Galaxy Gaming, Inc. - (GLXZ)
10-K Filing Date: March 22, 2024
Risk Management and Strategy
We have developed and implemented cybersecurity risk management processes intended to protect the confidentiality, integrity and availability of our critical systems and information.
Our cybersecurity risk management program includes:
We have not identified risks from known cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. See Item 1A. “Risk Factors – Cyber-attacks or other failures in our telecommunications or information technology systems, or those of our collaborators, third-party logistics providers, distributors or other contractors or consultants, could result in information theft, data corruption and significant disruption of our business operations.”
Governance
Our Board considers cybersecurity risk as part of its risk oversight function. The Board receives periodic reports from management on the integrity of our technology communication infrastructure and any cybersecurity risks. In addition, management updates the Board, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Our management team, including our Chief Financial Officer, along with third party infrastructure providers are responsible for assessing and managing our material risks from cybersecurity threats. Our Chief Financial Officer has primary responsibility for our overall cybersecurity risk management program. Our Chief Financial Officer has experience supervising and managing company information technology departments.
Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from external security personnel; threat intelligence and other information obtained from governmental, public or private sources; and alerts and reports produced by security tools deployed in the information technology environment.