Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - HWKE

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors.

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1B. Unresolved Staff Comments

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1C. Cybersecurity Disclosures.

We rely upon internally and externally managed information technology systems for the collection and storage of sensitive data and business information. We approach cybersecurity risks with a risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business. We approach cybersecurity risks with a comprehensive risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business.

Risk Management and Strategy

Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and availability of systems and information used, owned or managed by us. Our focus is on protecting sensitive information, such as personal information of our customers and employees, and confidential business information that could be leveraged by a competitor or a malicious actor.

Our cybersecurity program has several components, including the adoption of information security protocols, standards, and guidelines consistent with best industry practices; engaging third-party service providers to conduct security assessments and penetration testing; and performing periodic internal audits of our cybersecurity protocols. We employ a risk-based process designed to manage cybersecurity risks presented by third-party vendors that may have access to our sensitive information and/or information technology (“IT”) systems. This process may consider the nature of the services provided, the sensitivity and quantity of information processed, the criticality of any potentially impacted IT systems, and/or the strength of the vendor’s cybersecurity practices.

We monitor potential cybersecurity risks through tracking. These key risks are characterized by various factors such as the likelihood of us experiencing a particular type of cybersecurity incident, the speed at which each type of cybersecurity incident could impact the Company, and management’s assessment of the Company’s ability to respond quickly and efficiently.

An incident response plan aligned with best practices guidelines governs our response to cybersecurity incidents. The incident response plan outlines how we can detect, analyze, contain, eradicate, recover, and perform post-incident activities in the event of a cybersecurity incident. It also contains an internal, risk-based escalation framework designed to ensure that all relevant individuals are promptly informed of any cybersecurity incident and dictates procedures for determining whether a cybersecurity incident is material without unreasonable delay.

Material Effects from Risks of Cybersecurity Threats

While we may experience minor data and cybersecurity incidents from time to time, to our knowledge, the risks posed by cybersecurity threats have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. However, there can be no assurance that we will not be materially affected by such risks in the future. A successful cybersecurity attack may expose us to misuse of information or systems, the compromising of confidential information, manipulation or destruction of data, production downtimes, and operations disruptions.

Governance

Role of Management

One of the key functions of our executive officers is to inform oversight of our risk management process, which includes risks from cybersecurity threats. Our executive officer monitor and assesses strategic risk exposure, and manages the material risks we face. Our executive ooficers monitor and assess strategic risk exposure, and manage the material risks we face.

Our Chief Executive Officer works to manage our cybersecurity policies and processes. He is responsible for managing how we identify, address, prevent and resolve cybersecurity issues and related matters. He is also responsible for tracking how we prevent, identify, lessen, and address cybersecurity issues. This is done through regular checks of our systems, tests to identify security weaknesses, and maintaining an incident response plan.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
APT an hour ago
IBO an hour ago
DAIC an hour ago
AEAQ an hour ago
NUWE an hour ago
KDK an hour ago
SKYT an hour ago
CRWE an hour ago
CWBC an hour ago
EXOD 2 hours ago
DMRC 2 hours ago
MNTK 2 hours ago
BLLN 2 hours ago
INBK 2 hours ago
DSP 2 hours ago
TGT 2 hours ago
CDXS 2 hours ago
THM 2 hours ago
TNYA 2 hours ago
PLRX 2 hours ago
HPK 2 hours ago
SST 2 hours ago
TTGT 2 hours ago
GRDN 2 hours ago
FCHS 2 hours ago
FHTX 2 hours ago
CCNE 2 hours ago
LCNB 3 hours ago
VGZ 3 hours ago
MRVL 3 hours ago
FWRD 3 hours ago
ACU 3 hours ago
TZOO 3 hours ago
PEBK 3 hours ago
TH 3 hours ago
PKBK 4 hours ago
MG 4 hours ago
BWEN 4 hours ago
PGC 5 hours ago
INRE 5 hours ago
SSSS 9 hours ago
RCKY 10 hours ago
TG 10 hours ago
VRCA 10 hours ago
NERV 11 hours ago
KPLT 11 hours ago
SGMT 11 hours ago
ATEK 11 hours ago
LAFA 22 hours ago
GBLI 1 day, 1 hour ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard