40 episodes

The Retail & Hospitality ISAC interviews members of the InfoSec community about the latest cybersecurity challenges and best practices unique to the retail and hospitality industry.

Retail & Hospitality ISAC Podcast RH-ISAC

    • Technology

The Retail & Hospitality ISAC interviews members of the InfoSec community about the latest cybersecurity challenges and best practices unique to the retail and hospitality industry.

    MISP Platform Integration, CISO Spotlight, & Intel Briefing

    MISP Platform Integration, CISO Spotlight, & Intel Briefing

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by Manpreet Kang, security automation engineer at Williams-Sonoma, Inc. and RH-ISAC staff, Ian Furr, security integration engineer and JJ Josing, principal threat researcher, to discuss Williams-Sonoma’s adoption of the MISP platform. Manpreet touches upon the pros associated with MISP and how Williams-Sonoma integrated the platform within their own environment. Then, Luke talks with Ngozi Eze, Global CISO at Levi Strauss & Co. about how he entered the cybersecurity industry and how the retail sector presents unique challenges. Finally, Lee Clark, cyber threat intelligence analyst & writer at RH-ISAC, provides the latest intel briefing.

    • 51 min
    Threat Landscape During the Holidays & Michael Francess Member Spotlight

    Threat Landscape During the Holidays & Michael Francess Member Spotlight

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by Target team members Ryan Miller, senior director of cyber security and cyber threat intelligence, and Leah Schwartzman, lead cyber security analyst, cyber threat intelligence, to discuss the ever-evolving threat landscape. They’ll provide insight on how retailers can better prepare for the upcoming holiday season. Luke is then joined by Anthony Lauro, director of security technology and strategy at Akamai Technologies to discuss three Magecart-style attack campaigns that Akamai has been tracking since the beginning of 2023. To learn more about these attacks, visit Akamai’s blog. Finally, Luke talks to our latest member spotlight feature Michael Francess, senior manager of cybersecurity advanced threat and response at Wyndham Hotels & Resorts. We were able to talk with Michael about his fascination with cybersecurity during his youth, his role at Wyndham, and how the RH-ISAC community has impacted him.

    • 44 min
    CISO Spotlight, the State of Ransomware, & Intel Briefing

    CISO Spotlight, the State of Ransomware, & Intel Briefing

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden sits down with Marnie Wilking, CISO at Booking.com, to discuss her background in cybersecurity, the global threat landscape, and emerging technology such as AI. Then, Luke is joined by Chip Witt, vice president of product management at SpyCloud, to talk about the state of ransomware and how threat actors are circumventing authentication. Chip also reviews techniques retailers can use to better protect themselves. Finally, Lee Clark, cyber threat intelligence analyst & writer at RH-ISAC, provides the latest intel briefing covering the latest Intelligence Trends Summary Report and cyber incidents stemming from the Israeli–Palestinian conflict.

    • 51 min
    RH-ISAC CISO of the Year, Security Control Validation with Aaron’s, Inc., and Credit Card Fraud Landscape with SecurityScorecard

    RH-ISAC CISO of the Year, Security Control Validation with Aaron’s, Inc., and Credit Card Fraud Landscape with SecurityScorecard

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by Brett Cumming, sr. director of information security at Skechers, to talk about emerging threats, fostering a culture of sharing, and his recent RH-ISAC CISO of the year win. Then, Luke sits down with Jonathan Buckner and Tyler Compton from Aaron’s, Inc. to discuss their project, security control validation on a budget. Finally, Alex Heid, VP, fellow, and threat research at SecurityScorecard covers the developments surrounding the credit card fraud scene and how it impacts retail and hospitality.

    • 1 hr 13 min
    Analyzing Top Attack Techniques in Multi-Party Data Breaches, Summit Preview, & Intel Briefing

    Analyzing Top Attack Techniques in Multi-Party Data Breaches, Summit Preview, & Intel Briefing

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by David Severski, senior security data scientist at Cyentia Institute, to expand upon the relationship between Associate Member, RiskRecon, and Cyentia and how that connection plays a part with examining top cyber-attack techniques. Then, Alexandra Brown, senior director of operations at RH-ISAC, provides a preview of the upcoming RH-ISAC Cyber Intelligence Summit, the premier event for cybersecurity practitioners in retail and hospitality. Still deciding on whether to attend the Summit? There’s still time to register today! Finally, Lee Clark, cyber threat intelligence analyst & writer at RH-ISAC, provides the latest intel briefing, specifically the recent Okta customer breach.

    • 46 min
    Cybersecurity Awareness Month & SEC Updates

    Cybersecurity Awareness Month & SEC Updates

    In this episode of the Retail & Hospitality ISAC podcast, host Luke Vander Linden is joined by Jay Banks, senior information security analyst of IT risk and compliance at Dick’s Sporting Goods, to talk about Cybersecurity Awareness Month in October. They explore the mechanisms Dick’s Sporting Goods employs to advocate for cybersecurity throughout the month. Then, Luke sits down with Christian Beckner, vice president of retail technology and cybersecurity at the National Retail Federation (NRF), to discuss the recent rules governing cybersecurity released by the U.S. Securities and Exchange Commission (SEC).

    • 39 min

Top Podcasts In Technology

Lex Fridman
Ben Gilbert and David Rosenthal
Jason Calacanis
The New York Times
Jack Rhysider
NPR

You Might Also Like

N2K Networks
N2K Networks
Red Hat
Johannes B. Ullrich
Malicious Life