Company Details
u.s.-conference-of-mayors
58
6,036
None
usmayors.org
0
UNI_3120205
In-progress

United States Conference of Mayors Company CyberSecurity Posture
usmayors.orgThe United States Conference of Mayors is the official non-partisan organization of cities with populations of 30,000 or more. There are over 1,400 such cities in the country today. Each city is represented in the Conference by its chief elected official, the mayor. The primary roles of The U.S. Conference of Mayors are to: - Promote the development of effective national urban/suburban policy; - Strengthen federal-city relationships; - Ensure that federal policy meets urban needs; - Provide mayors with leadership and management tools; and - Create a forum in which mayors can share ideas and information. The Conference holds its Winter Meeting each January in Washington, D.C. and an Annual Meeting each June in a different U.S. city. Additional meetings and events are held as directed by the Conference leadership.
Company Details
u.s.-conference-of-mayors
58
6,036
None
usmayors.org
0
UNI_3120205
In-progress
Between 750 and 799

USCM Global Score (TPRM)XXXX



No incidents recorded for United States Conference of Mayors in 2025.
No incidents recorded for United States Conference of Mayors in 2025.
No incidents recorded for United States Conference of Mayors in 2025.
USCM cyber incidents detection timeline including parent company and subsidiaries

The United States Conference of Mayors is the official non-partisan organization of cities with populations of 30,000 or more. There are over 1,400 such cities in the country today. Each city is represented in the Conference by its chief elected official, the mayor. The primary roles of The U.S. Conference of Mayors are to: - Promote the development of effective national urban/suburban policy; - Strengthen federal-city relationships; - Ensure that federal policy meets urban needs; - Provide mayors with leadership and management tools; and - Create a forum in which mayors can share ideas and information. The Conference holds its Winter Meeting each January in Washington, D.C. and an Annual Meeting each June in a different U.S. city. Additional meetings and events are held as directed by the Conference leadership.


The Winter® Equipment Company is a leading manufacturer and distributor of quality wear parts for snowplows, road machinery, and equipment used in a variety of construction, mining and industrial markets. Our staff of wear parts specialists use innovative thinking, along with unique manufacturing te

Patriot Week renews America’s spirit by deepening the appreciation of the First Principles, Founding Fathers and other Patriots, vital documents and speeches, and flags that make America the greatest nation in world history. We need to invigorate our appreciation and understanding of America’s spir

Ministry of External Affairs is responsible for all aspects of India's relations with the world. It formulates, implements & presents the foreign policy of the Government of India. The main objective is to advance India's national security & developmental priorities in a globalized and independent

Incisive Health is an award-winning healthcare policy, public affairs and communications consultancy focused on UK, European and International markets. We provide integrated support across the full range of audiences: policymakers, payers, healthcare providers, and patients. Proudly part of Inizio

The American Federation of Government Employees (AFGE) is the largest federal union representing 670,000 federal government employees. Our members are the doctors, Border Patrol agents, scientists, correctional officers, nurses, and food inspectors who keep America healthy and safe. We believe

Bear Mountain Associates, Inc. is a government relations and communications consulting firm based in Kern County, California. Bear Mountain Associates offers the following services to its clients: Government Relations • Issue Monitoring and Management • Legislative and Regulatory Analysis • As
.png)
Updates from the NGA Membership Team. For more about the programs below and a list of upcoming events please email us at:...
In U.S. cities big and small, mayors are finding their tenures shaped by housing shortages, and efforts to build more homes, so that people...
Groups including the National Governors Association and NASCIO have signed a letter asking Congress to reauthorize the State and Local...
The Honorable John Thune Majority Leader U.S. Senate 511 Dirksen Senate Office Building Washington, D.C. 20510. The Honorable Chuck Schumer
A ransomware attack has forced the public school district in Uvalde, Texas, to shut down for most of the week as officials attempt to...
The federal government canceled funding for a cybersecurity resource credited for detecting more than 43000 potential state and local...
President Donald Trump wants to push state and local entities to take more ownership of their cybersecurity, but his administration is...
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18000 state and local...
Groups representing state and local governments are pleading congressional leaders to restore funding to the Multi-State Information Sharing...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of United States Conference of Mayors is http://www.usmayors.org.
According to Rankiteo, United States Conference of Mayors’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, United States Conference of Mayors currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, United States Conference of Mayors is not certified under SOC 2 Type 1.
According to Rankiteo, United States Conference of Mayors does not hold a SOC 2 Type 2 certification.
According to Rankiteo, United States Conference of Mayors is not listed as GDPR compliant.
According to Rankiteo, United States Conference of Mayors does not currently maintain PCI DSS compliance.
According to Rankiteo, United States Conference of Mayors is not compliant with HIPAA regulations.
According to Rankiteo,United States Conference of Mayors is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
United States Conference of Mayors operates primarily in the Government Relations industry.
United States Conference of Mayors employs approximately 58 people worldwide.
United States Conference of Mayors presently has no subsidiaries across any sectors.
United States Conference of Mayors’s official LinkedIn profile has approximately 6,036 followers.
United States Conference of Mayors is classified under the NAICS code None, which corresponds to Others.
No, United States Conference of Mayors does not have a profile on Crunchbase.
Yes, United States Conference of Mayors maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/u.s.-conference-of-mayors.
As of December 17, 2025, Rankiteo reports that United States Conference of Mayors has not experienced any cybersecurity incidents.
United States Conference of Mayors has an estimated 420 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, United States Conference of Mayors has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.