---
ticker: DOV
company: Dover Corporation
filing_type: 10-K
year_current: 2024
year_prior: 2023
risks_added: 1
risks_removed: 1
risks_modified: 1
risks_unchanged: 14
source: SEC EDGAR
url: https://riskdiff.com/dov/2024-vs-2023/
markdown_url: https://riskdiff.com/dov/2024-vs-2023/index.md
generated: 2026-05-11
---

# Dover Corporation: 10-K Risk Factor Changes 2024 vs 2023

> Source: U.S. Securities and Exchange Commission (EDGAR)  
> Generated: 2026-05-11  
> All data extracted directly from official filings. No hallucinated content.

> **[AI-Generated Summary]** The paragraph below was produced by a language
> model and may contain errors. All other content on this page is deterministically
> extracted from the original SEC filing.

> Dover Corporation removed its COVID-19-specific risk disclosure and replaced it with a broader natural disasters and geopolitical risks statement that encompasses pandemics alongside war, terrorism, and other crises. The cybersecurity risk disclosure was substantively modified, likely reflecting evolving threat landscapes and operational dependencies. These changes suggest Dover shifted from pandemic-focused contingency planning to a more comprehensive enterprise risk framework addressing multiple categories of external disruptions.

---

## Summary

| Status | Count |
|--------|-------|
| New risks added | 1 |
| Risks removed | 1 |
| Risks modified | 1 |
| Unchanged | 14 |

---

## New in Current Filing: •Our businesses or operations may be adversely affected by natural or human-induced disasters, acts of war, terrorism, international conflicts, and public health crises.

Our businesses or operations may be adversely affected by natural or human-induced disasters including, but not limited to, earthquakes; tsunamis; floods; hurricanes, cyclones or typhoons; fires; other extreme weather conditions; power or water shortages; telecommunications failures; materials scarcity; terrorist acts, civil unrest, conflicts or wars; and health epidemics or pandemics. The occurrence of any such event, and the measures taken in response thereto, may disrupt the global economy and adversely impact our operations, including demand for our products across multiple end-markets as well as our supply chain and operations. Existing insurance coverage may not provide protection for all of the costs that may arise from such events. Additionally, concerns over the economic impact of such events could cause increased volatility in financial and other capital markets, adversely impacting our stock price, our ability to access the capital markets, and our ability to fund liquidity needs. The impacts of any such unexpected event are difficult to predict but could have a material adverse effect on our businesses, financial condition, or operations.

---

## No Match in Current: •The COVID-19 pandemic has adversely impacted, and continues to pose risks to, our businesses, the nature and extent of which are highly uncertain and unpredictable.

*This section from the 2023 filing does not have a high-confidence textual match in 2024. It may have been removed, merged, or substantially reworded.*

The COVID-19 pandemic has disrupted the global economy and adversely impacted our businesses, including demand for our products across multiple end-markets as well as our supply chain and operations. While we have experienced sequentially improving activity in most markets and geographies, the public health situation, global response measures and corresponding impacts on various markets remain fluid and uncertain and may lead to sudden changes in trajectory and outlook. Accordingly, we are currently unable to quantify the full and long-term impact of the pandemic on our results of operations, financial position and cash flows. We have taken and will continue to take steps to mitigate the risks of COVID-19 by working with our customers, employees, suppliers and other stakeholders. The emergence of new variants of COVID-19, evolving government plans around the world to institute vaccination mandates, including in the U.S., and limited availability of vaccines in various jurisdictions, create uncertainty that may impact our employees and result in labor shortages and unforeseen costs. We cannot predict the potential for operating at reduced capacity or the size of the workforce that may be impacted by potential labor actions such as furloughs or layoffs. In addition, the uncertain recovery in demand has had business impacts, including increased material cost inflation (principally steel), labor availability issues and logistics costs increases. Some of our businesses have also been impacted from supplier component input availability issues. The extent to which our operations may be impacted by COVID-19 will depend on future developments that are highly uncertain, including the pandemic's duration, the emergence of different COVID-19 variants, the efficacy and adoption rates of vaccines, the availability of oral medicines and actions by governments and private enterprises to contain the outbreak or mitigate the impact of the pandemic. For example, applicable laws and government measures, such as U.S. federal vaccine mandates or Occupational Safety and Health Administration requirements for vaccination or regular testing, could also result in skilled labor impacts including voluntary attrition or difficulty finding labor or otherwise adversely affect our ability to operate our facilities, obtain materials and component inputs from suppliers or deliver our products in a timely manner. Furthermore, the pandemic has impacted and may further impact the broader economies of affected countries, including negatively impacting economic growth, the proper functioning of financial and capital markets, foreign currency exchange rates and interest rates. Due to the continuing uncertainties surrounding the pandemic, we are unable to determine the impact that it will have on our financial position, operating results and cash flows in future periods.

