
City and County of Denver Company Cyber Security Posture
seeyourselfhere.orgSee Yourself Here - The City and County of Denver. With competitive pay, great benefits, and endless opportunities, working for The City and County of Denver means seeing yourself working with purpose โ for you, and those who benefit from your passion, skills and expertise. See yourself experiencing growth and balance. See yourself being respected and valued. See yourself belonging here. Join our diverse, inclusive, and talented workforce of more than 11,000 team members who are at the heart of what makes Denver, Denver. Your journey starts right here. #SeeYourselfHere. For our Social Media Privacy Policy, please visit https://www.denvergov.org/content/denvergov/en/city-of-denver-home/terms-of-use.html
CCD Company Details
city-and-county-of-denver
6520 employees
66765.0
922
Government Administration
seeyourselfhere.org
Scan still pending
CIT_2570365
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

City and County of Denver Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
City and County of Denver Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
City and County of Denver | Ransomware | 90 | 6 | 12/2021 | CIT16574422 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: The City of Denver was affected by a ransomware attack on its cloud-based payroll service provider Ultimate Kronos Group. The city immediately took preventive steps and implemented a backup documentation system to track city work hours, overtime, paid time off, etc. The attack lead to some disruptions in paychecks, but the city mobilized all available resources to support its customers and minimize the effect. |
City and County of Denver Company Subsidiaries

See Yourself Here - The City and County of Denver. With competitive pay, great benefits, and endless opportunities, working for The City and County of Denver means seeing yourself working with purpose โ for you, and those who benefit from your passion, skills and expertise. See yourself experiencing growth and balance. See yourself being respected and valued. See yourself belonging here. Join our diverse, inclusive, and talented workforce of more than 11,000 team members who are at the heart of what makes Denver, Denver. Your journey starts right here. #SeeYourselfHere. For our Social Media Privacy Policy, please visit https://www.denvergov.org/content/denvergov/en/city-of-denver-home/terms-of-use.html
Access Data Using Our API

Get company history
.png)
CCD Cyber Security News
Adversaries to Allies: CISOs and Auditors Build Trust
In this interview with Peter Ulrich, Denver's information technology audit manager, we explore relationships between auditors and security teamsย ...
Denverโs new CISO wants residents to receive cyber training, too
Denver's new CISO wants residents to receive cyber training, too. Merlin Namuth, Denver's new chief information security officer, said hisย ...
Denverโs new CISO to bolster cybersecurity awareness
Denver has named Merlin Namuth as the city's new Chief Information Security Officer (CISO). Namuth's remit will be to expand and strengthenย ...
City and County of Denver warns residents of unpaid parking ticket scam
Although this website looks convincing, it's a scam - an attempt to steal personal and financial information from Denver residents. However,ย ...
Denver hires new data chief
The Johnston administration has hired a new data chief.
Denverโs New CISO Prioritizes People to Bolster Security
Merlin Namuth, chief information security officer (CISO) for the city and county of Denver, is prioritizing building relationships in an effortย ...
Texts about 'an unpaid parking invoice' are scams, city confirms
DENVER โ The City and County of Denver is warning residents about fraudulent text messages trying to reach recipients about "an unpaid parkingย ...
City Council Operations - City and County of Denver
We wanted to assess the effectiveness of selected City Council operations and controls regarding council office spending oversight, technology assetย ...
Denver lacks comprehensive approach to cybersecurity risks, city auditor says
Denver lacks a comprehensive program to assess potentially disastrous cybersecurity risks, City Auditor Tim O'Brien said in a new report.

CCD Similar Companies

Agencia de Recaudaciโโฅn y Control Aduanero
La Administraciโโฅn Federal de Ingresos Pโโซblicos es el ente encargado de ejecutar las polโโ ticas impulsadas por el Poder Ejecutivo Nacional en materia tributaria, aduanera y de recaudaciโโฅn de los recursos de la seguridad social. Este organismo creado en el aโยฑo 1997 (Decreto 618/1997) estโยฐ inte

Department of Education
The Department of Education is responsible for delivering the Victorian Governmentโs commitment to making Victoria the Education State, where all Victorians have the best learning and development experience, regardless of their background, postcode or circumstances. Education remains a cornerstone f

Western Cape Government
The Western Cape Government creates laws for and provides services to the people of the Western Cape. We work closely with the National Government and municipalities in the Western Cape to ensure that citizens of the province have access to the services, facilities and information they need. We are

European Commission
The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

UK Home Office
At the Home Office, we help to ensure that the country is safe and secure. Weโve been looking after UK citizens since 1782. We are responsible for: - working on the problems caused by illegal drug use - shaping the alcohol strategy, policy and licensing conditions - keeping the United Kingdom safe

UK Home Office
At the Home Office, we help to ensure that the country is safe and secure. Weโve been looking after UK citizens since 1782. We are responsible for: - working on the problems caused by illegal drug use - shaping the alcohol strategy, policy and licensing conditions - keeping the United Kingdom safe

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
CCD CyberSecurity History Information
How many cyber incidents has CCD faced?
Total Incidents: According to Rankiteo, CCD has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at CCD?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
How does CCD detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Implemented a backup documentation system and recovery measures with Mobilized all available resources to support customers.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Ransomware Attack on Ultimate Kronos Group Affecting the City of Denver
Description: The City of Denver was affected by a ransomware attack on its cloud-based payroll service provider Ultimate Kronos Group. The city immediately took preventive steps and implemented a backup documentation system to track city work hours, overtime, paid time off, etc. The attack lead to some disruptions in paychecks, but the city mobilized all available resources to support its customers and minimize the effect.
Type: Ransomware
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware CIT16574422
Systems Affected: Payroll service
Operational Impact: Disruptions in paychecks
Which entities were affected by each incident?

Incident : Ransomware CIT16574422
Entity Type: Government
Industry: Public Administration
Location: Denver, Colorado, USA
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware CIT16574422
Containment Measures: Implemented a backup documentation system
Recovery Measures: Mobilized all available resources to support customers
Data Breach Information
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Implemented a backup documentation system.
Ransomware Information
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Mobilized all available resources to support customers.
Additional Questions
Impact of the Incidents
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Payroll service.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Implemented a backup documentation system.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
