Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Sep. 30, 2024 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Graphjet Technology recognizes the critical importance of developing, implementing, and maintaining robust cybersecurity measures to safeguard our information systems and protect the confidentiality, integrity, and availability of our data. Our risk management team is evaluating and addressing cybersecurity risks in alignment with our business objectives and operational needs. Engage Third-parties on Risk Management Recognizing the complexity and evolving nature of cybersecurity threats, Graphjet Technology has started in negotiating and engaging with a range of external experts, including cybersecurity assessors, consultants, and auditors in evaluating and testing our risk management systems. These partnerships will enable us to leverage specialized knowledge and insights, ensuring our cybersecurity strategies and processes remain at the forefront of industry best practices. Oversee Third-party Risk Because we are aware of the risks associated with third-party service providers, Graphjet Technology will implement stringent processes to oversee and manage these risks. We will conduct thorough security assessments of all third-party providers before engagement and maintain ongoing monitoring to ensure compliance with our cybersecurity standards Risks from Cybersecurity Threats We have not encountered cybersecurity challenges that have materially impaired our operations or financial standing. Cybersecurity Governance The Board of Directors considers cybersecurity risk as critical and delegates cybersecurity risk oversight to the Audit Committee. The Audit Committee thoroughly evaluates our cybersecurity program, risks and corresponding mitigations. |
Cybersecurity Risk Role of Management [Text Block] | Recognizing the complexity and evolving nature of cybersecurity threats, Graphjet Technology has started in negotiating and engaging with a range of external experts, including cybersecurity assessors, consultants, and auditors in evaluating and testing our risk management systems. |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Because we are aware of the risks associated with third-party service providers, Graphjet Technology will implement stringent processes to oversee and manage these risks. We will conduct thorough security assessments of all third-party providers before engagement and maintain ongoing monitoring to ensure compliance with our cybersecurity standards |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | We have not encountered cybersecurity challenges that have materially impaired our operations or financial standing. |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Board of Directors Oversight [Text Block] | The Board of Directors considers cybersecurity risk as critical and delegates cybersecurity risk oversight to the Audit Committee. |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Board of Directors considers cybersecurity risk as critical and delegates cybersecurity risk oversight to the Audit Committee. The Audit Committee thoroughly evaluates our cybersecurity program, risks and corresponding mitigations. |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee thoroughly evaluates our cybersecurity program, risks and corresponding mitigations. |