Comparison Overview

Riverside Theatre

VS

Ellandar Productions

Riverside Theatre

undefined, Iowa City, IA, undefined, US
Last Update: 2025-12-09

A great city deserves serious theatre. Theatre that sparks discourse, builds community, delights, inspires, breaks down barriers, and explores the complexities of the human spirit. Riverside Theatre strengthens the cultural fabric of Iowa City through intimate, engaging productions from classics to new works that foster an appreciation for the dramatic arts. Riverside Theatre was founded by Ron Clark, Jody Hovland and Bruce Wheaton in 1981 and is now in its 39th season. From September through April we produce a full season of work. In June and July, we produce a summer season centered around the classics and a full production of Shakespeare free for the community. We are affiliated with Actors’ Equity Association, the union of professional actors and stage managers in the United States, employing actors and designers from all over the country and provide housing, salary, and transportation to visiting actors and directors during their employment at Riverside. As a non-profit, 501 (c)(3) organization, we’re largely supported by contributors—50% of our income comes from contributions and sponsorships. We employ a year-round staff of seven, and within each season we employ over 100 artists. Riverside Theatre is governed by a volunteer board of directors.

NAICS: 711
NAICS Definition:
Employees: 46
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Ellandar Productions

undefined, London, undefined, undefined, GB
Last Update: 2025-12-09

Ellandar Productions is a British East and Southeast Asian (BESEA) led theatre company. We prioritise platforming work by and about British Southeast Asians. Founded in Perth, Western Australia in 2010, our work has always been ambitious and diverse. We focus on diverse British Muslim narratives, BESEA lived experience and female stories. Our aim is to bring new audiences from different cultural roots into the theatre. Through our plays, we offer a window into unknown and rarely seen worlds. They bring characters and stories that are deeply human and recognisable centre stage.

NAICS: 711
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/riverside-theatre.jpeg
Riverside Theatre
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/ellandar-productions.jpeg
Ellandar Productions
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Riverside Theatre
100%
Compliance Rate
0/4 Standards Verified
Ellandar Productions
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Riverside Theatre in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Ellandar Productions in 2025.

Incident History — Riverside Theatre (X = Date, Y = Severity)

Riverside Theatre cyber incidents detection timeline including parent company and subsidiaries

Incident History — Ellandar Productions (X = Date, Y = Severity)

Ellandar Productions cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/riverside-theatre.jpeg
Riverside Theatre
Incidents

No Incident

https://images.rankiteo.com/companyimages/ellandar-productions.jpeg
Ellandar Productions
Incidents

No Incident

FAQ

Riverside Theatre company demonstrates a stronger AI Cybersecurity Score compared to Ellandar Productions company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Ellandar Productions company has disclosed a higher number of cyber incidents compared to Riverside Theatre company.

In the current year, Ellandar Productions company and Riverside Theatre company have not reported any cyber incidents.

Neither Ellandar Productions company nor Riverside Theatre company has reported experiencing a ransomware attack publicly.

Neither Ellandar Productions company nor Riverside Theatre company has reported experiencing a data breach publicly.

Neither Ellandar Productions company nor Riverside Theatre company has reported experiencing targeted cyberattacks publicly.

Neither Riverside Theatre company nor Ellandar Productions company has reported experiencing or disclosing vulnerabilities publicly.

Neither Riverside Theatre nor Ellandar Productions holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Riverside Theatre company nor Ellandar Productions company has publicly disclosed detailed information about the number of their subsidiaries.

Riverside Theatre company employs more people globally than Ellandar Productions company, reflecting its scale as a Performing Arts.

Neither Riverside Theatre nor Ellandar Productions holds SOC 2 Type 1 certification.

Neither Riverside Theatre nor Ellandar Productions holds SOC 2 Type 2 certification.

Neither Riverside Theatre nor Ellandar Productions holds ISO 27001 certification.

Neither Riverside Theatre nor Ellandar Productions holds PCI DSS certification.

Neither Riverside Theatre nor Ellandar Productions holds HIPAA certification.

Neither Riverside Theatre nor Ellandar Productions holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X