Company Details
entertainment-events-inc.
12
221
7111
EntertainmentEvents.com
0
ENT_2757565
In-progress

Entertainment Events, Inc. Company CyberSecurity Posture
EntertainmentEvents.comEntertainment Events, Inc. (EEI), based in New York City, has made its mark on the theatrical touring industry by offering a variety of new and exciting plays and musicals to an ever growing list or professional and amateur presenting organizations throughout the country. EEI brings all aspects of producing under one roof sales, production, casting, creative and technical. EEI productions have been produced and presented in all 50 states as well as in Canada, Europe, Australia and Asia. Since 1999 EEI has produced; "The Late Nite Catechism Series," "Maybe Baby, It’s You," "The Yiddish Are Coming, The Yiddish Are Coming!," "Shout! The Mod Musical," "Tony N’ Tina’s Wedding," "Defending the Caveman," "We’re Still Hot!," and are former producers of Jeanie Linders’ "Menopause The Musical." EEI is now proud to present "Girls Night: The Musical," "Late NiteCatechism," "Sister Strikes Again!: Late Nite Catechism 2," "‘Til Death Do Us Part: Late Nite Catechism 3," "Sister’s Christmas Catechism: The Mystery of the Magi’s Gold," "The Santa Class" and "Girl Talk: The Musical."
Company Details
entertainment-events-inc.
12
221
7111
EntertainmentEvents.com
0
ENT_2757565
In-progress
Between 750 and 799

EEI Global Score (TPRM)XXXX



No incidents recorded for Entertainment Events, Inc. in 2025.
No incidents recorded for Entertainment Events, Inc. in 2025.
No incidents recorded for Entertainment Events, Inc. in 2025.
EEI cyber incidents detection timeline including parent company and subsidiaries

Entertainment Events, Inc. (EEI), based in New York City, has made its mark on the theatrical touring industry by offering a variety of new and exciting plays and musicals to an ever growing list or professional and amateur presenting organizations throughout the country. EEI brings all aspects of producing under one roof sales, production, casting, creative and technical. EEI productions have been produced and presented in all 50 states as well as in Canada, Europe, Australia and Asia. Since 1999 EEI has produced; "The Late Nite Catechism Series," "Maybe Baby, It’s You," "The Yiddish Are Coming, The Yiddish Are Coming!," "Shout! The Mod Musical," "Tony N’ Tina’s Wedding," "Defending the Caveman," "We’re Still Hot!," and are former producers of Jeanie Linders’ "Menopause The Musical." EEI is now proud to present "Girls Night: The Musical," "Late NiteCatechism," "Sister Strikes Again!: Late Nite Catechism 2," "‘Til Death Do Us Part: Late Nite Catechism 3," "Sister’s Christmas Catechism: The Mystery of the Magi’s Gold," "The Santa Class" and "Girl Talk: The Musical."


From Silk Road Theatre Project (2002) to Silk Road Rising (2012) to Silk Road Cultural Center (2024), our Silk Road story continues to inspire. OUR MISSION Silk Road Cultural Center is an interdisciplinary arts organization rooted in Pan-Asian*, North African, and Muslim experiences. We embrace the

The Vail Jazz Foundation, now referred to as Vail Jazz, was founded in 1995 by real estate attorney and investor Howard Stone, and is a 501 c(3) non profit arts organization that is in its 27th year of operation. After the success of the first Vail Jazz Party in 1995, Stone dreamed further and decid

THE VISION The Center is a hub for the artistic, cultural and creative activity in Jackson Hole, Wyoming. We are fueled by innovation, inspired by collaboration and proud to share our 78,000 sq. foot campus with 19 inspired local, regional and state-wide non-profit organizations who call The Center

The Village Players are a registered 501(c)(3) non-profit organization. All actors, members, and staff are volunteers. Our theater is handicapped-accessible, heated & air-conditioned. We have been producing plays since 1947! For the 2023/2024 season, we will produce 5 regular season productions,

The Broadway Theatre of Pitman is dedicated to breathing life into the most exciting theater productions written for a diverse audience. We engage and excite our audience, while using our stage as a place where professional and aspiring actors can learn, explore, grow and produce excellence together

What does a 31-year old theatre kid do when he finds out his parents aren't quite who he thinks they are? Write a musical, of course! OUR LITTLE SECRET is the hilarious, moving, and completely true story of Noam Tomaschoff's discovery that he wasn't an only child, and he actually had more than 35
.png)
Gen AI is everywhere, as top companies, governments, researchers, and startups showcase how they're already using Google's AI solutions to...
WestJet, Hawaiian Airlines and Qantas have confirmed attacks by the prolific hacking group known as Scattered Spider.
Our story begins with a spoiler: A media and entertainment company was going to experience a cybersecurity incident. Would it be an insider event...
Over the past three years, Deere has paid more than $1.5 million to the external researchers it works with to keep the company safe.
The future of cybersecurity starts here. Fal.Con is more than a conference - it's a cybersecurity revolution bringing together the greatest minds in the...
We are the world's largest theatrical exhibition company and an industry leader in innovation and operational excellence.
Our daily feed provides consumers and business, technology, financial, education and government professionals with the latest news to keep you on the cutting...
The live concert and entertainment giant disclosed the compromise days after reports began surfacing of a data breach. The company said it...
The hacking group ShinyHunters has claimed responsibility for stealing the user information of more than 500 million Ticketmaster customers.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Entertainment Events, Inc. is http://www.EntertainmentEvents.com.
According to Rankiteo, Entertainment Events, Inc.’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Entertainment Events, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Entertainment Events, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Entertainment Events, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Entertainment Events, Inc. is not listed as GDPR compliant.
According to Rankiteo, Entertainment Events, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Entertainment Events, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Entertainment Events, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Entertainment Events, Inc. operates primarily in the Performing Arts industry.
Entertainment Events, Inc. employs approximately 12 people worldwide.
Entertainment Events, Inc. presently has no subsidiaries across any sectors.
Entertainment Events, Inc.’s official LinkedIn profile has approximately 221 followers.
Entertainment Events, Inc. is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, Entertainment Events, Inc. does not have a profile on Crunchbase.
Yes, Entertainment Events, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/entertainment-events-inc..
As of December 14, 2025, Rankiteo reports that Entertainment Events, Inc. has not experienced any cybersecurity incidents.
Entertainment Events, Inc. has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Entertainment Events, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.