Comparison Overview

Oklahoma Shakespeare in the Park

VS

FunikiJam World Music & Theatricals

Oklahoma Shakespeare in the Park

PO Box 1437, Oklahoam City, OK, 73101, US
Last Update: 2025-12-10

Oklahoma Shakespeare in the Park's statement of purpose is to provide Oklahoma with quality stage productions in unique and exciting environments at a reasonable price and to develop cultural growth in Oklahoma through classical and theatrical projects. OSP benefits the area further by supplying a theatrical arts training center for the area's young people as well as providing residencies through the Oklahoma Arts Council's Artist-in-Residence program. Oklahoma Shakespeare in the Park is a non-profit organization in alliance with the University of Central Oklahoma, is supported in part by the Oklahoma Arts Council; Allied Arts; the Kirkpatrick Family Fund; College of Arts, Media & Design at the University of Central Oklahoma; Frontier Country Marketing Association; Devon Energy; Chesapeake Energy; OGE Energy Corp; National Endowment of the Arts; Cox Communications; Oklahoma Community Theatre Association; AT&T; Inasmuch Foundation; Oklahoma City Community Foundation; and Cardinal Engineering. For more information, call (405) 235-3700, email [email protected] or visit the Web site at www.oklahomashakespeare.com. OSP is also a member of the Institute of Outdoor Drama and the Shakespeare Theatre Association of America.

NAICS: 711
NAICS Definition:
Employees: 9
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

FunikiJam World Music & Theatricals

Symphony House, 235 W 56 15E, New York, NY, US, 10019
Last Update: 2025-12-11
Between 750 and 799

Founded in Nashville in 1999, today FunikiJam produces its trademark "music exploration for the next generation"​ from headquarters in New York City. Designed to build global community through smart, fun, interactive programs, FunikiJam's catalog of original songs, stories, chants, and rhymes are delivered through award-winning group classes, workshops, festivals and live shows and poised for distribution through television, publishing, and digital media. What people say about FunikiJam and founder, Brian Barrentine: "My kid is obsessed with the jamming. When we want to punish him, we tell him he can't go to FunikiJam"​ Funikijam mom “Barrentine blew into town and kid’s music has never been the same. He is astonishingly wonderful.” - The Tennessean “Part stage show, part live band, part puppet theater, kids get WILD with FunikiJam’s globe spanning musical adventure” - Atlanta’s Creative Loafing Magazine “I have never seen our youngest learners more focused and so involved in any educational performance. The blend of developmentally appropriate content and audience participation kept them mesmerized from beginning to end.” - Elementary School principal “A prolific songwriter, he has been jamming with young children for the past decade. With countless shows and classes around the world, It's like he’s been working with his very own focus group all these years!” - New York television producer

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 8
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/oklahoma-shakespeare-in-the-park.jpeg
Oklahoma Shakespeare in the Park
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/funikijam-music.jpeg
FunikiJam World Music & Theatricals
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Oklahoma Shakespeare in the Park
100%
Compliance Rate
0/4 Standards Verified
FunikiJam World Music & Theatricals
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Oklahoma Shakespeare in the Park in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for FunikiJam World Music & Theatricals in 2025.

Incident History — Oklahoma Shakespeare in the Park (X = Date, Y = Severity)

Oklahoma Shakespeare in the Park cyber incidents detection timeline including parent company and subsidiaries

Incident History — FunikiJam World Music & Theatricals (X = Date, Y = Severity)

FunikiJam World Music & Theatricals cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/oklahoma-shakespeare-in-the-park.jpeg
Oklahoma Shakespeare in the Park
Incidents

No Incident

https://images.rankiteo.com/companyimages/funikijam-music.jpeg
FunikiJam World Music & Theatricals
Incidents

No Incident

FAQ

FunikiJam World Music & Theatricals company demonstrates a stronger AI Cybersecurity Score compared to Oklahoma Shakespeare in the Park company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, FunikiJam World Music & Theatricals company has disclosed a higher number of cyber incidents compared to Oklahoma Shakespeare in the Park company.

In the current year, FunikiJam World Music & Theatricals company and Oklahoma Shakespeare in the Park company have not reported any cyber incidents.

Neither FunikiJam World Music & Theatricals company nor Oklahoma Shakespeare in the Park company has reported experiencing a ransomware attack publicly.

Neither FunikiJam World Music & Theatricals company nor Oklahoma Shakespeare in the Park company has reported experiencing a data breach publicly.

Neither FunikiJam World Music & Theatricals company nor Oklahoma Shakespeare in the Park company has reported experiencing targeted cyberattacks publicly.

Neither Oklahoma Shakespeare in the Park company nor FunikiJam World Music & Theatricals company has reported experiencing or disclosing vulnerabilities publicly.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Oklahoma Shakespeare in the Park company nor FunikiJam World Music & Theatricals company has publicly disclosed detailed information about the number of their subsidiaries.

Oklahoma Shakespeare in the Park company employs more people globally than FunikiJam World Music & Theatricals company, reflecting its scale as a Performing Arts.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds SOC 2 Type 1 certification.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds SOC 2 Type 2 certification.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds ISO 27001 certification.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds PCI DSS certification.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds HIPAA certification.

Neither Oklahoma Shakespeare in the Park nor FunikiJam World Music & Theatricals holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X