Cybersecurity in Tourism, 2020 Update - Thematic Research

Cybersecurity in Tourism, 2020 Update - Thematic Research

Summary

Travelers are more inter-connected than ever before, businesses are streamlining business operations to accommodate to changing traveler needs and the travel and technology sectors are becoming ever more entwined, increasing the exposure and vulnerability to cyberattacks.

This thematic research report takes an in-depth look at the role of Cybersecurity within the travel and tourism sector. The report analyzes cybersecurity trends within tourism alongside an array of case studies that look at the actions companies have taken post-breach, followed by an analysis of the impacts of this theme. Recommendations are then offered for the sector alongside a description of some of the companies mentioned.

“Holding various levels of personal data, the travel and tourism sector is a ‘hotbed’ for cybersecurity threats. As all related industries begin to invest more heavily in technologies such as AI, IoT and Big Data to offer the ultimate ‘personalized’ experience’ this is increasing the threat. There is a lack of investment from many into this theme - to be winners this needs to be identified with a clear, efficient strategy in place”.

Key Highlights

  • Cybersecurity was ranked as the second most important theme in the current travel space, coming second only to social media (GlobalData’s emerging technology travel trends survey (2019)). As the global tourism industry is riding a digital wave, implementing new technologies such as cloud, AI, big data and IoT, travelers are more connected online than ever therefore this increases exposure.
  • Governments worldwide continue to update their cybersecurity strategy (see macroeconomic trends) as the threat increases yet they still operate under a ‘cloak of secrecy’. Whilst this could be kept secretive, there does seem to be a current lack of investment and even identification in the travel and tourism space.
  • Travelers are both valuable and vulnerable. They are more exposed than ever to cybersecurity threats as they become increasingly connected through social media, increase their online transactions and are generally more active.
  • COVID-19 has decimated the travel industry across 2020. In order to recover, a strong and positive brand image is critical to tackle negative consumer sentiment. If a cyberattack occurs, this has the potential to prolong recovery causing a further loss of consumer confidence. Companies are becoming more dependent on online and customer care channels which in turn makes them more susceptible to a form of attack thus the need to hold a viable strategy is critical.
  • Across the sector, ransom attacks are the most common with nefarious attackers demanding a ransom be paid to reduce the risk. Out of all industries, hotels are the most prone to cyberattacks due to a high dependence on IT to manage systems, the level of personal data they collect and the variety of ‘entry points’ across the business including reservations, to front desk, guest services and loyalty programs provided.
Scope
  • This thematic report provides an overview of cybersecurity within the travel sector today and the implications that it can have.
  • The key trends within this theme reflect some of the current issues within this theme through cybersecurity today.
  • Several case studies are included to identify the implications a cyberattack has had on a company and the actions that have been taken to mitigate future threats.
  • The impacts of cybersecurity on the travel and tourism sector are then discussed in detail outlining the key threats the industry faces today.
  • To conclude, an array of recommendations are laid out to suggest various ways in which a company can become better protected in the face of a cyber-threat.
Reasons to Buy
  • Understand the theme of cybersecurity and how this has/will affect the travel and tourism sector in the future.
  • Access how businesses are investing more into digitizing their products, offering the ultimate ‘personalized experience’ and how this puts a greater threat on cybersecurity.
  • GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.
  • Airlines, lodging providers, travel intermediaries, DMO’s and TMC’s should utilize this report to understand why cybersecurity is a key theme within the travel and tourism sector and should not be ignored.
  • Find out recommendations that will help make your company or organization more cyber-secure and why this is important.
  • This thematic applies to all industries within the travel sector including airlines, hotels, attractions and tour operators - management roles across different providers are likely to benefit, observing how a cyberattack can affect tourism development.


