Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - NWFL

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$NWFL Risk Factor changes from 00/03/17/23/2023 to 00/03/14/25/2025

Item 1A. Risk Factors Not applicable. Item 1B. Unresolved Staff Comments None. Item 1C. Item 1B. Cybersecurity Incident Response Policy The Board of Directors is responsible for overseeing the risks from cybersecurity threats. Each month, the Board is presented with the executive overview of the Cybersecurity Continuous Monitoring Review Report (“Report”) prepared by the Company’s third-party chief information security officer. The Board of Directors reviews the Report each month and, if warranted, directs senior management of the Company to take necessary and appropriate actions in accordance with the IR Policy (as defined below). 8 Wayne Bank has adopted an Incident Response Policy (the “IR Policy”) for responding to cybersecurity incidents. This IR Policy applies to both potential and actual incidents. The IR Policy should be invoked in any context where the Bank believes that an incident may have occurred. The IR Policy applies to all employees, contractors, and third parties. The objectives of the IR Policy are to ensure the protection of customer data and all organization assets from security incidents and ensure timely detection, mitigation, and communication of security incidents to appropriate parties. Implementation of the IR Policy requires cross-functional efforts from across the organization. The roles/functions involved and the related responsibilities in enforcing the IR Policy are spread across the entire organization of the Bank’s senior leadership and chief credit officer. Once the possibility of a cybersecurity incident has been noted, employees assigned to appropriate teams do the necessary research and analysis to confirm either that there is an incident requiring additional action, or that no further action is necessary. This will typically involve some combination of Operations and Information Technology. If an incident is confirmed, an incident response team is formed, and the team takes steps to contain the incident to limit damage, eradicate the incident to restore our full control of all Bank systems and eliminate unauthorized access, and recover data and full functionality. Detection and analysis continue during this phase as necessary to ensure that this phase has been successfully executed. This phase also involves communication as needed with employees, customers, partners and service providers, legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as necessary and appropriate. In the post-incident phase, the Bank analyzes the root cause of the incident, identifies any changes that need to be made to policies, procedures, training, documentation, and technology to protect against similar incidents in the future, and institutes a plan to implement them. In addition, the Bank undertakes any additional communication with the necessary parties and the public, if appropriate, and the Bank’s legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as appropriate to fully address the impact of the incident, and fully documents the entire incident. During the fiscal year ended December 31, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition. . .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
CASH 2 days, 6 hours ago
TFSL 2 days, 6 hours ago
CLFD 2 days, 7 hours ago
HZEN 2 days, 7 hours ago
GXLM 2 days, 7 hours ago
SMG 2 days, 7 hours ago
CLSK 2 days, 7 hours ago
PHCI 2 days, 7 hours ago
RJF 2 days, 7 hours ago
AVXL 2 days, 7 hours ago
MAGN 2 days, 7 hours ago
AMTM 2 days, 7 hours ago
BDX 2 days, 7 hours ago
ARMK 2 days, 7 hours ago
ARWR 2 days, 8 hours ago
EMBC 2 days, 8 hours ago
FLNC 2 days, 8 hours ago
ADI 2 days, 8 hours ago
GLDM 2 days, 8 hours ago
GLD 2 days, 8 hours ago
COR 2 days, 9 hours ago
WWD 2 days, 10 hours ago
FFIV 2 days, 11 hours ago
ROAD 3 days, 6 hours ago
BLBD 3 days, 7 hours ago
ALCO 3 days, 7 hours ago
PNNT 3 days, 8 hours ago
SYM 3 days, 8 hours ago
PFLT 3 days, 8 hours ago
OYCG 3 days, 9 hours ago
CBT 3 days, 13 hours ago
DSNY 3 days, 18 hours ago
GEOS 6 days, 7 hours ago
IIIV 6 days, 7 hours ago
HP 6 days, 8 hours ago
PTC 6 days, 8 hours ago
MATW 6 days, 9 hours ago
UGI 6 days, 9 hours ago
DGII 6 days, 11 hours ago
POST 6 days, 12 hours ago
NFG 6 days, 13 hours ago
IESC 6 days, 16 hours ago
NJR 1 week ago
PXED 1 week ago
TTEK 1 week ago
NTIC 1 week ago
CRNC 1 week ago
EACO 1 week ago
MMS 1 week ago
ASH 1 week ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard