ALEXANDER TECH CORP 10-K Cybersecurity GRC - 2025-07-18

Page last updated on July 18, 2025

ALEXANDER TECH CORP reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-07-18 16:50:57 EDT.

Filings

10-K filed on 2025-07-18

ALEXANDER TECH CORP filed a 10-K at 2025-07-18 16:50:57 EDT
Accession Number: 0001539497-25-001920

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity. We presently do not have any substantial activities that require cybersecurity strategies; however the following will be adopted once we begin operations: We recognize that cybersecurity risks pose a significant threat to the confidentiality, integrity and availability of our information systems, and to our ability to execute on our business strategy and protect stakeholder interests. Our approach to cybersecurity is anchored in formal policies, robust controls, ongoing risk assessment and clear governance structures. Governance and Oversight Our sole director, who also serves as our Chief Executive Officer and Chief Financial Officer, has ultimate responsibility for cybersecurity oversight. This individual: - Reviews our cybersecurity program and risk profile at least quarterly. - Approves our cybersecurity policies, standards and incident response procedures; and - Monitors management’s implementation of recommended improvements. Management’s Cybersecurity Risk Management and Strategy Our cybersecurity program is designed to align with industry’s best practices, including the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). Key elements include: - Regular risk assessments and vulnerability scans across our network and cloud environments. - Formal policies covering access control, data protection, encryption, system configuration and change management. - Tiered security controls (e.g., firewalls, endpoint protection, multi-factor authentication) to guard against unauthorized access. - Security awareness training for all personnel, with annual refreshers and real-time phishing simulations; and - Third-party vendor assessments to ensure service providers meet our cybersecurity requirements. Incident Response, Monitoring and Detection We maintain a documented incident response plan detailing roles, responsibilities, communication protocols and escalation paths. In the past fiscal year: - We deployed continuous monitoring tools and log-management platforms to detect anomalous activity; - We conducted at least two tabletop exercises simulating a breach scenario and tested our response readiness; and - We established notification procedures to comply with applicable laws and to inform affected stakeholders promptly in the event of an incident. Cybersecurity Risks and Outlook While we have not experienced any material cybersecurity incidents during the fiscal year ended April 30, 2025, we acknowledge that evolving threats such as ransomware, social-engineering attacks and supply-chain vulnerabilities could materially disrupt our operations or expose sensitive information. We continue to: - Invest in strengthening endpoint and network defenses; - Enhance logging, detection and response capabilities; and - Revisit our risk assessments and incident response playbooks to address emerging threat vectors. We believe our cybersecurity governance, risk management processes and incident response program provide a strong foundation for managing risks, but no cybersecurity program can eliminate all risks entirely. We will continue to evolve our defenses in line with industry developments and regulatory expectations.


Company Information

NameALEXANDER TECH CORP
CIK0001347491
SIC DescriptionBlank Checks
Ticker
Website
CategoryNon-accelerated filer
Smaller reporting company
Emerging growth company
Fiscal Year EndApril 29