  • Introduction
    • Travel sector is a `hotbed' for cyberattacks
    • Cyber ignorance could cause significant risks
    • Hyperaware travelers post COVID-19
    • Winners and losers
  • Players
    • Table Figure 1: Who are the big players in the cybersecurity industry and where do they sit in the value chain?
  • Technology briefing
    • Table Figure 2: CSPM tools enable organizations to identify and remediate cloud security risks
    • Table Figure 3: DevSecOps introduces security earlier in the lifecycle of application development
  • Trends
    • Cybersecurity trends in tourism
      • Table Cybersecurity trends in tourism
    • Technology trends
      • Table Technology trends
    • Macroeconomic trends
      • Table Macroeconomic trends
    • Regulatory trends
      • Table Regulatory trends
  • Industry analysis
    • The third wave of cybersecurity
      • A need for vigilance and resilience
      • Predictive risk assessments
    • Market size and growth forecasts
      • Table Figure 4: By 2030, global security revenues will have reached nearly $238bn
    • AI technologies are changing cybersecurity
      • Table AI technologies are changing cybersecurity
    • Moving towards the edge
    • Understanding the malware threat
      • The rise and rise of ransomware
      • The organizational cost of an insider threat
      • Operational technology and critical national infrastructure attacks
      • The need to secure remote workers post COVID-19
      • Cybercrime is a global affair
        • Table Top 10 global attackers by country of origin
      • Solving the cyber skills shortage
    • Mergers and acquisitions
      • Table Mergers and acquisitions
    • Venture funding for cybersecurity companies
      • Table Venture funding for cybersecurity companies
    • Timeline
      • Table Figure 5: The cybersecurity story
  • Case studies
    • Uber
    • Association of British Travel Agents (ABTA)
    • Sabre
    • Marriott International
    • Accor
    • easyJet
    • Carnival Corporation & plc
  • Impact of cybersecurity on tourism
    • Tourists will be `hyper-aware' post COVID-19
    • Online market value growth accelerates cyber threat potential
    • Reputational damage can be detrimental
    • Hotels are the most prone to cyberattacks
      • Table Figure 6: Attacks most common in the travel and hospitality industries
    • Recommendations for the travel and tourism sector
  • Value chain
    • Table Figure 7: The cybersecurity value chain
    • The cyber-aware organization
      • Table Figure 8: The cyber-aware organization
    • The cybersecurity organizational stack
    • The cybersecurity technology stack
      • Incident response
        • Table Figure 9: Leaders and challengers in incident response
      • Security orchestration, automation, and response (SOAR)
        • Table Figure 10: Leaders and challengers in security orchestration, automation, and response
      • Security information and event management (SIEM)
        • Table Figure 11: Leaders and challengers in security information and event management
      • Threat management, intelligence, and hunting
        • Table Figure 12: Leaders and challengers in threat management, intelligence, and hunting
      • Unified threat management
        • Table Figure 13: Leaders and challengers in unified threat management
      • Behavioral analytics
        • Table Figure 14: Leaders and challengers in behavioral analytics
      • Cloud Security
        • Table Figure 15: Leaders and challengers in cloud security
      • Email security
        • Table Figure 16: Leaders and challengers in email security
      • Network security
        • Table Figure 17: Leaders and challengers in network security
      • Application security
        • Table Figure 18: Leaders and challengers in application security
      • DevSecOps
        • Table Figure 19: Leaders and challengers in DevSecOps
      • Mobile security
        • Table Figure 20: Leaders and challengers in mobile security
      • Endpoint security tools
        • Table Figure 21: Leaders and challengers in endpoint security tools
      • IoT security
        • Table Figure 22: Leaders and challengers in IoT security
      • Single sign-on and access management
        • Table Figure 23: Leaders and challengers in single sign-on and access management
      • Adaptive authentication and authorization
        • Table Figure 24: Leaders and challengers in adaptive authentication and authorization
      • Identity and access management
        • Table Figure 25: Leaders and challengers in identity and access management
      • Vulnerability management
        • Table Figure 26: Leaders and challengers in vulnerability management
      • Privileged access management
        • Table Figure 27: Leaders and challengers in privileged access management
      • Data loss prevention
        • Table Figure 28: Leaders and challengers in data loss prevention
      • Managed security services
        • Table Figure 29: Leaders and challengers in managed security services
      • Post-breach response services
        • Table Figure 30: Leaders and challengers in post-breach response services
  • Companies
    • Travel and tourism companies
      • Table Travel and tourism companies
    • Public companies
      • Table Public companies
    • Private companies
      • Table Private companies
  • Sector scorecards
    • Enterprise security sector scorecard
      • Who's who
        • Table Figure 31: Who does what in the enterprise security space?
      • Thematic screen
        • Table Figure 32: Thematic screen - Enterprise security sector scorecard
      • Valuation screen
        • Table Figure 33: Valuation screen - Enterprise security sector scorecard
      • Risk screen
        • Table Figure 34: Risk screen - Enterprise security sector scorecard
    • IT services sector scorecard
      • Who's who
        • Table Figure 35: Who does what in the IT services space?
      • Thematic screen
        • Table Figure 36: . Thematic screen - IT services sector scorecard
      • Valuation screen
        • Table Figure 37: Valuation screen - IT services sector scorecard
      • Risk screen
        • Table Figure 38: Risk screen - IT services sector scorecard
  • Glossary
    • Table Glossary
  • Further reading
    • GlobalData reports
  • Appendix: Our thematic research methodology
    • Viewing the world's data by themes makes it easier to make important decisions
    • Traditional research does a poor job of picking winners and losers
    • That is why we developed our "thematic engine"
    • How do we create our sector scorecards?
      • Table Figure 39: Our five-step approach for generating a sector scorecard
    • What is in our sector scorecards?
    • How do we score companies in our thematic screen?
    • About GlobalData
    • Contact us
    • Research
    • Client Services
    • Disclaimer

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook