Comparison Overview

Milwaukee Rep

VS

Cincinnati Opera

Milwaukee Rep

108 E Wells Street, Milwaukee, WI, US, 53202
Last Update: 2025-12-11
Between 750 and 799

Milwaukee Rep is the largest performing arts organization in Wisconsin in terms of audiences served and one of the largest professional theaters in the country. Under the leadership of Artistic Director Mark Clements and Executive Director Chad Bauman, each year Milwaukee Rep welcomes 300,000 people at 700 performances of 15 productions ranging from compelling dramas, powerful classics, new plays and full-scaled musicals in its three unique performance venues – the Quadracci Powerhouse, Stiemke Studio and Stackner Cabaret. For over 65 years, Milwaukee Rep has gained a national reputation as an incubator of new work, an agent of community change and a forward-thinking provider of vital arts education programs.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 192
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Cincinnati Opera

1243 Elm Street, Cincinnati, OH, 45202, US
Last Update: 2025-12-13

­Fou­n­ded in 1920 and the second oldest opera company in the U.S., Cincinnati Opera presents a thrilling roster of world-class artists and conductors, important company debuts, stunning sets and costumes, and the spectacular Cincin­nati Symphony Orchestra. Today the c­ompany is hailed as Cincinnati's "prime summer arts festival"​ attracting a passionate regional audience as well as opera tourists from throughout the U.S. and Canada.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 82
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/milwaukee-rep.jpeg
Milwaukee Rep
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/cincinnati-opera.jpeg
Cincinnati Opera
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Milwaukee Rep
100%
Compliance Rate
0/4 Standards Verified
Cincinnati Opera
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Milwaukee Rep in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Cincinnati Opera in 2025.

Incident History — Milwaukee Rep (X = Date, Y = Severity)

Milwaukee Rep cyber incidents detection timeline including parent company and subsidiaries

Incident History — Cincinnati Opera (X = Date, Y = Severity)

Cincinnati Opera cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/milwaukee-rep.jpeg
Milwaukee Rep
Incidents

No Incident

https://images.rankiteo.com/companyimages/cincinnati-opera.jpeg
Cincinnati Opera
Incidents

No Incident

FAQ

Milwaukee Rep company demonstrates a stronger AI Cybersecurity Score compared to Cincinnati Opera company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Cincinnati Opera company has disclosed a higher number of cyber incidents compared to Milwaukee Rep company.

In the current year, Cincinnati Opera company and Milwaukee Rep company have not reported any cyber incidents.

Neither Cincinnati Opera company nor Milwaukee Rep company has reported experiencing a ransomware attack publicly.

Neither Cincinnati Opera company nor Milwaukee Rep company has reported experiencing a data breach publicly.

Neither Cincinnati Opera company nor Milwaukee Rep company has reported experiencing targeted cyberattacks publicly.

Neither Milwaukee Rep company nor Cincinnati Opera company has reported experiencing or disclosing vulnerabilities publicly.

Neither Milwaukee Rep nor Cincinnati Opera holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Milwaukee Rep company nor Cincinnati Opera company has publicly disclosed detailed information about the number of their subsidiaries.

Milwaukee Rep company employs more people globally than Cincinnati Opera company, reflecting its scale as a Performing Arts.

Neither Milwaukee Rep nor Cincinnati Opera holds SOC 2 Type 1 certification.

Neither Milwaukee Rep nor Cincinnati Opera holds SOC 2 Type 2 certification.

Neither Milwaukee Rep nor Cincinnati Opera holds ISO 27001 certification.

Neither Milwaukee Rep nor Cincinnati Opera holds PCI DSS certification.

Neither Milwaukee Rep nor Cincinnati Opera holds HIPAA certification.

Neither Milwaukee Rep nor Cincinnati Opera holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N