Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - ATAO

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A. RISK FACTORS

We are a smaller reporting company as defined by Rule 12b-2 of the Securities Exchange Act of 1934 and, as such, are not required to provide the information under this Item.

Item 1B. UNRESOLVED STAFF COMMENTS

None

ITEM 1C. CYBERSECURITY

We use, store and process data for and about our customers, employees, partners and suppliers. We have implemented a cybersecurity risk management program that is designed to identify, assess, and mitigate risks from cybersecurity threats to this data, our systems and business operations.

Cyber Risk Management and Strategy

Under the oversight of the Board of Directors since we do not currently have an Audit Committee, we have implemented and maintain a risk management program that includes processes for the systematic identification, assessment, management, and treatment of cybersecurity risks. Our cybersecurity oversight and operational processes are integrated into our overall risk management processes, and cybersecurity is one of our designated risk categories. We implement a risk-based approach to the management of cyber threats, supported by cybersecurity technologies, including automated tools, designed to monitor, identify, and address cybersecurity risks. In support of this approach, our IT security team implements processes to assess, identify, and manage security risks to the company, including in the pillar areas of security and compliance, application security, infrastructure security, and data privacy. This process includes regular compliance and critical system access reviews. In addition, we conduct application security assessments, vulnerability management, penetration testing, security audits, and ongoing risk assessments as part of our risk management process.

We utilize third parties and consultants to assist in the identification and assessment of risks, including to support tabletop exercises and to conduct security testing. We utilize well-known cloud-based technologies and service providers such as Amazon AWS, Microsoft Office, and Google enterprise to provide protection against cybersecurity threats.

Further, we have processes in place to evaluate potential risks from cybersecurity threats associated with our use of third-party service providers that will have access to our data, including a review process for such providers’ cybersecurity practices, risk assessments, contractual requirement, and system monitoring.

We continue to evaluate and enhance our systems, controls, and processes where possible, including in response to actual or perceived threats specific to us or experienced by other companies.

Risks from cybersecurity threats have to date not materially affected us, our business strategy, results of operations or financial condition.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
WENN 5 hours ago
GTERA 5 hours ago
CCXI 5 hours ago
PAAC 5 hours ago
NRDE 5 hours ago
SLND 5 hours ago
SGP 5 hours ago
GPAT 5 hours ago
SFRX 5 hours ago
DBVT 5 hours ago
ANF 5 hours ago
DRMA 5 hours ago
ORMP 5 hours ago
CVSI 5 hours ago
BUDA 5 hours ago
WRAP 5 hours ago
NMAX 6 hours ago
OACC 6 hours ago
ZNTL 6 hours ago
CEPF 6 hours ago
CV 6 hours ago
RANI 6 hours ago
QNRX 6 hours ago
WKSP 6 hours ago
RNTX 6 hours ago
CD 6 hours ago
LINK 6 hours ago
ULTA 6 hours ago
VANI 6 hours ago
IKT 6 hours ago
LBRX 6 hours ago
SNWV 6 hours ago
MBOT 6 hours ago
INVE 6 hours ago
VATE 6 hours ago
VRM 6 hours ago
IMDX 6 hours ago
KYTX 6 hours ago
BTCS 6 hours ago
RKDA 6 hours ago
PIII 6 hours ago
GANX 6 hours ago
ABOS 6 hours ago
LE 6 hours ago
AMPG 6 hours ago
NSYS 6 hours ago
SPRO 6 hours ago
UPB 6 hours ago
KBON 6 hours ago
DARE 6 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard