Securing Retail Summit

Held to ransom: lessons from a summer of pain

19th November, 2025 • Online

The extent of cyber-attacks on the retail sector this year means an update on the lessons learned is already overdue, especially given the level of secrecy that has surrounded the responses to many of these incidents.

 

A Brutal Year for European Retail Cybersecurity

2025 has proven devastating for the retail sector across the UK and Europe. High-profile retailers — including Marks & Spencer, The Co-op, Harrods, Adidas, El Corte Inglés, Tendam, Alcampo, and Decathlon — have all fallen victim to significant cyberattacks. In many cases, these attacks were not direct intrusions into the retailers’ own systems but instead entered through the digital backdoors of third-party suppliers, underscoring the fragility of the modern supply chain.

So, what are the key lessons from these many attacks?

The Supply Chain Is the Attack Surface: El Corte Inglés, Adidas, and M&S were all breached through third-party service providers.

  • Treat vendors and service providers as an extension of your enterprise.
  • Implement zero trust architectures that apply across your supplier ecosystem.
  • Demand security certifications, regular pen testing, and visibility into their incident response capabilities.
  • Maintain a centralised third-party risk registry and integrate it with your SIEM.

Social Engineering Is Outpacing Tech Defences: The Co-op, Harrods and M&S were infiltrated by the Scattered Spider group, who used voice phishing (vishing) to impersonate IT staff and gain password resets.

  • Train help desks and HR teams to spot and halt social engineering attempts.
  • Enforce multi-step verification for all sensitive changes (e.g. password resets, privilege escalations).
  • Limit what internal data is publicly available (e.g. LinkedIn job roles).
  • Rotate from “security awareness” to attack simulation and resilience training.

Retail-Specific Digital Weak Points Are Being Targeted: Retailers lost access to point-of-sale systems, fulfilment chains, online stores, and customer loyalty systems.

  • Retail CISOs must map critical dependencies between digital, physical, and customer systems.
  • Segment POS, fulfilment, and web commerce systems from each other.
  • Implement real-time monitoring on transactional anomalies across platforms.

Visibility and Detection Gaps Are Exploited: Many retail attacks went undetected for days or weeks due to low visibility across hybrid systems.

  • Invest in extended detection and response (XDR)and real-time behaviour analytics.
  • Ensure logs from cloud, in-store, and vendor platforms feed into a single threat detection system.
  • Use AI-based anomaly detection for spotting unusual activity in inventory systems or staff credentials.

Cyber Resilience Must Be a Business-Level Priority: Cyber Risk = Financial Risk. Marks & Spencer at one stage saw over £1bn wiped off its valuation.

  • Retail CISOs must lead cross-functional resilience planning: not just IT but logistics, legal, brand, and customer experience.
  • Secure off-site backups of operational data, and test recovery plans regularly.
  • Simulate full-blown outages of fulfilment systems, payment gateways, and CRM platforms.
  • Work closely with the CFO to quantify cyber risk in financial terms: lost revenue per hour, customer churn, and data breach penalties.


The e-Crime & Cybersecurity Retail Summit will take place online and will look at how cybersecurity teams are tackling this new world.
Join our real-life case studies and in-depth technical sessions from the security and privacy teams at a range of different providers and suppliers.

  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility?
    • And what about anomaly detection after that?
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security.Can you help?
  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away from the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 

Who attends

Job titles

Security Architect
Business Systems Manager
Principle DevOps Engineer
Senior Information Security Engineer
Information Security Lead
Information Security Officer / Interim DPO
Information Security & Compliance Officer
Head of Detection and Response
Group IT Security and Compliance Manager
PCI DSS Compliance Manager
Incident Problem Manager
Principal Information Security Architect
Head of Information Security and IT Operations
Internal Digital Audit Manager
Partnership CISO
Digital Assurance Analyst
Security Analyst
Group Information Security Manager
Cloud Security Operations Lead
CISO
Head of IT
Physical Security & Investigations Manager
Cyber Security Manager - Incident Response
IT Director
Fraud Operations Manager
Senior Compliance officer
Data Protection Administrator
PCI Analyst
Security Architect
Security Architect
Head of Technology - Reliability Engineering and Operations
Information Security Team Lead
Cyber Security Consultant
Cyber Security Resilience Lead
Information Security Risk and Compliance Manager
Security Compliance Manager
International Director
Information Security Architect
Head of Audit
CTO
Investigation Specialist
Group Information Security Manager
Head of Information Security Risk and Governance
Compliance Consultant
Information Security Analyst
Information Security Auditor
Cyber Security Assurance Specialist
Cybersecurity Engineer
Senior Cyber Security Manager
Digital Security Manager
Compliance Security Analyst
Information Security Manager
Head of Cyber Defence
Investigation Specialist
Former Head of Security Culture & Competence
Payments and Partnerships Lead
Group Privacy & Security Director
Group Compliance Analyst
Information Security Manager
Cyber Security Manager
Information Security Analyst
CISO
Data Security & Controls Manager
IT & Information Security Manager
Information Security Auditor
CISO
Director of Cyber Security & Compliance
Head of Information & Cyber Security
IT Security Lead
Information Security & Data Privacy Leader & DPO
Group Data Protection Administrator
Vulnerability Testing Manager
Principal Security Architect
IT Risk and Compliance Analyst
Compliance Lead
Head of Security and IT Risk Management
Senior Compliance Officer
Insurance Manager
Information Security Analyst
Global Information Security, Payments & Privacy Lead
Director of Information Security
Senior Manager ISSCA Consultancy Services - ISA
Group Information Security Officer
Head of Information Security
Head of Cyber Security and Risk
Information Security Officer
Senior Information Security Analyst
Group Data Protection Officer
Senior Security Engineer
Information Security Officer and Infosec Lead
Senior InfoSec Analyst
Senior Information Security Analyst
Senior Information Security Analyst

Companies

Currys plc
Wynnstay Group plc
NEXT
River Island
Pentland
Boden
B&S World Supply
OVO Group
Theo Paphitis Retail Group
Stonegate Pub Company
ASOS plc
Sainsbury's
Kurt Geiger
Kingfisher plc
John Lewis Partnership
Kingfisher plc
WHSmith
JD Sports Fashion plc
Deliveroo
Footasylum
S & T Audio Ltd
Tesco
John Lewis Partnership
Charles Tyrwhitt
Sainsbury's
NEXT
ETEL (European Tyre Enterprise Ltd)
Sainsbury's
Clarks
Specsavers
ASOS plc
PayPoint
Wickes
Halfords
Domino's Pizza
The Co-operative Group
PCI Security Standards Council
JD Sports Fashion plc
Waterstones
The Range
Sainsbury's
Boohoo.com
Frasers Group
Maridnach
JD Sports Fashion plc
JD Sports Fashion plc
Howdens Joinery
Clarks
Currys plc
Domino's Pizza
Marie Curie Cancer Care
John Lewis Partnership
Frasers Group
Sainsbury's
H&M
OVO Group
Halfords
Odeon Cinemas
Costa Coffee
Arco
Sainsbury's
Dubai Media Incorporated (DMI)
The Co-operative Group
Waterstones
Paragon Customer Communications
LUSH
Lumanity
Card Factory
END.
IKEA Group
ETEL (European Tyre Enterprise Ltd)
Frasers Group
Halfords
The Walt Disney Company
Kingfisher plc
Clarks
JD Sports Fashion plc
Matalan
Sainsbury's
Costa Coffee
OVO Group
BT
Harvey Nichols Group Limited
All Saints Retail Ltd
N Brown Group
River Island
Dunelm Group plc
ETEL (European Tyre Enterprise Ltd)
All Saints Retail Ltd
Specsavers
Sainsbury's
All Saints Retail Ltd
John Lewis Partnership

Industries

Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail