Reducing cyber risk in retail & hospitality
Community collaboration and engagement will reduce the risk of consumer cybercrime
Strategic and tactical information sharing channels
Expand your network and intelligence program through RH-ISAC strategic and tactical information sharing channels to advance trust, share practical advice and experiences, increase visibility, and improve cyber intelligence capabilities.
![sharing channels](https://rhisac.org/wp-content/uploads/2019/09/sharing-channels-desktop-mobile-illustration.png)
![threat intelligence products](https://rhisac.org/wp-content/uploads/2019/09/threat-intelligence-reports-illustration.png)
Finished threat intelligence products
RH-ISAC analysis and research helps your organization prioritize industry threats, formulate intelligence-driven strategy, and mitigate risks. RH-ISAC analysts gather shared intelligence data and publish finished intelligence products on a daily, weekly, and monthly basis.
Benchmarking
RH-ISAC is in the unique position to provide industry-specific benchmarking on organizational structure, information security practices and processes, and compliance issues through both formal benchmark studies and informal requests.
![benchmarking analytics](https://rhisac.org/wp-content/uploads/2019/09/benchmarking-analytics-illustration.png)
![networking](https://rhisac.org/wp-content/uploads/2019/09/networking-illustration.png)
Education, training, and networking opportunities
Member-exclusive resources and reports
Being a member with RH-ISAC gives you access to many useful resources developed by working groups and in partnership with Associate Members and other industry leaders.
![RH-ISAC Membership Brochure](https://rhisac.org/wp-content/uploads/2019/09/membership-brochure-sample.png)
![2 women and a man stand together in conversation](https://rhisac.org/wp-content/uploads/exclusive-offerings.png)
Discounts from Associate Members
Join the RH-ISAC community!
RH-ISAC members receive trusted and timely expert information that increases sector-wide knowledge of cybersecurity threats.