CoreNorth Capital Planning Company Cyber Security Posture

http://www.corenorth.com

We are passionate about enriching our communityโ€™s wealth by forming unique relationships through a financial process tailored to each individual. Independence โ€“ Objectivity โ€“ Integrity Your need for objective advice drives our independence. Our choice as an independent financial professional serves your best interests because we have the freedom to offer you objective guidance. This means we are not forced to sell proprietary products or meet any sales quotas. Therefore, we are not pressured or distracted by corporate interests and can focus on what is best for you and your financial goals. To better understand the advantages of working with an independent financial professional, visit our website at www.corenorth.com Securities offered through Registered Representatives of Cambridge Investment Research Inc, a brokerยญdealer, member FINRA/SIPC. Advisory services offered through Cambridge Investment Research Advisors, Inc., a Registered Investment Adviser. CoreNorth Capital Planning, LLC and Cambridge Investment Research Inc are not affiliated. Products and services offered by unaffiliated insurers are not guaranteed, endorsed or recommended by Cambridge Investment Research, Inc. CoreNorth Capital Planning and Cambridge Investment Research, Inc. are Equal Opportunity Employers and Affirmative Action Employers. We cannot accept trade orders through social networks. This social network service may not be monitored every day, or after normal business hours. CoreNorth Capital Planning 13111 E 21st St N Wichita, KS 67230 316.854.4811

CCP Company Details

Linkedin ID:

corenorth-capital-planning

Employees number:

15 employees

Number of followers:

52.0

NAICS:

523

Industry Type:

Investment Management

Homepage:

http://www.corenorth.com

IP Addresses:

Scan still pending

Company ID:

COR_2800871

Scan Status:

In-progress

AI scoreCCP Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

CoreNorth Capital Planning Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

CoreNorth Capital Planning Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
CoreNorth Capital PlanningBreach6036/2020COR137072825Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: On October 17, 2021, the Maine Office of the Attorney General reported a data breach involving CoreNorth, which occurred on May 28, 2021, due to unauthorized access to an employee's email. The breach potentially affected the Social Security number of 677 individuals, with only 1 resident affected directly. Identity theft protection services, including one year of credit monitoring by Experian, were offered to those impacted.

CoreNorth Capital Planning Company Subsidiaries

SubsidiaryImage

We are passionate about enriching our communityโ€™s wealth by forming unique relationships through a financial process tailored to each individual. Independence โ€“ Objectivity โ€“ Integrity Your need for objective advice drives our independence. Our choice as an independent financial professional serves your best interests because we have the freedom to offer you objective guidance. This means we are not forced to sell proprietary products or meet any sales quotas. Therefore, we are not pressured or distracted by corporate interests and can focus on what is best for you and your financial goals. To better understand the advantages of working with an independent financial professional, visit our website at www.corenorth.com Securities offered through Registered Representatives of Cambridge Investment Research Inc, a brokerยญdealer, member FINRA/SIPC. Advisory services offered through Cambridge Investment Research Advisors, Inc., a Registered Investment Adviser. CoreNorth Capital Planning, LLC and Cambridge Investment Research Inc are not affiliated. Products and services offered by unaffiliated insurers are not guaranteed, endorsed or recommended by Cambridge Investment Research, Inc. CoreNorth Capital Planning and Cambridge Investment Research, Inc. are Equal Opportunity Employers and Affirmative Action Employers. We cannot accept trade orders through social networks. This social network service may not be monitored every day, or after normal business hours. CoreNorth Capital Planning 13111 E 21st St N Wichita, KS 67230 316.854.4811

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=corenorth-capital-planning' -H 'apikey: YOUR_API_KEY_HERE'
newsone

CCP Cyber Security News

2025-08-06T05:50:00.000Z
AI Is Transforming Cybersecurity Adversarial Testing - Pentera Founderโ€™s Vision

AI transforms Pentera's testing platform, enabling real-time, intent-driven validation for 1200+ enterprises.

2025-08-06T16:14:17.000Z
CISAโ€™s relationship with industry needs work to reestablish trust, experts say

Critics say budget cuts, job losses have hurt the agency's ability to coordinate with private industry. Published Aug. 6, 2025.

2025-08-06T16:29:00.000Z
Former and current officials clash over CISAโ€™s role in US cyber defenses at Black Hat

CISA's communications chief backed the narrowing of the agency's scope, while a former NSA leader warned that shrinking the federal cyberย ...

2025-08-06T14:57:05.000Z
What CMMC 3.0 Really Means for Government Contractors

The Department of Defense (DoD) recently introduced CMMC 3.0 (Cybersecurity Maturity Model Certification), marking the next evolution in itsย ...

2025-08-03T13:00:00.000Z
Pentagon Snub Rattles Cybersecurity Conference Circuit

Organizers express concern after military leaders withdraw from recent national-security forum, which they say hurts intelligence sharing.

2025-08-04T12:49:17.000Z
Senate bill orders White House to create post-quantum cybersecurity roadmap to protect federal systems

The bipartisan legislation helps prepare the federal government for emerging cybersecurity threats posed by quantum computing, an advancedย ...

2025-07-30T07:00:00.000Z
Report a Cybersecurity Incident

To support timely and effective responses to cybersecurity threats, the DFPI encourages licensees to promptly report certain cyber incidents.

2025-08-05T11:02:24.000Z
A New Chapter for AI and Cybersecurity: SentinelOne Acquires Prompt Security

SentinelOne acquires Prompt Security to deliver real-time AI visibility, control, and protection across enterprises.

2025-08-05T17:01:59.000Z
FedRAMP 20x pilot finds initial success with four approvals

The initial results are in four months into the pilot effort to improve the cloud security program known as FedRAMP.

similarCompanies

CCP Similar Companies

Group DF is a diversified international group of companies operating in 11 countries across Europe and Asia. Our core areas of operations are fertilizer and titanium businesses, gas distribution and banking. Other businesses of the Group currently include agribusiness, media business, soda ash produ

Entekhab Group

Entekhab Group is one of the largest Iranian international holdings which seeks to impact industry and economy of Iran and the world. The impact which more than anything, is derived from updated and localized knowledge and technology which has so far been implemented in most Iranian economic fields.

Essar

Essar, with an entrepreneurial track record spanning 50+ years, specialises in investing and developing assets to create value in core sectors such as Energy, Infrastructure, Metals & Mining, and Technology & Retail. With a presence in eight countries, Essar generates revenues of US$15 billion and p

Grupo Visabeira

O Grupo Visabeira โˆšยฉ uma holding multinacional e multidisciplinar que surgiu em Viseu em 1980, onde mantโˆšยฉm a sua sede. Presente em 18 paโˆšโ‰ ses, comercializa produtos e serviโˆšรŸos em 134 naโˆšรŸโˆšยตes nos 5 continentes. O Grupo estโˆšยฐ dividido em sub-holdings: Visabeira Global (TelecomunicaโˆšรŸโˆšยตes, Energia,

Ackermans & van Haaren

Ackermans & van Haaren is a diversified group active in 4 core sectors: Marine Engineering & Contracting (DEME, one of the largest dredging companies in the world - CFE, a construction group with headquarters in Belgium), Private Banking (Delen Private Bank, one of the largest independent private as

Odebrecht

Founded in 1944, Odebrecht is a Brazilian group with diverse businesses and world-class standards of quality. Its Members, guided by the Groupโ€™s own philosophy, the Odebrecht Entrepreneurial Technology (TEO), provide services and manufacture products for clients on five continents. As part of their

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CCP CyberSecurity History Information

How many cyber incidents has CCP faced?

Total Incidents: According to Rankiteo, CCP has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at CCP?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does CCP detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Identity theft protection services including one year of credit monitoring by Experian.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: CoreNorth Data Breach

Description: Unauthorized access to an employee's email potentially compromised the Social Security numbers of 677 individuals.

Date Detected: 2021-10-17

Date Publicly Disclosed: 2021-10-17

Type: Data Breach

Attack Vector: Email Compromise

Vulnerability Exploited: Unauthorized Access

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Compromise.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach COR137072825

Data Compromised: Social Security numbers

Identity Theft Risk: High

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security numbers.

Which entities were affected by each incident?

Incident : Data Breach COR137072825

Entity Type: Company

Customers Affected: 677

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach COR137072825

Remediation Measures: Identity theft protection services including one year of credit monitoring by Experian

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach COR137072825

Type of Data Compromised: Social Security numbers

Number of Records Exposed: 677

Sensitivity of Data: High

Personally Identifiable Information: Social Security numbers

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Identity theft protection services including one year of credit monitoring by Experian.

References

Where can I find more information about each incident?

Incident : Data Breach COR137072825

Source: Maine Office of the Attorney General

Date Accessed: 2021-10-17

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2021-10-17.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach COR137072825

Entry Point: Email Compromise

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach COR137072825

Root Causes: Unauthorized access to an employee's email

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2021-10-17.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-10-17.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was Social Security numbers.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Social Security numbers.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 677.0.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Compromise.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge