Cybersecurity in Travel and Tourism - Thematic Research

Cybersecurity in Travel and Tourism - Thematic Research

Summary

Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs, and electronic data from attack. The travel and tourism sector has received plenty of attention regarding cybersecurity. There has been a string of high-profile cyberattacks in the lodging and aviation sectors. A lot of personal information is required for bookings in these sectors, meaning related companies have a wealth of personal data, which is attractive to potential hackers.

This thematic report takes an in-depth look at look at how important cybersecurity in the travel and tourism sector is. Firstly, the value chain section summarizes an in-depth description of each of the segments of cybersecurity and outlines the specialist vendors and leading adopters of cybersecurity in the travel and tourism sector. The challenges section outlines the key challenges being faced by the travel and tourism sector. This is followed by an impact assessment detailing the areas in cybersecurity where travel and tourism companies should focus and outlines these challenges faced by the industry have accelerated the need for greater cybersecurity. A case study section is then provided, which shows cyber-attacks within the travel and tourism sector. A data analysis section provides market size and growth forecasts, followed by mergers and acquisition activity, a cybersecurity timeline, and insight into company filings, hiring, and social media trends. Next, the report highlights companies making their mark within the theme, and finally, the relative position of these companies within the airlines, rail and road transport, and lodging sectors is summarized.

“The travel and tourism sector is one of the most susceptible to cyberattacks. With attacks becoming more common and increasingly sophisticated, the risk and impact of cyber-ignorance is escalating. The sector handles huge amounts of personal data and involve numerous individuals susceptible to human error, interacting with millions of customers in cyberspace. Cybersecurity should involve contingency planning as merely investigating an attack in its aftermath or simply meeting compliance obligations will not suffice. It will only lead to an endless cycle of spending.”

Key Highlights

  • The travel and tourism industry is highly exposed to attacks due to the wealth of personal data it stores. The lodging sector is the third most targeted by hackers, according to the Trustwave 2020 Global Security report. Worth $1.3 billion in 2020, cybersecurity revenues in the travel and tourism sector are forecasted to reach $2.1 billion by 2025.
  • The travel industry holds hugely valuable and sensitive data on every traveler. If these data points are not well protected, there are significant risks for the customers, who could have their data stolen. Such breaches can damage a company's reputation. Several high-profile companies within the sector have made negative headlines due to poor cybersecurity. Cybercriminals exploit the vulnerabilities within a cybersecurity strategy, so a rigorous approach is central to effective risk management. To tackle cyber threats, a company’s cybersecurity strategy must involve contingency planning, outlining immediate actions, post-breach responses, and an understanding of the company’s current cyber risks.
  • The travel and tourism sector is becoming increasingly digitalized, embracing emerging technologies such as artificial intelligence (AI), the Internet of Things (IoT), and cloud. As the digital ecosystems of companies grow, they become more vulnerable to cyberattacks. The industry is fragmented, with direct suppliers sharing data with third-party intermediaries, increasing the number of potential entry points for attackers to exploit. Data is most secure when all companies across the travel and tourism value chain invest in all layers of the cybersecurity value chain. Collaboration is vital, and companies must ensure that all of their vendors also have suitable measures in place. It takes only one vulnerable device to compromise an entire network, impacting the reputation of a business and damaging both the companies they work with and customers’ security.
Scope

This report provides an overview of cybersecurity in travel and tourism.
This report explains why cybersecurity will continue to grow in importance for the travel and tourism industry.
This report outlines how an effective cybersecurity strategy is crucial for the traveler experience.
This report provides examples of what companies and organizations in the travel and tourism industry are doing in reaction to this theme, and how they create differentiation.
We highlight travel and tourism companies that are leading in this theme

Reasons to Buy
  • To understand cyber risk and its current and future impact on the industry.
  • To understand how key challenges that the travel and tourism sector is facing have accelerated the need for greater cybersecurity.
  • To identify the leading adopters and specialist vendors of cybersecurity.
  • GlobalData’s thematic research ecosystem is a single, integrated global research platform that provides an easy-to-use framework for tracking all themes across all companies in all sectors. It has a proven track record of identifying the important themes early, enabling companies to make the right investments ahead of the competition, and secure that all-important competitive advantage.


