ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

GLG is the world’s largest insight network. We connect decision makers to the right experts so they can act with the confidence that comes from true clarity and have what it takes to get ahead. Our network of experts is the world’s largest source of first-hand expertise, and we recruit hundreds of new experts every day. We bring the power of insight to every great professional decision. Visit GLGinsights.com. For information regarding GLG’s practices with respect to personal information, please visit our privacy policy at https://glginsights.com/privacy-policy/

GLG A.I CyberSecurity Scoring

GLG

Company Details

Linkedin ID:

glg

Employees number:

11,918

Number of followers:

442,669

NAICS:

519

Industry Type:

Information Services

Homepage:

glginsights.com

IP Addresses:

0

Company ID:

GLG_4578248

Scan Status:

In-progress

AI scoreGLG Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/glg.jpeg
GLG Information Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGLG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/glg.jpeg
GLG Information Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

GLG Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Gerson Lehrman Group, Inc.Ransomware100511/2023
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The Washington State Office of the Attorney General reported on March 12, 2024, that Gerson Lehrman Group experienced a ransomware attack on November 12, 2023, affecting 3,734 individuals. The compromised information included names, financial and banking information, full dates of birth, and passport numbers.

Gerson Lehrman Group, Inc.
Ransomware
Severity: 100
Impact: 5
Seen: 11/2023
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The Washington State Office of the Attorney General reported on March 12, 2024, that Gerson Lehrman Group experienced a ransomware attack on November 12, 2023, affecting 3,734 individuals. The compromised information included names, financial and banking information, full dates of birth, and passport numbers.

Ailogo

GLG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for GLG

Incidents vs Information Services Industry Average (This Year)

No incidents recorded for GLG in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for GLG in 2025.

Incident Types GLG vs Information Services Industry Avg (This Year)

No incidents recorded for GLG in 2025.

Incident History — GLG (X = Date, Y = Severity)

GLG cyber incidents detection timeline including parent company and subsidiaries

GLG Company Subsidiaries

SubsidiaryImage

GLG is the world’s largest insight network. We connect decision makers to the right experts so they can act with the confidence that comes from true clarity and have what it takes to get ahead. Our network of experts is the world’s largest source of first-hand expertise, and we recruit hundreds of new experts every day. We bring the power of insight to every great professional decision. Visit GLGinsights.com. For information regarding GLG’s practices with respect to personal information, please visit our privacy policy at https://glginsights.com/privacy-policy/

Loading...
similarCompanies

GLG Similar Companies

NielsenIQ

NielsenIQ (NIQ) is the world’s leading consumer intelligence company, delivering the most complete understanding of consumer buying behavior and revealing new pathways to growth. NIQ combined with GfK in 2023, bringing together the two industry leaders with unparalleled global reach. Today NIQ has

Wolters Kluwer

Wolters Kluwer (EURONEXT: WKL) is a global leader in professional information, software solutions, and services for the healthcare, tax and accounting, financial and corporate compliance, legal and regulatory, and corporate performance and ESG sectors. We help our customers make critical decisions e

Springer Nature

Be Part of Progress - together we bring greater understanding to the world Springer Nature is one of the leading publishers of research in the world. We publish the largest number of journals and books and are a pioneer in open research. Through our leading brands, trusted for more than 180 years,

CASA is an industry leading association that can provide you with the edge you need to be an effective business owner with a substantial property portfolio and gives you the power to confidently manage your business and structures to enable you, the business owner, to later on become a member of our

Gartner

We deliver actionable, objective business and technology insights. Our expert guidance and tools enable faster, smarter decisions and stronger performance on an organization’s mission-critical priorities. Our unrivaled combination of business and technology insights steers clients toward the right

Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, deliver digital marketing solutions, and gain deeper insights into the automotive market, all us

newsone

GLG CyberSecurity News

July 30, 2025 07:00 AM
AI Creates New Cyber Risks. It Can Help Resolve Them, Too

A global survey of CISOs finds companies are shifting cybersecurity budgets in response to a rising wave of AI-driven cyberattacks.

October 15, 2024 07:00 AM
What Cybersecurity Leaders Get Right

Explore how CISOs are strengthening defenses against rising cyber threats and where they need to intensify their efforts to stay ahead of...

March 13, 2024 07:00 AM
Gerson Lehrman Group Recently Discovers November 2023 Data Breach Leaking 152k Consumers’ SSNs

On March 12, 2024, Gerson Lehrman Group, Inc. (GLG) filed a notice of data breach with the Attorney General of Maine after discovering that an unauthorized...

December 12, 2023 08:48 PM
Finding a Computer Software Expert Witness

Computer software expert witnesses can bring specialized knowledge to litigation around software development, intellectual property, cybersecurity, and product...

May 15, 2023 02:28 PM
Navigating The New Cybersecurity Environment

Navigating the New Cybersecurity Environment ... GLG recently partnered with Boston Consulting Group (BCG) to survey 600 of GLG's chief information security...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GLG CyberSecurity History Information

Official Website of GLG

The official website of GLG is https://glginsights.com.

GLG’s AI-Generated Cybersecurity Score

According to Rankiteo, GLG’s AI-generated cybersecurity score is 728, reflecting their Moderate security posture.

How many security badges does GLG’ have ?

According to Rankiteo, GLG currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does GLG have SOC 2 Type 1 certification ?

According to Rankiteo, GLG is not certified under SOC 2 Type 1.

Does GLG have SOC 2 Type 2 certification ?

According to Rankiteo, GLG does not hold a SOC 2 Type 2 certification.

Does GLG comply with GDPR ?

According to Rankiteo, GLG is not listed as GDPR compliant.

Does GLG have PCI DSS certification ?

According to Rankiteo, GLG does not currently maintain PCI DSS compliance.

Does GLG comply with HIPAA ?

According to Rankiteo, GLG is not compliant with HIPAA regulations.

Does GLG have ISO 27001 certification ?

According to Rankiteo,GLG is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of GLG

GLG operates primarily in the Information Services industry.

Number of Employees at GLG

GLG employs approximately 11,918 people worldwide.

Subsidiaries Owned by GLG

GLG presently has no subsidiaries across any sectors.

GLG’s LinkedIn Followers

GLG’s official LinkedIn profile has approximately 442,669 followers.

NAICS Classification of GLG

GLG is classified under the NAICS code 519, which corresponds to Other Information Services.

GLG’s Presence on Crunchbase

Yes, GLG has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/gerson-lehrman-group.

GLG’s Presence on LinkedIn

Yes, GLG maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/glg.

Cybersecurity Incidents Involving GLG

As of December 16, 2025, Rankiteo reports that GLG has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

GLG has an estimated 2,362 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at GLG ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Gerson Lehrman Group Ransomware Attack

Description: Gerson Lehrman Group experienced a ransomware attack affecting 3,734 individuals, compromising names, financial and banking information, full dates of birth, and passport numbers.

Date Detected: 2023-11-12

Date Publicly Disclosed: 2024-03-12

Type: Ransomware

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware GLG128072625

Data Compromised: Names, Financial and banking information, Full dates of birth, Passport numbers

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Financial And Banking Information, Full Dates Of Birth, Passport Numbers and .

Which entities were affected by each incident ?

Incident : Ransomware GLG128072625

Entity Name: Gerson Lehrman Group

Entity Type: Company

Customers Affected: 3734

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware GLG128072625

Type of Data Compromised: Names, Financial and banking information, Full dates of birth, Passport numbers

Number of Records Exposed: 3734

References

Where can I find more information about each incident ?

Incident : Ransomware GLG128072625

Source: Washington State Office of the Attorney General

Date Accessed: 2024-03-12

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2024-03-12.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-11-12.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-03-12.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, financial and banking information, full dates of birth, passport numbers and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, financial and banking information, full dates of birth and passport numbers.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 377.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Washington State Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=glg' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge