Search SEC Filings
Search across the full text content of downloaded SEC filings
42455
Results Found
Showing 161 -
180 of 42455 results
ALPHA PRO TECH LTD
CIK: 884269
...In the last fifteen fiscal years, we have not experienced any material cybersecurity incidents and the expenses we have incurred from cybersecurity incidents were immaterial. This includes penalties and settlements, of which there were none. 13 Cybersecurity Governance Cybersecurity is an important part of our enterprise risk management program and...
CISO GLOBAL, INC.
CIK: 1777319
...We provide a full range of cybersecurity consulting, related services, and cybersecurity software, encompassing all four pillars of proprietary software stack, compliance, cybersecurity, and organizational culture. Our comprehensive cybersecurity services include managed security, compliance services, security operations center (“SOC”) services, virtual Chief Information Security Officer (“vCISO”) services, incident response, certified...
CERBERUS CYBER SENTINEL CORP
CIK: 1777319
...We provide a full range of cybersecurity consulting, related services, and cybersecurity software, encompassing all four pillars of proprietary software stack, compliance, cybersecurity, and organizational culture. Our comprehensive cybersecurity services include managed security, compliance services, security operations center (“SOC”) services, virtual Chief Information Security Officer (“vCISO”) services, incident response, certified...
J2 GLOBAL, INC.
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The significant accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form...
ZIFF DAVIS, INC.
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The significant accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form...
J2 GLOBAL COMMUNICATIONS INC
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The significant accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form...
BOARDWALK PIPELINE PARTNERS, LP
CIK: 1336047
...Governance Our board of directors oversees the execution of our cybersecurity strategy. Our Chief Information Security Officer (CISO) oversees our cybersecurity activities and leads our team of cybersecurity professionals responsible for our cybersecurity program and is informed about and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents as...
BOARDWALK PIPELINE PARTNERS, LP
CIK: 1336047
...Our Chief Information Security Officer (CISO) oversees our cybersecurity activities and leads our team of cybersecurity professionals responsible for our cybersecurity program and is informed about and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents as part of our cybersecurity programs. Our CISO and other cybersecurity professionals provide...
DEPHASIUM CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
LONGWEN GROUP CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
PAY MOBILE, INC
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
WENYUAN GROUP CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
ALLIED VENTURES HOLDINGS CORP.
CIK: 723533
...As a smaller reporting company, we currently do not have formalized cybersecurity measures, a dedicated cybersecurity team or specific protocols in place to manage cybersecurity risks. Our approach to cybersecurity is in the developmental stage, and we have not yet conducted comprehensive risk assessments, established an incident response plan or...
OPPENHEIMER HOLDINGS INC
CIK: 791963
...The National Institute of Standards and Technology Cybersecurity Framework helps the Company inform its cybersecurity agenda and prioritize its cybersecurity activities. The Company takes a risk-based approach to cybersecurity, which begins with the identification and evaluation of cybersecurity risks or threats that could affect the Company’s operations, finances...
J2 GLOBAL, INC.
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form 10...
ZIFF DAVIS, INC.
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form 10...
J2 GLOBAL COMMUNICATIONS INC
CIK: 1084048
...Our Cybersecurity and Martech business provides cloud-based subscription and license services to consumers and businesses including cybersecurity, privacy, and marketing technology. Significant Accounting Policies The accounting policies followed by the Company are set forth in Note 1 to the Company's consolidated financial statements included in its Form 10...
SOUTH DAKOTA SOYBEAN PROCESSORS LLC
CIK: 1163609
...Engaging Third Parties on Cybersecurity Risk Management. Recognizing the complexity and evolving nature of cybersecurity threats, we engage with third-party service providers, including cybersecurity assessors, and consultants, to evaluate and test our cybersecurity risk management systems. This enables us to leverage knowledge and insights to align our cybersecurity strategies...
MAYS J W INC
CIK: 54187
...Notwithstanding the effort we place on cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on the Company. As of the date of this Annual Report on Form 10-K, we are not aware of any cybersecurity threats or...
SOUTH DAKOTA SOYBEAN PROCESSORS LLC
CIK: 1163609
...12 Engaging Third Parties on Cybersecurity Risk Management. Recognizing the complexity and evolving nature of cybersecurity threats, the Company engages with third-party service providers, including cybersecurity assessors, and consultants, in evaluating and testing our cybersecurity risk management systems. This enables us to leverage knowledge and insights with the goal...