  • Executive Summary
  • Cybersecurity Value Chain
    • Key players in the cybersecurity value chain
      • Table Figure 1: Key players in the cybersecurity value chain
      • Table Figure 2: The cybersecurity value chain
    • Cybersecurity hardware
      • Chip-based security
        • Table Figure 3: The cybersecurity value chain - hardware
    • Cybersecurity software
      • Identity management
        • Table Figure 4: The cybersecurity value chain - software - Identity management: leaders and challengers
      • Network security
        • Table Figure 5: The cybersecurity value chain - software - Network security: leaders and challengers
      • Endpoint security
        • Table Figure 6: The cybersecurity value chain - software - Endpoint security: leaders and challengers
      • Threat detection and response
        • Table Figure 7: The cybersecurity value chain - software - Threat detection and response: leaders and challengers
      • Cloud security
        • Table Figure 8: The cybersecurity value chain - software - Cloud security: leaders and challengers
      • Data security
        • Table Figure 9: The cybersecurity value chain - software - Data security: leaders and challengers
      • Email security
        • Table Figure 10: The cybersecurity value chain - software - Email security: leaders and challengers
      • Application security
        • Table Figure 11: The cybersecu9rity value chain - software - Application security: leaders and challengers
      • Unified threat management
        • Table Figure 12: The cybersecurity value chain - software - Unified threat management: leaders and challengers
      • Vulnerability management
        • Table Figure 13: The cybersecurity value chain - software - Vulnerability management: leaders and challengers
    • Cybersecurity services
      • Managed security services
        • Table Figure 14: The cybersecurity value chain - services - Managed security services: leaders and challengers
      • Post-breach response services
        • Table Figure 15: The cybersecurity value chain - services - Post-breach response services: leaders and challengers
      • Risk and compliance services
        • Table Figure 16: The cybersecurity value chain - services - Risk and compliance services: leaders and challengers
  • Travel and Tourism Challenges
    • Table Figure 17: How much will the following technologies disrupt your industry?
    • Table Travel and Tourism Challenges
  • The Impact of Cybersecurity on Travel and Tourism
    • Table Figure 18: Thematic impact assessment
    • Software
    • Services
    • Cyber-ignorance accelerates the need for cybersecurity
      • Table Figure 19: Wyndham Hotels suffered three cyberattacks from 2008 to 2010
    • COVID-19 accelerated the need for cybersecurity
    • Geopolitics accelerates the need for cybersecurity
    • How the challenge of ESG accelerates the need for cybersecurity
    • How cybersecurity helps resolve the challenge of last-minute bookings
  • Case Studies
    • DarkHotel targets C-suite executives by hacking luxury hotel networks
      • Table Figure 20: DarkHotel operates using a layered attack
    • SITA suffered a high-level data hack that exploited frequent flyer loyalty schemes
    • Nordic Choice Hotels stopped a ransomware attack within six hours
  • Data Analysis
    • Market size and growth forecasts
      • Table Figure 21: Cybersecurity software will represent 48% of revenue by 2025
      • Cybersecurity products and services
        • Table Figure 22: Managed security services account for the largest share of cybersecurity revenues from 2021 to 2025
        • Table Figure 23: Managed security services will see the biggest growth in revenue from 2021 to 2025
    • Mergers and acquisitions
      • Table Mergers and acquisitions
    • Company filings trends
      • Table Figure 24: Mentions of cybersecurity in company filings have increased by 634% since 2016
      • Table Figure 25: Cybersecurity was the second most mentioned technology theme in company filings from 2016 to 2021
    • Hiring trends
      • Table Figure 26: The top five companies hiring in cybersecurity roles have all suffered cyberattacks in the last 10 years
      • Chief information security officers (CISOs)
        • Table Chief information security officers (CISOs)
    • Social media trends
      • Table Figure 27: Cybersecur8ity-related social media posts in the travel and tourism sector are rising
      • Table Figure 28: International Airlines and British Airways were the companies most mentioned in cybersecurity posts
    • Cybersecurity timeline
      • Table Figure 29: The cybersecurity story
  • Companies
    • Leading cybersecurity adopters in travel and tourism
      • Table Leading cybersecurity adopters in travel and tourism
    • Leading cybersecurity vendors
      • Table Leading cybersecurity vendors
    • Specialist cybersecurity vendors in travel and tourism
      • Table Specialist cybersecurity vendors in travel and tourism
  • Sector Scorecards
    • Airlines sector scorecard
      • Who's who
        • Table Figure 30: Who does what in the airlines space?
      • Thematic screen
        • Table Figure 31: Thematic screen - Airlines sector scorecard
      • Valuation screen
        • Table Figure 32: Valuation screen - Airlines sector scorecard
      • Risk screen
        • Table Figure 33: Risk screen - Airlines sector scorecard
    • Lodging sector scorecard
      • Who's who
        • Table Figure 34: Who does what in the lodging space?
      • Thematic screen
        • Table Figure 35: Thematic screen - Lodging sector scorecard
      • Valuation screen
        • Table Figure 36: Valuation screen - Lodging sector scorecard
      • Risk screen
        • Table Figure 37: Risk screen - Lodging sector scorecard
    • Rail and road transport sector scorecard
      • Who's who
        • Table Figure 38: Who does what in the rail and road transport space?
      • Thematic screen
        • Table Figure 39: Thematic screen - Rail and road transport sector scorecard
      • Valuation screen
        • Table Figure 40: Valuation screen - Rail and road transport sector scorecard
      • Risk screen
        • Table Figure 41: Risk screen - Rail and road transport sector scorecard
  • Glossary
    • Table Glossary
  • Further Reading
    • GlobalData reports
      • Table GlobalData reports
  • Our thematic research methodology
    • Table Figure 42: Our five-step approach for generating a sector scorecard
  • About GlobalData
  • Contact Us

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings