Comparison Overview

Provincie Oost-Vlaanderen

VS

SEPI

Provincie Oost-Vlaanderen

Charles de Kerchovelaan 189, Ghent, 9000, BE
Last Update: 2025-11-25
Between 700 and 749

De Provincie is een verkozen streekbestuur. Als toekomstgerichte organisatie willen we in nauwe samenwerking met andere partners werken aan innovatief, creatief en duurzaam Oost-Vlaanderen. Vanuit de principes van Het Nieuwe Werken wil de Provincie verder evolueren naar een resultaatgerichte organisatie waar de vraag van de klant centraal staat en waar personeelsleden efficiënt en aangenaam kunnen samenwerken voor een goede dienstverlening.

NAICS: 921
NAICS Definition: Executive, Legislative, and Other General Government Support
Employees: 876
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

SEPI

c/ Velázquez, 134, Madrid, Madrid, 28006, ES
Last Update: 2025-11-27
Between 700 and 749

La Sociedad Estatal de Participaciones Industriales (SEPI) desarrolla su actividad a través de tres grandes líneas de trabajo: - Como primer holding público empresarial de España impulsa el desarrollo y crecimiento de sus empresas, con el doble objetivo de lograr su rentabilidad económica y social. SEPI es accionista mayoritario de 14 empresas y cuenta con participación directa minoritaria en otras 10. Además, todas estas sociedades a su vez participan en más de 100 empresas. - Contribuye a la definición de la estrategia industrial del país con su actividad en sectores de especial relevancia como el servicio postal, el sector agroalimentario, la logística y la distribución, la construcción naval, la defensa nacional, el sector de la comunicación, el sector energético, el desarrollo empresarial, el sector financiero y, también, en el ocio y el deporte. Con una plantilla de más de 85.000 personas, el Grupo SEPI está presente en todas las comunidades autónomas y en la totalidad de las provincias de nuestro país. - A través del Fondo de Apoyo a la Solvencia de Empresas Estratégicas fomenta la recuperación del tejido empresarial tras la pandemia. Cuenta con una fundación pública, FUNDACIÓN SEPI, que promueve programas de becas de formación práctica para jóvenes titulados sin experiencia laboral, y realiza actividades de formación, además de estudios y publicaciones de carácter económico. SEPI nace el 16 de junio de 1995, con el Instituto Nacional de Industria (INI) como antecedente. Actualmente, depende del Ministerio de Hacienda.

NAICS: 921
NAICS Definition: Executive, Legislative, and Other General Government Support
Employees: 369
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/provincie-oost-vlaanderen.jpeg
Provincie Oost-Vlaanderen
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/sepi.jpeg
SEPI
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Provincie Oost-Vlaanderen
100%
Compliance Rate
0/4 Standards Verified
SEPI
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Public Policy Offices Industry Average (This Year)

No incidents recorded for Provincie Oost-Vlaanderen in 2025.

Incidents vs Public Policy Offices Industry Average (This Year)

No incidents recorded for SEPI in 2025.

Incident History — Provincie Oost-Vlaanderen (X = Date, Y = Severity)

Provincie Oost-Vlaanderen cyber incidents detection timeline including parent company and subsidiaries

Incident History — SEPI (X = Date, Y = Severity)

SEPI cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/provincie-oost-vlaanderen.jpeg
Provincie Oost-Vlaanderen
Incidents

No Incident

https://images.rankiteo.com/companyimages/sepi.jpeg
SEPI
Incidents

No Incident

FAQ

Provincie Oost-Vlaanderen company demonstrates a stronger AI Cybersecurity Score compared to SEPI company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, SEPI company has disclosed a higher number of cyber incidents compared to Provincie Oost-Vlaanderen company.

In the current year, SEPI company and Provincie Oost-Vlaanderen company have not reported any cyber incidents.

Neither SEPI company nor Provincie Oost-Vlaanderen company has reported experiencing a ransomware attack publicly.

Neither SEPI company nor Provincie Oost-Vlaanderen company has reported experiencing a data breach publicly.

Neither SEPI company nor Provincie Oost-Vlaanderen company has reported experiencing targeted cyberattacks publicly.

Neither Provincie Oost-Vlaanderen company nor SEPI company has reported experiencing or disclosing vulnerabilities publicly.

Neither Provincie Oost-Vlaanderen nor SEPI holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Provincie Oost-Vlaanderen company nor SEPI company has publicly disclosed detailed information about the number of their subsidiaries.

Provincie Oost-Vlaanderen company employs more people globally than SEPI company, reflecting its scale as a Public Policy Offices.

Neither Provincie Oost-Vlaanderen nor SEPI holds SOC 2 Type 1 certification.

Neither Provincie Oost-Vlaanderen nor SEPI holds SOC 2 Type 2 certification.

Neither Provincie Oost-Vlaanderen nor SEPI holds ISO 27001 certification.

Neither Provincie Oost-Vlaanderen nor SEPI holds PCI DSS certification.

Neither Provincie Oost-Vlaanderen nor SEPI holds HIPAA certification.

Neither Provincie Oost-Vlaanderen nor SEPI holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.