Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - HWKE

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors.

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1B. Unresolved Staff Comments

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1C. Cybersecurity Disclosures.

We rely upon internally and externally managed information technology systems for the collection and storage of sensitive data and business information. We approach cybersecurity risks with a risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business. We approach cybersecurity risks with a comprehensive risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business.

Risk Management and Strategy

Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and availability of systems and information used, owned or managed by us. Our focus is on protecting sensitive information, such as personal information of our customers and employees, and confidential business information that could be leveraged by a competitor or a malicious actor.

Our cybersecurity program has several components, including the adoption of information security protocols, standards, and guidelines consistent with best industry practices; engaging third-party service providers to conduct security assessments and penetration testing; and performing periodic internal audits of our cybersecurity protocols. We employ a risk-based process designed to manage cybersecurity risks presented by third-party vendors that may have access to our sensitive information and/or information technology (“IT”) systems. This process may consider the nature of the services provided, the sensitivity and quantity of information processed, the criticality of any potentially impacted IT systems, and/or the strength of the vendor’s cybersecurity practices.

We monitor potential cybersecurity risks through tracking. These key risks are characterized by various factors such as the likelihood of us experiencing a particular type of cybersecurity incident, the speed at which each type of cybersecurity incident could impact the Company, and management’s assessment of the Company’s ability to respond quickly and efficiently.

An incident response plan aligned with best practices guidelines governs our response to cybersecurity incidents. The incident response plan outlines how we can detect, analyze, contain, eradicate, recover, and perform post-incident activities in the event of a cybersecurity incident. It also contains an internal, risk-based escalation framework designed to ensure that all relevant individuals are promptly informed of any cybersecurity incident and dictates procedures for determining whether a cybersecurity incident is material without unreasonable delay.

Material Effects from Risks of Cybersecurity Threats

While we may experience minor data and cybersecurity incidents from time to time, to our knowledge, the risks posed by cybersecurity threats have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. However, there can be no assurance that we will not be materially affected by such risks in the future. A successful cybersecurity attack may expose us to misuse of information or systems, the compromising of confidential information, manipulation or destruction of data, production downtimes, and operations disruptions.

Governance

Role of Management

One of the key functions of our executive officers is to inform oversight of our risk management process, which includes risks from cybersecurity threats. Our executive officer monitor and assesses strategic risk exposure, and manages the material risks we face. Our executive ooficers monitor and assess strategic risk exposure, and manage the material risks we face.

Our Chief Executive Officer works to manage our cybersecurity policies and processes. He is responsible for managing how we identify, address, prevent and resolve cybersecurity issues and related matters. He is also responsible for tracking how we prevent, identify, lessen, and address cybersecurity issues. This is done through regular checks of our systems, tests to identify security weaknesses, and maintaining an incident response plan.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
RIVF 42 minutes ago
FGPR 6 hours ago
HWKE 6 hours ago
FOXX 14 hours ago
TGL 19 hours ago
ALDS 19 hours ago
GHST 19 hours ago
PETS 20 hours ago
LUVU 20 hours ago
LSH 20 hours ago
SGLY 1 day ago
NGTF 1 day, 2 hours ago
SGLA 1 day, 3 hours ago
DYNT 1 day, 4 hours ago
BRWC 5 days, 2 hours ago
ACN 5 days, 5 hours ago
VLGEA 5 days, 19 hours ago
IPW 5 days, 19 hours ago
NKLAQ 5 days, 20 hours ago
ODC 5 days, 20 hours ago
GLEI 6 days ago
ADVB 6 days, 19 hours ago
COST 1 week ago
VISM 1 week, 1 day ago
OPTX 1 week, 4 days ago
CIIT 1 week, 4 days ago
MU 1 week, 4 days ago
ARRT 1 week, 5 days ago
XERI 1 week, 5 days ago
UNFI 2 weeks ago
MWAI 2 weeks ago
VIVC 2 weeks ago
KFFB 2 weeks ago
NXNT 2 weeks ago
INTG 2 weeks, 1 day ago
PRSI 2 weeks, 1 day ago
ESMC 2 weeks, 1 day ago
POCI 2 weeks, 1 day ago
NEOV 2 weeks, 1 day ago
MTN 2 weeks, 1 day ago
FEAM 2 weeks, 1 day ago
SRBK 2 weeks, 1 day ago
RENB 2 weeks, 1 day ago
CVAT 2 weeks, 1 day ago
LBUY 2 weeks, 1 day ago
NTWK 2 weeks, 1 day ago
CBLO 2 weeks, 1 day ago
IXHL 2 weeks, 1 day ago
MARPS 2 weeks, 2 days ago
FKWL 2 weeks, 2 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard