Comparison Overview

Smith Garson

VS

The Patriot Week Foundation

Smith Garson

1150 Connecticut Ave NW, Washington, District of Columbia, 20036, US
Last Update: 2025-12-13
Between 750 and 799

Established in 1981, Smith Garson (formerly Smith Dawson & Andrews) is a full-service government relations firm that works with public and private sector clients to develop and implement effective legislative and communications strategies to advance their public policy agendas and secure needed funding for projects in the public interest. Smith Garson's diverse team of professionals provides clients with a wide range of expertise in policy areas including transportation and infrastructure, environmental regulation, public finance, local government, housing and community development, public safety and security, higher education, health, and international trade. Smith Garson offers clients cost-effective personal service with a bipartisan approach, in-depth knowledge and a record of success. Smith Garson’s reputation for integrity, candor and hard work helps clients meet the challenges they face at home and in Washington. Our in-depth substantive knowledge combined with our creativity, hard work and reputation for integrity attracts new clients at the forefront of innovation and has earned us the trust of longstanding clients, some of whom have been with us for more than twenty-five years. We offer a wide range of services to a variety of organizations across many industry sectors. These include businesses, corporations, state and local governments, nonprofits and trade associations. We’re proud that clients think of us as an integral part of their business, capable of delivering the services they need when they need them.

NAICS: None
NAICS Definition:
Employees: 21
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

The Patriot Week Foundation

700 East Maple Road , None, Birmingham, Michigan, US, 48009
Last Update: 2025-12-12
Between 750 and 799

Patriot Week renews America’s spirit by deepening the appreciation of the First Principles, Founding Fathers and other Patriots, vital documents and speeches, and flags that make America the greatest nation in world history. We need to invigorate our appreciation and understanding of America’s spirit. Anchored by the key dates of September 11 (the anniversary of the terrorists attacks) and September 17 (Constitution Day, the anniversary of the signing of the Constitution by our Founding Fathers), the Schedule for each day has a separate focus. Co-created in 2009 by Judge Michael Warren and his then 10-year-old daughter Leah, Patriot Week has captured the imagination and support of citizens across the nation. Over 10 states have recognized Patriot Week with official gubernatorial and legislative proclamations and resolutions. Scores of K-12 schools (public, charter, private and home), universities, law schools, student groups, community organizations (Rotaries, Kiwanis, senior centers, religious, and others), cities, counties, courts, law firms, businesses, senior living communities, libraries, hospitals, historical groups, private homes, public officials, and others engage in a wide range of grassroots activities (including panel discussions, speakers, lesson plans, festivals, parades, picnics, commemorations, etc.). The grassroots effort is renewing the spirit of America, one person at a time, and is spreading throughout the nation. Participation has occurred in MI, NY, WI, SC, OH, CO, AZ, GA, PA, WA DC, IL, MS, and NH, with more to come!

NAICS: None
NAICS Definition: Others
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/smith-dawson-&-andrews.jpeg
Smith Garson
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/the-patriot-week-foundation.jpeg
The Patriot Week Foundation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Smith Garson
100%
Compliance Rate
0/4 Standards Verified
The Patriot Week Foundation
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Relations Industry Average (This Year)

No incidents recorded for Smith Garson in 2025.

Incidents vs Government Relations Industry Average (This Year)

No incidents recorded for The Patriot Week Foundation in 2025.

Incident History — Smith Garson (X = Date, Y = Severity)

Smith Garson cyber incidents detection timeline including parent company and subsidiaries

Incident History — The Patriot Week Foundation (X = Date, Y = Severity)

The Patriot Week Foundation cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/smith-dawson-&-andrews.jpeg
Smith Garson
Incidents

No Incident

https://images.rankiteo.com/companyimages/the-patriot-week-foundation.jpeg
The Patriot Week Foundation
Incidents

No Incident

FAQ

The Patriot Week Foundation company demonstrates a stronger AI Cybersecurity Score compared to Smith Garson company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, The Patriot Week Foundation company has disclosed a higher number of cyber incidents compared to Smith Garson company.

In the current year, The Patriot Week Foundation company and Smith Garson company have not reported any cyber incidents.

Neither The Patriot Week Foundation company nor Smith Garson company has reported experiencing a ransomware attack publicly.

Neither The Patriot Week Foundation company nor Smith Garson company has reported experiencing a data breach publicly.

Neither The Patriot Week Foundation company nor Smith Garson company has reported experiencing targeted cyberattacks publicly.

Neither Smith Garson company nor The Patriot Week Foundation company has reported experiencing or disclosing vulnerabilities publicly.

Neither Smith Garson nor The Patriot Week Foundation holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Smith Garson company nor The Patriot Week Foundation company has publicly disclosed detailed information about the number of their subsidiaries.

Smith Garson company employs more people globally than The Patriot Week Foundation company, reflecting its scale as a Government Relations.

Neither Smith Garson nor The Patriot Week Foundation holds SOC 2 Type 1 certification.

Neither Smith Garson nor The Patriot Week Foundation holds SOC 2 Type 2 certification.

Neither Smith Garson nor The Patriot Week Foundation holds ISO 27001 certification.

Neither Smith Garson nor The Patriot Week Foundation holds PCI DSS certification.

Neither Smith Garson nor The Patriot Week Foundation holds HIPAA certification.

Neither Smith Garson nor The Patriot Week Foundation holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N