Lithium Corp - (LTUM)
10-K Filing Date: April 04, 2024
Risk Management and Strategy
The Company has processes for assessing, identifying, and managing material risks from cybersecurity threats. These processes are integrated into the Company’s overall risk management systems, as overseen by the Company’s board of directors, primarily through its audit committee.
Governance
Board of Directors
The audit committee of the Company’s board of directors, with the input of management, oversees the Company’s internal controls, including internal controls designed to assess, identify, and manage material risks from cybersecurity threats. The audit committee is informed of material risks, when applicable, from cybersecurity threats by the Company’s Chief Executive Officer. Updates on cybersecurity matters, including material risks and threats, are provided to the Company’s audit committee, and the audit committee provides updates to the Company’s board of directors at regular board meetings.
Management
Under the oversight of the audit committee of the Company’s board of directors, the Company’s Chief Executive Officer is primarily responsible for the assessment and management of material cybersecurity risks and establishing and maintaining adequate and effective internal controls covering cybersecurity matters.
The audit committee of the Company’s board of directors, with the assistance of the Company’s Chief Executive Officer, is responsible for overseeing the establishment and effectiveness of controls and other procedures, including controls and procedures related to the public disclosure of material cybersecurity matters.
As of the date of this report, other than the foregoing, the Company is not aware of any cybersecurity incidents that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition and that are required to be reported in this report. For further discussion of the risks associated with cybersecurity incidents, see the cybersecurity risk factors in Item 1A. Risk Factors in this report.