Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 281 -
300 of 42455 results
CHIPOTLE MEXICAN GRILL INC
CIK: 1058090
...CYBERSECURITY Cybersecurity Risk Management and Strategy As a global company, we are regularly subject to cyberattacks and other cybersecurity incidents. In response, we have implemented cybersecurity processes, technologies, and controls to aid in our efforts to assess, identify, and manage cybersecurity risks. Our enterprise risk management framework considers cybersecurity risk...
AMERICAN WOODMARK CORP
CIK: 794619
...Complementing our Information Security Policy Framework, we conduct regular cybersecurity training campaigns that emphasize the importance of cybersecurity awareness. These campaigns address relevant cybersecurity topics, such as common cybersecurity threats, phishing awareness, and best practices for safeguarding sensitive information. Employees are held accountable for completing all assigned cybersecurity programs and...
NORFOLK SOUTHERN CORP
CIK: 702165
...Cybersecurity CYBERSECURITY RISK MANAGEMENT AND STRATEGY Process We use a multi-layered defensive cybersecurity strategy based on the cyber security framework drafted by the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The NIST Cybersecurity Framework (NIST CSF) is a voluntary framework of best practices...
YETI HOLDINGS, INC.
CIK: 1670592
...Cybersecurity Risk Management and Strategy We operate a risk-based cybersecurity program dedicated to protecting the confidentiality, integrity and availability of our information systems and the information residing therein. YETI’s cybersecurity program has been integrated into our enterprise risk framework, which identifies, aggregates, and evaluates risks across the enterprise...
FORESTAR GROUP INC.
CIK: 1406587
...We invest a considerable amount of resources in training, tools and other resources to manage risks from cybersecurity threats. Our cybersecurity program is led by an experienced team that creates cybersecurity policies and procedures and possess expert knowledge related to controls and safeguards related to cybersecurity. The cybersecurity team, led...
ZEUUS, INC.
CIK: 1687926
...Through our cybersecurity awareness, the current threat landscape is actively monitored in an effort to identify material risks arising from new and evolving cybersecurity threats. We may engage external experts, including cybersecurity assessors, consultants and auditors to evaluate cybersecurity measures and risk management processes as needed. We also depend on...
KRIPTECH INTERNATIONAL CORP.
CIK: 1687926
...Through our cybersecurity awareness, the current threat landscape is actively monitored in an effort to identify material risks arising from new and evolving cybersecurity threats. We may engage external experts, including cybersecurity assessors, consultants and auditors to evaluate cybersecurity measures and risk management processes as needed. We also depend on...
ANSYS INC
CIK: 1013462
...Our cybersecurity program, and its associated CSMS, is led by an experienced team of cybersecurity professionals headed by the Vice President of Cybersecurity. In the event of a cybersecurity incident, we have a dedicated Cybersecurity Incident Response Team that is responsible for identifying, escalating, responding to and managing cybersecurity incidents...
ISHARES S&P GSCI COMMODITY-INDEXED TRUST
CIK: 1332174
...The CISO works closely with the leadership team and other subject matter experts in the global cybersecurity group, who collectively have extensive prior work experience in various roles involving managing information security, developing cybersecurity strategy, implementing effective information and cybersecurity programs and overseeing cybersecurity controls in technology risk and audit...
GRAINGER W W INC
CIK: 277135
...Cybersecurity Risk Management and Strategy Grainger has a dedicated cybersecurity team that works to prevent, detect, and respond to cybersecurity threats. The cybersecurity team is led by the Vice President and Chief Information Security Officer (CISO) , who is responsible for assessing and managing material risks from cybersecurity threats. Grainger’s...
W.W. GRAINGER, INC.
CIK: 277135
...Cybersecurity Risk Management and Strategy Grainger has a dedicated cybersecurity team that works to prevent, detect, and respond to cybersecurity threats. The cybersecurity team is led by the Vice President and Chief Information Security Officer (CISO) , who is responsible for assessing and managing material risks from cybersecurity threats. Grainger’s...
TELETECH HOLDINGS INC
CIK: 1013880
...The Company has previously experienced significant cybersecurity incidents. Although cybersecurity threats, including any previous cybersecurity incidents, have not materially affected and we believe are not reasonably likely to materially affect the Company, there can be no assurances that future cybersecurity incidents, which are unavoidable, will not materially affect our results...
TTEC HOLDINGS, INC.
CIK: 1013880
...The Company has previously experienced significant cybersecurity incidents. Although cybersecurity threats, including any previous cybersecurity incidents, have not materially affected and we believe are not reasonably likely to materially affect the Company, there can be no assurances that future cybersecurity incidents, which are unavoidable, will not materially affect our results...
FORESTAR GROUP INC.
CIK: 1406587
...We invest a considerable amount of resources in training, tools and other resources to manage risks from cybersecurity threats. Our cybersecurity program is led by an experienced team that creates cybersecurity policies and procedures and possess expert knowledge related to controls and safeguards related to cybersecurity. The cybersecurity team, led...
DALLASNEWS CORP
CIK: 1413898
...Management implements and maintains compliance with relevant cybersecurity regulations and standards applicable to the Company. Budgeting and Resource Allocation: Management reviews budgets for cybersecurity initiatives and ensures that adequate resources are allocated to address cybersecurity risks and that investments in cybersecurity align with the Company’s risk tolerance and...
A. H. BELO CORP
CIK: 1413898
...Management implements and maintains compliance with relevant cybersecurity regulations and standards applicable to the Company. Budgeting and Resource Allocation: Management reviews budgets for cybersecurity initiatives and ensures that adequate resources are allocated to address cybersecurity risks and that investments in cybersecurity align with the Company’s risk tolerance and...
UNISYS CORP
CIK: 746838
...We also perform internal audits on our cybersecurity and data privacy practices. We regularly engage third-party cybersecurity experts to supplement our cybersecurity risk management efforts, including those we engage to conduct periodic cybersecurity risk assessments. During 2024, Unisys engaged an external security firm to 25 conduct several cybersecurity tabletop...
OPPENHEIMER HOLDINGS INC
CIK: 791963
...The National Institute of Standards and Technology Cybersecurity Framework helps the Company inform its cybersecurity agenda and prioritize its cybersecurity activities. The Company takes a risk-based approach to cybersecurity, which begins with the identification and evaluation of cybersecurity risks or threats that could affect the Company’s operations, finances...
MRC GLOBAL INC.
CIK: 1439095
...She also has earned a CERT certificate in cybersecurity from Carnegie Mellon. Our Board and ESG & Enterprise Risk Committee each receive regular quarterly presentations and reports throughout the year from members of the Cybersecurity Committee on our cybersecurity threats, audits and exercises to determine the sufficiency of defenses against cybersecurity...
MCJUNKIN RED MAN HOLDING CORP
CIK: 1439095
...She also has earned a CERT certificate in cybersecurity from Carnegie Mellon. Our Board and ESG & Enterprise Risk Committee each receive regular quarterly presentations and reports throughout the year from members of the Cybersecurity Committee on our cybersecurity threats, audits and exercises to determine the sufficiency of defenses against cybersecurity...