Company Details
old-log-theater
22
124
7111
oldlog.com
0
OLD_2701514
In-progress

Old Log Theatre Company CyberSecurity Posture
oldlog.comAs one of the oldest, most popular professional theaters in the country, the Old Log offers contemporary plays, comedies, and musicals year-round. Minutes away from the Twin Cities metro area and set on 10 beautiful acres near the shores of historic Lake Minnetonka, the Old Log combines rustic charm, a serene setting and spacious accommodations, including a 561 seat auditorium, a separate 300 seat restaurant for pre-show dining and full bar service. The lovely grounds with their authentic log buildings are bordered by tall pines, perennial gardens and natural wetlands.
Company Details
old-log-theater
22
124
7111
oldlog.com
0
OLD_2701514
In-progress
Between 750 and 799

OLT Global Score (TPRM)XXXX



No incidents recorded for Old Log Theatre in 2025.
No incidents recorded for Old Log Theatre in 2025.
No incidents recorded for Old Log Theatre in 2025.
OLT cyber incidents detection timeline including parent company and subsidiaries

As one of the oldest, most popular professional theaters in the country, the Old Log offers contemporary plays, comedies, and musicals year-round. Minutes away from the Twin Cities metro area and set on 10 beautiful acres near the shores of historic Lake Minnetonka, the Old Log combines rustic charm, a serene setting and spacious accommodations, including a 561 seat auditorium, a separate 300 seat restaurant for pre-show dining and full bar service. The lovely grounds with their authentic log buildings are bordered by tall pines, perennial gardens and natural wetlands.


UPROOTED provides a vital outlet through the performing arts for the exploration and expression of African-American voices and cultural experiences. Through its work, UPROOTED strives to unite all members of the Milwaukee community, regardless of their racial or socioeconomic backgrounds, religious

For more than 25 years, Writers Theatre has captivated Chicagoland audiences with inventive interpretations of classic work, a bold approach to contemporary theatre and a dedication to creating the most intimate theatrical experience possible. Under the artistic leadership of interim Artistic Direc

Founded in 2006, Music Haven empowers and connects young people through exceptional tuition-free music education, mentoring, and performance by our resident musicians in the heart of New Haven, giving all kids a chance to play. Recognized as a top 50 after-school arts program in the country by the

New York Classical Theatre creates and reinvigorates audiences for the theatre by presenting free productions of popular & forgotten classical plays in public spaces throughout New York City. We are also committed to developing and producing new plays by living playwrights that enrich and expand our

Trafalgar Theatres is a leading theatre operator and is part of Trafalgar Entertainment. We’re experts in regional theatre and venue operation – with a proven track-record across 15 years of operation. Our portfolio of 14 venues represents a broad cross-section of UK regional theatres, live music v

For over twenty years the Centenary Stage Company has served as a cultural resource for our community and the beautiful Skylands region. Our mission as a theatre has always been to entertain, enlighten, and inspire. Each year we venture forth on a journey we hope will have an impact on the lives of
.png)
The final curtain is falling on the Old Log Theatre, Minnesota's oldest and longest continuously operating playhouse.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Old Log Theatre is http://oldlog.com/.
According to Rankiteo, Old Log Theatre’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.
According to Rankiteo, Old Log Theatre currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Old Log Theatre is not certified under SOC 2 Type 1.
According to Rankiteo, Old Log Theatre does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Old Log Theatre is not listed as GDPR compliant.
According to Rankiteo, Old Log Theatre does not currently maintain PCI DSS compliance.
According to Rankiteo, Old Log Theatre is not compliant with HIPAA regulations.
According to Rankiteo,Old Log Theatre is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Old Log Theatre operates primarily in the Performing Arts industry.
Old Log Theatre employs approximately 22 people worldwide.
Old Log Theatre presently has no subsidiaries across any sectors.
Old Log Theatre’s official LinkedIn profile has approximately 124 followers.
Old Log Theatre is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, Old Log Theatre does not have a profile on Crunchbase.
Yes, Old Log Theatre maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/old-log-theater.
As of December 15, 2025, Rankiteo reports that Old Log Theatre has not experienced any cybersecurity incidents.
Old Log Theatre has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Old Log Theatre has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.