One-third of retail and hospitality organizations have experienced a data breach, according to Security Magazine. Why are retail and hospitality organizations targeted? Because they’re an all-in-one source for stored personally identifiable information, including financial data.
POS systems, customer relationship management systems, and web properties, for example, are the main attack vectors for criminals wanting to compromise retail and hospitality organizations. Organizations have to increase their scrutiny and security of these assets, but to do so, IT and security teams need reliable asset intelligence.
Intelligence is the data and context that help these teams understand the motives, targets, and behaviors of cybersecurity threats. Investing in a strategy to collect and curate intelligence should be a necessity for every cybersecurity team. And automation is the tactic that teams need to employ to scale their efforts and reduce team burnout.
Join this session to learn more about:
• How to define security intelligence use cases
• Collecting and curating asset information to create asset intelligence
• Automating the collection of external data sources to create threat intelligence
• Five essential steps for automating security use cases
• Derek Loomis, Subject Matter Expert – Data Intelligence, Axonius