Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - TAYD

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors.

Smaller reporting companies are not required to provide the information required by this item.

Item 1B. Unresolved Staff Comments.

None.

Item 1C. Cybersecurity

Risk Management and Strategy

In connection with the operation of the Company’s business, we identify, assess and manage key risks that may affect the Company, including material risks from cybersecurity threats, through our system security plan. Our system security plan is aligned with the 110 controls detailed in the NIST (SP) 800-171 and Department of Defense CMMC Level 2 guidelines for Cybersecurity. We have company-wide security policies, standards and controls that seek to incorporate best practices in security engineering, technology architecture and data protection. Our policies and controls include security measures designed to protect our systems against unauthorized access. We also maintain cybersecurity protection measures covering our information technology systems, including the protection of customer data, vendor data and employee information. We also maintain cybersecurity protection measures covering our information technology systems, including with respect to the protection of customer data, vendor data and employee information. We have also implemented specialized training and education programs to guard against cybersecurity incidents, including company-wide communications and presentations, phishing simulations, focused training for specific roles and a general cybersecurity training program required for all employees. We have also implemented specialized training and education programs to seek to guard against cybersecurity incidents, including company-wide communications and presentations, phishing simulations, focused training for specific roles and a general cybersecurity training program required for all employees.

We engage third parties to perform regular reviews of our security controls which includes 24/7/365 security incident and event management as well as vulnerability services and penetration testing. Our processes to identify, assess and manage material risks from cybersecurity threats include risks associated with our use of third-party service providers, including cloud-based platforms. We oversee and identify cybersecurity risks from our third-party service providers in a number of ways, including appropriate due diligence in connection with service provider onboarding, robust security terms and conditions in our third-party service provider contracts and ongoing risk-based monitoring to ensure compliance with our cybersecurity standards. We oversee and identify cybersecurity risks from our third-party service providers in a number of ways, including appropriate due diligence in connection with new third-party service provider onboarding, robust security terms and conditions in our third-party service provider contracts and ongoing risk-based monitoring to ensure compliance with our cybersecurity standards. We believe that these policies and controls provide us with an appropriate assessment of potential cybersecurity threats.

As of the date of this Annual Report on Form 10-K (this “Form 10-K”), we are not aware of any risks from any potential cybersecurity threat or from any previous cybersecurity incident that have materially affected or are likely to materially affect our business strategy, results of operations or financial condition. However, the preventative actions we have taken and continue to take to reduce the risk of cybersecurity threats and incidents may not successfully protect against these potential threats and incidents in the future.

Governance

The Company’s Board of Directors is responsible for overseeing management’s identification, assessment and management of key risks, including cybersecurity risks.

Our Director of Information Technology, Mitch Reszczenski, is primarily responsible for assessing and managing our cybersecurity risks. Mr. Reszczenski has over 29 years of extensive information technology experience in highly successful manufacturing, engineering and financial organizations. Mr. Reszczenski provides regular updates on cybersecurity risks and threats and key developments in Company policies, practices and related risk exposures to the Chief Executive Officer and Chief Financial Officer. Additionally, senior management provides an update to the Board of Directors on cybersecurity matters at least once a year, and more often as appropriate. The Board of Directors annually reviews and approves the capital and operating budgets, ultimately reviewing and approving the amount spent by the Company on cybersecurity measures.


6



Mr. Reszczenski works with senior management to implement and oversee processes for the regular monitoring of our information systems. If a cybersecurity incident involving the Company were to occur, Mr. Reszczenski would engage senior management to initially determine the potential materiality of the incident, the potential need for public disclosure, the timing and extent of the Company’s response and whether any future vulnerabilities are expected. As part of this evaluation, senior management would also identify immediate actions to mitigate the impact and long-term strategies for remediation and prevention of future cybersecurity incidents. After an initial evaluation by senior management, the relevant information regarding the cybersecurity incident and its materiality would be promptly reported to the Company’s Board of Directors for further review and evaluation, including as to whether public disclosure would be required or advisable.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
BIVI 35 minutes ago
EAT 51 minutes ago
AMCR an hour ago
HRB an hour ago
TEAM an hour ago
AIT 8 hours ago
INBS 9 hours ago
TAYD 9 hours ago
COHR 20 hours ago
AVT 23 hours ago
TPR 1 day, 10 hours ago
MSS 1 day, 19 hours ago
WDC 1 day, 21 hours ago
YYAI 2 days ago
SRCO 2 days ago
MSGE 2 days, 1 hour ago
PFGC 2 days, 1 hour ago
CMPR 1 week ago
LNBY 1 week ago
RMD 1 week ago
CRMT 1 week, 1 day ago
PTON 1 week, 1 day ago
LFCR 1 week, 1 day ago
ATGE 1 week, 1 day ago
OTEX 1 week, 1 day ago
CACI 1 week, 1 day ago
ADP 1 week, 2 days ago
PCTY 1 week, 2 days ago
NWSA 1 week, 2 days ago
FOXA 1 week, 2 days ago
LRN 1 week, 3 days ago
NRUC 1 week, 3 days ago
BR 1 week, 3 days ago
PG 1 week, 4 days ago
RELL 1 week, 4 days ago
CNTM 1 week, 4 days ago
SXI 1 week, 6 days ago
STX 2 weeks ago
TPCS 2 weeks, 2 days ago
MSFT 2 weeks, 2 days ago
APLD 2 weeks, 2 days ago
WOR 2 weeks, 2 days ago
NEOG 2 weeks, 2 days ago
WS 2 weeks, 3 days ago
USAU 2 weeks, 3 days ago
NORD 2 weeks, 3 days ago
MMEX 2 weeks, 3 days ago
GFMH 2 weeks, 3 days ago
VALU 2 weeks, 3 days ago
UUU 2 weeks, 3 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard