XML 37 R26.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] While to date we have not encountered any cybersecurity incidents, any sophisticated and deliberate attacks on, or security breaches in, our systems or infrastructure could lead to corruption or misappropriation of proprietary information and sensitive or confidential data.

RED Technologies has developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity and availability of RED Technologies’ critical systems and information. RED Technologies’ cybersecurity risk management program includes a cybersecurity incident response plan. RED Technologies designs and assesses its program based on ISO 27002 standards. This does not imply that RED Technologies meets any particular technical standards, specifications, or requirements, only that it uses the ISO 27002 as a guide to help it identify, assess, and manage cybersecurity risks relevant to its business. RED Technologies uses established processes designed to identify, assess, and manage third-party service provider risks when third parties handle, possess, process, and store RED Technologies’ material information. RED Technologies’ cybersecurity risk management program includes (i) a policy designed to help identify material cybersecurity risks to its critical systems, information, products, services, and its broader enterprise information technology environment and (ii) a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents. RED Technologies has not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect RED Technologies, including its operations, business strategy, results of operations, or financial condition. However, there can be no assurance that RED Technologies’ cybersecurity prevention and mitigation efforts will always be successful, and it is possible that cybersecurity threats could have a material adverse effect on our business, operations, or financial condition in the future.

As a smaller reporting company with cybersecurity processes centered on RED Technologies, we may not be sufficiently protected against such occurrences. See Item 1A. Risk Factors, “Cyber incidents or attacks directed at us could result in information theft, data corruption, operational disruption and/or financial loss” of this Annual Report for a discussion of cybersecurity-related risks
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] RED Technologies uses established processes designed to identify, assess, and manage third-party service provider risks when third parties handle, possess, process, and store RED Technologies’ material information. RED Technologies’ cybersecurity risk management program includes (i) a policy designed to help identify material cybersecurity risks to its critical systems, information, products, services, and its broader enterprise information technology environment and (ii) a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents. RED Technologies has not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect RED Technologies, including its operations, business strategy, results of operations, or financial condition.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The audit committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The audit committee is responsible to discuss with management any significant risks or exposures, and as necessary report such risks or exposures to our board of directors.
Cybersecurity Risk Role of Management [Text Block] We are a smaller reporting company. While management monitors our exposure to cybersecurity risk, as a whole, CONX Corp. has not adopted specific processes for assessing and managing such risk.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true