---

## Modified: •Our operations, businesses, products and business strategy are subject to cybersecurity risks.

**Key changes:**

- Reworded sentence: "Although we have several processes and procedures in place designed to manage and mitigate cybersecurity risk, our business is still subject to certain risks."
- Reworded sentence: "We continuously monitor and develop our systems to protect our technology infrastructure and data from misappropriation or corruption."
- Added sentence: "For additional information on our cybersecurity risk management, strategy and governance, see Item 1C."

**Prior (2023):**

We depend on our own and third party IT systems, including cloud-based systems and managed service providers, to store, process and protect our information and support our business activities. We also use third party IT systems to support employee data processing for our global workforce and to support customer business activities, such as transmitting payment information, providing mobile monitoring services, and capturing operational data. Additionally, some of our products contain computer hardware and software and offer the ability to connect to computer networks. Increasingly, our customers, including government customers, are requiring cybersecurity protections and mandating cybersecurity standards for our products. Our business has both an increasing reliance on IT systems and an increasing digital footprint as a result of changing technologies, connected devices and digital offerings, as well as expanded remote work policies. If these technologies, systems, products or services are damaged, cease to function properly, are compromised due to employee or third-party contractor error, user error, malfeasance, system errors, or other vulnerabilities, or are subject to cybersecurity attacks, such as those involving denial of service attacks, unauthorized access, malicious software, or other intrusions, including by criminals, nation states or insiders, our business may be adversely impacted. The impacts could include production downtimes, operational delays, and other impacts on our operations and ability to provide products and services to our customers; compromise of confidential, proprietary or otherwise protected information, including personal information and customer confidential data; destruction, corruption, or theft of data or intellectual property; manipulation, disruption, or improper use of these technologies, systems, products or services; financial losses from fraudulent transactions, remedial actions, loss of business or potential liability; adverse media coverage; and legal claims or legal proceedings, including regulatory investigations, actions and fines; and damage to our reputation. There has been a rise in the number of cyberattacks targeting confidential business information generally and in the manufacturing industry specifically, as well as an increase in cyberattacks targeting managed service providers, by both state-sponsored and criminal organizations. Moreover, there has been a rise in the number of 18 18 18 Table of Contents Table of Contents cyberattacks that depend on human error or manipulation, including phishing attacks or schemes that use social engineering to gain access to systems or perpetuate wire transfer or other frauds. These trends increase the likelihood of such events occurring as well as the costs associated with protecting against such attacks. It is possible for vulnerabilities in our IT systems to remain undetected for an extended period of time up to and including several years. We attempt to mitigate these risks by employing a number of measures, including employee training, systems monitoring and other technical security controls, a breach response plan, maintenance of backup and protective systems, and security personnel. Notwithstanding those measures, our systems, networks, products and services remain potentially vulnerable to known or unknown cybersecurity attacks and other threats, any of which could have a material adverse effect on our consolidated results of operations, financial condition and cash flows. We, and the service providers that we depend on to support our systems and business operations, are regularly the target of, and periodically respond to, cyberattacks, including phishing and denial-of-service attacks, and must continuously monitor and develop our systems to protect our technology infrastructure and data from misappropriation or corruption. In addition, a cybersecurity attack could persist for an extended period of time before being detected, and, following detection, it could take considerable time for us to obtain full and reliable information about the extent, amount and type of information compromised. During the course of an investigation, we may not know the full impact of the event and how to remediate it, and actions, decisions and mistakes that are taken or made may further increase the negative effects of the event on our business, results of operations and reputation. While we maintain insurance coverage that is intended to address certain aspects of cybersecurity risks, such insurance coverage may not cover all losses or all types of claims that arise. As cyber threats continue to evolve, cybersecurity and data protection laws and regulations continue to develop in the U.S. and globally, and our business continues to move towards increased online connectivity within our information systems and through more Internet-enabled products and offerings, we expect to expend additional resources to continue to build out our compliance programs, strengthen our information security, data protection and business continuity measures, and investigate and remediate vulnerabilities.

