◆ Market Data --:--
Commodities
Loading...
📈 Yields & Rates
Loading...
💱 FX Rates
Loading...
📈 Market Pulse
Loading...
🏛 Congress Trades
Loading...
👤 Insider Trades
Loading...

Search SEC Filings

Search across the full text content of downloaded SEC filings

42455
Results Found
Showing 321 - 340 of 42455 results
ARMOUR RESIDENTIAL REIT, INC. CIK: 1428205
10-K 2025-02-12
...There is no assurance that these efforts will effectively mitigate cybersecurity risk and mitigation efforts are not an assurance that no cybersecurity incidents will occur. In addition, our Audit Committee periodically monitors and oversees our information and cybersecurity risks including reviewing and approving any information and cybersecurity policies, procedures and...
RAPID7, INC. CIK: 1560327
10-K 2024-02-26
...This framework includes steps for assessing the severity of a cybersecurity threat or incident, identifying the source of such cybersecurity threat or incident (including whether such cybersecurity threat or incident is associated with a third-party service provider, supplier, or vendor), implementing cybersecurity countermeasures and mitigations and an escalation path...
CITI TRENDS INC CIK: 1318484
10-K 2024-04-18
...CYBERSECURITY Risk Management and Strategy Cybersecurity is an important component of our overall approach to risk management. We have implemented cybersecurity processes, technologies and controls to facilitate our efforts to identify, assess and manage material risks from cybersecurity threats. We leverage industry associations, third-party benchmarking, results from internal and...
QXO, INC. CIK: 1236275
10-K 2025-03-04
...We collaborate with third parties to assess the effectiveness of our cybersecurity incident prevention and response systems and processes as our SOT deems necessary or appropriate. These include cybersecurity assessors, consultants, and other external cybersecurity experts to assist in the identification, verification, and validation of cybersecurity threats and risks, as...
SILVERSUN TECHNOLOGIES, INC. CIK: 1236275
10-K 2025-03-04
...We collaborate with third parties to assess the effectiveness of our cybersecurity incident prevention and response systems and processes as our SOT deems necessary or appropriate. These include cybersecurity assessors, consultants, and other external cybersecurity experts to assist in the identification, verification, and validation of cybersecurity threats and risks, as...
SL INVESTMENT FUND II LLC CIK: 2028686
10-K 2025-03-07
...Morgan Stanley continually adjusts its Cybersecurity Program to address the evolving cybersecurity threat landscape and comply with extensive legal and regulatory expectations. The Adviser and the Administrator manage the Company’s day-to-day operations, and the Company uses the Cybersecurity Program to assess, identify and manage material cybersecurity risks...
CERES TACTICAL SYSTEMATIC L.P. CIK: 1209709
10-K 2024-03-22
...Morgan Stanley continually adjusts the Cybersecurity Program to address the evolving cybersecurity threat landscape and comply with extensive legal and regulatory expectations. Processes for assessing, identifying and managing material risks from cybersecurity threats The Cybersecurity Program takes into account industry best practices and addresses risks from cybersecurity threats to Morgan...
TACTICAL DIVERSIFIED FUTURES FUND L.P. CIK: 1209709
10-K 2024-03-22
...Morgan Stanley continually adjusts the Cybersecurity Program to address the evolving cybersecurity threat landscape and comply with extensive legal and regulatory expectations. Processes for assessing, identifying and managing material risks from cybersecurity threats The Cybersecurity Program takes into account industry best practices and addresses risks from cybersecurity threats to Morgan...
RAPID7, INC. CIK: 1560327
10-K 2025-02-28
...At Rapid7, cybersecurity risk management is integrated into our overall enterprise risk management program and one pillar of our broader cybersecurity program. Our cybersecurity risk management program is designed based on prevailing security standards and controls, such as NIST-800 and ISO 27001, and to continuously evaluate cybersecurity risks in...
BRIDGFORD FOODS CORP CIK: 14177
10-K 2025-01-29
...Cybersecurity We maintain an information security and cybersecurity program, as well as a cybersecurity governance framework, which are designed to protect our information systems against operational risks related to cybersecurity. Cybersecurity Risk Management and Strategy We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats...
VIRCO MFG CORPORATION CIK: 751365
10-K 2024-04-12
...Cybersecurity Governance Our Board of Directors oversees the execution of our cybersecurity strategy and the assessment of cybersecurity risks, along with the actions that we take seeking to mitigate and address those cybersecurity risks. The Board has delegated primary oversight of cybersecurity risks to the Executive Team and Lead Independent...
ESCALADE INC CIK: 33488
10-K 2025-03-10
...18 ITEM 1C - CYBERSECURITY Cybersecurity Risk Management and Strategy As a company committed to safeguarding our operations, assets and stakeholders against cyber threats, we recognize the critical importance of the need for cybersecurity risk management and strategy. In today’s digital landscape, where cyber threats continue to evolve and proliferate...
NORFOLK SOUTHERN CORP CIK: 702165
10-K 2025-02-10
...Cybersecurity CYBERSECURITY RISK MANAGEMENT AND STRATEGY Process We use a multi-layered defensive cybersecurity strategy based on the cyber security framework drafted by the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The NIST Cybersecurity Framework (NIST CSF) is a voluntary framework of best practices...
CERES TACTICAL SYSTEMATIC L.P. CIK: 1209709
10-K 2025-03-20
...Morgan Stanley continually adjusts the Cybersecurity Program to address the evolving cybersecurity threat landscape and comply with extensive legal and regulatory expectations. Processes for assessing, identifying and managing material risks from cybersecurity threats The Cybersecurity Program takes into account industry best practices and addresses risks from cybersecurity threats to Morgan...
TACTICAL DIVERSIFIED FUTURES FUND L.P. CIK: 1209709
10-K 2025-03-20
...Morgan Stanley continually adjusts the Cybersecurity Program to address the evolving cybersecurity threat landscape and comply with extensive legal and regulatory expectations. Processes for assessing, identifying and managing material risks from cybersecurity threats The Cybersecurity Program takes into account industry best practices and addresses risks from cybersecurity threats to Morgan...
WORLD HEALTH ENERGY HOLDINGS, INC. CIK: 943535
10-K 2025-04-15
...Our cybersecurity system might be used for fraudulent, illegal or improper purposes, which could expose us to additional liability and harm our business. Reputation in the cybersecurity field is an important corporate asset. An operating incident, significant cybersecurity disruption, or other adverse event may have a negative impact on our...
SENECA FOODS CORP CIK: 88948
10-K 2025-06-12
...The Company designs and assesses the cybersecurity risk management program based on the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF”). The Company uses the NIST CSF as a guide to help identify, assess, and manage cybersecurity risks relevant to its business; this does not imply that the...
HAWKEYE SYSTEMS, INC. CIK: 1750777
10-K 2025-10-15
...We approach cybersecurity risks with a risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business. Risk Management and Strategy Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and...
VERISIGN INC/CA CIK: 1014473
10-K 2025-02-13
...CYBERSECURITY Our cybersecurity program is designed and implemented to assess, identify, mitigate and manage risks from cybersecurity threats that may result in adverse effects on the integrity and availability of our production and information systems. Among other items, our cybersecurity program is comprised of policies, standards, plans and frameworks for...
VIRNETX HOLDING CORP CIK: 1082324
10-K 2024-03-15
...Notwithstanding the extensive approach we take to cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on us . While we have technology and processes in place to detect and respond to cybersecurity threats, we are continually at risk from...
NEWS
Loading news...
TRENDING
Loading...