RH-ISAC Hosts First Sector-Wide Tabletop Exercise

Washington D.C., October 17, 2019 — The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) hosted its first-ever sector-wide Securing Retail Alliance (SRA) tabletop exercise on September 23, 2019 in Denver, CO, preceding the 2019 Retail Cyber Intelligence Summit. The SRA is a community within RH-ISAC that fosters a collaborative forum to share best practices…

Read More

Together We Are Stronger

The RH-ISAC community grows every year and the 2019 Retail Cyber Intelligence Summit in Denver was a testament to our growing community and a success because of it! We had nearly 300 attendees talking cybersecurity, sharing best practices and planning how to protect as one over the next year. Check out some highlights from a…

Read More

Another Round of Applause for our Peer Choice Award Winners!

2019 has been another great year for RH-ISAC! During the Retail Cyber Intelligence Summit in Denver, CO, RH-ISAC members came together to share ideas, collaborate, talk threat intelligence, and celebrate the year. RH-ISAC hosted an annual member meeting during the Member Gala as a way to honor our community, congratulate them on all that they…

Read More

Retail & Hospitality ISAC Welcomes TransUnion as a New Associate Member

October 08, 2019 – Washington, DC – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) welcomed TransUnion (NYSE: TRU) today as an Associate member. TransUnion will support the RH-ISAC’s fraud community by providing data and information that will help consumer-facing companies. “RH-ISAC is excited to have TransUnion as an Associate member,” said Vice President of Membership…

Read More

Don’t Let ATO Steal Your Holiday Season

Reports of account takeover (ATO) from our e-commerce customers have risen 67% in the past six months. What is driving this rise? Moreover, what can you do to combat it without impacting the vitally important holiday season?  Fraudsters use a number of tactics to takeover accounts, including social engineering, credential stuffing and phishing attacks. Regardless…

Read More