**Current (2024):**

Although we have several processes and procedures in place designed to manage and mitigate cybersecurity risk, our business is still subject to certain risks. We depend on our own and third party information systems, including cloud-based systems and managed service providers, to store, process and protect our information and support our business activities. We also use third party systems to support employee data processing for our global workforce and to support customer business activities, such as transmitting payment information, providing mobile monitoring services, and capturing operational data. Additionally, some of our products contain integrated hardware and software and offer the ability to connect to networks. While we have measures in place that are designed to protect these systems, these systems have been and are expected to continue to be the target of cyber attacks. Although we conduct security assessments and 18 18 18 Table of Contents Table of Contents periodic re-assessments of third party partners and other service providers, our systems may also experience vulnerabilities from third-party or open source software code that may be incorporated into our own or our vendors' systems. Any prolonged system disruption in our systems or third-party services could negatively impact the coordination of our sales, planning, and manufacturing activities, which could harm our business. Our business has both an increasing reliance on systems and an increasing digital footprint as a result of changing technologies, connected devices and digital offerings, as well as expanded remote work policies. If these technologies, systems, products or services are damaged, cease to function properly, are compromised due to employee or third-party contractor error, user error, malfeasance, system errors, or other vulnerabilities, or are subject to cybersecurity attacks, such as those involving denial of service attacks, unauthorized access, malicious software, ransomware, or other intrusions, including by criminals, nation states or insiders, our business may be adversely impacted. The impacts could include production downtimes, operational delays, and other impacts on our operations and ability to provide products and services to our customers; compromise of confidential, proprietary or otherwise protected information, including personal information and customer confidential data; destruction, corruption, or theft of data or intellectual property; manipulation, disruption, or improper use of these technologies, systems, products or services; financial losses from fraudulent transactions, remedial actions, loss of business or potential liability; adverse media coverage; legal claims or legal proceedings, including regulatory investigations, actions and fines; and damage to our reputation. We regularly assess our threat landscape and monitor our systems and other technical security controls, maintain information security policies and procedures, including a breach response plan, ensure maintenance of backup and protective systems, and have a team of security personnel managing our efforts and initiatives. However, there has been a rise in the number of cyberattacks targeting confidential business information generally and in the manufacturing industry specifically, as well as an increase in cyberattacks targeting managed service providers, by both state-sponsored and criminal organizations. Moreover, there has been a rise in the number of cyberattacks that depend on human error or manipulation, including phishing attacks or schemes that use social engineering to gain access to systems or perpetuate wire transfer or other frauds. These trends increase the likelihood of such events occurring as well as the costs associated with protecting against such events. It is possible for vulnerabilities in our systems to remain undetected for an extended period of time up to and including several years. We attempt to mitigate these risks by employing a number of measures, including employee training, systems monitoring and other technical security controls, vulnerability scanning, risk assessments, a breach response plan, maintenance of backup and protective systems, and security personnel. Notwithstanding those measures, our systems, networks, products and services remain potentially vulnerable to known or unknown cybersecurity attacks and other threats, any of which could have a material adverse effect on our consolidated results of operations, financial condition and cash flows. We continuously monitor and develop our systems to protect our technology infrastructure and data from misappropriation or corruption. However, a cybersecurity attack could persist for an extended period of time before being detected, and, following detection, it could take considerable time for us to obtain full and reliable information about the extent, amount and type of information compromised. During the course of an investigation, we may not know the full impact of the event and how to remediate it, and actions, decisions and mistakes that are taken or made may further increase the negative effects of the event on our business, results of operations and reputation. While we maintain insurance coverage that is intended to address certain aspects of cybersecurity risks, such insurance coverage may not cover all losses or all types of claims that arise. As cyber threats continue to evolve, cybersecurity and data protection laws and regulations continue to develop in the U.S. and globally, and our business continues to move towards increased online connectivity within our information systems and through more Internet-enabled products and offerings, we expect to expend additional resources to continue to build out our compliance programs, strengthen our information security, data protection and business continuity measures, and investigate and remediate vulnerabilities. For additional information on our cybersecurity risk management, strategy and governance, see Item 1C. "Cybersecurity."

---

*Data sourced from SEC EDGAR. Last updated 2026-05-11.*