Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - BTCS
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
Not applicable to smaller reporting companies. However, our principal risk factors are described under “Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.”
ITEM 1B. UNRESOLVED STAFF COMMENTS
Not applicable.
ITEM 1C. CYBERSECURITY
We are subject to various cyber and other security threats, including attempts to gain unauthorized access to sensitive information and networks; virtual and cyber threats to our directors, officers, and employees; and threats to the security of our infrastructure, digital assets, and operational systems. To mitigate the threats to our business, we take a comprehensive approach to cybersecurity risk management. Our Board and our management oversee our risk management program, including the management of cybersecurity risks.
We have devoted financial and personnel resources to implement and maintain security measures designed to address cybersecurity risks in a manner consistent with our size, operational complexity, and risk profile, and we intend to continue to make investments as may be required to maintain the security of our data and cybersecurity infrastructure. While we cannot guarantee complete effectiveness of our cybersecurity measures despite our best efforts and continuous monitoring, we believe that the Company’s sustained investment in people, processes, and technologies has contributed to a culture of continuous improvement that positions us to
| 9 |
Risk Management and Strategy
Our cybersecurity risk management program (“Cybersecurity Program”) is designed and assessed by leveraging the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF”), customized to align with our entity size, risk profile, and industry best practices. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a reference framework to help identify, assess, and manage cybersecurity risks relevant to our business. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the NIST CSF as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.
Our Cybersecurity Program is an integral part of our broader ERM framework and business continuity efforts. By incorporating cybersecurity into our overall risk assessment and management processes, we aim to address interconnected risks that could impact critical operations, systems, digital assets, and infrastructure. This alignment allows us to proactively evaluate and prioritize cybersecurity risks in the context of broader organizational objectives and resilience planning. This alignment allows us to proactively evaluate and prioritize cybersecurity risks in the context of broader organizational objectives and resilience planning, ensuring a comprehensive approach to safeguarding the Company’s infrastructure and stakeholders.
The key objectives of our Cybersecurity Program are to implement and sustain effective security controls designed to prevent unauthorized access to digital assets, systems and data, and to maintain and continuously improve our ability to detect, respond to, and recover from cybersecurity incidents. Success in achieving these objectives relies upon using appropriate technology solutions, cultivating and maintaining skilled personnel (including external specialists, as appropriate), and continuously improving policies and procedures. Success in achieving these objectives relies upon using quality technology solutions, cultivating and maintaining a team of skilled professionals, and continuously improving processes.
Our Cybersecurity Program focuses on the following key areas:
Risk Assessment
We conduct periodic cybersecurity risk assessments to identify reasonably foreseeable internal and external cybersecurity threats, including assessments conducted in connection with material changes to our business operations, systems, or third-party relationships. These risk assessments evaluate, among other things, the potential likelihood and magnitude of harm from such risks, including potential impacts on our operations, financial condition, reputation, digital assets, and business strategy, as well as the effectiveness of existing controls and safeguards.
Risk assessments consider information from internal stakeholders, known security vulnerabilities, threat intelligence, reported incidents affecting other companies in our industry, and information obtained from third parties and external advisors, as appropriate. The results of these assessments are used to inform enhancements to our cybersecurity controls, operational processes, and broader Company-wide risk management activities, which are periodically reported to management and the Audit Committee. The results of our assessments are used to develop initiatives to enhance our security controls, make recommendations to improve processes, and inform a broader Company-wide risk assessment that is then periodically reported to our Board and Audit Committee.
Technical Safeguards
We assess and deploy technical safeguards designed to protect our information systems, infrastructure, and digital assets from cybersecurity threats. These safeguards are evaluated and updated based on vulnerability assessments, threat intelligence, and lessons learned from cybersecurity events and incident response activities.
Incident Response and Recovery Planning
We maintain a cybersecurity incident response and recovery plan designed to guide our response to cybersecurity incidents. The plan provides a structured framework for incident identification, containment, investigation, remediation, and recovery, and includes defined escalation and communication protocols. In the event of a cybersecurity incident, management evaluates the incident to determine its severity and potential impact, including whether the incident is reasonably likely to be material, based on both quantitative and qualitative factors.
Vendor and Third-Party Risk Management
| 10 |
Education and Awareness
Our policies require employees and relevant third-party contractors to contribute to our cybersecurity efforts. We provide periodic cybersecurity and data protection awareness training and require the prompt reporting of suspicious activity or potential cybersecurity incidents to management.
Governance
In the event of a cybersecurity incident, management evaluates the incident and, as appropriate, escalates matters to the Audit Committee and the Board.
Recently Filed
| Ticker * | File Date |
|---|---|
| WENN | 29 minutes ago |
| GTERA | 30 minutes ago |
| CCXI | 30 minutes ago |
| PAAC | 31 minutes ago |
| NRDE | 31 minutes ago |
| SLND | 32 minutes ago |
| SGP | 36 minutes ago |
| GPAT | 39 minutes ago |
| SFRX | 39 minutes ago |
| DBVT | 40 minutes ago |
| ANF | 41 minutes ago |
| DRMA | 41 minutes ago |
| ORMP | 44 minutes ago |
| CVSI | 45 minutes ago |
| BUDA | 46 minutes ago |
| WRAP | 54 minutes ago |
| NMAX | 58 minutes ago |
| OACC | 58 minutes ago |
| ZNTL | an hour ago |
| CEPF | an hour ago |
| CV | an hour ago |
| RANI | an hour ago |
| QNRX | an hour ago |
| WKSP | an hour ago |
| RNTX | an hour ago |
| CD | an hour ago |
| LINK | an hour ago |
| ULTA | an hour ago |
| VANI | an hour ago |
| IKT | an hour ago |
| LBRX | an hour ago |
| SNWV | an hour ago |
| MBOT | an hour ago |
| INVE | an hour ago |
| VATE | an hour ago |
| VRM | an hour ago |
| IMDX | an hour ago |
| KYTX | an hour ago |
| BTCS | an hour ago |
| RKDA | an hour ago |
| PIII | an hour ago |
| GANX | an hour ago |
| ABOS | an hour ago |
| LE | an hour ago |
| AMPG | an hour ago |
| NSYS | an hour ago |
| SPRO | an hour ago |
| UPB | an hour ago |
| KBON | an hour ago |
| DARE | an hour ago |