Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 341 -
360 of 42455 results
FAIR ISAAC CORP
CIK: 814547
...Cybersecurity breaches experienced by our vendors, by our distributors, by our customers, by companies that we acquire, or by us may trigger governmental notice requirements and public disclosures, which may lead to widespread negative publicity, statutory damages, and lawsuits filed by individuals impacted by cybersecurity breaches under privacy and cybersecurity...
AMERISOURCEBERGEN CORP
CIK: 1140859
...We heavily depend on our supply chain to provide our products and services to customers, and a cybersecurity incident involving a supplier or subcontractor could significantly affect us. To evaluate third-party cybersecurity controls, we utilize third-party cybersecurity monitoring and alerting tools, cybersecurity due diligence questionnaires, and request and...
CENCORA, INC.
CIK: 1140859
...We heavily depend on our supply chain to provide our products and services to customers, and a cybersecurity incident involving a supplier or subcontractor could significantly affect us. To evaluate third-party cybersecurity controls, we utilize third-party cybersecurity monitoring and alerting tools, cybersecurity due diligence questionnaires, and request and...
M-TRON INDUSTRIES, INC.
CIK: 1902314
...However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced an undetected cybersecurity incident. For more information about these risks, please see “Risk Factors - Cybersecurity risks and cybersecurity incidents may adversely affect our business by causing a disruption to our...
AUREUS INC
CIK: 1624517
...CYBERSECURITY We recognize that cybersecurity threats represent a significant risk to our business operations, reputation, and financial performance. To manage these risks, we maintain a comprehensive cybersecurity risk management program designed to identify, assess, mitigate, and respond to potential cybersecurity incidents. Our cybersecurity program is integrated into our overall risk...
AUREUS, INC.
CIK: 1624517
...CYBERSECURITY We recognize that cybersecurity threats represent a significant risk to our business operations, reputation, and financial performance. To manage these risks, we maintain a comprehensive cybersecurity risk management program designed to identify, assess, mitigate, and respond to potential cybersecurity incidents. Our cybersecurity program is integrated into our overall risk...
FREQUENCY HOLDINGS, INC
CIK: 1624517
...CYBERSECURITY We recognize that cybersecurity threats represent a significant risk to our business operations, reputation, and financial performance. To manage these risks, we maintain a comprehensive cybersecurity risk management program designed to identify, assess, mitigate, and respond to potential cybersecurity incidents. Our cybersecurity program is integrated into our overall risk...
YUENGLINGS ICE CREAM CORP
CIK: 1624517
...CYBERSECURITY We recognize that cybersecurity threats represent a significant risk to our business operations, reputation, and financial performance. To manage these risks, we maintain a comprehensive cybersecurity risk management program designed to identify, assess, mitigate, and respond to potential cybersecurity incidents. Our cybersecurity program is integrated into our overall risk...
PDF SOLUTIONS INC
CIK: 1120914
...For more than 5 years, we have not experienced any material cybersecurity incidents and the expenses we have incurred from cybersecurity incidents were immaterial. This includes penalties and settlements, of which there were none. Cybersecurity Governance Information technology and data security, particularly cybersecurity, is a top area of focus for...
DESERT CANADIANS LTD.
CIK: 1495932
...Staff across all segments are required to complete company facilitated cybersecurity training at least annually. Engage Third Parties on Risk Management Understanding the complexity and evolving nature of cybersecurity threats, each reporting segment may engage with a range of external experts, including cybersecurity assessors and consultants, to assess, identify, and...
EXP REALTY INTERNATIONAL CORP
CIK: 1495932
...Staff across all segments are required to complete company facilitated cybersecurity training at least annually. Engage Third Parties on Risk Management Understanding the complexity and evolving nature of cybersecurity threats, each reporting segment may engage with a range of external experts, including cybersecurity assessors and consultants, to assess, identify, and...
EXP WORLD HOLDINGS, INC.
CIK: 1495932
...Staff across all segments are required to complete company facilitated cybersecurity training at least annually. Engage Third Parties on Risk Management Understanding the complexity and evolving nature of cybersecurity threats, each reporting segment may engage with a range of external experts, including cybersecurity assessors and consultants, to assess, identify, and...
KIMBALL ELECTRONICS, INC.
CIK: 1606757
...Our CL&AO receives regular updates on cybersecurity matters, results of mitigation efforts, and cybersecurity incident response and remediation. The Company’s team responsible for developing and executing our cybersecurity policies together with our CL&AO, including our Director of Cybersecurity and Director of IT Infrastructure and Operations, are individuals...
LIBERTY BROADBAND CORP
CIK: 1611983
...Various security standards provide guidance to telecommunications companies in order to help identify and mitigate cybersecurity risks. See Part I, Item 1C. “Cybersecurity” below for additional information on our management and oversight of cybersecurity. One such standard is the voluntary Cybersecurity Framework (“CSF”) released by the National Institute for Standards...
HOME DEPOT INC
CIK: 354950
...Overseeing our cybersecurity efforts on a day-to-day basis is our cybersecurity team, led by our Chief Information Security Officer (“CISO”). Our cybersecurity team, in partnership with third parties, designs and implements our data security and cybersecurity programs, risk assessments, monitoring procedures, and training programs for our associates. We...
HOME DEPOT, INC.
CIK: 354950
...Overseeing our cybersecurity efforts on a day-to-day basis is our cybersecurity team, led by our Chief Information Security Officer (“CISO”). Our cybersecurity team, in partnership with third parties, designs and implements our data security and cybersecurity programs, risk assessments, monitoring procedures, and training programs for our associates. We...
OPPENHEIMER HOLDINGS INC
CIK: 791963
...The National Institute of Standards and Technology Cybersecurity Framework helps the Company inform its cybersecurity agenda and prioritize its cybersecurity activities. The Company takes a risk-based approach to cybersecurity, which begins with the identification and evaluation of cybersecurity risks or threats that could affect the Company’s operations, finances...
XYLEM INC.
CIK: 1524472
...Material Cybersecurity Risks, Threats & Incidents Due to evolving cybersecurity threats, it has and will continue to be difficult to prevent, detect, mitigate, and remediate cybersecurity incidents. While we have not experienced any material cybersecurity threats or incidents as of the date of this Report, our cybersecurity program might not be...
GCI LIBERTY, INC.
CIK: 2057463
...Cybersecurity incidents and cybersecurity threats, which include the use of malware, computer viruses, and other means for service disruption or unauthorized access to confidential customer or employee data, have increased in frequency, scope, and potential harm for businesses in recent years. It is possible for such cybersecurity incidents and cybersecurity...
MUELLER WATER PRODUCTS, INC.
CIK: 1350593
...We have two cybersecurity teams, each dedicated to a specific area. Our Information Technology Cybersecurity team focuses on corporate programs, and our Products Cybersecurity team focuses on customer-facing programs. These teams work collaboratively to implement programs designed to protect our information systems from cybersecurity threats and to promptly respond...