v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] The Company recognizes the increasing complexity and significance of cybersecurity risks in safeguarding its technology, operations, proprietary systems, and data. The Company’s operations rely on interconnected digital infrastructure, cloud-based systems, and proprietary software platforms, including systems supporting digital asset management and cryptocurrency operations, making cybersecurity an essential component of its risk management framework.

 

The Company has implemented a cybersecurity program designed to identify, assess, mitigate, and respond to cybersecurity risks. This program is informed by recognized industry practices, including the National Institute of Standards and Technology (“NIST”) Cybersecurity Framework (“CSF”). The following disclosure outlines the Company’s cybersecurity risk management strategy and governance, including the Board’s oversight and management’s role.

 

1. Cybersecurity Risk Management

 

The Company employs a structured cybersecurity risk management program to assess, identify, and manage cybersecurity risks across its information technology environment, including corporate systems and cloud-based platforms. The Company currently operates in part through shared IT infrastructure and personnel, which provides continuity of cybersecurity controls and practices while the Company develops its standalone capabilities. Key elements of the program include:

 

Risk assessments and periodic evaluation of cybersecurity risks across systems and environments.
Threat detection and monitoring, including alert triage and investigation, to identify suspicious activity and potential incidents.
Vulnerability management, including scanning, prioritization, and remediation activities.
Access controls and security protections, including multi-factor authentication, encryption protocols, and endpoint security measures where appropriate.
Third-party risk management, including evaluation of vendors and service providers that may access Company data or systems.
Cybersecurity risks are evaluated in coordination with management and are considered within the Company’s broader operational and enterprise risk considerations.

 

2. Governance and Oversight

 

Cybersecurity oversight is a shared responsibility between the Company’s Board of Directors and management. The Vice President provides cybersecurity updates to the full Board as appropriate, including information regarding the Company’s cybersecurity posture, risk environment, incident trends, and mitigation efforts. The Company is in the process of establishing a formal cadence of cybersecurity reporting to the Board as part of its ongoing business transition. In addition to scheduled updates, management’s incident response procedures require that potential material cybersecurity incidents are escalated to senior leadership and the Board promptly, as appropriate. The Company enforces a top-down approach to cybersecurity governance, ensuring accountability and continuous risk monitoring at all levels of the organization.

 

3. Management’s Role in Cybersecurity

 

Management is responsible for the day-to-day execution of the Company’s cybersecurity program. The Vice President oversees cybersecurity initiatives and supervises cybersecurity personnel and processes. The Company’s cybersecurity incident response governance is supported by an Incident Response Policy that is in the process of being established and will define roles and responsibilities, incident classification, documentation expectations, evidence preservation requirements, and communication protocols.

 

4. Cybersecurity Strategy and Resilience

 

The Company maintains cybersecurity resilience measures designed to support business continuity and protect critical assets. These measures include monitoring and response capabilities, as well as processes for containment, remediation, and recovery when incidents occur.

 

5. Material Cybersecurity Incidents

 

During fiscal year 2025, the Company did not experience any material cybersecurity incidents. No cybersecurity incidents required disclosure under Form 8-K Item 1.05 during 2025.

 

6. Impact of Cyber Incidents

 

Cybersecurity incidents, if material, could adversely affect the Company’s financial condition, results of operations, operational stability, and reputation. Potential impacts may include remediation costs, operational disruptions, litigation or regulatory exposure, and reputational harm. The Company evaluates cybersecurity risks as part of its ongoing risk assessment processes.

 

7. Board Expertise in Cybersecurity

 

The Board’s cybersecurity oversight is informed through management briefings and periodic updates. The Company may enhance Board education on cybersecurity trends and governance practices as appropriate.

 

8. Use of Third-Party Services

 

The Company uses third-party service providers to support certain technology and security functions. Digital asset custody services are provided by BitGo, a qualified custodian maintaining its own security controls and compliance frameworks. The Company evaluates third-party cybersecurity risks through vendor due diligence processes, including review of security documentation and reports where applicable, and monitors third-party risks on an ongoing basis. Given the nature of the Company’s cryptocurrency-focused operations, the security practices of digital asset custodians and blockchain infrastructure providers are a particular focus of the Company’s third-party risk management process.

  

9. Regulatory and Legal Compliance Risks

 

The Company is subject to cybersecurity and data privacy requirements, including applicable data privacy laws and SEC disclosure requirements. Failure to comply with applicable requirements could result in financial penalties, legal liabilities, and reputational harm. The Company performs compliance-focused activities as part of its cybersecurity program.

 

10. Incident Response Plan

 

The Company maintains an incident response policy framework intended to support timely identification, containment, investigation, remediation, and recovery. Incident response procedures include incident severity classification, escalation, documentation, evidence preservation, and communications protocols.

 

11. Cyber Insurance

 

The Company does not maintain standalone cybersecurity insurance coverage. The Company evaluates risk mitigation and risk transfer options as part of its broader risk management considerations.

 

12. Historical Cyber Incidents

 

The Company did not record any material cybersecurity incidents during fiscal year 2025.

 

13. Technology and Infrastructure Risks

 

The Company’s cybersecurity program includes measures intended to protect systems and data, including monitoring, endpoint protections, access controls, and vulnerability management. As cybersecurity threats continue to evolve, the Company may adjust its cybersecurity tools, processes, and controls over time.

 

14. Data Security and Privacy Policies

 

The Company maintains policies and controls intended to protect sensitive data, including access controls and other security measures designed to safeguard data confidentiality and integrity.

 

15. Ongoing Cybersecurity Efforts

 

The Company continues to invest in cybersecurity capabilities, including monitoring, vulnerability management, employee awareness training, and improvements to policies and procedures, to address evolving cybersecurity threats. As a company in transition, the Company expects to continue developing its standalone cybersecurity infrastructure and formalizing its governance processes accordingly.

 
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity oversight is a shared responsibility between the Company’s Board of Directors and management.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board’s cybersecurity oversight is informed through management briefings and periodic updates. The Company may enhance Board education on cybersecurity trends and governance practices as appropriate.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management is responsible for the day-to-day execution of the Company’s cybersecurity program. The Vice President oversees cybersecurity initiatives and supervises cybersecurity personnel and processes.