
Cybersecurity in Travel and Tourism - Thematic Intelligence
Description
Cybersecurity in Travel and Tourism - Thematic Intelligence
Summary
The travel and tourism sector has received plenty of attention regarding cybersecurity. There has been a string of high-profile cyberattacks in the lodging and aviation sectors. A lot of personal information is required for bookings in these sectors, meaning related companies have a wealth of personal data, which is attractive to potential hackers. 13% of all cyber compromises in 2019 were suffered by hotels, which made it the third most targeted business by hackers across all industries. As people expect a more seamless experience while traveling, increased digitalization within the sector is required. As the global tourism industry undergoes a digital transformation, implementing new technologies such as cloud, AI, and IoT, travelers have more of their personal information online than ever before. Booking, check-ins, and virtual chat assistance create a more technologically advanced experience while traveling but also increase vulnerability to cyberattacks. The COVID-19 pandemic and subsequent staff shortages have fueled an increased desire for efficient traveling and have boosted digitalization. However, this, in turn, has brought increased susceptibility to cyberattacks.
This thematic research report takes an in-depth look at the theme of cybersecurity and the impact it has on the travel and tourism industry. This report analyzes the players impacted by this theme alongside the contributing trends, negative destination trends, unintended opportunities, and trends that have emerged as a result of cybersecurity. It then dives deep into an industry analysis, presenting several real-life case studies looking at how destinations and companies have responded to the impact of this theme on their operations. Recommendations are then offered for the travel sector, alongside a description of companies mentioned throughout.
Who should buy?
CEOs, Senior Executives, and Marketing Executives within travel and tourism should use this report to understand the highly important theme of Cybersecurity.
Key Highlights
The travel and tourism sector is one of the most susceptible to cyberattacks, ranking third in incidents according to the Trustwave 2020 Global Security Report. With attacks becoming more common and increasingly sophisticated, the risk and impact of cyber-ignorance are escalating. The different layers of the travel and tourism value chain handle vast amounts of personal data and involve numerous individuals susceptible to human error, interacting with millions of customers in cyberspace. Therefore, given the growing sophistication of attacks, simply thoroughly investigating cybersecurity strategies in the aftermath of a cyberattack or focusing on meeting compliance obligations will not suffice, it will only lead to an endless cycle of spending.
Cybersecurity should involve contingency planning, outlining the immediate actions and post-breach responses a company should take if a cyberattack occurs, and understanding a company’s current level of cyber risk. Although these services are typically outsourced, companies should still invest in these services by creating strong partnerships with service providers to stay on top of vulnerabilities and ensure compliance requirements are met. This is especially important due to the volume of sensitive data these companies handle, especially direct suppliers. Managed security services, risk and compliance services, and post-breach responses will limit attacks and help companies respond effectively to retrieve personal data, minimizing damage to consumers. This is important as the industry has experienced a string of high-profile cyberattacks which have caused significant reputational damage.
Changing travel restrictions because of COVID-19 has made a seamless booking experience increasingly expected. These are often facilitated by OTAs, allowing for changing travel arrangements and ease when booking online. Online travel booking is accelerating and is an attractive area for cybercriminals. As booking becomes more digitalized and more personal data is shared online, the exposure to security threats increases. Mobile travel apps are also common platforms for OTAs, but they have become popular endpoint targets among threat actors.
Scope
- This thematic report provides an overview of the impact cybersecurity has on the travel sector and seeks to understand some of the contributory factors.
- The key trends within this theme are split into three categories: technology trends, macroeconomic trends, and regulatory trends.
- Several case studies are included to analyze the multiple ways countries and companies have responded to the impact of this theme’s growth and what they are doing to grow with this theme.
- Understand the current cybersecurity trends within the travel landscape today and how these will escalate in the near future.
- Assess how travel and tourism companies such as tour operators, OTAs and DMOs are utilizing cybersecurity to drive revenues.
- Acknowledge the necessity of using cybersecurity by understanding the social, cultural, and environmental effects on the destination.
- Discover recommendations for businesses involved in cybersecurity
- GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.
- All across the travel and tourism supply chain, now have an opportunity to capitalize on cybersecurity, and there are notable examples of this. Therefore, all should buy this report to fully understand how this theme will continue to be a key theme in the future travel landscape.
Table of Contents
105 Pages
- Executive Summary
- Players
- Technology Briefing
- Threat actors
- Types of cyberattack
- Un-targeted cyberattacks
- Targeted cyberattacks
- The survey stage
- The delivery stage
- The breach stage
- The impact stage
- Trends
- Technology trends
- Macroeconomic trends
- Regulatory trends
- Travel & Tourism Challenges
- The Impact of Cybersecurity on Travel & Tourism
- Software
- Cyber-ignorance accelerates the need for cybersecurity
- Services
- COVID-19 accelerated the need for cybersecurity
- Geopolitics accelerate the need for cybersecurity
- How the challenge of ESG accelerates the need for cybersecurity
- How cybersecurity helps resolve the challenge of last-minute bookings
- Case Studies
- MGM Resorts
- Breach
- Response
- Disneyland California
- Breach
- Response
- H-Hotels
- Breach
- Response
- IHG
- Background
- Response
- AirAsia
- Background
- Response
- Industry Analysis
- Market size and growth forecasts
- Cybersecurity products and services
- Timeline
- Signals
- M&A trends
- Venture financing trends
- Patent trends
- Company filing trends
- Hiring trends
- Social media trends
- Air travel
- Artificial intelligence
- Hotels
- Personalization
- Value Chain
- Cybersecurity hardware
- Chip-based security
- Cybersecurity software
- Identity management
- Network security
- Endpoint security
- Threat detection and response
- Cloud security
- Data security
- Email security
- Application security
- Unified threat management
- Vulnerability management
- Cybersecurity services
- Managed security services
- Post-breach response services
- Risk and compliance services
- Companies
- Leading cybersecurity adopters in travel and tourism
- Leading cybersecurity vendors
- Public companies
- Private companies
- Specialist cybersecurity vendors in travel and tourism
- Sector Scorecards
- Airlines sector scorecard
- Who’s who
- Thematic screen
- Valuation screen
- Risk screen
- Lodging sector scorecard
- Who’s who
- Thematic screen
- Valuation screen
- Risk screen
- Rail and road transport sector scorecard
- Who’s who
- Thematic screen
- Valuation screen
- Risk screen
- Glossary
- GlobalData reports
- Our Thematic Research Methodology
- About GlobalData
- Contact Us
- List of Tables
- Table 1: Threat actors
- Table 2: Technology trends
- Table 3: Macroeconomic trends
- Table 4: Regulatory trends
- Table 5: Key challenges facing the travel and tourism sector
- Table 6: Key M&A transactions associated with the cybersecurity theme since January 2022
- Table 7: Key venture financing deals associated with the cybersecurity theme since September 2022
- Table 8: Leading cybersecurity adopters in travel and tourism
- Table 9: Public companies
- Table 10: Private companies
- Table 11: Specialist cybersecurity vendors in travel and tourism
- Table 12: Glossary
- Table 13: GlobalData reports
- List of Figures
- Figure 1: Who are the leading players in the cybersecurity theme, and where do they sit in the value chain?
- Figure 2: Organizations’ technical complexity breeds vulnerability
- Figure 3: When will the following technologies disrupt your industry?
- Figure 4: Cybersecurity software will represent 41.62% of revenue by 2026
- Figure 5: Managed security services will account for the largest share of cybersecurity revenues in 2021–2026
- Figure 6: The cybersecurity story
- Figure 7: The number of cybersecurity-related M&A deals peaked in 2021 at 422 deals, declining to 371 in 2022
- Figure 8: Cybersecurity venture financing peaked at $25 billion in 2021, falling to $14 billion in 2022
- Figure 9: Cybersecurity patents have remained stagnant but high over the last four years
- Figure 10: China is the top authority registering cybersecurity patents
- Figure 11: Trends in company filings suggest that cybersecurity is a maturing theme
- Figure 12: Cybersecurity was the second most mentioned technology theme in travel and tourism company filings from 2016 to 2022
- Figure 13: Cybersecurity job postings have been high over the last two years, peaking in December 2022
- Figure 14: Cybersecurity job postings in the travel and tourism sector peaked in January 2023
- Figure 15: The top five travel and tourism companies hiring in cybersecurity roles have all suffered cyberattacks in the last 10 years
- Figure 16: Trendline chart
- Figure 17: The cybersecurity value chain
- Figure 18: The cybersecurity value chain – hardware
- Figure 19: The cybersecurity value chain – software - Identity management: leaders and challengers
- Figure 20: The cybersecurity value chain - software - Network security: leaders and challengers
- Figure 21: The cybersecurity value chain – software- Endpoint security: leaders and challengers
- Figure 22: The cybersecurity value chain – software - Threat detection and response: leaders and challengers
- Figure 23: The cybersecurity value chain – software - Cloud security: leaders and8 challengers
- Figure 24: The cybersecurity value chain – software - Data security: leaders and challengers
- Figure 25: The cybersecurity value chain – software - Email security: leaders and challengers
- Figure 26: The cybersecurity value chain – software - Application security: leaders and challengers
- Figure 27: The cybersecurity value chain – software - Unified threat management: leaders and challengers
- Figure 28: The cybersecurity value chain – software - Vulnerability management: leaders and challengers
- Figure 29: The cybersecurity value chain – services - Managed security services: leaders and challengers
- Figure 30: The cybersecurity value chain – services - Post-breach response services: leaders and challengers
- Figure 31: The cybersecurity value chain – services - Risk and compliance services: leaders and challengers
- Figure 32: Who does what in the airlines space?
- Figure 33: Thematic screen - Airlines sector scorecard
- Figure 34: Valuation screen - Airlines sector scorecard
- Figure 35: Risk screen - Airlines sector scorecard
- Figure 36: Who does what in the Lodging space?
- Figure 37: Thematic screen - Lodging sector scorecard
- Figure 38: Valuation screen - Lodging sector scorecard
- Figure 39: Risk screen - Lodging sector scorecard
- Figure 40: Who does what in the rail and road transport space?
- Figure 41: Thematic screen - Rail and road transport sector scorecard
- Figure 42: Valuation screen - Rail and road transport sector scorecard
- Figure 43: Risk screen - Rail and road transport sector scorecard
- Figure 44: Our five-step approach for generating a sector scorecard
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.