Company Details
purdue-convocations
15
493
7111
convocations.org
0
PUR_3069529
In-progress

Purdue Convocations Company CyberSecurity Posture
convocations.orgInitiated in 1902, Purdue Convocations is among the oldest collegiate performing arts presenters in the United States. With an artistic eye and entrepreneurial flair, Convocations brings a diverse array of world-class performances and intellectual encounters—including collaborations with an ever-widening circle of partners—fulfilling our mission by connecting them to our academic, local, and regional audiences through engaging educational opportunities. MISSION Purdue Convocations catalyzes the curriculum, energizes the community, and distinguishes Purdue through powerful performances, illuminating discourse, and extraordinary learning encounters. VISION Purdue Convocations is to be a leader and a partner in making the performing arts essential to everyone’s life. HISTORY Purdue University has a rich history of bringing concerts, lectures and performances to campus. In 1902 the “Lecture and Concert Course” was first offered, creating the earliest evidence of what is now Purdue Convocations. Over the years and decades the names and formats have changed, but one thing has remained constant: the desire to expand the Purdue experience beyond the classroom.
Company Details
purdue-convocations
15
493
7111
convocations.org
0
PUR_3069529
In-progress
Between 750 and 799

Purdue Convocations Global Score (TPRM)XXXX



No incidents recorded for Purdue Convocations in 2025.
No incidents recorded for Purdue Convocations in 2025.
No incidents recorded for Purdue Convocations in 2025.
Purdue Convocations cyber incidents detection timeline including parent company and subsidiaries

Initiated in 1902, Purdue Convocations is among the oldest collegiate performing arts presenters in the United States. With an artistic eye and entrepreneurial flair, Convocations brings a diverse array of world-class performances and intellectual encounters—including collaborations with an ever-widening circle of partners—fulfilling our mission by connecting them to our academic, local, and regional audiences through engaging educational opportunities. MISSION Purdue Convocations catalyzes the curriculum, energizes the community, and distinguishes Purdue through powerful performances, illuminating discourse, and extraordinary learning encounters. VISION Purdue Convocations is to be a leader and a partner in making the performing arts essential to everyone’s life. HISTORY Purdue University has a rich history of bringing concerts, lectures and performances to campus. In 1902 the “Lecture and Concert Course” was first offered, creating the earliest evidence of what is now Purdue Convocations. Over the years and decades the names and formats have changed, but one thing has remained constant: the desire to expand the Purdue experience beyond the classroom.


The Rose Theater is one of the largest and most accomplished children’s theaters in the nation. The Rose and the Omaha Theater Company have a reputation for enriching the lives of children and families through top-quality professional productions and arts education. In 2016, American Theatre magazi

The Paramount is a beautiful performing arts theatre located in the heart of Historic Downtown Goldsboro. Home to countless local performing arts events such as plays, musicals and dance performances, the Paramount also features to a small classic/themed movie night series, and an annual series of p

San Diego Repertory Theatre produces intimate, provocative, inclusive theatre. We promote an interconnected community through vivid works that nourish progressive political and social values and celebrate the multiple voices of our region. San Diego Repertory Theatre feeds the curious soul. We ar

Founded by Bill English and Susi Damilano in 2003, and described by the New York Times as “a company that stages some of the most consistently high-quality work around, and deemed “ever adventurous” by the Bay Area News Group. Located right in the heart of the Union Square Theater District, SFPH is

Transforming the lives of youth and communities through collaboration and the performing arts! Our Mission: Yes! And... Collaborative Arts (YACA) is a youth-centered organization dedicated to amplifying voices, nurturing agency, and creating community through performing arts experiences. We believe

Het Nationaal Jeugd Orkest (NJO), opgericht in 1957, biedt al ruim zestig jaar een podium aan jong toptalent tussen de 18 en 26 jaar. Bijvoorbeeld tijdens de NJO Muziekzomer, een zomers festival op de mooiste plekken van Gelderland, en tijdens de NJO Wintertournee, als een symfonieorkest van het NJO
.png)
CrowdStrike, Palo Alto Networks, and Fortinet are the three Cybersecurity stocks to watch today, according to MarketBeat's stock screener...
AI dominates cybersecurity experts' 2026 predictions as it touches on authentication, privacy and attack acceleration.
ServiceNow (NOW) is in advanced talks to acquire Armis, a significant move into the cybersecurity sector. Armis, valued at $6.1 billion,...
Ogeechee Technical College's Cybersecurity Club, ARPe-DIEM, has proven its mettle on the national stage, achieving a significant ranking in...
As 2025 nears its close, the cybersecurity landscape shows no signs of slowing down. This week's developments highlight how rapidly the...
Back in July, the UK government announced its intention to ban ransomware payments for all public sector bodies, including local government,...
The Lake County Public Defender's office recently recognized two Lake County staffers with The Chief's Award during the office's quarterly...
Cybersecurity US Stocks Week Ahead (Dec. 15–19, 2025): Zscaler's Bounce Test, SailPoint's Post-Earnings Reset, and Fed-Cut Volatility...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Purdue Convocations is http://convocations.org.
According to Rankiteo, Purdue Convocations’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Purdue Convocations currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Purdue Convocations is not certified under SOC 2 Type 1.
According to Rankiteo, Purdue Convocations does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Purdue Convocations is not listed as GDPR compliant.
According to Rankiteo, Purdue Convocations does not currently maintain PCI DSS compliance.
According to Rankiteo, Purdue Convocations is not compliant with HIPAA regulations.
According to Rankiteo,Purdue Convocations is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Purdue Convocations operates primarily in the Performing Arts industry.
Purdue Convocations employs approximately 15 people worldwide.
Purdue Convocations presently has no subsidiaries across any sectors.
Purdue Convocations’s official LinkedIn profile has approximately 493 followers.
Purdue Convocations is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, Purdue Convocations does not have a profile on Crunchbase.
Yes, Purdue Convocations maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/purdue-convocations.
As of December 14, 2025, Rankiteo reports that Purdue Convocations has not experienced any cybersecurity incidents.
Purdue Convocations has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Purdue Convocations has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.