ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Regional Development Australia (RDA) is an Australian Government initiative established to encourage partnership between all levels of government to enhance the growth and development of Australia's regional communities. RDA committees operate under a national RDA Charter and report to the Australian Government on key outcomes. A national network of 55 RDA committees has been established and RDA Tasmania represents the entire state of Tasmania. RDA Tasmania is a not-for-profit organisation that has a formal partnership between the Australian Government, Tasmanian Government, and the Local Government Association of Tasmania (LGAT). A key focus of RDA Tasmania is on the economic, social and environmental issues affecting communities. Committee members of RDA Tasmania are committed volunteers who have been chosen by the Australian Government due to their understanding of, and experience in, a range of areas including their professional and industry background, community networks, skills and experience.

Regional Development Australia Tasmania A.I CyberSecurity Scoring

RDAT

Company Details

Linkedin ID:

regional-development-australia-tasmania

Employees number:

13

Number of followers:

1,643

NAICS:

None

Industry Type:

Government Relations

Homepage:

rdatasmania.org.au

IP Addresses:

0

Company ID:

REG_2699279

Scan Status:

In-progress

AI scoreRDAT Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/regional-development-australia-tasmania.jpeg
RDAT Government Relations
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreRDAT Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/regional-development-australia-tasmania.jpeg
RDAT Government Relations
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

RDAT Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

RDAT Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for RDAT

Incidents vs Government Relations Industry Average (This Year)

No incidents recorded for Regional Development Australia Tasmania in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Regional Development Australia Tasmania in 2025.

Incident Types RDAT vs Government Relations Industry Avg (This Year)

No incidents recorded for Regional Development Australia Tasmania in 2025.

Incident History — RDAT (X = Date, Y = Severity)

RDAT cyber incidents detection timeline including parent company and subsidiaries

RDAT Company Subsidiaries

SubsidiaryImage

Regional Development Australia (RDA) is an Australian Government initiative established to encourage partnership between all levels of government to enhance the growth and development of Australia's regional communities. RDA committees operate under a national RDA Charter and report to the Australian Government on key outcomes. A national network of 55 RDA committees has been established and RDA Tasmania represents the entire state of Tasmania. RDA Tasmania is a not-for-profit organisation that has a formal partnership between the Australian Government, Tasmanian Government, and the Local Government Association of Tasmania (LGAT). A key focus of RDA Tasmania is on the economic, social and environmental issues affecting communities. Committee members of RDA Tasmania are committed volunteers who have been chosen by the Australian Government due to their understanding of, and experience in, a range of areas including their professional and industry background, community networks, skills and experience.

Loading...
similarCompanies

RDAT Similar Companies

Peel Development Commission

Western Australia’s Peel region is on the brink of exciting change. Over the next two decades it will welcome a dramatic wave of people attracted by the area’s abundant resources, picturesque environment and enviable lifestyle. This influx will establish Peel as one of the State’s biggest populatio

Convenntus

At Convenntus, our job is to make Washington work for your organization. We offer a complete suite of services to make your next annual meeting or fly-in effective and seamless, and to make you look good in the process. As advocates, you know that nothing wins battles like bringing your members and

Bunbury Geographe Tourism Partnership

Bunbury Geographe Tourism Partnership is a collaboration of seven local governments in the Bunbury Geographe region with the aim to lead and foster a strategic and cooperative approach to tourism. In December 2017, an MOU was established between the City of Bunbury, the shires of Harvey, Collie,

Oxygen Strategy

Oxygen is a growing team of healthcare policy experts with a proven track-record in developing tangible outcomes for clients. Our services include healthcare strategy development, public affairs consultancy, market access support and stakeholder relations. We deliver precise and laser-sharp insight,

The National Authority for the Campaign Against Alcohol and Drug Abuse (NACADA) is a State Corporation mandated to coordinate a multi-sectoral effort aimed at preventing, controlling and mitigation of alcohol and drug abuse in Kenya. NACADA’s main focus is drug demand reduction through evidence-base

Build Nova Scotia

We are Build Nova Scotia. We oversee opportunities to transform our province’s lands and properties in ways that drive our economy forward and improve quality of life for all Nova Scotians. This includes managing the addition and renewal of infrastructure that keeps Nova Scotians healthy, connected,

newsone

RDAT CyberSecurity News

June 30, 2023 07:00 AM
Excite Cyber launches first privately owned SOC in Tasmania

The launch follows an increasing awareness of the need for cybersecurity skills development in Tasmania and will play an active role in...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

RDAT CyberSecurity History Information

Official Website of Regional Development Australia Tasmania

The official website of Regional Development Australia Tasmania is https://www.rdatasmania.org.au/.

Regional Development Australia Tasmania’s AI-Generated Cybersecurity Score

According to Rankiteo, Regional Development Australia Tasmania’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Regional Development Australia Tasmania’ have ?

According to Rankiteo, Regional Development Australia Tasmania currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Regional Development Australia Tasmania have SOC 2 Type 1 certification ?

According to Rankiteo, Regional Development Australia Tasmania is not certified under SOC 2 Type 1.

Does Regional Development Australia Tasmania have SOC 2 Type 2 certification ?

According to Rankiteo, Regional Development Australia Tasmania does not hold a SOC 2 Type 2 certification.

Does Regional Development Australia Tasmania comply with GDPR ?

According to Rankiteo, Regional Development Australia Tasmania is not listed as GDPR compliant.

Does Regional Development Australia Tasmania have PCI DSS certification ?

According to Rankiteo, Regional Development Australia Tasmania does not currently maintain PCI DSS compliance.

Does Regional Development Australia Tasmania comply with HIPAA ?

According to Rankiteo, Regional Development Australia Tasmania is not compliant with HIPAA regulations.

Does Regional Development Australia Tasmania have ISO 27001 certification ?

According to Rankiteo,Regional Development Australia Tasmania is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Regional Development Australia Tasmania

Regional Development Australia Tasmania operates primarily in the Government Relations industry.

Number of Employees at Regional Development Australia Tasmania

Regional Development Australia Tasmania employs approximately 13 people worldwide.

Subsidiaries Owned by Regional Development Australia Tasmania

Regional Development Australia Tasmania presently has no subsidiaries across any sectors.

Regional Development Australia Tasmania’s LinkedIn Followers

Regional Development Australia Tasmania’s official LinkedIn profile has approximately 1,643 followers.

Regional Development Australia Tasmania’s Presence on Crunchbase

No, Regional Development Australia Tasmania does not have a profile on Crunchbase.

Regional Development Australia Tasmania’s Presence on LinkedIn

Yes, Regional Development Australia Tasmania maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/regional-development-australia-tasmania.

Cybersecurity Incidents Involving Regional Development Australia Tasmania

As of December 17, 2025, Rankiteo reports that Regional Development Australia Tasmania has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Regional Development Australia Tasmania has an estimated 420 peer or competitor companies worldwide.

Regional Development Australia Tasmania CyberSecurity History Information

How many cyber incidents has Regional Development Australia Tasmania faced ?

Total Incidents: According to Rankiteo, Regional Development Australia Tasmania has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Regional Development Australia Tasmania ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=regional-development-australia-tasmania' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge