Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - HWKE

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors.

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1B. Unresolved Staff Comments

We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.

Item 1C. Cybersecurity Disclosures.

We rely upon internally and externally managed information technology systems and networks for the collection and storage of sensitive data and business information. We approach cybersecurity risks with a comprehensive risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business.

Risk Management and Strategy

Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and availability of systems and information used, owned or managed by us. Our focus is on protecting sensitive information, such as personal information of our customers and employees, and confidential business information that could be leveraged by a competitor or a malicious actor.

Our cybersecurity program has several components, including the adoption of information security protocols, standards, and guidelines consistent with best industry practices; engaging third-party service providers to conduct security assessments and penetration testing; and performing periodic internal audits of our cybersecurity protocols. We employ a risk-based process designed to manage cybersecurity risks presented by third-party vendors that may have access to our sensitive information and/or information technology (“IT”) systems. This process may consider the nature of the services provided, the sensitivity and quantity of information processed, the criticality of any potentially impacted IT systems, and/or the strength of the vendor’s cybersecurity practices.

We monitor potential cybersecurity risks through tracking. These key risks are characterized by various factors such as the likelihood of us experiencing a particular type of cybersecurity incident, the speed at which each type of cybersecurity incident could impact the Company, and management’s assessment of the Company’s ability to respond quickly and efficiently.

An incident response plan aligned with best practices guidelines governs our response to cybersecurity incidents. The incident response plan outlines how we can detect, analyze, contain, eradicate, recover, and perform post-incident activities in the event of a cybersecurity incident. It also contains an internal, risk-based escalation framework designed to ensure that all relevant individuals are promptly informed of any cybersecurity incident and dictates procedures for determining whether a cybersecurity incident is material without unreasonable delay.

Material Effects from Risks of Cybersecurity Threats

While we may experience minor data and cybersecurity incidents from time to time, to our knowledge, the risks posed by cybersecurity threats have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. However, there can be no assurance that we will not be materially affected by such risks in the future. A successful cybersecurity attack may expose us to misuse of information or systems, the compromising of confidential information, manipulation or destruction of data, production downtimes, and operations disruptions.

Governance

Role of Management

One of the key functions of our executive officers, in connection with our IT team, is informed oversight of our risk management process, which includes risks from cybersecurity threats. Our executive ooficers monitor and assess strategic risk exposure, and manage the material risks we face.

Our executive officers who have experience in IT, work with our board of directors to manage our cybersecurity policies and processes. Together, they stay informed and manage how we identify, address, prevent and resolve cybersecurity issues and related matters. They also track how we prevent, identify, lessen, and address cybersecurity issues. This is done through regular checks of our systems, tests to identify security weaknesses, and maintaining an incident response plan.

In addition to such regular system checks, our executive officers, together with the board of directors, regularly discuss active, emerging and potential cybersecurity risks. They keep each other informed about significant changes affecting cybersecurity, and they periodically update management with these changes, as well as our cybersecurity risks, so that management can administer its oversight function as a part of its broader oversight and risk management.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
AVGO 14 hours ago
TOL 15 hours ago
CSPI 15 hours ago
CIEN 16 hours ago
A 1 day, 12 hours ago
ARKR 1 day, 14 hours ago
LTCH 1 day, 14 hours ago
LIVE 1 day, 14 hours ago
HEI 1 day, 14 hours ago
ESOA 1 day, 15 hours ago
AVO 1 day, 15 hours ago
JOB 1 day, 15 hours ago
ABM 1 day, 15 hours ago
MGYR 1 day, 15 hours ago
OPXS 1 day, 15 hours ago
HPE 1 day, 23 hours ago
NDSN 2 days, 14 hours ago
HOV 2 days, 14 hours ago
NVOS 2 days, 15 hours ago
YCBD 2 days, 15 hours ago
TTC 2 days, 18 hours ago
APDN 3 days, 14 hours ago
KEYS 3 days, 15 hours ago
SONN 3 days, 22 hours ago
NMTC 3 days, 22 hours ago
EPIX 4 days ago
UPXI 4 days, 14 hours ago
CMP 4 days, 14 hours ago
QIPT 4 days, 14 hours ago
MITK 4 days, 14 hours ago
ALID 4 days, 14 hours ago
RICK 4 days, 15 hours ago
ASRE 4 days, 15 hours ago
VERU 4 days, 15 hours ago
NX 5 days, 1 hour ago
FSFG 1 week ago
EDSA 1 week ago
ODRS 1 week ago
PRKA 1 week ago
AMAT 1 week ago
GNSS 1 week ago
LEE 1 week ago
ESSA 1 week ago
HPQ 1 week, 1 day ago
SDCH 1 week, 1 day ago
LPTV 1 week, 1 day ago
ASYS 1 week, 1 day ago
NGVC 1 week, 1 day ago
GTIM 1 week, 1 day ago
LQDT 1 week, 1 day ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard