Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - FRD

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$FRD Risk Factor changes from 00/07/14/23/2023 to 00/06/12/25/2025

Item 1A. Risk Factors Not required. Item 1B. Unresolved Staff Comments None. Item 1C. Item 1B. Cybersecurity Cybersecurity Governance The Board of Directors (the “Board”) of the Company is responsible for the oversight of the Company’s cybersecurity program and recognizes the risks that cybersecurity threats may impose on the Company, its business partners, employees and investors. The Company's IT Director is responsible for overall IT governance, risk and compliance including the Company’s cybersecurity program. The Audit Committee of the Board collaborates with the full Board and the IT Director to facilitate alignment of overall IT related controls and processes. We have a formalized IT Security Incident Report process which provides a method to document and communicate details of security incidents to appropriate stakeholders. The Board and the Audit Committee receive periodic briefings on cybersecurity and help set priorities and strategic direction. As part of continuous improvement, our cybersecurity program is being aligned with the NIST Cybersecurity Framework 2.0 to help ensure comprehensive controls and oversight. Cybersecurity Controls We have implemented a modern, comprehensive set of controls that restrict access to systems using a combination of firewalls, virtual private networks, multi-factor authentication and enforced use of corporate controlled compliant devices. We utilize automated intrusion prevention, detection and response systems which constantly monitor activity, build usage patterns and respond or alert when unusual activity is detected. We have experienced staff who perform root cause analysis, respond to any immediate threat, and implement improved controls for future prevention. Our cybersecurity tools are fully integrated and collect data from various sources to build relationships and detect more complex multi-channel attack strategies. Application controls are role-based and designed to protect data confidentiality and provide overall data integrity. A risk-based approach is taken regarding third-party systems utilized in our business. We have controls specifically focused on E-mail phishing including impersonation attempts. Although our automated controls prevent most phishing attempts, some can be delivered to employees. To mitigate this risk, we provide training to employees using various methods including E-mail phishing campaigns which send phishing-style E-mails, monitors user responses and automatically assigns further training as appropriate. Employees have been trained to send any suspicious activity to a central IT Service Desk for evaluation and appropriate timely action. All critical systems have rigorous data backups and are designed for disaster recovery, ensuring business continuity in the event of a catastrophic incident. As part of continuous improvement, disaster recovery testing is being conducted and documented. We are not aware of any unmitigated risk or any prior incident that may have materially affected the Company’s data integrity, confidentiality, operations, business strategy or financial reporting. Given our reliance on modern systems, we are aware a significant incident could impact the Company’s overall goals so we strive to provide modern counter measures to manage this risk. 4 .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
NOTV an hour ago
AZTA 17 hours ago
XRPN 17 hours ago
RGCO 1 day, 14 hours ago
HNNA 1 day, 18 hours ago
PAPL 1 day, 18 hours ago
VSTS 3 days, 3 hours ago
SLP 3 days, 18 hours ago
JCTC 3 days, 18 hours ago
ABQQ 3 days, 18 hours ago
ESE 3 days, 20 hours ago
CNBX 4 days, 2 hours ago
SNEX 6 days, 17 hours ago
TMRC 6 days, 17 hours ago
ALTX 6 days, 17 hours ago
DBMM 6 days, 17 hours ago
LEDS 1 week ago
LEXX 1 week, 1 day ago
JJSF 1 week, 1 day ago
UTI 1 week, 1 day ago
IMKTA 1 week, 1 day ago
MOG-A 1 week, 1 day ago
LEE 1 week, 1 day ago
CFFN 1 week, 1 day ago
CENT 1 week, 2 days ago
SPH 1 week, 2 days ago
CASH 1 week, 2 days ago
TFSL 1 week, 2 days ago
CLFD 1 week, 2 days ago
HZEN 1 week, 2 days ago
GXLM 1 week, 2 days ago
SMG 1 week, 2 days ago
CLSK 1 week, 2 days ago
PHCI 1 week, 2 days ago
RJF 1 week, 2 days ago
AVXL 1 week, 2 days ago
MAGN 1 week, 2 days ago
AMTM 1 week, 2 days ago
BDX 1 week, 2 days ago
ARMK 1 week, 2 days ago
ARWR 1 week, 2 days ago
EMBC 1 week, 2 days ago
FLNC 1 week, 2 days ago
ADI 1 week, 2 days ago
GLDM 1 week, 2 days ago
GLD 1 week, 2 days ago
COR 1 week, 2 days ago
WWD 1 week, 2 days ago
FFIV 1 week, 2 days ago
ROAD 1 week, 3 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard