Company Details
cgi
67,825
1,671,117
5415
cgi.com
0
CGI_1885774
In-progress

CGI Company CyberSecurity Posture
cgi.comInsights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally. We value your opinions and welcome your comments and questions on our posts here on LinkedIn. Please keep a polite, professional and constructive tone. We remove comments containing objectionable language and derogatory views. We do not allow content that is unrelated to the subject, and we remove discriminatory and racist comments as well as spam and advertising. Note that content on this page contains general information regarding CGI’s services and initiatives and should not be considered direct business advice. To engage in a discussion with one of our experts, please make a request through https://www.cgi.com/en/contact-us
Company Details
cgi
67,825
1,671,117
5415
cgi.com
0
CGI_1885774
In-progress
Between 750 and 799

CGI Global Score (TPRM)XXXX



No incidents recorded for CGI in 2025.
No incidents recorded for CGI in 2025.
No incidents recorded for CGI in 2025.
CGI cyber incidents detection timeline including parent company and subsidiaries

Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally. We value your opinions and welcome your comments and questions on our posts here on LinkedIn. Please keep a polite, professional and constructive tone. We remove comments containing objectionable language and derogatory views. We do not allow content that is unrelated to the subject, and we remove discriminatory and racist comments as well as spam and advertising. Note that content on this page contains general information regarding CGI’s services and initiatives and should not be considered direct business advice. To engage in a discussion with one of our experts, please make a request through https://www.cgi.com/en/contact-us


Appen has been a leader in AI training data for over 25 years, providing high-quality, diverse datasets that power the world's leading AI models. Our end-to-end platform, deep expertise, and scalable human-in-the-loop services enable AI innovators to build and optimize cutting-edge models. We spec
For over 70 years, Iron Mountain Incorporated (NYSE: IRM) has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we pro
Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and

SoftServe is a premier IT consulting and digital services provider. We expand the horizon of new technologies to solve today's complex business challenges and achieve meaningful outcomes for our clients. Our boundless curiosity drives us to explore and reimagine the art of the possible. Clients conf

We Transform. SAP® solutions into Value We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosys

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a

HUAWEI CLOUD now distills 30+ years of accumulated technology, innovation, and expertise in the ICT infrastructure field to offer customers everything as a service. You can grow your enterprise in the best environment with stable, secure, and ever-improving HUAWEI CLOUD services and affordable, incl

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that
At CDW, we know how to make technology work so people can do great things. Our experts bring a full-stack, full-lifestyle approach with custom solutions, services and relationships to bring your vision to life. Through decades of experience, scale, and deep industry expertise, we deliver the full
.png)
CGI Inc. reported a solid performance in its Q3 2025 earnings call, highlighting significant revenue growth driven by AI integration and...
A critical vulnerability in Zyxel's ATP and USG series firewalls that allows attackers to bypass authorization controls and access sensitive...
Critical ZYXEL vulnerability exposed: attackers can access and download system configurations, putting your network security at serious risk...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded...
CGI expands European footprint with Apside acquisition, adding 2500 professionals across 6 countries. Strengthens digital services in...
New Jersey signed a 10-year contract with tech firm CGI to aid in dispersing recovery funding and track reports.
CGI Inc reported a significant earnings beat for its third fiscal quarter of 2025, with earnings per share (EPS) reaching $2.10,...
Some companies are still not treating cybersecurity as a core business risk that demands board-level attention and accountability, says a cyber expert.
Glasgow City Council has been hit with a cyber attack that has disrupted services and compromised personal data as local authorities in Britain continue to be...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CGI is https://cgi.com.
According to Rankiteo, CGI’s AI-generated cybersecurity score is 793, reflecting their Fair security posture.
According to Rankiteo, CGI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CGI is not certified under SOC 2 Type 1.
According to Rankiteo, CGI does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CGI is not listed as GDPR compliant.
According to Rankiteo, CGI does not currently maintain PCI DSS compliance.
According to Rankiteo, CGI is not compliant with HIPAA regulations.
According to Rankiteo,CGI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CGI operates primarily in the IT Services and IT Consulting industry.
CGI employs approximately 67,825 people worldwide.
CGI presently has no subsidiaries across any sectors.
CGI’s official LinkedIn profile has approximately 1,671,117 followers.
CGI is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, CGI has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/cgi.
Yes, CGI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cgi.
As of November 27, 2025, Rankiteo reports that CGI has not experienced any cybersecurity incidents.
CGI has an estimated 36,295 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CGI has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.