ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally. We value your opinions and welcome your comments and questions on our posts here on LinkedIn. Please keep a polite, professional and constructive tone. We remove comments containing objectionable language and derogatory views. We do not allow content that is unrelated to the subject, and we remove discriminatory and racist comments as well as spam and advertising. Note that content on this page contains general information regarding CGI’s services and initiatives and should not be considered direct business advice. To engage in a discussion with one of our experts, please make a request through https://www.cgi.com/en/contact-us

CGI A.I CyberSecurity Scoring

CGI

Company Details

Linkedin ID:

cgi

Employees number:

67,825

Number of followers:

1,671,117

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

cgi.com

IP Addresses:

0

Company ID:

CGI_1885774

Scan Status:

In-progress

AI scoreCGI Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/cgi.jpeg
CGI IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCGI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cgi.jpeg
CGI IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CGI Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

CGI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CGI

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for CGI in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for CGI in 2025.

Incident Types CGI vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for CGI in 2025.

Incident History — CGI (X = Date, Y = Severity)

CGI cyber incidents detection timeline including parent company and subsidiaries

CGI Company Subsidiaries

SubsidiaryImage

Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally. We value your opinions and welcome your comments and questions on our posts here on LinkedIn. Please keep a polite, professional and constructive tone. We remove comments containing objectionable language and derogatory views. We do not allow content that is unrelated to the subject, and we remove discriminatory and racist comments as well as spam and advertising. Note that content on this page contains general information regarding CGI’s services and initiatives and should not be considered direct business advice. To engage in a discussion with one of our experts, please make a request through https://www.cgi.com/en/contact-us

Loading...
similarCompanies

CGI Similar Companies

Appen

Appen has been a leader in AI training data for over 25 years, providing high-quality, diverse datasets that power the world's leading AI models. Our end-to-end platform, deep expertise, and scalable human-in-the-loop services enable AI innovators to build and optimize cutting-edge models. We spec

Iron Mountain

For over 70 years, Iron Mountain Incorporated (NYSE: IRM) has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we pro

Conduent

Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and

SoftServe is a premier IT consulting and digital services provider. We expand the horizon of new technologies to solve today's complex business challenges and achieve meaningful outcomes for our clients. Our boundless curiosity drives us to explore and reimagine the art of the possible. Clients conf

NTT DATA Business Solutions

We Transform. SAP® solutions into Value We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosys

Reply

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a

Common Market For Eastern And Southern Africa

HUAWEI CLOUD now distills 30+ years of accumulated technology, innovation, and expertise in the ICT infrastructure field to offer customers everything as a service. You can grow your enterprise in the best environment with stable, secure, and ever-improving HUAWEI CLOUD services and affordable, incl

TD SYNNEX

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that

At CDW, we know how to make technology work so people can do great things. Our experts bring a full-stack, full-lifestyle approach with custom solutions, services and relationships to bring your vision to life. Through decades of experience, scale, and deep industry expertise, we deliver the full

newsone

CGI CyberSecurity News

November 01, 2025 07:00 AM
Earnings call transcript: CGI Q3 2025 sees AI-driven growth, stock steady

CGI Inc. reported a solid performance in its Q3 2025 earnings call, highlighting significant revenue growth driven by AI integration and...

October 21, 2025 07:00 AM
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

A critical vulnerability in Zyxel's ATP and USG series firewalls that allows attackers to bypass authorization controls and access sensitive...

October 21, 2025 07:00 AM
ZYXEL Vulnerability Exposes System Configurations to Attackers

Critical ZYXEL vulnerability exposed: attackers can access and download system configurations, putting your network security at serious risk...

October 03, 2025 07:00 AM
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded...

August 28, 2025 07:00 AM
2,500 Tech Experts Join CGI as Apside Acquisition Strengthens AI, Cloud, and Cybersecurity Portfolio

CGI expands European footprint with Apside acquisition, adding 2500 professionals across 6 countries. Strengthens digital services in...

August 27, 2025 07:00 AM
New Jersey awards CGI 10-year disaster recovery IT contract

New Jersey signed a 10-year contract with tech firm CGI to aid in dispersing recovery funding and track reports.

July 30, 2025 07:00 AM
Earnings call transcript: CGI Q3 2025 beats forecasts, stock dips

CGI Inc reported a significant earnings beat for its third fiscal quarter of 2025, with earnings per share (EPS) reaching $2.10,...

July 11, 2025 07:00 AM
Cyber security seen as core risk

Some companies are still not treating cybersecurity as a core business risk that demands board-level attention and accountability, says a cyber expert.

June 26, 2025 07:00 AM
Services disrupted as cyber attack hits Glasgow Council

Glasgow City Council has been hit with a cyber attack that has disrupted services and compromised personal data as local authorities in Britain continue to be...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CGI CyberSecurity History Information

Official Website of CGI

The official website of CGI is https://cgi.com.

CGI’s AI-Generated Cybersecurity Score

According to Rankiteo, CGI’s AI-generated cybersecurity score is 793, reflecting their Fair security posture.

How many security badges does CGI’ have ?

According to Rankiteo, CGI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does CGI have SOC 2 Type 1 certification ?

According to Rankiteo, CGI is not certified under SOC 2 Type 1.

Does CGI have SOC 2 Type 2 certification ?

According to Rankiteo, CGI does not hold a SOC 2 Type 2 certification.

Does CGI comply with GDPR ?

According to Rankiteo, CGI is not listed as GDPR compliant.

Does CGI have PCI DSS certification ?

According to Rankiteo, CGI does not currently maintain PCI DSS compliance.

Does CGI comply with HIPAA ?

According to Rankiteo, CGI is not compliant with HIPAA regulations.

Does CGI have ISO 27001 certification ?

According to Rankiteo,CGI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of CGI

CGI operates primarily in the IT Services and IT Consulting industry.

Number of Employees at CGI

CGI employs approximately 67,825 people worldwide.

Subsidiaries Owned by CGI

CGI presently has no subsidiaries across any sectors.

CGI’s LinkedIn Followers

CGI’s official LinkedIn profile has approximately 1,671,117 followers.

NAICS Classification of CGI

CGI is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

CGI’s Presence on Crunchbase

Yes, CGI has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/cgi.

CGI’s Presence on LinkedIn

Yes, CGI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cgi.

Cybersecurity Incidents Involving CGI

As of November 27, 2025, Rankiteo reports that CGI has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

CGI has an estimated 36,295 peer or competitor companies worldwide.

CGI CyberSecurity History Information

How many cyber incidents has CGI faced ?

Total Incidents: According to Rankiteo, CGI has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at CGI ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cgi' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge