Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - NWFL

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$NWFL Risk Factor changes from 00/03/17/23/2023 to 00/03/14/25/2025

Item 1A. Risk Factors Not applicable. Item 1B. Unresolved Staff Comments None. Item 1C. Item 1B. Cybersecurity Incident Response Policy The Board of Directors is responsible for overseeing the risks from cybersecurity threats. Each month, the Board is presented with the executive overview of the Cybersecurity Continuous Monitoring Review Report (“Report”) prepared by the Company’s third-party chief information security officer. The Board of Directors reviews the Report each month and, if warranted, directs senior management of the Company to take necessary and appropriate actions in accordance with the IR Policy (as defined below). 8 Wayne Bank has adopted an Incident Response Policy (the “IR Policy”) for responding to cybersecurity incidents. This IR Policy applies to both potential and actual incidents. The IR Policy should be invoked in any context where the Bank believes that an incident may have occurred. The IR Policy applies to all employees, contractors, and third parties. The objectives of the IR Policy are to ensure the protection of customer data and all organization assets from security incidents and ensure timely detection, mitigation, and communication of security incidents to appropriate parties. Implementation of the IR Policy requires cross-functional efforts from across the organization. The roles/functions involved and the related responsibilities in enforcing the IR Policy are spread across the entire organization of the Bank’s senior leadership and chief credit officer. Once the possibility of a cybersecurity incident has been noted, employees assigned to appropriate teams do the necessary research and analysis to confirm either that there is an incident requiring additional action, or that no further action is necessary. This will typically involve some combination of Operations and Information Technology. If an incident is confirmed, an incident response team is formed, and the team takes steps to contain the incident to limit damage, eradicate the incident to restore our full control of all Bank systems and eliminate unauthorized access, and recover data and full functionality. Detection and analysis continue during this phase as necessary to ensure that this phase has been successfully executed. This phase also involves communication as needed with employees, customers, partners and service providers, legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as necessary and appropriate. In the post-incident phase, the Bank analyzes the root cause of the incident, identifies any changes that need to be made to policies, procedures, training, documentation, and technology to protect against similar incidents in the future, and institutes a plan to implement them. In addition, the Bank undertakes any additional communication with the necessary parties and the public, if appropriate, and the Bank’s legal representatives, insurance provider, law-enforcement authorities, and regulatory bodies as appropriate to fully address the impact of the incident, and fully documents the entire incident. During the fiscal year ended December 31, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition. . .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
IRTC 1 day, 8 hours ago
GCMG 1 day, 8 hours ago
ED 1 day, 8 hours ago
IAUX 1 day, 8 hours ago
LNC 1 day, 8 hours ago
TSCO 1 day, 8 hours ago
MSTR 1 day, 8 hours ago
GH 1 day, 8 hours ago
MIR 1 day, 8 hours ago
CSGS 1 day, 8 hours ago
LKQ 1 day, 8 hours ago
DTM 1 day, 8 hours ago
BG 1 day, 9 hours ago
THRM 1 day, 9 hours ago
SEM 1 day, 9 hours ago
TVTX 1 day, 9 hours ago
KALU 1 day, 9 hours ago
LYV 1 day, 9 hours ago
FTI 1 day, 9 hours ago
MS 1 day, 9 hours ago
ICUI 1 day, 9 hours ago
ET 1 day, 9 hours ago
BNL 1 day, 9 hours ago
OWL 1 day, 9 hours ago
BTU 1 day, 9 hours ago
EFX 1 day, 9 hours ago
PTCT 1 day, 9 hours ago
RPD 1 day, 9 hours ago
MET 1 day, 9 hours ago
IEX 1 day, 9 hours ago
CNDT 1 day, 9 hours ago
SPSC 1 day, 9 hours ago
CYH 1 day, 9 hours ago
SLM 1 day, 9 hours ago
STT 1 day, 9 hours ago
WSC 1 day, 9 hours ago
NPO 1 day, 9 hours ago
FFBC 1 day, 9 hours ago
SUNC 1 day, 9 hours ago
FDP 1 day, 9 hours ago
SUN 1 day, 9 hours ago
UDMY 1 day, 9 hours ago
OPEN 1 day, 9 hours ago
MSEX 1 day, 9 hours ago
ULS 1 day, 9 hours ago
GATX 1 day, 9 hours ago
RMAX 1 day, 9 hours ago
CTO 1 day, 9 hours ago
GLPI 1 day, 9 hours ago
AIZ 1 day, 9 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard