Member and BoD Spotlight: Colin Anderson, Global CISO, Levi Strauss & Co.

Colin Anderson, global CISO at Levi Strauss & Co., has been with the Retail & Hospitality ISAC since the beginning in 2014, when he and a small group of retail and hospitality organizations came together to develop an intelligence sharing community. As the current RH-ISAC Board Chair, and an IT executive with more than 25…

Read More

Top 5 Tips to Protect User Data

If there’s one thing that never changes in cybersecurity, it’s this: threat actors will always look for the path of least resistance to gain access to a victim’s network. While companies that collect and maintain personally identifiable information (PII) or protected health information (PHI) are often the preferred targets of threat actors, attackers will target…

Read More

6 Best Practices for Data Breach Protection

Keeping your data safe and protected often seems like an uphill battle. Consistently presenting a hardened attack surface to a would-be attacker and doing so across all the various attack vectors possible is a difficult problem to solve. The attacker only has to be right once, while you and your broader security team have to…

Read More

The Event You’ll Want to Wake Up Early For: CISO Networking Breakfast at RSA Conference

We’re gearing up for next month’s RSA Conference, where we’ll have the chance to connect with so many of our members! If you’re like others we’ve spoken to, you’ll want to make the most of your time in San Francisco between the great conference agenda sessions, abundance of social events, learning about the latest and…

Read More

Increase Cybersecurity Practices with RH-ISAC’s 2020 Regional Intelligence Workshops

The retail and hospitality sector constantly faces cybersecurity concerns. Security breaches are highly publicized and can change the way a consumer views the organization and brand – years after the breach. Collaboration within our sector is essential to combat these cyberattacks before they happen. We must come together to share cyber intelligence, best practices, tools,…

Read More