Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - RAVE

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$RAVE Risk Factor changes from 00/09/26/24/2024 to 00/09/25/25/2025

ITEM 1A. RISK FACTORS. RISK FACTORS. Not required for a smaller reporting company. ITEM 1B. ITEM 1B. UNRESOLVED STAFF COMMENTS. UNRESOLVED STAFF COMMENTS. Not applicable. ITEM 1C. ITEM 1C. CYBERSECURITY. The Company recognizes the critical importance of maintaining the safety and security of our systems and data and has a holistic process for overseeing and managing cybersecurity and related risks. The Company recognizes the critical importance of maintaining the safety and security of our systems and data and has a holistic process for overseeing and managing cybersecurity and related risks. The Company believes that cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. The Company believes that cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. 6 Index Cybersecurity Risk Management and Strategy Personnel The Company has an information security program and procedures in place to protect, identify, detect, respond to and manage reasonably foreseeable cybersecurity risks and threats. 6 Index Cybersecurity Risk Management and Strategy Personnel The Company has an information security program and procedures in place to protect, identify, detect, respond to and manage reasonably foreseeable cybersecurity risks and threats. The Company uses various security tools that help prevent, identify, investigate, resolve and recover from identified vulnerabilities and security incidents to protect our information systems and data from cybersecurity threats. This framework is implemented and overseen by management’s information security department which is led by the Information Technology (“IT”) Support Associate Director and overseen by the Company’s IT Steering Committee. This framework is implemented and overseen by management’s information security department which is led by the Information Technology (“IT”) Support Associate Director and overseen by the Company’s IT Steering Committee. The IT Support Associate Director has over twenty years of experience in technology management and cybersecurity. The IT Support Associate Director has over twenty years of experience in technology management and cybersecurity. The IT Steering Committee is comprised of the Company’s two Associate IT Directors, the CEO, and CFO and convenes quarterly to review IT control policies and procedures are properly followed and any new employees were properly onboarded in compliance with security procedures. The IT Steering Committee is comprised of the Company’s two Associate IT Directors, the CEO, and CFO and convenes quarterly to review IT control policies and procedures are properly followed and any new employees were properly onboarded in compliance with security procedures. Third-Party Engagement The Company employs third-party risk security vendors to identify, mitigate, and remediate cybersecurity risks; however, we rely on the third parties we use to implement security programs commensurate with their risks, and we cannot ensure in all circumstances that their efforts will be successful. Third Party Engagement The Company employs third party risk security vendors to identify, mitigate, and remediate cybersecurity risks; however, we rely on the third parties we use to implement security programs commensurate with their risks, and we cannot ensure in all circumstances that their efforts will be successful. The Company employs a third-party vendor to securely host the Company’s data in a cloud-based storage system. The third-party vendor conducts quarterly vulnerability scans on both the hosted data environment and the Company’s corporate data network. Scans of the Company’s firewall are conducted regularly by the third-party vendor. Any necessary remediation would also be provided by the third-party vendor after the scan, but none has been required. Any necessary remediation would also be provided by Contego after the scan, but none has been required. The Company uses multiple third-party developed software to continually monitor technology systems for viruses, malicious software, executable harmful files, and other cybersecurity risks. The Company uses SolarWinds with Sentinel One software from Contego to continually monitor technology systems for viruses, malicious software, executable harmful files, and other cybersecurity risks. The Company requires the annual submission of SOC 1 security certificates from our third-party vendors which have access to our financial and sales data. The Company requires the annual submission of SOC 1 security certificates from our third-party vendors which have access to our financial and sales data. The Company also maintains cybersecurity insurance providing coverage for certain costs related to security failures and specified cybersecurity related incidents. The Company recognizes that threat actors frequently target employees to gain unauthorized access to information systems. The Company recognizes that threat actors frequently target employees to gain unauthorized access to information systems. Therefore, each employee is required to complete information security and data privacy training to build awareness of cybersecurity risks to the organization. Therefore, each employee is required to complete information security and data privacy training to build awareness of cybersecurity risks to the organization. The Company has engaged a third-party vendor to periodically send each employee an email that mimics a potentially harmful phishing attempt each month and to report to management the results of the phishing security test. The Company has engaged third party vendor Knowbe4 to send each employee an email that mimics a potentially harmful phishing attempt each month and to report to management the results of the phishing security test. Governance The Board of Directors are acutely aware of the critical nature of managing risks associated with cybersecurity threats. Governance The Board of Directors are acutely aware of the critical nature of managing risks associated with cybersecurity threats. Each quarterly meeting, management presents a cybersecurity update which includes results of testing by third-party vendors and any suspected cybersecurity incidents to the entire Board of Directors. Each quarterly meeting, management presents a cybersecurity update which includes results of testing by third-party vendors and any suspected cybersecurity incidents to the entire Board of Directors. Management would report any material cybersecurity breach immediately to the full Board of Directors. The Company has a written policy for the employee reporting of any cybersecurity suspected incidents. The Audit Committee of the Board has the primary responsibility to oversee effective governance in managing risks associated with cybersecurity threats. The Audit Committee of the Board has the primary responsibility to oversee effective governance in managing risks associated with cybersecurity threats. Our Audit Committee is composed of members with diverse expertise, including risk management, technology, and finance, equipping them to oversee cybersecurity risks effectively. Our Audit Committee is composed of members with diverse expertise, including risk management, technology, and finance, equipping them to oversee cybersecurity risks effectively. . .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
QNTO 21 minutes ago
PBT 29 minutes ago
CRT an hour ago
VABK an hour ago
BAFN an hour ago
VRA an hour ago
XAEIU an hour ago
XXAAU an hour ago
ANSC an hour ago
LGMK an hour ago
NKSH an hour ago
BVFL an hour ago
MNPR an hour ago
GRHI 3 hours ago
OXM 3 hours ago
HAFG 3 hours ago
IWAL 4 hours ago
SHFH 4 hours ago
EPSN 4 hours ago
IPWR 5 hours ago
CMTV 5 hours ago
WENN 21 hours ago
GTERA 21 hours ago
CCXI 21 hours ago
PAAC 21 hours ago
NRDE 21 hours ago
SLND 21 hours ago
SGP 21 hours ago
GPAT 21 hours ago
SFRX 21 hours ago
DBVT 21 hours ago
ANF 21 hours ago
DRMA 21 hours ago
ORMP 21 hours ago
CVSI 21 hours ago
BUDA 21 hours ago
WRAP 21 hours ago
NMAX 21 hours ago
OACC 21 hours ago
ZNTL 22 hours ago
CEPF 22 hours ago
CV 22 hours ago
RANI 22 hours ago
QNRX 22 hours ago
WKSP 22 hours ago
RNTX 22 hours ago
CD 22 hours ago
LINK 22 hours ago
ULTA 22 hours ago
VANI 22 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard