Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - NWFL

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$NWFL Risk Factor changes from 00/03/17/23/2023 to 00/03/14/25/2025

Item 1A. Risk Factors Not applicable. Item 1B. Unresolved Staff Comments None. Item 1C. Item 1B. Cybersecurity Incident Response Policy The Board of Directors is responsible for overseeing the risks from cybersecurity threats. Each month, the Board is presented with the executive overview of the Cybersecurity Continuous Monitoring Review Report (“Report”) prepared by the Company’s third-party chief information security officer. The Board of Directors reviews the Report each month and, if warranted, directs senior management of the Company to take necessary and appropriate actions in accordance with the IR Policy (as defined below). 8 Wayne Bank has adopted an Incident Response Policy (the “IR Policy”) for responding to cybersecurity incidents. This IR Policy applies to both potential and actual incidents. The IR Policy should be invoked in any context where the Bank believes that an incident may have occurred. The IR Policy applies to all employees, contractors, and third parties. The objectives of the IR Policy are to ensure the protection of customer data and all organization assets from security incidents and ensure timely detection, mitigation, and communication of security incidents to appropriate parties. Implementation of the IR Policy requires cross-functional efforts from across the organization. The roles/functions involved and the related responsibilities in enforcing the IR Policy are spread across the entire organization of the Bank’s senior leadership and chief credit officer. Once the possibility of a cybersecurity incident has been noted, employees assigned to appropriate teams do the necessary research and analysis to confirm either that there is an incident requiring additional action, or that no further action is necessary. This will typically involve some combination of Operations and Information Technology. If an incident is confirmed, an incident response team is formed, and the team takes steps to contain the incident to limit damage, eradicate the incident to restore our full control of all Bank systems and eliminate unauthorized access, and recover data and full functionality. Detection and analysis continue during this phase as necessary to ensure that this phase has been successfully executed. This phase also involves communication as needed with employees, customers, partners and service providers, legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as necessary and appropriate. In the post-incident phase, the Bank analyzes the root cause of the incident, identifies any changes that need to be made to policies, procedures, training, documentation, and technology to protect against similar incidents in the future, and institutes a plan to implement them. In addition, the Bank undertakes any additional communication with the necessary parties and the public, if appropriate, and the Bank’s legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as appropriate to fully address the impact of the incident, and fully documents the entire incident. During the fiscal year ended December 31, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition. . .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
OVV 13 hours ago
ACVA 13 hours ago
USB 13 hours ago
BWXT 13 hours ago
MAT 13 hours ago
AXSM 13 hours ago
CAKE 13 hours ago
NOVT 13 hours ago
BDN 13 hours ago
RIG 13 hours ago
RYN 13 hours ago
LPLA 13 hours ago
KTOS 14 hours ago
KWR 14 hours ago
LAZ 14 hours ago
PRA 14 hours ago
BLBX 14 hours ago
MAN 14 hours ago
DEA 14 hours ago
ERIE 14 hours ago
COUR 14 hours ago
MMLP 14 hours ago
MAX 14 hours ago
WEN 14 hours ago
PRK 14 hours ago
TRMK 14 hours ago
BOOM 14 hours ago
APLE 14 hours ago
GLDD 14 hours ago
ORIC 14 hours ago
CCI 14 hours ago
AGNC 14 hours ago
TARS 14 hours ago
SMMT 14 hours ago
FBIN 14 hours ago
CINF 14 hours ago
LZ 14 hours ago
EKSO 14 hours ago
FRPT 14 hours ago
VVX 14 hours ago
IVR 14 hours ago
VRE 14 hours ago
RNA 14 hours ago
CL 14 hours ago
SAH 14 hours ago
SEIC 14 hours ago
UVSP 14 hours ago
KEY 15 hours ago
WTS 15 hours ago
D 18 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard