Page last updated on April 1, 2025
BLUSKY AI INC. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2025-03-31 19:20:56 EDT.
Filings
10-K filed on 2025-03-31
BLUSKY AI INC. filed a 10-K at 2025-03-31 19:20:56 EDT
Accession Number: 0001096906-25-000357
Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!
Item 1C. Cybersecurity.
ITEM 1C: CYBERSECURITY Our board of directors and senior management recognize the critical importance of maintaining the trust and confidence of our clients, business partners and employees. Our management, led by our Chief Executive Officer, is actively involved in oversight of our risk management efforts, and cybersecurity represents an important component of the Company’s overall approach to enterprise risk management (“ERM”). Our cybersecurity processes and practices are fully integrated into the Company’s ERM efforts. In general, we seek to address cybersecurity risks through a cross-functional approach that is focused on preserving the confidentiality, security and availability of the information that we collect and store by identifying, preventing and mitigating cybersecurity threats and effectively responding to cybersecurity incidents when they occur. In addition, we regularly review cybersecurity trends and, partially as a result of our prior cybersecurity exposure, have moved some of our internal servers to off-site locations. Data security within a data center : Is provided by a combination of dedicated security personnel , advanced technologies, and stringent protocols. This includes physical security measures like access control systems, surveillance, and security personnel, as well as cybersecurity measures like firewalls, intrusion detection, and data encryption. 1. Physical Security: · Access Control: Only authorized personnel are allowed access to specific areas of the data center, often using biometric scanners, keycards, and PIN codes. · Surveillance: CCTV cameras and motion sensors monitor the premises around the clock, deterring unauthorized access and identifying suspicious activities. · Security Personnel: Trained security guards patrol the perimeter and inside the building, ensuring 24/7 protection. · Perimeter Security: Fencing, security gates, and other measures restrict access to the data center facility. · Key Management: Strict procedures are in place for issuing, controlling, and auditing physical keys, ensuring they are not lost or misused. 2. Cybersecurity: · Firewalls and Intrusion Detection Systems: These technologies monitor network traffic and block unauthorized access, protecting against cyberattacks. · Data Encryption: Sensitive data is encrypted both in transit and at rest, making it unreadable to unauthorized parties. · Network Segmentation: Isolating different parts of the network to prevent the spread of malware and other threats. · Security Operations Centers (SOCs): Dedicated teams monitor the data center for security incidents and respond to threats in real-time. · Vulnerability Management: Regular assessments and patching of systems and software to address security vulnerabilities. · Compliance: Adherence to industry standards and regulations, such as PCI DSS for processing payment card information. · Remote Security Management: Cloud-based security management systems enable staff to monitor and manage security remotely from secure devices. · Secure Building Management Systems: Securing access to remote technicians who maintain the building, and ensuring that the systems that manage the building are also secured. Risk Management and Strategy As one of the critical elements of our overall ERM approach, our cybersecurity efforts are focused on the following key areas: ● Governance: Management oversees cybersecurity risk mitigation and reports to the board of directors any cybersecurity incidents. ● Collaborative Approach: We have implemented a cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner. ● Technical Safeguards : We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence. Third parties also play a role in our cybersecurity. We engage third-party service providers to conduct evaluations of our security controls, independent audits or consulting on best practices to address new challenges. While we have experienced cybersecurity threats in the past in the normal course of business and expect to continue to experience such threats from time to time, to date, none have had a material adverse effect on our business, financial condition, results of operations or cash flows. Even with the approach we take to cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on us.
Company Information
Name | BLUSKY AI INC. |
CIK | 0001416090 |
SIC Description | Gold and Silver Ores |
Ticker | IMII - OTCIMIID - OTC |
Website | |
Category | Non-accelerated filer Smaller reporting company |
Fiscal Year End | December 30 |