SlideShare a Scribd company logo
1 of 1
Download to read offline
In 2019, Verizon reported over 53,000
incidents and 2,216 confirmed data breaches.
Here are the most common cyberattacks
Verizon has faced in the last year:
Source: Cybersecurity mid-year snapshot 2019
Top 5 cybersecurity
trends retailers should
keep an eye on in 2020
Most dangerous retail
security challenges:
CISOs are responsible for making
risk-based decisions and coming up
with the most efficient cybersecurity
strategies.
The new CISO’s playbook:
5 rules to follow
1
4 5
4. GDPR compliance
Once retailers start processing
customer information, they have to
start complying with GDPR.
Even though complying with GDPR
is time-consuming and requires legal
assistance, it has to be done to
avoid lawsuits.
5. Application security self-testing
Companies working with DevOps will
be securing their applications by
adopting security self-testing,
self-diagnosing, and self-protection
technologies to assess new vendors
and detect possible security threats.
Credential
phishing
Malware
(besides
ransomware)
Ransomware DDoS
attacks
BEC/wire
transfer
fraud
30.43%
November
2018
Phishing
scams
6 month
later
Privileged
accounts
IoT
devices
7.94%
Critical
infrastructure
Phishing
scams
Email
takeover
21.74% 13.04% 10.14% 7.25%
3. Data protection
While the cloud is the future of
ecommerce, it also brings unknown
bugs and a high risk of mistakes.
That’s why data protection will
remain one of the top priorities for
retailers in 2020.
To-dos and must-haves
for CISOs
ABI Research predicts that
machine learning in cybersecurity
will increase big data, intelligence,
and analytics spending to
75%
new malicious
programs every
day
The AV-Test
Institute registers
more than
of all attacks are carried
out either through denial
of service, web
applications, or payment
card skimmers
250.000
Engage stakeholders in
cybersecurity discussions
and explain the importance
of cybersecurity protection.
32
Effectively inform
business leaders about
cybersecurity threats
and how challenging it
might be to fix them at
later stages.
Encourage bigger
investments in retail
cybersecurity.
Strive for passwordless
authentication.
Provide essential
cybersecurity skills
training for employees.
How deep learning
algorithms can assist in
identifying security risks
Detect cybersecurity threats.
Empower the retail industry with data
to prevent retail theft.
AI can eliminate a lot of human work.
Push the development of intelligent
reasoning and analysis of security
threats.
Detection, prediction, and relationship
diagram algorithms will play a massive
role in preventing retail theft.
Basic learning
of historical data
Sensitivity
adjustment for
secondary
verification of
learning result
Trust operations
to improve
learning accuracy
Historical
data + trust data
toautomatically
train and update
baselines
Recurred and
automatic
baseline updates
1 2 3 4 5
According to the Cyber Security Mid-Year
Snapshot 2019 by Cyber Security Hub, critical
infrastructure, phishing scams, and email
takeovers are the three most dangerous
retail security challenges.
With major retail security breaches
in the news, it’s time to reveal
cybersecurity trends and prepare
to fight upcoming attacks.
Retail Security
Challenges
in 2020
19.58% 10.58%
1. Same threats, different
approaches
Treat known vulnerable threats as
newly discovered ones. It’s always
more costly to fix something later,
so protect your enterprise security
by solving even minor issues.
2. Risk management
The tendency to increase
cybersecurity budgets isn’t going
to slow down. Retail companies will
start prioritizing cybersecurity by
strategically planning retail theft
prevention.
$96 billion
by 2021
Why is maintaining security so challenging?
8.7%17.39% 14.49%

More Related Content

What's hot

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 

What's hot (20)

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 

Similar to Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft

7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Shawn Nutley
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfMobibizIndia1
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr khan shamim
 
2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead NowPaul Wood
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 

Similar to Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft (20)

7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr
 
2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 

Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft

  • 1. In 2019, Verizon reported over 53,000 incidents and 2,216 confirmed data breaches. Here are the most common cyberattacks Verizon has faced in the last year: Source: Cybersecurity mid-year snapshot 2019 Top 5 cybersecurity trends retailers should keep an eye on in 2020 Most dangerous retail security challenges: CISOs are responsible for making risk-based decisions and coming up with the most efficient cybersecurity strategies. The new CISO’s playbook: 5 rules to follow 1 4 5 4. GDPR compliance Once retailers start processing customer information, they have to start complying with GDPR. Even though complying with GDPR is time-consuming and requires legal assistance, it has to be done to avoid lawsuits. 5. Application security self-testing Companies working with DevOps will be securing their applications by adopting security self-testing, self-diagnosing, and self-protection technologies to assess new vendors and detect possible security threats. Credential phishing Malware (besides ransomware) Ransomware DDoS attacks BEC/wire transfer fraud 30.43% November 2018 Phishing scams 6 month later Privileged accounts IoT devices 7.94% Critical infrastructure Phishing scams Email takeover 21.74% 13.04% 10.14% 7.25% 3. Data protection While the cloud is the future of ecommerce, it also brings unknown bugs and a high risk of mistakes. That’s why data protection will remain one of the top priorities for retailers in 2020. To-dos and must-haves for CISOs ABI Research predicts that machine learning in cybersecurity will increase big data, intelligence, and analytics spending to 75% new malicious programs every day The AV-Test Institute registers more than of all attacks are carried out either through denial of service, web applications, or payment card skimmers 250.000 Engage stakeholders in cybersecurity discussions and explain the importance of cybersecurity protection. 32 Effectively inform business leaders about cybersecurity threats and how challenging it might be to fix them at later stages. Encourage bigger investments in retail cybersecurity. Strive for passwordless authentication. Provide essential cybersecurity skills training for employees. How deep learning algorithms can assist in identifying security risks Detect cybersecurity threats. Empower the retail industry with data to prevent retail theft. AI can eliminate a lot of human work. Push the development of intelligent reasoning and analysis of security threats. Detection, prediction, and relationship diagram algorithms will play a massive role in preventing retail theft. Basic learning of historical data Sensitivity adjustment for secondary verification of learning result Trust operations to improve learning accuracy Historical data + trust data toautomatically train and update baselines Recurred and automatic baseline updates 1 2 3 4 5 According to the Cyber Security Mid-Year Snapshot 2019 by Cyber Security Hub, critical infrastructure, phishing scams, and email takeovers are the three most dangerous retail security challenges. With major retail security breaches in the news, it’s time to reveal cybersecurity trends and prepare to fight upcoming attacks. Retail Security Challenges in 2020 19.58% 10.58% 1. Same threats, different approaches Treat known vulnerable threats as newly discovered ones. It’s always more costly to fix something later, so protect your enterprise security by solving even minor issues. 2. Risk management The tendency to increase cybersecurity budgets isn’t going to slow down. Retail companies will start prioritizing cybersecurity by strategically planning retail theft prevention. $96 billion by 2021 Why is maintaining security so challenging? 8.7%17.39% 14.49%