Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - NMEX

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A. RISK FACTORS

We are a smaller reporting company as defined by Rule 12b-2 of the Securities Exchange Act of 1934 and, as such, are not required to provide the information under this Item.

Item 1B. UNRESOLVED STAFF COMMENTS

None.

Item 1C. CYBERSECURITY

Cyber Risk Management and Strategy

Under the oversight of the Board of Directors, since we do not currently have an Audit Committee, we have implemented and maintain a risk management program that includes processes for the systematic identification, assessment, management, and treatment of cybersecurity risks. Our cybersecurity oversight and operational processes are integrated into our overall risk management processes, and cybersecurity is one of our designated risk categories. We implement a risk-based approach to the management of cyber threats, supported by cybersecurity technologies, including automated tools designed to monitor, identify, and address cybersecurity risks. In support of this approach, we implement processes to assess, identify, and manage security risks to the company, including in the pillar areas of security and compliance, application security, infrastructure security, and data privacy. This process includes regular compliance and critical system access reviews. In addition, we conduct application security assessments, vulnerability management, penetration testing, security audits, and ongoing risk assessments as part of our risk management process. We also maintain an incident response plan to guide our processes in the event of an incident.

Further, we have processes in place to evaluate potential risks from cybersecurity threats associated with our use of third-party service providers that will have access to our data, including a review process for such providers’ cybersecurity practices, risk assessments, contractual requirement, and system monitoring.

We continue to evaluate and enhance our systems, controls, and processes where possible, including in response to actual or perceived threats specific to us or experienced by other companies.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
SAFX 3 days, 1 hour ago
RVRC 3 days, 1 hour ago
AIRS 3 days, 1 hour ago
CYCU 3 days, 1 hour ago
CBDY 3 days, 1 hour ago
GEMI 3 days, 1 hour ago
SOLC 3 days, 1 hour ago
ZVSA 3 days, 1 hour ago
LCGMF 3 days, 1 hour ago
TRNR 3 days, 1 hour ago
SLSN 3 days, 1 hour ago
LTUM 3 days, 1 hour ago
SVAQ 3 days, 1 hour ago
INKT 3 days, 1 hour ago
GNLN 3 days, 1 hour ago
NCNO 3 days, 1 hour ago
CEPS 3 days, 1 hour ago
STSS 3 days, 1 hour ago
BDCO 3 days, 1 hour ago
SKAS 3 days, 1 hour ago
TE 3 days, 1 hour ago
JWSMF 3 days, 1 hour ago
AQMS 3 days, 1 hour ago
FCCI 3 days, 1 hour ago
INIS 3 days, 1 hour ago
DUOT 3 days, 1 hour ago
GOCO 3 days, 1 hour ago
PED 3 days, 1 hour ago
BLNK 3 days, 1 hour ago
HTCR 3 days, 1 hour ago
SRG 3 days, 1 hour ago
ADTX 3 days, 1 hour ago
ALTI 3 days, 1 hour ago
SVIX 3 days, 1 hour ago
PLAY 3 days, 1 hour ago
TCRT 3 days, 1 hour ago
ACRG 3 days, 1 hour ago
BNZI 3 days, 1 hour ago
TOGI 3 days, 2 hours ago
RPMT 3 days, 2 hours ago
SKVI 3 days, 2 hours ago
ISRLF 3 days, 2 hours ago
SCWO 3 days, 2 hours ago
CRAQ 3 days, 2 hours ago
BITF 3 days, 2 hours ago
UAVS 3 days, 2 hours ago
CNTA 3 days, 2 hours ago
DSS 3 days, 2 hours ago
FCAP 3 days, 2 hours ago
AMOD 3 days, 2 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard