Comparison Overview

STEPHEN PETRONIO DANCE COMPANY, INC.

VS

Iris Collective

STEPHEN PETRONIO DANCE COMPANY, INC.

undefined, New York City, New York, 10003, US
Last Update: 2025-12-12
Between 750 and 799

Acclaimed by audiences and critics alike, Stephen Petronio is widely regarded as one of the leading dance-makers of his generation. New music, visual art, and fashion collide in his dances, producing powerfully modern landscapes for the senses. He has built a body of work with some of the most talented and provocative artists in the world, including composers Atticus Ross, Valgeir Sigurðsson, Robert Longo, Nico Muhly, Fischerspooner, Rufus Wainwright, Lou Reed, Laurie Anderson, Son Lux, Nick Cave, James Lavelle, Michael Nyman, Sheila Chandra, Diamanda Galás, Andy Teirstein, Wire, Peter Gordon, Lenny Pickett, and David Linton; visual artists Janine Antoni, Cindy Sherman, Anish Kapoor, Donald Baechler, Stephen Hannock, Tal Yarden, Arnaldo Ferrara, and Justin Terzi III; fashion designers Narciso Rodriguez, John Bartlett, Jillian Lewis, Adam Kimmel, Benjamin Cho, Michael Angel, Tony Cohen, Rachel Roy, Tara Subkoff, Tanya Sarne/Ghost, Leigh Bowery, Paul Compitus, Manolo, Yonson Pak, H. Petal, Iris Bonner/These Pink Lips and Patricia Field; and Resident Lighting Designer Ken Tabachnick. Founded in 1984, Stephen Petronio Company has performed in 40 countries throughout the world, including numerous New York City engagements and 24 seasons at The Joyce Theater. The Company has been commissioned by Dance Umbrella Festival/London, Hebbel Theater/Berlin, Scène National de Sceaux, Festival d’Automne à Paris, CNDC Angers/France, The Holland Festival, Festival Montpellier Danse, Danceworks UK Ltd, Festival de Danse–Cannes, and in the U.S. by San Francisco Performances, The Joyce Theater, UCSB Arts & Lectures, Wexner Center for the Arts, Walker Art Center, and White Bird, among others. In 2017, SPC completed a five-week residency in Singapore, Thailand, and Vietnam teaching and performing as a part of the sixth season of DanceMotionUSA supported by the U.S. Department of State and Brooklyn Academy of Music.

NAICS: 711
NAICS Definition:
Employees: 13
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Iris Collective

1801 Exeter Road, Germantown, TN, 38138, US
Last Update: 2025-12-13
Between 750 and 799

IRIS Orchestra is a unique model for the 21st century American orchestra, and we are completing our 18th season in Memphis Tennessee. We are the resident professional orchestra of Germantown Performing Arts Center (GPAC). Our international community of virtuosic musicians draws from the leading orchestras, chamber groups, conservatories, and university faculties from across the United States and abroad. Founding Artistic Director, Michael Stern, and his inspired musicians continue to attract some of the finest musicians worldwide to share in the unique experience of IRIS. We strive to enrich and transform lives with music and music education throughout the greater Memphis area. The core commitments of the orchestra are: • Dedication to the highest standard of performance • Presenting innovative programs, combining classic canon with exciting American repertoire • Commissioning today’s top composers in works especially written for IRIS • Bringing consistent service to underserved communities throughout the Greater Memphis area

NAICS: 711
NAICS Definition:
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/stephen-petronio-dance-company-inc-.jpeg
STEPHEN PETRONIO DANCE COMPANY, INC.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/iris-orchestra.jpeg
Iris Collective
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
STEPHEN PETRONIO DANCE COMPANY, INC.
100%
Compliance Rate
0/4 Standards Verified
Iris Collective
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for STEPHEN PETRONIO DANCE COMPANY, INC. in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Iris Collective in 2025.

Incident History — STEPHEN PETRONIO DANCE COMPANY, INC. (X = Date, Y = Severity)

STEPHEN PETRONIO DANCE COMPANY, INC. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Iris Collective (X = Date, Y = Severity)

Iris Collective cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/stephen-petronio-dance-company-inc-.jpeg
STEPHEN PETRONIO DANCE COMPANY, INC.
Incidents

No Incident

https://images.rankiteo.com/companyimages/iris-orchestra.jpeg
Iris Collective
Incidents

No Incident

FAQ

Both STEPHEN PETRONIO DANCE COMPANY, INC. company and Iris Collective company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Iris Collective company has disclosed a higher number of cyber incidents compared to STEPHEN PETRONIO DANCE COMPANY, INC. company.

In the current year, Iris Collective company and STEPHEN PETRONIO DANCE COMPANY, INC. company have not reported any cyber incidents.

Neither Iris Collective company nor STEPHEN PETRONIO DANCE COMPANY, INC. company has reported experiencing a ransomware attack publicly.

Neither Iris Collective company nor STEPHEN PETRONIO DANCE COMPANY, INC. company has reported experiencing a data breach publicly.

Neither Iris Collective company nor STEPHEN PETRONIO DANCE COMPANY, INC. company has reported experiencing targeted cyberattacks publicly.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. company nor Iris Collective company has reported experiencing or disclosing vulnerabilities publicly.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds any compliance certifications.

Neither company holds any compliance certifications.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. company nor Iris Collective company has publicly disclosed detailed information about the number of their subsidiaries.

Iris Collective company employs more people globally than STEPHEN PETRONIO DANCE COMPANY, INC. company, reflecting its scale as a Performing Arts.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds SOC 2 Type 1 certification.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds SOC 2 Type 2 certification.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds ISO 27001 certification.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds PCI DSS certification.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds HIPAA certification.

Neither STEPHEN PETRONIO DANCE COMPANY, INC. nor Iris Collective holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X