Company Details
academy-of-children's-theatre
19
314
7111
academyofchildrenstheatre.org
0
ACA_2157666
In-progress

Academy of Children's Theatre Company CyberSecurity Posture
academyofchildrenstheatre.orgIt is the mission of the Academy of Children's Theatre to provide educational opportunities in the theatre arts for young people of all abilities and levels of interest, to produce quality theatre for and by the young with appeal to all ages, and to expose people to diverse ideas and cultures through the theatre experience.
Company Details
academy-of-children's-theatre
19
314
7111
academyofchildrenstheatre.org
0
ACA_2157666
In-progress
Between 750 and 799

ACT Global Score (TPRM)XXXX



No incidents recorded for Academy of Children's Theatre in 2025.
No incidents recorded for Academy of Children's Theatre in 2025.
No incidents recorded for Academy of Children's Theatre in 2025.
ACT cyber incidents detection timeline including parent company and subsidiaries

It is the mission of the Academy of Children's Theatre to provide educational opportunities in the theatre arts for young people of all abilities and levels of interest, to produce quality theatre for and by the young with appeal to all ages, and to expose people to diverse ideas and cultures through the theatre experience.


At Superblue, we believe that art and creativity have the power to change how people understand the world we live in. So we’ve teamed up with innovative artists who think the same. Artists who create experiential artworks that are as meaningful as they are breathtaking. Who push boundaries of what

Prospect Musicals (aka Prospect Theater Company) is an NYC-based non-profit organization, was founded in 1998 and is dedicated to dedicated to fostering and showcasing today's new voices shaping tomorrow's musicals. We develop and produce new works, envisioned and implemented by emerging and mid-ca

Since 1995, Auguri Productions has been representing some of the most respected French artists in live music, like Stromae, Vanessa Paradis, -M-, Julien Doré, Jain, Thomas Dutronc, Oxmo Puccino, Philippe Katerine, Dominique A and many more. Our only ambition: to guide and develop them on the live sc

Southern Dance Theatre offers a variety of dance classes for early childhood through adult students and for dancers of all levels. We’ve been a recognized leader in dance education in South Florida’s performing arts community since 1983. Now open at our NEW LOCATION 924 North Dixie Highway Lake Wor

Preserving and producing Off-Broadway's intimate storytelling. In recent years, we have been home to Phoebe Waller-Bridge's Fleabag, Hannah Gadsby, and Daniel Sloss. We are also home to the Fringe Encore Series, choosing the top Fringe shows from around the world and giving them a full off-Broadwa

Circle World Arts is a vibrant community of cultural citizens dedicated to sharing artistic traditions across the globe, with support from Yo-Yo Ma's Silk Road Ensemble, the Harvard Graduate School of Education, and the Kennedy Center for Performing Arts. We organize multicultural, interdisciplinary
.png)
Information about the Palo Alto Children's Theatre mission and history and upcoming events at the theatre.
Teens and older kids will love this selection of teen-friendly summer camps in the Pittsburgh area.
CyBR Hacks, at Bridgewater-Raritan High School, is embarking on a new initiative to educate young children about the importance of cybersecurity in today's...
NEIT has launched a new cybersecurity training range, a virtual simulation platform for training students and IT professionals through exercises.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Academy of Children's Theatre is http://www.academyofchildrenstheatre.org.
According to Rankiteo, Academy of Children's Theatre’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, Academy of Children's Theatre currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Academy of Children's Theatre is not certified under SOC 2 Type 1.
According to Rankiteo, Academy of Children's Theatre does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Academy of Children's Theatre is not listed as GDPR compliant.
According to Rankiteo, Academy of Children's Theatre does not currently maintain PCI DSS compliance.
According to Rankiteo, Academy of Children's Theatre is not compliant with HIPAA regulations.
According to Rankiteo,Academy of Children's Theatre is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Academy of Children's Theatre operates primarily in the Performing Arts industry.
Academy of Children's Theatre employs approximately 19 people worldwide.
Academy of Children's Theatre presently has no subsidiaries across any sectors.
Academy of Children's Theatre’s official LinkedIn profile has approximately 314 followers.
Academy of Children's Theatre is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
Yes, Academy of Children's Theatre has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/academy-of-children-s-theatre.
Yes, Academy of Children's Theatre maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/academy-of-children's-theatre.
As of December 15, 2025, Rankiteo reports that Academy of Children's Theatre has not experienced any cybersecurity incidents.
Academy of Children's Theatre has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Academy of Children's Theatre has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.