Comparison Overview

The House Theatre of Chicago

VS

Young Actors Theatre Islington

The House Theatre of Chicago

4611 North Ravenswood Avenue, Chicago, IL, 60640, US
Last Update: 2025-12-11
Between 750 and 799

The House is Chicago's premier home for intimate, original works of epic story and stagecraft. Founded and led by Artistic Director Nathan Allen and driven by an interdisciplinary ensemble of Chicago’s next generation of great storytellers, The House aims to become a laboratory and platform for the evolution of the American theatre as an inclusive and popular artform. The House was founded in 2001 by a group of friends to explore connections between Community and Storytelling through a unique theatrical experience. Since becoming eligible in 2004, The House has been nominated for 70 Joseph Jefferson Awards (21 wins) and became the first recipient of Broadway in Chicago’s Emerging Theater Award in 2007, and was awarded a 2013 National Theatre Company Grant by the American Theatre Wing, founder of the Tony Awards. Now in its 16th year of original work, The House continues its mission to unite Chicago in the spirit of Community through amazing feats of Storytelling.

NAICS: 711
NAICS Definition:
Employees: 8
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Young Actors Theatre Islington

70-72 Barnsbury Road, Islington, London, N1 0ES, GB
Last Update: 2025-12-13

Young Actors Theatre is a professional theatre school, and registered charity, based in Islington, North London. Responsible for starting careers of young people Asa Butterfield, Ella Purnell... both soon to star with Samuel L Jackson in Tim Burton's new movie Miss Peregrine's Home for Peculiar children. We have a 100 seater Black box studio theatre and rehearsal space for hire. | Affordable training provided to over 700 young people | Regular performing arts classes for 4 to 24 year olds | Professional acting foundation course for 18 - 24 year olds | In-house agency YAT Management Please support us!

NAICS: 711
NAICS Definition:
Employees: 21
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-house-theatre-of-chicago.jpeg
The House Theatre of Chicago
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/young-actors-theatre.jpeg
Young Actors Theatre Islington
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The House Theatre of Chicago
100%
Compliance Rate
0/4 Standards Verified
Young Actors Theatre Islington
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for The House Theatre of Chicago in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Young Actors Theatre Islington in 2025.

Incident History — The House Theatre of Chicago (X = Date, Y = Severity)

The House Theatre of Chicago cyber incidents detection timeline including parent company and subsidiaries

Incident History — Young Actors Theatre Islington (X = Date, Y = Severity)

Young Actors Theatre Islington cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-house-theatre-of-chicago.jpeg
The House Theatre of Chicago
Incidents

No Incident

https://images.rankiteo.com/companyimages/young-actors-theatre.jpeg
Young Actors Theatre Islington
Incidents

No Incident

FAQ

Young Actors Theatre Islington company demonstrates a stronger AI Cybersecurity Score compared to The House Theatre of Chicago company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Young Actors Theatre Islington company has disclosed a higher number of cyber incidents compared to The House Theatre of Chicago company.

In the current year, Young Actors Theatre Islington company and The House Theatre of Chicago company have not reported any cyber incidents.

Neither Young Actors Theatre Islington company nor The House Theatre of Chicago company has reported experiencing a ransomware attack publicly.

Neither Young Actors Theatre Islington company nor The House Theatre of Chicago company has reported experiencing a data breach publicly.

Neither Young Actors Theatre Islington company nor The House Theatre of Chicago company has reported experiencing targeted cyberattacks publicly.

Neither The House Theatre of Chicago company nor Young Actors Theatre Islington company has reported experiencing or disclosing vulnerabilities publicly.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds any compliance certifications.

Neither company holds any compliance certifications.

Neither The House Theatre of Chicago company nor Young Actors Theatre Islington company has publicly disclosed detailed information about the number of their subsidiaries.

Young Actors Theatre Islington company employs more people globally than The House Theatre of Chicago company, reflecting its scale as a Performing Arts.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds SOC 2 Type 1 certification.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds SOC 2 Type 2 certification.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds ISO 27001 certification.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds PCI DSS certification.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds HIPAA certification.

Neither The House Theatre of Chicago nor Young Actors Theatre Islington holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N