Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 261 -
280 of 42455 results
PDF SOLUTIONS INC
CIK: 1120914
...Cybersecurity Cybersecurity Risk Management and Strategy We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things, operational risks, intellectual property theft, fraud, extortion, harm to employees...
APPLIED MATERIALS INC /DE
CIK: 6951
...Cybersecurity Risk Management and Strategy We have implemented processes for assessing, identifying and managing material risks from cybersecurity threats as part of our cybersecurity risk management program. This program includes processes for continuous cybersecurity risk and advanced persistent cybersecurity threat monitoring; cybersecurity attack, vulnerability and cloud security management; and penetration...
ALBANY INTERNATIONAL CORP /DE/
CIK: 819793
...This multi-layered approach enables early detection and facilitates prompt response to potential cybersecurity threats. We regularly review and update our cybersecurity strategies, policies and procedures, taking into consideration the latest advancements in cybersecurity practices and changes to the threat landscape. We have a cybersecurity incident response and crisis management...
METROPOLITAN BANK HOLDING CORP.
CIK: 1476034
...While the Company maintains cybersecurity insurance, the costs related to cybersecurity threats or disruptions may not be fully insured. For information on our cybersecurity risk management, strategy and governance, see Part I, Item 1C., “Cybersecurity.” 30 Table of Contents The Company faces risks related to its operational, technological and organizational...
ENTREPRENEUR UNIVERSE BRIGHT GROUP
CIK: 1171326
...Cybersecurity Measures On December 28, 2021, the CAC and several other administrations jointly published the Measures for Cybersecurity Review (2021), which became effective on February 15, 2022 and replace the current Measures for Cybersecurity Review promulgated on April 13, 2020. The Measures for Cybersecurity Review (2021) specifies that the procurement...
NVE CORP /NEW/
CIK: 724910
...Board of Directors Oversight of Cybersecurity Our Board of Directors Audit Committee has ultimate oversight of cybersecurity risks. The Committee is composed of independent directors with cybersecurity expertise. Management briefs the Committee on cybersecurity and information security at least annually. Cybersecurity Risk Management We operate under written cybersecurity policies and...
SAIA INC
CIK: 1177702
...Cybersecurity Cybersecurity risk management and strategy Saia maintains cybersecurity processes, technologies and controls to help us assess, identify and manage material risks from cybersecurity threats. These processes, technologies and controls are part of Saia’s overall enterprise risk management process. Our cybersecurity program is based on the National Institute of...
TILE SHOP HOLDINGS, INC.
CIK: 1552800
...Accordingly, cybersecurity is an important part of the Company’s enterprise risk management program, and the Company seeks to address cybersecurity risks through a comprehensive, cross-functional approach. The Company’s cybersecurity policies, standards, processes, and practices for assessing, identifying, and managing material risks from cybersecurity threats and responding to...
LEGGETT & PLATT INC
CIK: 58492
...Although we are not aware of any material cybersecurity incidents, because of past immaterial cybersecurity threats and what we have learned in responding to those threats, we have accelerated several cybersecurity protection efforts. In 2024, we expect to spend roughly $9 million in maintaining and enhancing our cybersecurity protection efforts...
LANDBAY INC
CIK: 1672572
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
EASTERN CO
CIK: 31107
...To facilitate the success of the Company’s cybersecurity risk management program, multidisciplinary teams throughout the Company are deployed to address cybersecurity threats and to respond to cybersecurity incidents. Through ongoing communications with these teams, the Director of Information Technology & Cybersecurity and the Cybersecurity Council monitor the prevention, detection, mitigation...
ARMOUR RESIDENTIAL REIT, INC.
CIK: 1428205
...There is no assurance that these efforts will effectively mitigate cybersecurity risk and mitigation efforts are not an assurance that no cybersecurity incidents will occur. In addition, our Audit Committee periodically monitors and oversees our information and cybersecurity risks including reviewing and approving any information and cybersecurity policies, procedures and...
ROBERT HALF INC.
CIK: 315213
...Cybersecurity As part of the Company’s broader information security program, the cybersecurity program includes a defense-in-depth model that utilizes a variety of techniques and tools for protecting against, detecting, responding to and recovering from cybersecurity incidents (“Incidents”). The Company’s cybersecurity program is designed to prioritize detection...
ROBERT HALF INTERNATIONAL INC.
CIK: 315213
...Cybersecurity As part of the Company’s broader information security program, the cybersecurity program includes a defense-in-depth model that utilizes a variety of techniques and tools for protecting against, detecting, responding to and recovering from cybersecurity incidents (“Incidents”). The Company’s cybersecurity program is designed to prioritize detection...
HALF ROBERT INTERNATIONAL INC /DE/
CIK: 315213
...Cybersecurity As part of the Company’s broader information security program, the cybersecurity program includes a defense-in-depth model that utilizes a variety of techniques and tools for protecting against, detecting, responding to and recovering from cybersecurity incidents (“Incidents”). The Company’s cybersecurity program is designed to prioritize detection...
CYCURION, INC.
CIK: 1868419
...The CISO and ISO have primary responsibility for our overall cybersecurity risk management program, including monitoring the prevention, detection, mitigation, and remediation of cybersecurity incidents, and works in partnership with our other business leaders. Our CISO and ISO supervise both our internal cybersecurity personnel and any retained external cybersecurity consultants...
WESTERN ACQUISITION VENTURES CORP.
CIK: 1868419
...The CISO and ISO have primary responsibility for our overall cybersecurity risk management program, including monitoring the prevention, detection, mitigation, and remediation of cybersecurity incidents, and works in partnership with our other business leaders. Our CISO and ISO supervise both our internal cybersecurity personnel and any retained external cybersecurity consultants...
ISHARES S&P GSCI COMMODITY-INDEXED TRUST
CIK: 1332174
...The CISO works closely with the leadership team and other subject matter experts in the global cybersecurity group, who collectively have extensive prior work experience in various roles involving managing information security, developing cybersecurity strategy, implementing effective information and cybersecurity programs and overseeing cybersecurity controls in technology risk and audit...
CONAGRA BRANDS INC.
CIK: 23217
...Members of our cybersecurity team provide cybersecurity reports to our Board, SLT, and cross-functional leaders and teams. The internal cybersecurity team is responsible for implementing our cybersecurity strategy including policies, standards, architecture, and processes including our processes for identifying cybersecurity risks and threats and recommending mitigating actions to strengthen...
CONAGRA FOODS INC /DE/
CIK: 23217
...Members of our cybersecurity team provide cybersecurity reports to our Board, SLT, and cross-functional leaders and teams. The internal cybersecurity team is responsible for implementing our cybersecurity strategy including policies, standards, architecture, and processes including our processes for identifying cybersecurity risks and threats and recommending mitigating actions to strengthen...