Using Technical Intelligence to Improve Behavioral Defenses

Specific adversary behaviors observed in actual cyber-attacks are analyzed, tracked and collectively comprise technical threat intelligence. This session presents a straightforward process to apply technical threat intelligence to prioritizing threats and closing gaps in cybersecurity controls.  

Read more

What To Do When Your Company Takes a Stance

In today’s 24/7 online environment, political and social issues are increasingly spotlit by the accessibility, rapid-paced, and always-updated news cycle, creating massive polarization. As a result, internet activism, hacktivism, and online extremism are on the rise, and retail and hospitality companies that take a social justice or political stance are increasingly targeted by these groups. […]

Read more

PCI DSS 4.0 is Coming | Are You Ready?

Let us help you remove the guesswork from PCI 4.0.! This panel session will outline updates to controls, testing procedures, guidance, and reporting to help you hit the ground running. This two-part session will kick off with a presentation on key PCI 4.0 changes, followed by a panel discussion with security leaders from the retail […]

Read more

Preparing for Ransomware | Preventing Disruption Through Resiliency

Ransomware has proven to be a pervasive and persistent attack in the cyber threat landscape, enabling malicious threat actors the ability to quickly and easily monetize access to any organization. Threat actors continuously evolve attack chains and procedures, but frequently reuse common tactics that work well – often repeating across different attacks. Leveraging the commonalities […]

Read more

Hyatt Driving Innovation & Exceptional Customer Experiences with FIDO Passwordless Authentication

Across retail and hospitality today, subpar guest experiences can instantaneously make or break your business success. There is a critical need to drive great guest experiences while also ensuring strong cybersecurity and compliance are in place to scale. Authentication should be a first-line defense of any cybersecurity strategy to protect against modern and evolving cyber threats, […]

Read more

TLP:RED | How RH-ISAC’s Dark Web Working Group Works

Audience: Retail & Hospitality Practitioners Only The Dark Web Working Group (DWWG) is an active community of members dedicated to collective defense through threat discovery in the dark web. This session covers the DWWG history, key objectives, success stories, and future outlook including how you can benefit by leveraging the DWWG for information and insights […]

Read more

Understanding Supply Chain Threats from the CTI Perspective

Supply chain threats have continued to occur with regular frequency in the past few years and can cause catastrophic domino effects on the tourism industry, as global travel attempts to ramp up in the wake of pandemic-related restrictions.  In most instances, supply chain attacks enable subsequent offensive operations against hundreds, if not thousands, of victims.  […]

Read more

Cybersecurity Strategy | Getting Ready for the Next Event

Your digital transformation journey must be efficient, effective, and secure. Where does cybersecurity fit in your post-pandemic IT and digital enablement? With the recent shift in IT priorities, a CISO should be a strategic thinker and an ally who promotes security readiness as you shape your company and organization’s success. In this session, we will […]

Read more

Refund Fraud-as-a-Service | The Other RaaS Threat for Retailers

Refund fraud is becoming increasingly detrimental to e-commerce stores. Last December, a man pleaded guilty to defrauding a retailer for more than $300,000 by performing refund fraud over a series of three years. With the cybercrime underground’s continued shift to a service-driven economy, interested parties can outsource the process of refund fraud to groups of […]

Read more

On Your Left | How Target Collects and Processes Cyber Threat Intelligence

One of the biggest challenges that cyber threat intelligence (CTI) teams face each day is how to unpack and action on the massive amount of information available to them. Being left of the kill chain means identifying what information your security team is collecting and processing before an attack occurs. Prioritizing what information is collected […]

Read more
RH-ISAC Summit