Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Jan. 31, 2026 | ||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Cybersecurity
Risk Management and Strategy We, like other companies in our industry, face several cybersecurity risks in connection with our business. Our business strategy, results of operations, and financial condition have not, to date, been materially affected by risks from cybersecurity threats. During the reporting period, we have not experienced any material cyber incidents, nor have we experienced a series of immaterial incidents, which would require disclosure.
We will implement a cybersecurity program in the future. The program will be aimed at safeguarding the confidentiality, integrity, and availability of our essential systems and information, and will be designed to detect and mitigate risks from cybersecurity threats to our data and our systems. Central to our future cybersecurity efforts will be a robust incident response plan designed to address potential cyber incidents swiftly and effectively.
In designing and evaluating our cybersecurity program, we will adopt the National Institute of Standards and Technology Cybersecurity Framework (“NIST CSF 2.0”) as a guiding principle. It is important to clarify that our use of the NIST CSF 2.0 is for guidance purposes to frame our risk identification, assessment and management processes and does not equate to compliance with any specific technical standards or requirements.
The key components of our future cybersecurity program will include:
|
|||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | The program will be aimed at safeguarding the confidentiality, integrity, and availability of our essential systems and information, and will be designed to detect and mitigate risks from cybersecurity threats to our data and our systems. Central to our future cybersecurity efforts will be a robust incident response plan designed to address potential cyber incidents swiftly and effectively. | |||||||||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | Our business strategy, results of operations, and financial condition have not, to date, been materially affected by risks from cybersecurity threats. During the reporting period, we have not experienced any material cyber incidents, nor have we experienced a series of immaterial incidents, which would require disclosure. | |||||||||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Cybersecurity
Governance The governance of cybersecurity risks is a critical function of our Board of Directors which has a key role in the oversight of cybersecurity and related technology risks. The Board of Directors is tasked with monitoring the effectiveness of our cybersecurity risk management program as implemented by management.
The Board of Directors will receive regular updates from management on the state of cybersecurity risks facing the Company. This includes briefings on any significant cyber incidents and ongoing risk management efforts.
The responsibility for day-to-day management of cybersecurity risks lies with our management team, including the Chief Financial Officer and Chief Executive Officer. This team will be at the forefront of our cybersecurity initiatives, coordinating both internal and external resources to anticipate, identify, and mitigate cyber threats. Our approach will include regular updates from our third-party security expert consultant, leveraging intelligence from various sources, and utilizing advanced security tools to protect our digital environment.
|
|||||||||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board of Directors will receive regular updates from management on the state of cybersecurity risks facing the Company. This includes briefings on any significant cyber incidents and ongoing risk management efforts. | |||||||||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | our Board of Directors which has a key role in the oversight of cybersecurity and related technology risks. | |||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The responsibility for day-to-day management of cybersecurity risks lies with our management team, including the Chief Financial Officer and Chief Executive Officer. This team will be at the forefront of our cybersecurity initiatives, coordinating both internal and external resources to anticipate, identify, and mitigate cyber threats. Our approach will include regular updates from our third-party security expert consultant, leveraging intelligence from various sources, and utilizing advanced security tools to protect our digital environment. |