CYBER THURSDAY: Navigating Fraud: Ownership, Operations, and Total Costs

About: In this panel discussion, fellow RH-ISAC peers at Wayfair, L Brands, and Raising Cane’s will share how they’re navigating the complex world of fraud. From ownership among internal stakeholders, identifying and detecting the most concerning types of fraud (e.g., gift card, clean fraud, identity theft and ATO), to calculating the total cost of fraud…

Read More

CYBER THURSDAY: Human Error is Just as Risky As Ransomware

About: Research has shown that the main cause of cyberattacks is human error and can be just as damaging as ransomware attacks. In some cases, human error is more damaging given that security leaders often lack visibility into employees’ mistakes and risky behaviors. Most companies know that cybersecurity is important, but the majority don’t train…

Read More

CYBER THURSDAY: Integrated Third-Party Risk Management

About: Third-party risk is not simply a threat faced by cyber teams. In fact, the danger comes in various shapes and forms, from contracts, to operations, to financial risks, and more. Hilton has set out to build a cross-functional team that tackles these risks across the board. By integrating procurement, legal, internal audit, and other…

Read More

CYBER THURSDAY: Securing Your Data Using Data

About: Retail websites are attractive targets for hackers. They collect and store sensitive personal and financial information about consumers and hacker groups like Magecart are now increasingly targeting user browsers to steal this information. Retailers can protect sensitive user data by leveraging data obtained from deploying standards-based security controls, monitoring for script and content changes…

Read More

CYBER THURSDAY: Simplifying Data Protection with a Data-First SASE Architecture

About: In a hybrid, unbound enterprise, the working models of protecting the edge are no longer enough. Users and apps are everywhere, so it’s essential to protect your data. Secure Service Access Edge (SASE) makes it possible for people to work safely from anywhere and, with zero trust principles applied, you can ensure explicit permissions…

Read More