Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - CLST

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors

Not applicable.

Item 1B. Unresolved Staff Comments

Not applicable.

Item 1C. Cybersecurity

The Bank, as part of its risk management process, has implemented an information security program that encompasses the Bank’s cybersecurity efforts. The Bank’s goals of confidentiality, availability and integrity of its information are key to this process and program. The Bank’s goals of protecting confidential information and safeguarding our digital assets are foundational objectives of the program.

The Boards of Directors of the Company and Bank and the Audit Committee of the Company are responsible for ultimate oversight of cybersecurity risks managed daily by management pursuant to the Bank’s information security program. The Boards of Directors annually approve this information security program and regularly receive a report from the Bank’s Information Security Officer that outlines the steps undertaken to protect the information and data assets of the Bank and Company. Additionally, the Information Security Officer updates the Boards of Directors through supplementary reports on issues related to Cybersecurity readiness. Our Information Security Officer has over 20 years of relevant experience in the areas of information security and cyber security risk management.

The Bank’s information security program is developed and implemented by the Bank’s Information Security Officer. Together with the Bank’s Information Technology Committee, comprised of relevant information technology and business unit stakeholders within Bank management, the Information Security Officer of the Bank works to manage, control and mitigate cybersecurity risks. The Bank’s employees are regularly trained on cybersecurity awareness, and testing is performed to monitor the success of the training. The Board of Directors receives training annually.

The Bank engages third parties to audit and examine its processes, review the security of its network infrastructure, and assist the Bank in designing and implementing robust cybersecurity systems. These third parties help the Bank improve and test its cybersecurity readiness. The Bank engages third-party vendors to monitor and test its network infrastructure. These third-party vendors take an active role in ensuring that the Bank’s systems are protected by testing, reviewing and advising the Bank to strengthen cybersecurity controls when necessary.

22

The Bank has a vendor oversight risk management process that helps to validate the security and integrity of information collected and maintained by third-party vendors that the Bank uses to provide banking services. A key goal of the Bank’s vendor management program includes assessing risks, which include but are not limited to operational, strategic, reputational, cyber, and credit risks. These processes are supported by specialized vendors that assist the Bank’s management and Board of Directors with properly assessing these risks. Finally, the Bank also has an incident response and business continuity program that is intended to address operational concerns, including cybersecurity risks, during contingency scenarios that may create unknown circumstances. This program is tested annually.

Although the Company and Bank have not, as of the date of this Annual Report on Form 10-K, experienced a cybersecurity threat or incident that materially affected their business strategy, results of operations or financial condition, there can be no guarantee that the Company or Bank will not experience such an incident in the future.

As regulated financial institutions, the Company and Bank are also subject to financial privacy laws and their cybersecurity practices are subject to oversight by the federal banking agencies. For additional information, see “Supervision and Regulation –Cybersecurity” included in Part I. Item 1 – Business of this report.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
SAFX 43 minutes ago
RVRC 45 minutes ago
AIRS 46 minutes ago
CYCU 47 minutes ago
CBDY 47 minutes ago
GEMI 47 minutes ago
SOLC 47 minutes ago
ZVSA 48 minutes ago
LCGMF 49 minutes ago
TRNR 49 minutes ago
SLSN 50 minutes ago
LTUM 51 minutes ago
SVAQ 51 minutes ago
INKT 53 minutes ago
GNLN 53 minutes ago
NCNO 54 minutes ago
CEPS 54 minutes ago
STSS 55 minutes ago
BDCO 56 minutes ago
SKAS 56 minutes ago
TE 57 minutes ago
JWSMF 58 minutes ago
AQMS 59 minutes ago
FCCI an hour ago
INIS an hour ago
DUOT an hour ago
GOCO an hour ago
PED an hour ago
BLNK an hour ago
HTCR an hour ago
SRG an hour ago
ADTX an hour ago
ALTI an hour ago
SVIX an hour ago
PLAY an hour ago
TCRT an hour ago
ACRG an hour ago
BNZI an hour ago
TOGI an hour ago
RPMT an hour ago
SKVI an hour ago
ISRLF an hour ago
SCWO an hour ago
CRAQ an hour ago
BITF an hour ago
UAVS an hour ago
CNTA an hour ago
DSS an hour ago
FCAP an hour ago
AMOD an hour ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard