Company Details
international-center-of-photography
968
70,910
54192
icp.org
0
INT_4238764
In-progress

International Center of Photography Company CyberSecurity Posture
icp.orgThe International Center of Photography (ICP) is the world’s leading institution dedicated to photography and visual culture. Through our exhibitions, educational programs, and community outreach, we offer an open forum for dialogue about the role images play in our culture. Since our founding, we have presented more than 700 exhibitions and offered thousands of classes, providing instruction at every level. ICP is a center where photographers and artists, students and scholars can create and interpret the world of the image within our comprehensive educational facilities and archive.
Company Details
international-center-of-photography
968
70,910
54192
icp.org
0
INT_4238764
In-progress
Between 700 and 749

ICP Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported a data breach involving the International Center of Photography on February 7, 2024. The breach occurred on December 15, 2023, and was discovered on February 16, 2023, affecting a total of 5,985 individuals, including 10 residents. The breach resulted from an external hacking incident that may have compromised various types of personal information, including financial account numbers.


No incidents recorded for International Center of Photography in 2025.
No incidents recorded for International Center of Photography in 2025.
No incidents recorded for International Center of Photography in 2025.
ICP cyber incidents detection timeline including parent company and subsidiaries

The International Center of Photography (ICP) is the world’s leading institution dedicated to photography and visual culture. Through our exhibitions, educational programs, and community outreach, we offer an open forum for dialogue about the role images play in our culture. Since our founding, we have presented more than 700 exhibitions and offered thousands of classes, providing instruction at every level. ICP is a center where photographers and artists, students and scholars can create and interpret the world of the image within our comprehensive educational facilities and archive.


Images That Sell is a Sydney based company providing creative services for fashion and lifestyle brands that require media for marketing, social and e-commerce. Started in 2012, Images That Sell quickly became the market leader in e-commerce photography and content creation. Working with some of th

Memphis Wedding Cinematography and Worldwide Corporate Videography including video for the cheerleading industry , transportation, sports, as well as other corporate video clients. Message in a Bottle Productions provides stunning HD quality videos for the Memphis wedding video market. Our clients

am a Herefordshire based Equine Portrait Photographer covering the entire United Kingdom. I produce dramatic, punchy, edgy, and moody images of the horse. My first horse experience was when I attended a birthday ‘pony party’ at the age of six. That was it, I was hooked. By the time I was thirteen

Who We Are It's been nearly 50 years since our company's founding. Yet for all the changes those years have brought, one thing has always remained constant. Geskus Photography has been - is still - and will continue to be the industry leader when it comes to school portraits, yearbooks, and sports p

Guy Cali Associates, Inc. has closed its doors after fifty years. It has been an honor and a privilege to have served our community, for those we photographed were not just our clients but our family, friends, and neighbors. Thank you for choosing us to preserve the history of Northeastern Pennsylva

The Line Studios are experts in e-commerce imagery - we create high-performing content that drives brand growth. OUR CLIENTS Our clients range from high-end luxury brands like Farfetch, Proenza Schouler and Thom Browne to emerging brands like Negative Underwear, Hill House Home & M.M. LaFleur. O
.png)
As digitalization accelerates and cyberattacks grow increasingly complex and sophisticated, NEC's cybersecurity business has reached a...
To deliver advanced AI-powered cybersecurity defense operations for global enterprises. BENGALURU, India, Dec.
Rep. Nick Langworthy and St. Bonaventure President Jeff Gingerich cut through a computer cable to launch the universitys new Cyber...
China's military-civil fusion turns global supply chains into a battlefield. The CCP fuses state power and private enterprise to embed cyber...
Misuse of information and communications technologiesThere is growing concern over the misuse of information and communications technologies (ICT) by...
The Defense Logistics Agency must adapt to the complexities of a rapidly changing global landscape by modernizing its approaches to...
The 2019/2020 Official Annual Cybersecurity Jobs Report is sponsored by Herjavec Group, a leading global cybersecurity advisory firm and...
Cybersecurity Ventures predicts cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.
With nearly $25 billion in the One Big Beautiful Bill Act, a deep bench of cyber executive leaders, and recently expanded cyber authorities,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International Center of Photography is http://www.icp.org.
According to Rankiteo, International Center of Photography’s AI-generated cybersecurity score is 721, reflecting their Moderate security posture.
According to Rankiteo, International Center of Photography currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International Center of Photography is not certified under SOC 2 Type 1.
According to Rankiteo, International Center of Photography does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International Center of Photography is not listed as GDPR compliant.
According to Rankiteo, International Center of Photography does not currently maintain PCI DSS compliance.
According to Rankiteo, International Center of Photography is not compliant with HIPAA regulations.
According to Rankiteo,International Center of Photography is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International Center of Photography operates primarily in the Photography industry.
International Center of Photography employs approximately 968 people worldwide.
International Center of Photography presently has no subsidiaries across any sectors.
International Center of Photography’s official LinkedIn profile has approximately 70,910 followers.
International Center of Photography is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, International Center of Photography does not have a profile on Crunchbase.
Yes, International Center of Photography maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/international-center-of-photography.
As of December 17, 2025, Rankiteo reports that International Center of Photography has experienced 1 cybersecurity incidents.
International Center of Photography has an estimated 2,458 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at International Center of Photography
Description: The Maine Office of the Attorney General reported a data breach involving the International Center of Photography on February 7, 2024. The breach occurred on December 15, 2023, and was discovered on February 16, 2023, affecting a total of 5,985 individuals, including 10 residents. The breach resulted from an external hacking incident that may have compromised various types of personal information, including financial account numbers.
Date Detected: 2023-02-16
Date Publicly Disclosed: 2024-02-07
Type: Data Breach
Attack Vector: External Hacking
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Personal information, Financial account numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Financial Account Numbers and .

Entity Name: International Center of Photography
Entity Type: Organization
Industry: Education/Arts
Customers Affected: 5985

Type of Data Compromised: Personal information, Financial account numbers
Number of Records Exposed: 5985

Source: Maine Office of the Attorney General
Date Accessed: 2024-02-07
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-02-07.
Most Recent Incident Detected: The most recent incident detected was on 2023-02-16.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-07.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, Financial Account Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Information and Financial Account Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 603.0.
Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.