v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Governance & Risk Management

The Board oversees cybersecurity strategy, with management ensuring compliance and enforcement. Key measures include:

 

  • Risk Assessments: Continuous monitoring of threats and vulnerabilities.
  • Incident Response: A structured plan for rapid mitigation and resolution.
  • Third-Party Security: Due diligence on vendors and partners.
  • Regulatory Compliance: Adherence to industry standards and legal requirements.

Data Protection & Incident Response

CETI safeguards sensitive data with:

 

  • Encryption & Access Controls: Secure storage and restricted access.
  • Employee Training: Awareness programs on cyber threats.
  • Breach Response: Rapid containment, forensic analysis, and regulatory notifications.

Cybersecurity Investments

CETI continuously enhances security through:

 

  • Advanced threat detection systems.
  • Regular penetration testing.
  • Collaboration with cybersecurity experts.

Forward-Looking Statements

While CETI implements strong cybersecurity measures, no system is completely immune to threats. The Company remains vigilant in strengthening its security post.

Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Role of Management [Text Block]
  • Encryption & Access Controls: Secure storage and restricted access.
  • Employee Training: Awareness programs on cyber threats.
  • Breach Response: Rapid containment, forensic analysis, and regulatory notifications.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]

 

  • Advanced threat detection systems.
  • Regular penetration testing.
  • Collaboration with cybersecurity experts.