Company Details
public-policy-forum
76
36,949
54172
ppforum.ca
0
PUB_3139913
In-progress

Public Policy Forum Company CyberSecurity Posture
ppforum.caFor almost four decades, the Public Policy Forum (PPF) has been bringing together Canada’s leading experts from across sectors, provinces, territories and First Nations communities to create good policy for a better Canada. We are passionate in our belief that putting this diverse set of perspectives at the centre of policy discussions creates representative, resilient policy. As an independent, non-partisan think tank, PPF works to ensure Canada’s inclusive growth and strategic competitiveness by addressing the country’s most pressing policy challenges, including the energy transition and climate policy, health security and health-care system reform, Indigenous economic reconciliation, democracy and good governance.
Company Details
public-policy-forum
76
36,949
54172
ppforum.ca
0
PUB_3139913
In-progress
Between 750 and 799

PPF Global Score (TPRM)XXXX



No incidents recorded for Public Policy Forum in 2025.
No incidents recorded for Public Policy Forum in 2025.
No incidents recorded for Public Policy Forum in 2025.
PPF cyber incidents detection timeline including parent company and subsidiaries

For almost four decades, the Public Policy Forum (PPF) has been bringing together Canada’s leading experts from across sectors, provinces, territories and First Nations communities to create good policy for a better Canada. We are passionate in our belief that putting this diverse set of perspectives at the centre of policy discussions creates representative, resilient policy. As an independent, non-partisan think tank, PPF works to ensure Canada’s inclusive growth and strategic competitiveness by addressing the country’s most pressing policy challenges, including the energy transition and climate policy, health security and health-care system reform, Indigenous economic reconciliation, democracy and good governance.


India’s sole think-tank that concentrates, with unwavering focus, upon the entire gamut of subjects and disciplines relevant to the maritime domain. As a serious think-tank, the NMF undertakes intellectual, academic and interactive activities related to research, advocacy, and convening. It also has

Big Plans Bakery is a think-tank & do-tank working in the field of sustainability. For us sustainability is the most important variable to take in to account when facing the problems of the contemporary world. We provide organisations, both private and public, systemically planned solutions to these

Ondernemers Klankbord Veluwe Ondernemers Klankbord Veluwe is de informele vereniging waar de aangesloten leden, kennis en ervaring uitwisselen, voor persoonlijke ontwikkeling en verbetering van de eigen bedrijfsvoering. Elke 2 weken komen de leden bij elkaar tijdens een ontbijtsessie in De Lierd

Whether you're launching a new concept that you’ve drawn out on a napkin, redesigning and positioning your brand for its next phase of growth, or looking for a complete business overhaul, you’re going to expend a lot of energy. It must be spent well and invested wisely. That’s where we come in. We

Parnell and Associates is a business consulting and technology concierge firm that specializes in solving real challenges for US military veteran professionals and businesses. We're military trained problem solvers, with corporate and professional consulting backgrounds and have owned small busines

All Storage offers the best self storage options across the great state of Texas. With more than 30 locations in Texas, we cover the areas of Dallas/Fort Worth, West Texas and Central Texas. If you are located in the Dallas/Fort Worth area, look no further; there's an All Storage facility convenient
.png)
IISD participated in the World Trade Organization (WTO) Public Forum and Geneva Trade Week 2025, contributing insights on sustainability, industrial policy,...
In an era of rapid digital transformation and escalating global uncertainty, the preservation and protection of our physical and digital...
The Europeana 2025 Policy Forum culminated in a Call to Action which outlines five guiding principles and proposes five concrete actions...
Catherine Bridges is Cyber Advisor at the ANU National Security College, on secondment from the Department of the Prime Minister and Cabinet.
The Forum will convene global experts from government, academia, industry, and civil society to explore how technology can transform public sector institutions.
Seven in 10 leaders agree that cyber risks are rising. New research rates national cyber powers' policy approaches, but there is no one...
Jon R. Lindsay is Assistant Professor of Digital Media and Global Affairs at the University of Toronto Munk School of Global Affairs.
Katherine Mansted is Senior Fellow in the Practice of National Security at the ANU National Security College. She is also the Director of Cyber Intelligence.
Gai Brodtmann is a member of the ANU National Security College (NSC)'s Futures Council, having previously served as a diplomat, defence consultant, Member of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Public Policy Forum is http://www.ppforum.ca.
According to Rankiteo, Public Policy Forum’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Public Policy Forum currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Public Policy Forum is not certified under SOC 2 Type 1.
According to Rankiteo, Public Policy Forum does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Public Policy Forum is not listed as GDPR compliant.
According to Rankiteo, Public Policy Forum does not currently maintain PCI DSS compliance.
According to Rankiteo, Public Policy Forum is not compliant with HIPAA regulations.
According to Rankiteo,Public Policy Forum is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Public Policy Forum operates primarily in the Think Tanks industry.
Public Policy Forum employs approximately 76 people worldwide.
Public Policy Forum presently has no subsidiaries across any sectors.
Public Policy Forum’s official LinkedIn profile has approximately 36,949 followers.
Public Policy Forum is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, Public Policy Forum does not have a profile on Crunchbase.
Yes, Public Policy Forum maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/public-policy-forum.
As of December 05, 2025, Rankiteo reports that Public Policy Forum has not experienced any cybersecurity incidents.
Public Policy Forum has an estimated 812 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Public Policy Forum has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.