Comparison Overview

Go High Center for the Arts

VS

Child's Play Touring Theatre

Go High Center for the Arts

4206 Chamberlayne Ave, Richmond, Virginia, undefined, US
Last Update: 2025-12-11
Between 750 and 799

The mission of Go High Corp Center for the Arts (GHCTA) is to provide a permanent location for youth to participate in the urban arts in Richmond, VA and the surrounding counties. The venue will serve as a secondary and alternative community for the youth that will operate under the management of the youth themselves. Go High Corp Center for the Arts provides opportunities for local youth artists and musicians to perform and showcase their own work in a healthy environment. The venue will host concerts, fashion shows with clothing designed by themselves, video productions, music produced in our own production studios, community events and Social Media and Marketing workshops in collaboration with local artists and musicians. Providing this alternative youth community will give youth another recreational option, resulting in healthy decision-making and habits of the youth involved. The goal of CHCTA mission is the pursuit of the following principles: Commitment: Go High Center for the Arts wants to inspire pro-social friendships, strong interpersonal skills, and instill a sense of hope in the future. Responsibility: The focus of GHCTA is to empower youth in establishing goals and following through on commitments. Possibility: Go High Center for the Arts wants to expand the perspective of young people to make them aware of life's possibilities. Support: An individual is dramatically influenced by their support system. Go High Center for the Arts wants to surround young people in a caring, supportive and inclusive learning environment. As GHCTA programs develop, it hopes to form additional community partnerships that will provide job internship opportunities for the youth each year

NAICS: 711
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Child's Play Touring Theatre

5097 N Elston Ave., Chicago, Illinois, 60630, US
Last Update: 2025-12-12
Between 750 and 799

Founded in 1978, Child's Play Touring Theatre was the first theatre company to realize the value of children's own writing and perform exclusively stories and poems written by young authors. By combining the important, imaginative writings of children with the craftsmanship of professional theatre artists, we created a unique stage where children's voices can be heard, examined and treasured. Today, Child's Play actors and teaching artists tour throughout the country, bringing enhanced arts curriculum to schools and community organizations through workshops, performances and residencies. To date, we have reached more than 4 million students, educators and parents, and have performed the original works of over 16,000 young writers. As an educational theatre, we have developed many acting and writing classes. The Cook County State's Attorney's office has supported our in school and after school programs for at risk children.We have also reached children of all abilities through our work with Gallery 37's connection program. We have worked with many wonderful institutions including: Art Institute, Chicago Park District, DePaul University, Field Museum, University of Chicago Laboratory School, Peace Museum, Museum of Science and Industry, The League of Woman Voters, YMCA, Navy Pier's Skyline Stage, and Union League Club.

NAICS: 711
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/go-high-corp.jpeg
Go High Center for the Arts
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/child's-play-touring-theatre.jpeg
Child's Play Touring Theatre
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Go High Center for the Arts
100%
Compliance Rate
0/4 Standards Verified
Child's Play Touring Theatre
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Go High Center for the Arts in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Child's Play Touring Theatre in 2025.

Incident History — Go High Center for the Arts (X = Date, Y = Severity)

Go High Center for the Arts cyber incidents detection timeline including parent company and subsidiaries

Incident History — Child's Play Touring Theatre (X = Date, Y = Severity)

Child's Play Touring Theatre cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/go-high-corp.jpeg
Go High Center for the Arts
Incidents

No Incident

https://images.rankiteo.com/companyimages/child's-play-touring-theatre.jpeg
Child's Play Touring Theatre
Incidents

No Incident

FAQ

Go High Center for the Arts company demonstrates a stronger AI Cybersecurity Score compared to Child's Play Touring Theatre company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Child's Play Touring Theatre company has disclosed a higher number of cyber incidents compared to Go High Center for the Arts company.

In the current year, Child's Play Touring Theatre company and Go High Center for the Arts company have not reported any cyber incidents.

Neither Child's Play Touring Theatre company nor Go High Center for the Arts company has reported experiencing a ransomware attack publicly.

Neither Child's Play Touring Theatre company nor Go High Center for the Arts company has reported experiencing a data breach publicly.

Neither Child's Play Touring Theatre company nor Go High Center for the Arts company has reported experiencing targeted cyberattacks publicly.

Neither Go High Center for the Arts company nor Child's Play Touring Theatre company has reported experiencing or disclosing vulnerabilities publicly.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Go High Center for the Arts company nor Child's Play Touring Theatre company has publicly disclosed detailed information about the number of their subsidiaries.

Child's Play Touring Theatre company employs more people globally than Go High Center for the Arts company, reflecting its scale as a Performing Arts.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds SOC 2 Type 1 certification.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds SOC 2 Type 2 certification.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds ISO 27001 certification.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds PCI DSS certification.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds HIPAA certification.

Neither Go High Center for the Arts nor Child's Play Touring Theatre holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N