Key takeaways from the RH-ISAC’s week at RSA Conference

Hi, I’m Alex Brown. As Community Manager at the RH-ISAC, I’m thrilled to begin working with and learning from all of you on how to best facilitate conversations and disseminate information that drives value for you within your organizations and in the retail cybersecurity space. Kicking off what I hope to be an ongoing conversation,…

Read More

The Retail ISAC (RH-ISAC) Presents our Holiday Guidance Series for Retailers

The Retail ISAC (RH-ISAC) is pleased to invite all eligible retailers to join in our upcoming Holiday Guidance webinar series designed to arm information security professionals from retail, restaurants, hotels, hospitality, and our partner sectors with actionable insight, strategies, and peer discussion opportunities throughout this most busy time of year! Interested individuals can email [email protected] for registration details…

Read More

Beyond the Cybersecurity Breach: To the Right of Boom

A series of cybersecurity breaches in the 2013 to 2014 timeframe were the shot heard throughout the industry for many retailers. For some retailers the shot has resulted in a direct hit, while for others it has served as a warning fired across the bow. In all cases, the impact of these events has resulted…

Read More

Accepting the Challenge

Last week was our inaugural RH-ISAC Summit in Chicago. With just over 200 attendees, we had the most significant retail industry professionals covering the latest and greatest in cybersecurity issues and trends.   Kicking off the two days of deep discussions was a session with the RH-ISAC Board of Directors sharing their vision of the…

Read More

Sharing Threat Intelligence at Both Ends of the Chain

An SC Magazine e-book came out recently, dubbed “Retail Retaliation,” which gives a good summation of some of the issues facing retailers these days. It’s an oversimplification to say it’s all about that POS, but we certainly know that attackers are going to keep exploiting vulnerabilities where the transactions occur. Ranging from physical compromise of the POS…

Read More