Member Login Become a Member
  • Who We Are
    • About RH-ISAC
    • Core Members
    • Associate Members
    • Leadership
    • Partners
    • Careers
  • Why RH-ISAC?
    • Member Benefits
    • Value
    • Sharing Channels
    • Threat Intelligence
    • Career Growth
    • Benchmarking
    • Discounts & Special Offers
  • Membership
    • Overview
    • Working Groups
    • Associate Membership
    • LinkSECURE
    • Common Questions
    • Member Referral Program
    • Join RH-ISAC
  • Events
    • Calendar
    • Summit
    • Regional Workshops
    • Event Types
    • Call for Presentations
    • Sponsor an Event
  • Resources
    • Blog
    • Newsletter
    • Press
    • Reports

Tech Marketplace:
Discounts and Special Offers

Industry-leading service and product providers committed to the RH-ISAC community

360 Privacy logo
Offer
Details
Offer

Free 1-Year Subscription

RH-ISAC members get a complimentary 12-month membership for one executive for the 360 Privacy flagship 360 Enterprise tiered offering. This includes the removal of Personally Identifiable Information from 400+ public data broker websites, Monthly Deletion Reporting, and Optional Decoy data deployment.

To redeem, email [email protected] with the subject line “RH-ISAC Exclusive Offer: 360 Privacy”

Details

360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes, and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.

AccessIT Group
Offer
Details
Offer

10% Off Penetration Testing & Complimentary Strategic Workshop

Secure your systems and fortify your defenses with AccessIT Group‘s expert-led penetration tests, meticulously tailored to meet the unique needs of your industry. By partnering with AccessIT Group, you’ll gain invaluable insights into potential vulnerabilities and strengthen your security posture for the year ahead. Additionally, sign up for free strategic workshop, tailored to navigate the complexities of the modern information age. 

Details

Penetration Testing

Why Choose Us?

  • Proven Expertise: With years of experience and a track record of success, we’re your trusted cybersecurity partner.
  • Comprehensive Solutions: Our work ensures thorough testing across all critical areas of your infrastructure including but not limited to: External testing, Internal testing, Cloud testing, Application testing, phishing & more.
  • Customer Satisfaction: Join countless satisfied clients who have enhanced their security with our services.

Don’t let cyberthreats compromise your operations. Take advantage of this special offer and invest in your organization’s security today.

**The 10% discount applies to the purchase order price of your latest penetration test, given that it’s dated within the last 24 months and does not already include the promotional rate. Offer valid for Retail & Hospitality ISAC members only.


 

Strategic Workshop

Transform your organization’s approach to cybersecurity with a free 2-3 hour session from our strategic workshop series, tailored to navigate the complexities of the modern information age. Our series is designed to equip your team with the insights and tools needed to fortify your cybersecurity posture in a rapidly evolving landscape. Each workshop is crafted to help your team address key areas of cybersecurity, ensuring your organization stays ahead of threats and compliant with industry standards. 

As your strategic partner, we are committed to evolving with you, continuously updating our offerings to include the most relevant and impactful topics. Join us to proactively enhance your cybersecurity strategy and turn potential vulnerabilities into strengths.

Potential Workshop Topics:

  • Technology Rationalization: Streamlining your cybersecurity tech stack for efficiency and effectiveness.
  • Threat Detection & Response: Building and enhancing capabilities to identify, assess, and mitigate cyber threats.
  • PCI Readiness and PCI 4.0: Preparing for and adapting to the latest standards in payment card industry security.
  • Data Protection: Implementing robust strategies to safeguard critical data from breaches and leaks.
  • Cloud Security Architecture: Designing and securing cloud environments to protect assets in a cloud-based infrastructure.

Embark on a journey to redefine your cybersecurity strategy, with workshops and recommendations that provide the knowledge and action plans to secure your digital future.

Get Access
AccessIT Group
Offer
Details
Offer

10% Off CIS Pre-Hardened Virtual Machine Images for Windows, Mac, and Linux Operating Systems for improved Security Posture

Secure your cloud environment with CIS Hardened Images® for Windows, Mac, and Linux operating systems from the Center for Internet Security® (CIS®). These cost-effective virtual machine images provide you with a secure, on-demand, and scalable computing environment and can help you meet your industry compliance requirements. AccessIT has partnered with CIS to help RH-ISAC members improve their security posture with CIS Hardened images for AWS, Microsoft Azure, Google Cloud, and Oracle Cloud environments.

Details

CIS Hardened Images® are pre-hardened virtual machine (VM) images for Windows, Mac, and Linux operating systems (OSes). They offer built-in secure configuration and compliance according to the recommendations of the globally recognized CIS Benchmarks™, which are the only consensus-based, vendor-agnostic, best practice secure configuration guides both developed and accepted by government, business, industry, and academia. CIS Hardened images are available for over 50 OS versions on major cloud service platforms like AWS, Microsoft Azure, Google Cloud, and Oracle Cloud.

These cost-effective VM images provide you with a secure, on-demand, and scalable computing environment pre-configured to the security guidance of the CIS Benchmarks and that complements your existing cybersecurity infrastructure. They can help you save time and effort on avoiding misconfigurations and staying secure against malware, denial of service, and other cyber threats. CIS Hardened Images can also help you meet your compliance requirements to industry frameworks, including PCI DSS, NIST CSF, and FFIEC. Each CIS Hardened Image provides evidence of compliance and is regularly updated by the Center for Internet Security® (CIS®) to address emerging cyber threats.

Get Access
Armis
Offer
Details
Offer

10% Off the Armis Centrix Platform

As part of their commitment to the RH-ISAC community, Armis is offering an exclusive 10% off of the Armis Centrix Platform for members. Armis Centrix™ is the cyber exposure management platform that protects the entire attack surface and manages an organization’s cyber risk exposure in real time.

To redeem, email [email protected] with the subject line “10% Discount off the Armis Centrix Platform for RH-ISAC Members”

Details

A Comprehensive, Modular Approach

  • Armis Centrix™ for Asset Management and Security: Complete inventory of all asset types to see and secure your attack surface
  • Armis Centrix™ for OT/ IoT Security: See and secure OT networks and physical assets, ensure uptime, and build an effective and comprehensive security strategy
  • Armis Centrix™ for Vulnerability Prioritization and Remediation: See, consolidate, prioritize, and remediate all vulnerabilities
Black Cloak logo
Offer
Details
Offer

3 Months Free with a 12-Month Enterprise Grade Bundle

BlackCloak protects corporate executives and high-profile individuals from cybersecurity, privacy, financial, and other reputational risks. As an RH-ISAC member, if you sign up for any 12-month enterprise grade bundle, you will receive an additional 3 months at no additional charge.

To redeem, email [email protected].

Details

The BlackCloak Concierge Cybersecurity & Privacy™ Platform is a holistic solution including mobile and desktop apps as well as concierge support. Executives get peace of mind knowing their family, reputation, and finances are secured. Companies rest assured that their brand, intellectual property, data, and finances are protected against threats coming through executives without having to invade their personal lives.

 

Flare logo
Offer
Details
Offer

Full Access for Two Weeks

Gain full access to Flare’s capabilities for two weeks, providing unparalleled visibility into your organization’s threat landscape. 

Features include:

  • 800 Identifiers: Gain visibility into up to 800 unique identifiers tied to your organization.
  • Global Search Bar: Instantly search across stealer logs, leaked credentials, dark web data, GitHub, and Telegram for risks.
  • Threat Flow: Timely, relevant, and trustworthy insights derived from dark web chatter, helping you scale threat research and reporting.

After two weeks, your trial will transition to monitoring 1 identifier (your main domain) for the remainder of the year. All other features will be removed.

Details

Flare is the leader in Threat Exposure Management, helping organizations of all sizes detect high-risk exposure found on the clear and dark web. Combining the industry’s best cybercrime database with an incredibly intuitive user experience, Flare enables customers to reclaim the information advantage and get ahead of threat actors.

Prevent Fraud and Account Takeovers

Account takeover (ATO) and fraud are escalating as cybercriminals exploit infostealer malware, stealer logs, and stolen session cookies to hijack accounts. Flare provides a world-class dataset of leaked credentials and active session cookies, accessible via API, enabling organizations to detect risky sessions, prevent fraud, and enhance security in real time.

Get Access
Jscrambler logo
Offer
Details
Offer

Free PCI DSS Payment Page Analysis

Get a free PCI DSS Payment Page Analysis to assess your readiness for PCI DSS v4 payment page requirements 6.4.3 and 11.6.1. If your website accepts, processes, stores, or transmits payment card data, this analysis and dashboard will prepare you for the impending March 31, 2025, deadline.

Details

What can you expect from the PCI DSS Payment Page Analysis?

  • Submit your payment page URL in seconds
  • No installation with zero performance impact
  • Gain visibility into real-time payment page script inventory
  • See business justification approval workflows in action
  • Alert on script tampering and unauthorized changes
  • Generate a compliance report as evidence for QSAs within 1-day
  • Review payment page analysis with PCI DSS experts within 72 hours

Jscrambler enables simple and scalable PCI DSS compliance in a single day through continuous authorization, detection, and reporting of payment page scripts. Reduce script authorizations by 40% and effectively comply with PCI DSS requirements 6.4.3 and 11.6.1.

Jscrambler offers a hybrid architecture with flexible deployment options. That means you can start with an agentless deployment and quickly bring as many payment pages as needed into compliance. You can also configure the agent and employ comprehensive client-side protection and compliance as you approach the compliance deadline. You can use both PCI DSS module components together and switch back and forth between them if needed.

Get Access
Kasada
Offer
Details
Offer

Free 30-day Trial to Monitor and Assess Bot Traffic

Kasada offers a free instant Bot Threat Report for the site of your choosing. Additionally, for qualified RH-ISAC members, Kasada offers an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic. 

Details

The Bot Threat Report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.

Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.

