity practices and changes to the threat landscape. We have a cybersecurity incident response and crisis management...
DEPHASIUM CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
LONGWEN GROUP CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
PAY MOBILE, INC
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
WENYUAN GROUP CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
ALLIED VENTURES HOLDINGS CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
VISIUM TECHNOLOGIES, INC.
CIK: 1082733
...In such an event, the insurance coverage we maintain may be inadequate to cover claims, costs, and liabilities relating to cybersecurity incidents. While we have not been subject to cyberattacks and other cyber incidents, we take cybersecurity preparedness seriously. Our risk management framework considers cybersecurity risk alongside other company risks...
NUSTATE ENERGY HOLDINGS, INC.
CIK: 1082733
...In such an event, the insurance coverage we maintain may be inadequate to cover claims, costs, and liabilities relating to cybersecurity incidents. While we have not been subject to cyberattacks and other cyber incidents, we take cybersecurity preparedness seriously. Our risk management framework considers cybersecurity risk alongside other company risks...
VERTICAL DATA INC.
CIK: 2033264
...does not currently engage with third parties in connection with cybersecurity risk management. Third-party consultants including cybersecurity auditors are being considered for future engagement, at which point any risks stemming from the use of third parties will be incorporated in the cybersecurity risk assessment. Risks from Cybersecurity Threats Vertical...
ALPHA PRO TECH LTD
CIK: 884269
...In the last fifteen fiscal years, we have not experienced any material cybersecurity incidents and the expenses we have incurred from cybersecurity incidents were immaterial. This includes penalties and settlements, of which there were none. Cybersecurity Governance Cybersecurity is an important part of our enterprise risk management program and an...
FAIR ISAAC CORP
CIK: 814547
...Cybersecurity breaches experienced by our vendors, by our distributors, by our customers, by companies that we acquire, or by us may trigger governmental notice requirements and public disclosures, which may lead to widespread negative publicity, statutory damages, and lawsuits filed by individuals impacted by cybersecurity breaches under privacy and cybersecurity...
SWIFT TRANSPORTATION CO
CIK: 1492691
...Management's Role The Company has a dedicated cybersecurity organization within its technology department that focuses on current and emerging cybersecurity matters. The Company’s cybersecurity function is led by Cybersecurity Leadership who are actively involved in assessing and managing cybersecurity risks. They are responsible for implementing cybersecurity policies, programs...
KNIGHT-SWIFT TRANSPORTATION HOLDINGS INC.
CIK: 1492691
...Management's Role The Company has a dedicated cybersecurity organization within its technology department that focuses on current and emerging cybersecurity matters. The Company’s cybersecurity function is led by Cybersecurity Leadership who are actively involved in assessing and managing cybersecurity risks. They are responsible for implementing cybersecurity policies, programs...
EASTERN CO
CIK: 31107
...To facilitate the success of the Company’s cybersecurity risk management program, multidisciplinary teams throughout the Company are deployed to address cybersecurity threats and to respond to cybersecurity incidents. Through ongoing communications with these teams, the Director of Information Technology & Cybersecurity and the Cybersecurity Council monitor the prevention, detection, mitigation...
HUNTINGTON INGALLS INDUSTRIES, INC.
CIK: 1501585
...CYBERSECURITY Our cybersecurity program (the “ Cybersecurity Program ”) includes processes to identify, assess, and manage material risks from cybersecurity threats. The Cybersecurity Program processes utilize a risk-based approach and 25 Table of Contents include written cybersecurity and information technology policies and procedures, including a cybersecurity incident response plan. The Cybersecurity...
VERTIV HOLDINGS CO
CIK: 1674101
...Risk Management and Strategy Processes for Assessing, Identifying, and Managing Cybersecurity Threats: The Company maintains a fully defined set of documentation for assessing, identifying, and managing material risks from cybersecurity threats. We recognize the risk that cybersecurity threats pose to our operations, and cybersecurity is an integral component of our...
GS ACQUISITION HOLDINGS CORP
CIK: 1674101
...Risk Management and Strategy Processes for Assessing, Identifying, and Managing Cybersecurity Threats: The Company maintains a fully defined set of documentation for assessing, identifying, and managing material risks from cybersecurity threats. We recognize the risk that cybersecurity threats pose to our operations, and cybersecurity is an integral component of our...
SWIFT TRANSPORTATION CO
CIK: 1492691
...Management's Role The Company has a dedicated cybersecurity organization within its technology department that focuses on current and emerging cybersecurity matters. The Company’s cybersecurity function is led by Cybersecurity Leadership who are actively involved in assessing and managing cybersecurity risks. They are responsible for implementing cybersecurity policies, programs...
KNIGHT-SWIFT TRANSPORTATION HOLDINGS INC.
CIK: 1492691
...Management's Role The Company has a dedicated cybersecurity organization within its technology department that focuses on current and emerging cybersecurity matters. The Company’s cybersecurity function is led by Cybersecurity Leadership who are actively involved in assessing and managing cybersecurity risks. They are responsible for implementing cybersecurity policies, programs...