WISA TECHNOLOGIES, INC. - (WISA)
10-K Filing Date: April 01, 2024
Cybersecurity.
Risk management and strategy
We do not believe that we face significant cybersecurity risk and have not adopted a formal cybersecurity risk management program or process for assessing cybersecurity risk currently. We assess material risks from cybersecurity threats on an ongoing basis, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. As we grow, we plan to develop a more robust and detailed strategy for cybersecurity in alignment with nationally accepted standards. We have not encountered cybersecurity challenges that have materially impaired our operations or financial standing. For additional information regarding risks from cybersecurity threats, please refer to the “Risk Factors” section of the Registration Statement on Form S-1 (File No.333-276631), as amended, originally filed by the Company with the Securities and Exchange Commission on January 19, 2024.
Governance
Our management and Board, including our Board’s audit committee (the “Audit Committee”), recognize the critical importance of maintaining the trust and confidence of our business partners and employees, including the importance of managing cybersecurity risks as part of our larger risk management program. While all of our personnel play a part in managing cybersecurity risks, one of the key functions of the Audit Committee is informed oversight of our risk management process, including risks from cybersecurity threats. The Audit Committee is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks that we face. In general, we seek to address cybersecurity risks through a cross-functional approach that is focused on preserving the confidentiality, integrity, and availability of the information that we collect and store by identifying, preventing, and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur.
12