Get Access
Security Scorecard
Offer
Details
Offer

Free 60-Day Enterprise License 

Get a complimentary SecurityScorecard Enterprise License that enables you to monitor your own organization as well as up to 30 vendors, suppliers, or competitors (the choice is yours) for 60 days.

Details

SecurityScorecard scores and monitors over 12 million companies using an A to F grade scale that correlates with breach risk (F Companies are 7.7X more likely to be breached than A Companies). The platform can score and monitor the external cybersecurity posture of any organization using non-intrusive methods and show it how to improve via actionable detail.

You and your team can leverage SecurityScorecard for a variety of use-cases that include, vendor risk management, enterprise monitoring, board reporting, M&A and regulatory compliance.

Get Access
stairwell
Offer
Details
Offer

Free Access to the Stairwell Platform

The Stairwell ISAC Program is a free initiative that fosters collaborative threat intelligence sharing among ISAC members. Participants gain access to a private malware repository and analysis tool, shared threat detection resources, and contributions from ISAC threat teams, enabling collective knowledge sharing and stronger community defenses.

Details

The Stairwell ISAC Program is a free initiative to support collaborative threat intelligence sharing among ISAC members. As a member of the Stairwell ISAC Program, you get access to:

  • Private malware repository: Securely store and analyze malware to bolster your organization’s threat detection and response capabilities.
  • Collaborative threat sharing: A dedicated space for ISAC members to privately exchange malware, YARA rules, and threat reports, enhancing everyone’s detection capabilities.
  • Shared resources: Access a community-driven repository of malware samples, YARA rules, and threat reports to integrate into your own systems and processes.
  • Knowledge sharing & collaboration: Work alongside peers of varying expertise levels, contributing to and benefiting from shared knowledge that strengthens the entire community’s security posture.
  • Integrate into your workflow: Use webhooks to integrate Stairwell with your SIEM and SOAR tools, enabling you to utilize Stairwell intelligence within your existing security stack.
  • ISAC threat team contributions: Stay informed with industry-specific intelligence provided by ISAC threat teams, ensuring you’re equipped with the latest insights on emerging threats.
Get Access
Offer
Details
Offer

Free threatER for 1 Year

Block All Known Threats Across Your Network

threatER blocks the cyberattacks your firewall missed. RH-ISAC members can get a free threatER subscription for an entire year. Automatically enforce, deploy, and analyze cyber threats at scale and enable the rest of your cybersecurity stack to do its job more efficiently.
Details
Get Access
rh-isac
Offer
Details
Offer

Complimentary Advanced Continual Threat Hunt

Trustwave is a cyber-only focused company that hunts threats and stops threats all day every day. Trustwave can detect what others can’t enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. RH-ISAC members can register for one complimentary Advanced Continual Threat Hunt. 

Details

Number of hunts are limited and available on a first come, first served basis. Only one hunt per customer request. Customer must have an EDR supported by Trustwave.

Get Access
Contact
  • 8300 Boone Blvd.
    Suite 500
    Vienna, VA 22182
  • Staverenstraat 15
    7418 CJ Deventer
    Netherlands

  • (703) 848-9294
  • [email protected]
Who we are
  • About RH-ISAC
  • Core Members
  • Associate Members
  • Partners
  • Leadership
  • Careers
Why RH-ISAC?
  • Member Benefits
  • Sharing Channels
  • Threat Intelligence
  • Career Growth
  • Benchmarking
  • Tech Marketplace
Membership
  • Overview
  • Working Groups
  • Common Questions
  • Associate Membership
  • LinkSECURE
  • Member Referral Program
  • Join RH-ISAC
Resources
  • Events
  • Blog
  • Newsletter
  • Press
  • Reports & Documents

© 2025 RH-ISAC. All rights reserved. | Website Design by HMG Creative

  • Privacy
  • Cookie Policy
  • Terms and Conditions
  • Member Login
  • LinkedIn: @Retail Hospitality ISACLinkedIn: @Retail Hospitality ISAC
  • YouTube: @Retail Hospitality ISACYouTube: @Retail Hospitality ISAC
  • Bluesky: @Retail Hospitality ISACBluesky: @Retail Hospitality ISAC
  • Github: @Retail Hospitality ISACGithub: @Retail Hospitality ISAC
  • Home
  • Who We Are
    • About RH-ISAC
    • Core Members
    • Associate Members
    • Leadership
    • Partners
    • Careers
  • Why RH-ISAC?
    • Member Benefits
    • Value
    • Sharing Channels
    • Threat Intelligence
    • Career Growth
    • Benchmarking
    • Tech Marketplace
  • Membership
    • Overview
    • Working Groups
    • Associate Membership
    • LinkSECURE
    • Common Questions
    • Join RH-ISAC
  • Resources
    • Blog
    • Newsletter
    • Podcast
    • Press
    • Reports
  • Events
    • Calendar
    • Regional Workshops
    • Summit
    • Event Types
    • Call for Presentations
    • Sponsor an Event
  • Member Portal
  • Become a Member