{"url_path":"/sec/wnlv/10-k/2026/item-1c","section_key":"item-1c","section_title":"Item 1C CYBERSECURITY**","topic":"sec","document":{"doc_type":"10-K","doc_date":"2026-05-08","source_url":"https://www.sec.gov/Archives/edgar/data/1558740/0001477932-26-002885-index.html","accession_number":"0001477932-26-002885","cik":"0001558740","ticker":"WNLV","issuer_name":"Winvest Group Ltd","edgar_url":"https://www.sec.gov/Archives/edgar/data/1558740/0001477932-26-002885-index.html","primary_entity_key":"0001558740","primary_entity_name":"Winvest Group Ltd"},"word_count":260,"has_tables":true,"body_markdown":"**ITEM 1C. CYBERSECURITY**\n\n \n\nThe Company maintains processes for assessing, identifying, and managing material risks from cybersecurity threats as part of its overall enterprise risk management framework. These processes are applied to information systems supporting the registrant’s Contech AI studio operations, technology platform, and intellectual property development activities. Risk assessment and identification occur through continuous internal monitoring of network infrastructure, access controls, and data assets by designated management personnel responsible for cybersecurity oversight. Mitigation measures include implementation of technical controls, policy enforcement, and periodic reviews aligned with operational requirements and business objectives. The registrant has not engaged third-party service providers for independent cybersecurity evaluations as of the reporting date; risk evaluation is conducted internally by management with responsibility assigned to the executive team overseeing compliance and information technology functions. Ongoing monitoring of cybersecurity risks is performed by this management group through regular internal assessments and alignment with the registrant’s risk management program.\n\n \n\nThe Company recognizes the dynamic nature of cybersecurity threats and incorporates risk management into decision-making processes at all organizational levels. To address third-party service provider risks, the registrant conducts security assessments prior to engagement and maintains continuous oversight to ensure compliance with internal cybersecurity standards. Quarterly reviews by management and evaluation by internal security resources are utilized where applicable.\n\n \n\nAs of December 31, 2025, the Company has not identified any cybersecurity threats, including previous incidents, that have materially impacted our business strategy, results of operations, or financial condition. This assertion signifies our diligent efforts in managing and mitigating cybersecurity risks, contributing to the stability and continuity of our operations."}