Cybersecurity in Travel and Tourism - Thematic Intelligence

Cybersecurity in Travel and Tourism - Thematic Intelligence


Summary

The travel and tourism sector has received plenty of attention regarding cybersecurity. There has been a string of high-profile cyberattacks in the lodging and aviation sectors. A lot of personal information is required for bookings in these sectors, meaning related companies have a wealth of personal data, which is attractive to potential hackers. 13% of all cyber compromises in 2019 were suffered by hotels, which made it the third most targeted business by hackers across all industries. As people expect a more seamless experience while traveling, increased digitalization within the sector is required. As the global tourism industry undergoes a digital transformation, implementing new technologies such as cloud, AI, and IoT, travelers have more of their personal information online than ever before. Booking, check-ins, and virtual chat assistance create a more technologically advanced experience while traveling but also increase vulnerability to cyberattacks. The COVID-19 pandemic and subsequent staff shortages have fueled an increased desire for efficient traveling and have boosted digitalization. However, this, in turn, has brought increased susceptibility to cyberattacks.

This thematic research report takes an in-depth look at the theme of cybersecurity and the impact it has on the travel and tourism industry. This report analyzes the players impacted by this theme alongside the contributing trends, negative destination trends, unintended opportunities, and trends that have emerged as a result of cybersecurity. It then dives deep into an industry analysis, presenting several real-life case studies looking at how destinations and companies have responded to the impact of this theme on their operations. Recommendations are then offered for the travel sector, alongside a description of companies mentioned throughout.

Who should buy?

CEOs, Senior Executives, and Marketing Executives within travel and tourism should use this report to understand the highly important theme of Cybersecurity.

Key Highlights

The travel and tourism sector is one of the most susceptible to cyberattacks, ranking third in incidents according to the Trustwave 2020 Global Security Report. With attacks becoming more common and increasingly sophisticated, the risk and impact of cyber-ignorance are escalating. The different layers of the travel and tourism value chain handle vast amounts of personal data and involve numerous individuals susceptible to human error, interacting with millions of customers in cyberspace. Therefore, given the growing sophistication of attacks, simply thoroughly investigating cybersecurity strategies in the aftermath of a cyberattack or focusing on meeting compliance obligations will not suffice, it will only lead to an endless cycle of spending.

Cybersecurity should involve contingency planning, outlining the immediate actions and post-breach responses a company should take if a cyberattack occurs, and understanding a company’s current level of cyber risk. Although these services are typically outsourced, companies should still invest in these services by creating strong partnerships with service providers to stay on top of vulnerabilities and ensure compliance requirements are met. This is especially important due to the volume of sensitive data these companies handle, especially direct suppliers. Managed security services, risk and compliance services, and post-breach responses will limit attacks and help companies respond effectively to retrieve personal data, minimizing damage to consumers. This is important as the industry has experienced a string of high-profile cyberattacks which have caused significant reputational damage.

Changing travel restrictions because of COVID-19 has made a seamless booking experience increasingly expected. These are often facilitated by OTAs, allowing for changing travel arrangements and ease when booking online. Online travel booking is accelerating and is an attractive area for cybercriminals. As booking becomes more digitalized and more personal data is shared online, the exposure to security threats increases. Mobile travel apps are also common platforms for OTAs, but they have become popular endpoint targets among threat actors.

Scope
  • This thematic report provides an overview of the impact cybersecurity has on the travel sector and seeks to understand some of the contributory factors.
  • The key trends within this theme are split into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • Several case studies are included to analyze the multiple ways countries and companies have responded to the impact of this theme’s growth and what they are doing to grow with this theme.
Reasons to Buy
  • Understand the current cybersecurity trends within the travel landscape today and how these will escalate in the near future.
  • Assess how travel and tourism companies such as tour operators, OTAs and DMOs are utilizing cybersecurity to drive revenues.
  • Acknowledge the necessity of using cybersecurity by understanding the social, cultural, and environmental effects on the destination.
  • Discover recommendations for businesses involved in cybersecurity
  • GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.
  • All across the travel and tourism supply chain, now have an opportunity to capitalize on cybersecurity, and there are notable examples of this. Therefore, all should buy this report to fully understand how this theme will continue to be a key theme in the future travel landscape.


Executive Summary
Players
Technology Briefing
Threat actors
Types of cyberattack
Un-targeted cyberattacks
Targeted cyberattacks
The survey stage
The delivery stage
The breach stage
The impact stage
Trends
Technology trends
Macroeconomic trends
Regulatory trends
Travel & Tourism Challenges
The Impact of Cybersecurity on Travel & Tourism
Software
Cyber-ignorance accelerates the need for cybersecurity
Services
COVID-19 accelerated the need for cybersecurity
Geopolitics accelerate the need for cybersecurity
How the challenge of ESG accelerates the need for cybersecurity
How cybersecurity helps resolve the challenge of last-minute bookings
Case Studies
MGM Resorts
Breach
Response
Disneyland California
Breach
Response
H-Hotels
Breach
Response
IHG
Background
Response
AirAsia
Background
Response
Industry Analysis
Market size and growth forecasts
Cybersecurity products and services
Timeline
Signals
M&A trends
Venture financing trends
Patent trends
Company filing trends
Hiring trends
Social media trends
Air travel
Artificial intelligence
Hotels
Personalization
Value Chain
Cybersecurity hardware
Chip-based security
Cybersecurity software
Identity management
Network security
Endpoint security
Threat detection and response
Cloud security
Data security
Email security
Application security
Unified threat management
Vulnerability management
Cybersecurity services
Managed security services
Post-breach response services
Risk and compliance services
Companies
Leading cybersecurity adopters in travel and tourism
Leading cybersecurity vendors
Public companies
Private companies
Specialist cybersecurity vendors in travel and tourism
Sector Scorecards
Airlines sector scorecard
Who’s who
Thematic screen
Valuation screen
Risk screen
Lodging sector scorecard
Who’s who
Thematic screen
Valuation screen
Risk screen
Rail and road transport sector scorecard
Who’s who
Thematic screen
Valuation screen
Risk screen
Glossary
GlobalData reports
Our Thematic Research Methodology
About GlobalData
Contact Us
List of Tables
Table 1: Threat actors
Table 2: Technology trends
Table 3: Macroeconomic trends
Table 4: Regulatory trends
Table 5: Key challenges facing the travel and tourism sector
Table 6: Key M&A transactions associated with the cybersecurity theme since January 2022
Table 7: Key venture financing deals associated with the cybersecurity theme since September 2022
Table 8: Leading cybersecurity adopters in travel and tourism
Table 9: Public companies
Table 10: Private companies
Table 11: Specialist cybersecurity vendors in travel and tourism
Table 12: Glossary
Table 13: GlobalData reports
List of Figures
Figure 1: Who are the leading players in the cybersecurity theme, and where do they sit in the value chain?
Figure 2: Organizations’ technical complexity breeds vulnerability
Figure 3: When will the following technologies disrupt your industry?
Figure 4: Cybersecurity software will represent 41.62% of revenue by 2026
Figure 5: Managed security services will account for the largest share of cybersecurity revenues in 2021–2026
Figure 6: The cybersecurity story
Figure 7: The number of cybersecurity-related M&A deals peaked in 2021 at 422 deals, declining to 371 in 2022
Figure 8: Cybersecurity venture financing peaked at $25 billion in 2021, falling to $14 billion in 2022
Figure 9: Cybersecurity patents have remained stagnant but high over the last four years
Figure 10: China is the top authority registering cybersecurity patents
Figure 11: Trends in company filings suggest that cybersecurity is a maturing theme
Figure 12: Cybersecurity was the second most mentioned technology theme in travel and tourism company filings from 2016 to 2022
Figure 13: Cybersecurity job postings have been high over the last two years, peaking in December 2022
Figure 14: Cybersecurity job postings in the travel and tourism sector peaked in January 2023
Figure 15: The top five travel and tourism companies hiring in cybersecurity roles have all suffered cyberattacks in the last 10 years
Figure 16: Trendline chart
Figure 17: The cybersecurity value chain
Figure 18: The cybersecurity value chain – hardware
Figure 19: The cybersecurity value chain – software - Identity management: leaders and challengers
Figure 20: The cybersecurity value chain - software - Network security: leaders and challengers
Figure 21: The cybersecurity value chain – software- Endpoint security: leaders and challengers
Figure 22: The cybersecurity value chain – software - Threat detection and response: leaders and challengers
Figure 23: The cybersecurity value chain – software - Cloud security: leaders and8 challengers
Figure 24: The cybersecurity value chain – software - Data security: leaders and challengers
Figure 25: The cybersecurity value chain – software - Email security: leaders and challengers
Figure 26: The cybersecurity value chain – software - Application security: leaders and challengers
Figure 27: The cybersecurity value chain – software - Unified threat management: leaders and challengers
Figure 28: The cybersecurity value chain – software - Vulnerability management: leaders and challengers
Figure 29: The cybersecurity value chain – services - Managed security services: leaders and challengers
Figure 30: The cybersecurity value chain – services - Post-breach response services: leaders and challengers
Figure 31: The cybersecurity value chain – services - Risk and compliance services: leaders and challengers
Figure 32: Who does what in the airlines space?
Figure 33: Thematic screen - Airlines sector scorecard
Figure 34: Valuation screen - Airlines sector scorecard
Figure 35: Risk screen - Airlines sector scorecard
Figure 36: Who does what in the Lodging space?
Figure 37: Thematic screen - Lodging sector scorecard
Figure 38: Valuation screen - Lodging sector scorecard
Figure 39: Risk screen - Lodging sector scorecard
Figure 40: Who does what in the rail and road transport space?
Figure 41: Thematic screen - Rail and road transport sector scorecard
Figure 42: Valuation screen - Rail and road transport sector scorecard
Figure 43: Risk screen - Rail and road transport sector scorecard
Figure 44: Our five-step approach for generating a sector scorecard

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings