ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization focused on studying the security impacts of emerging technologies, supporting academic work in security and technology studies and delivering nonpartisan analysis to the policy community. CSET is currently focusing on the effects of progress in AI, advanced computing and biotechnology. CSET aims to prepare a generation of policymakers, analysts and diplomats to address the challenges and opportunities of emerging technologies.

Center for Security and Emerging Technology (CSET) A.I CyberSecurity Scoring

CSET

Company Details

Linkedin ID:

georgetown-cset

Employees number:

88

Number of followers:

10,214

NAICS:

54172

Industry Type:

Think Tanks

Homepage:

georgetown.edu

IP Addresses:

0

Company ID:

CEN_2303015

Scan Status:

In-progress

AI scoreCSET Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/georgetown-cset.jpeg
CSET Think Tanks
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCSET Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/georgetown-cset.jpeg
CSET Think Tanks
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CSET Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

CSET Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CSET

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for Center for Security and Emerging Technology (CSET) in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Center for Security and Emerging Technology (CSET) in 2025.

Incident Types CSET vs Think Tanks Industry Avg (This Year)

No incidents recorded for Center for Security and Emerging Technology (CSET) in 2025.

Incident History — CSET (X = Date, Y = Severity)

CSET cyber incidents detection timeline including parent company and subsidiaries

CSET Company Subsidiaries

SubsidiaryImage

The Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization focused on studying the security impacts of emerging technologies, supporting academic work in security and technology studies and delivering nonpartisan analysis to the policy community. CSET is currently focusing on the effects of progress in AI, advanced computing and biotechnology. CSET aims to prepare a generation of policymakers, analysts and diplomats to address the challenges and opportunities of emerging technologies.

Loading...
similarCompanies

CSET Similar Companies

Civil Squared

Our purpose at Civil Squared is to get un-likeminded people talking again because that’s how, together, we’ll create the most effective solutions to the challenges our communities face. Today’s problems won’t be solved by silencing disagreement. Civil discourse is essential to building and maintaini

CYIS | Centre for Youth and International Studies

The Centre for Youth and International Studies (CYIS) is a premier non-partisan youth-orientated institution on current and emerging security, economic-environmental and humanitarian threats in the Euro-Atlantic region. CYIS provides part-time opportunities to young professionals in IGOs and leadin

Beyond Violence

Beyond Violence as an online movement and global network fighting for non-violent conflict transformation. Beyond Violence listens to the voices of people caught in conflict zones, and connects people all over the world- coming together as one powerful voice calling for peace. Beyond Violence us

Friends of Europe

We believe an EU of partnership and solidarity matters, and we believe globalisation needs global rules to make it work for everyone. We think it’s time for a new 21st-century social contract based on peace, prosperity and sustainability. We support a multilateral world with cities, regions, states,

New Jersey Innovation Institute

The New Jersey Innovation Institute (NJII) is a 501c3 organization founded in 2014 and wholly owned by the New Jersey Institute of Technology (NJIT). As an independent corporation, NJII is uniquely positioned to be agile, entrepreneurial, and opportunistic. NJII is focused on accelerating technology

Circle the Med

A prosperous and peaceful Mediterranean region in which people enjoy a high quality of life and where sustainable development takes place within the carrying capacity of healthy ecosystems by sharing common economic and environmental policy frameworks. Circle the Med is about rethinking. - It's ab

newsone

CSET CyberSecurity News

November 10, 2025 08:00 AM
Virtual Event | Emerging AI Capabilities and the Future of Cybersecurity

This event builds upon the new CNAS report Tipping the Scales: Emerging AI Capabilities and the Cyber Offense-Defense Balance , in which...

May 22, 2025 04:13 AM
Anticipating AI’s Impact on the Cyber Offense-Defense Balance

This report takes a comprehensive look across cybersecurity to anticipate whether those changes will help cyber defense or offense.

March 21, 2025 07:00 AM
How to Improve AI Red-Teaming: Challenges and Recommendations

This blog post draws from a December 2024 CSET workshop on AI testing to outline challenges associated with improving red-teaming and suggest recommendations.

March 11, 2025 07:00 AM
SFS welcomes Michael Sulmeyer to Faculty

Georgetown's School of Foreign Service welcomes Michael Sulmeyer to the school's faculty as a Professor of the Practice and director of...

January 31, 2025 11:27 AM
Helen Toner: A Visionary in AI Policy and Ethics

Helen Toner has emerged as one of the most influential voices in artificial intelligence policy and ethics. As a researcher, strategist, and advocate,...

November 01, 2024 05:19 AM
Cybersecurity Risks of AI-Generated Code

The place to find CSET's publications, reports, and people.

October 01, 2024 05:55 AM
Securing Critical Infrastructure in the Age of AI

As critical infrastructure operators and providers seek to harness the benefits of new artificial intelligence capabilities, they must also manage...

September 26, 2024 07:00 AM
Revisiting AI Red-Teaming

CSET researchers returned to the DEF CON cybersecurity conference to explore how understandings of AI red-teaming practices have evolved among cybersecurity...

July 17, 2024 07:00 AM
Evaluating Large Language Models

This explainer covers why researchers are interested in evaluations, as well as some common evaluations and associated challenges.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CSET CyberSecurity History Information

Official Website of Center for Security and Emerging Technology (CSET)

The official website of Center for Security and Emerging Technology (CSET) is http://cset.georgetown.edu.

Center for Security and Emerging Technology (CSET)’s AI-Generated Cybersecurity Score

According to Rankiteo, Center for Security and Emerging Technology (CSET)’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.

How many security badges does Center for Security and Emerging Technology (CSET)’ have ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Center for Security and Emerging Technology (CSET) have SOC 2 Type 1 certification ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) is not certified under SOC 2 Type 1.

Does Center for Security and Emerging Technology (CSET) have SOC 2 Type 2 certification ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) does not hold a SOC 2 Type 2 certification.

Does Center for Security and Emerging Technology (CSET) comply with GDPR ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) is not listed as GDPR compliant.

Does Center for Security and Emerging Technology (CSET) have PCI DSS certification ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) does not currently maintain PCI DSS compliance.

Does Center for Security and Emerging Technology (CSET) comply with HIPAA ?

According to Rankiteo, Center for Security and Emerging Technology (CSET) is not compliant with HIPAA regulations.

Does Center for Security and Emerging Technology (CSET) have ISO 27001 certification ?

According to Rankiteo,Center for Security and Emerging Technology (CSET) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Center for Security and Emerging Technology (CSET)

Center for Security and Emerging Technology (CSET) operates primarily in the Think Tanks industry.

Number of Employees at Center for Security and Emerging Technology (CSET)

Center for Security and Emerging Technology (CSET) employs approximately 88 people worldwide.

Subsidiaries Owned by Center for Security and Emerging Technology (CSET)

Center for Security and Emerging Technology (CSET) presently has no subsidiaries across any sectors.

Center for Security and Emerging Technology (CSET)’s LinkedIn Followers

Center for Security and Emerging Technology (CSET)’s official LinkedIn profile has approximately 10,214 followers.

NAICS Classification of Center for Security and Emerging Technology (CSET)

Center for Security and Emerging Technology (CSET) is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.

Center for Security and Emerging Technology (CSET)’s Presence on Crunchbase

No, Center for Security and Emerging Technology (CSET) does not have a profile on Crunchbase.

Center for Security and Emerging Technology (CSET)’s Presence on LinkedIn

Yes, Center for Security and Emerging Technology (CSET) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/georgetown-cset.

Cybersecurity Incidents Involving Center for Security and Emerging Technology (CSET)

As of December 05, 2025, Rankiteo reports that Center for Security and Emerging Technology (CSET) has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Center for Security and Emerging Technology (CSET) has an estimated 812 peer or competitor companies worldwide.

Center for Security and Emerging Technology (CSET) CyberSecurity History Information

How many cyber incidents has Center for Security and Emerging Technology (CSET) faced ?

Total Incidents: According to Rankiteo, Center for Security and Emerging Technology (CSET) has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Center for Security and Emerging Technology (CSET) ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=georgetown-cset' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge