ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

A non-profit society and registered charity that creates opportunities for Indigenous artists. Margo Kane (Cree/Saulteaux), an interdisciplinary artist and Indigenous arts leader, founded Full Circle in 1992. Upon establishing Full Circle, Kane’s vision was to make a profound contribution to the development of Indigenous performance in Canada. Traditionally, in the Indigenous world, art is not separated from the community. It is integral to a happy and healthy way of life. Full Circle believes in rooting art back into the community, where it was traditionally and where it is intended to be. Through creating opportunities for Aboriginal artists to express their life experiences and engage with audiences of all ages and backgrounds, we share these values with as wide scope as possible so that people of all races and ages have a better understanding of First Nations, Metis and Inuit culture. Find out more about what we do at Full Circle at fullcircle.ca

Full Circle: First Nations Performance A.I CyberSecurity Scoring

FCFNP

Company Details

Linkedin ID:

full-circle-first-nations-performance

Employees number:

10

Number of followers:

41

NAICS:

7111

Industry Type:

Performing Arts

Homepage:

fullcircle.ca

IP Addresses:

0

Company ID:

FUL_5671045

Scan Status:

In-progress

AI scoreFCFNP Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/full-circle-first-nations-performance.jpeg
FCFNP Performing Arts
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreFCFNP Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/full-circle-first-nations-performance.jpeg
FCFNP Performing Arts
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

FCFNP Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

FCFNP Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for FCFNP

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Full Circle: First Nations Performance in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Full Circle: First Nations Performance in 2025.

Incident Types FCFNP vs Performing Arts Industry Avg (This Year)

No incidents recorded for Full Circle: First Nations Performance in 2025.

Incident History — FCFNP (X = Date, Y = Severity)

FCFNP cyber incidents detection timeline including parent company and subsidiaries

FCFNP Company Subsidiaries

SubsidiaryImage

A non-profit society and registered charity that creates opportunities for Indigenous artists. Margo Kane (Cree/Saulteaux), an interdisciplinary artist and Indigenous arts leader, founded Full Circle in 1992. Upon establishing Full Circle, Kane’s vision was to make a profound contribution to the development of Indigenous performance in Canada. Traditionally, in the Indigenous world, art is not separated from the community. It is integral to a happy and healthy way of life. Full Circle believes in rooting art back into the community, where it was traditionally and where it is intended to be. Through creating opportunities for Aboriginal artists to express their life experiences and engage with audiences of all ages and backgrounds, we share these values with as wide scope as possible so that people of all races and ages have a better understanding of First Nations, Metis and Inuit culture. Find out more about what we do at Full Circle at fullcircle.ca

Loading...
similarCompanies

FCFNP Similar Companies

Playwrights Horizons

Playwrights Horizons is a writer’s theater committed to the advancement of bold and visionary playwrights, through the development and production of daring new work and the education of future theatermakers. For over 50 years, the organization has distinguished itself by a steadfast commitment to ce

Briora Ballroom Dance Studio

Briora® Ballroom provides dance instruction tailored to you. Have fun dancing at our classes, parties, social events, showcases and more! Our elegant, state-of-the-art facility is the largest ballroom dance studio on the Eastside, and our teachers are certified, highly-trained professional dancers.

Chicago Contemporary Dance Theatre

Mission Chicago Contemporary Dance Theatre (Chi-CDT) is a dance-arts and educational institution grounded in African American traditions, and dedicated to excellence in providing instruction, performances and community programs to students, artists and audiences. Vision Chi-CDT is guided by a

Forward Theater Company

Forward Theater Company is a not-for-profit professional theater company founded to provide exceptional theater experiences for area audiences and give professional actors, designers, playwrights, and directors an artistic home. As a resident company of Overture Center for the Arts, FTC produces mai

Burbage Theatre Company

Burbage Theatre Co strives to excite and engage a new generation of theatre-goer with professional quality, socially relevant, compelling, and irreverent stories, both classic and contemporary, told by an inventive and expert ensemble of actors. Burbage is dedicated to the growing and cultivating

Windy City Wedding Dance

Windy City Wedding Dance is a place where wedding couples, friends, and family come to prepare for upcoming weddings or special events. We teach ballroom dance for beginners, intermediate, and advanced level clients. We have 3 locations strategically chosen throughout Chicagoland to provide an easy

newsone

FCFNP CyberSecurity News

June 07, 2025 03:07 PM
Full Circle: A Deloitte podcast | Deloitte Canada

Each episode of Full Circle explores a critical question on the minds of Canadian leaders. From cyber security to business transformation to workforce...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

FCFNP CyberSecurity History Information

Official Website of Full Circle: First Nations Performance

The official website of Full Circle: First Nations Performance is https://fullcircle.ca/.

Full Circle: First Nations Performance’s AI-Generated Cybersecurity Score

According to Rankiteo, Full Circle: First Nations Performance’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.

How many security badges does Full Circle: First Nations Performance’ have ?

According to Rankiteo, Full Circle: First Nations Performance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Full Circle: First Nations Performance have SOC 2 Type 1 certification ?

According to Rankiteo, Full Circle: First Nations Performance is not certified under SOC 2 Type 1.

Does Full Circle: First Nations Performance have SOC 2 Type 2 certification ?

According to Rankiteo, Full Circle: First Nations Performance does not hold a SOC 2 Type 2 certification.

Does Full Circle: First Nations Performance comply with GDPR ?

According to Rankiteo, Full Circle: First Nations Performance is not listed as GDPR compliant.

Does Full Circle: First Nations Performance have PCI DSS certification ?

According to Rankiteo, Full Circle: First Nations Performance does not currently maintain PCI DSS compliance.

Does Full Circle: First Nations Performance comply with HIPAA ?

According to Rankiteo, Full Circle: First Nations Performance is not compliant with HIPAA regulations.

Does Full Circle: First Nations Performance have ISO 27001 certification ?

According to Rankiteo,Full Circle: First Nations Performance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Full Circle: First Nations Performance

Full Circle: First Nations Performance operates primarily in the Performing Arts industry.

Number of Employees at Full Circle: First Nations Performance

Full Circle: First Nations Performance employs approximately 10 people worldwide.

Subsidiaries Owned by Full Circle: First Nations Performance

Full Circle: First Nations Performance presently has no subsidiaries across any sectors.

Full Circle: First Nations Performance’s LinkedIn Followers

Full Circle: First Nations Performance’s official LinkedIn profile has approximately 41 followers.

NAICS Classification of Full Circle: First Nations Performance

Full Circle: First Nations Performance is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.

Full Circle: First Nations Performance’s Presence on Crunchbase

No, Full Circle: First Nations Performance does not have a profile on Crunchbase.

Full Circle: First Nations Performance’s Presence on LinkedIn

Yes, Full Circle: First Nations Performance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/full-circle-first-nations-performance.

Cybersecurity Incidents Involving Full Circle: First Nations Performance

As of December 13, 2025, Rankiteo reports that Full Circle: First Nations Performance has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Full Circle: First Nations Performance has an estimated 2,699 peer or competitor companies worldwide.

Full Circle: First Nations Performance CyberSecurity History Information

How many cyber incidents has Full Circle: First Nations Performance faced ?

Total Incidents: According to Rankiteo, Full Circle: First Nations Performance has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Full Circle: First Nations Performance ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=full-circle-first-nations-performance' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge