Securing Retail Summit

It’s a steal: are hackers getting the better of the retail industry?

19th June, 2025 • Online

With complicated supply chains, third-party dependencies and digital sales channels, retailers need to spend more on security.

 

Cyberattacks on retail: A global threat that can’t be ignored

The Blue Yonder attack is a case study in retail cybersecurity: The Arizona-based company, owned by Panasonic, provides systems for fulfilment, delivery and returns for more than 3,000 major companies across 76 countries and was hit in November 2024. It was also named as a victim of a separate attack via a zero-day vulnerability in a file-sharing program sold by Cleo.

The attack demonstrates the dangers of ransomware, of advanced zero-day attacks, and of the complexity of third-party attacks: Morrisons and Sainsbury’s, two of Britain's largest supermarket groups, as well as many others globally, were affected by a third-party supplier of business-critical software. In turn, that supplier was also hit by an attack executed on a piece of its own third-party software.

So, it’s no surprise that cyber and data risks are what retailers are most concerned about in the next 12 months, according to research by Barclays Corporate Banking and Retail Economics. Of the UK retailers surveyed, 34% said they see cyber and data threats as the biggest risks, with 70% saying they are one of their “top three risks” over the next year.

However, many also view this as something they can feel confident about managing due to investment in technology to safeguard operations. Of those surveyed, 81% of retailers said the business is where it needs to be or ahead of the competition in terms of cybersecurity issues such as ransomware, malware attacks, network security or fraudulent attacks.

Blue Yonder and other attacks like it show that this complacency is misplaced. And to prove it, another 2024 report revealed that 45% of retail businesses were hit by a ransomware attack last year, with more than half of those attacks succeeding in encrypting their data.

It’s not just the big firms who get attacked either. Nearly half of all cyberattacks target businesses with 1,000 employees or less. Even physically small retail operations can have sizeable transaction flows and be attractive targets for hackers.

So, what should retailers be doing to heighten their security? Which technologies are best tailored to their particular needs? And can AI help in the fight against retail cybercrime?

This event will focus on multiple challenges including:

  • Implementing best-in-class endpoint device management
  • Improve general technical controls including encryption, authentication, and authorization
  • Third-party security and interoperability with other parts of the retail ecosystem
  • Better risk assessment and business continuity plans
  • Develop more coordinated incident response
  • Secure a complex and rapidly evolving IT/OT environment


The e-Crime & Cybersecurity Retail Summit will take place online and will look at how cybersecurity teams are tackling this new world.
Join our real-life case studies and in-depth technical sessions from the security and privacy teams at a range of different providers and suppliers.

  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility?
    • And what about anomaly detection after that?
  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away form the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security.Can you help?

Who attends

Job titles

Security Architect
Business Systems Manager
Principle DevOps Engineer
Senior Information Security Engineer
Information Security Lead
Information Security Officer / Interim DPO
Information Security & Compliance Officer
Head of Detection and Response
Group IT Security and Compliance Manager
PCI DSS Compliance Manager
Incident Problem Manager
Principal Information Security Architect
Head of Information Security and IT Operations
Internal Digital Audit Manager
Partnership CISO
Digital Assurance Analyst
Security Analyst
Group Information Security Manager
Cloud Security Operations Lead
CISO
Head of IT
Physical Security & Investigations Manager
Cyber Security Manager - Incident Response
IT Director
Fraud Operations Manager
Senior Compliance officer
Data Protection Administrator
PCI Analyst
Security Architect
Security Architect
Head of Technology - Reliability Engineering and Operations
Information Security Team Lead
Cyber Security Consultant
Cyber Security Resilience Lead
Information Security Risk and Compliance Manager
Security Compliance Manager
International Director
Information Security Architect
Head of Audit
CTO
Investigation Specialist
Group Information Security Manager
Head of Information Security Risk and Governance
Compliance Consultant
Information Security Analyst
Information Security Auditor
Cyber Security Assurance Specialist
Cybersecurity Engineer
Senior Cyber Security Manager
Digital Security Manager
Compliance Security Analyst
Information Security Manager
Head of Cyber Defence
Investigation Specialist
Former Head of Security Culture & Competence
Payments and Partnerships Lead
Group Privacy & Security Director
Group Compliance Analyst
Information Security Manager
Cyber Security Manager
Information Security Analyst
CISO
Data Security & Controls Manager
IT & Information Security Manager
Information Security Auditor
CISO
Director of Cyber Security & Compliance
Head of Information & Cyber Security
IT Security Lead
Information Security & Data Privacy Leader & DPO
Group Data Protection Administrator
Vulnerability Testing Manager
Principal Security Architect
IT Risk and Compliance Analyst
Compliance Lead
Head of Security and IT Risk Management
Senior Compliance Officer
Insurance Manager
Information Security Analyst
Global Information Security, Payments & Privacy Lead
Director of Information Security
Senior Manager ISSCA Consultancy Services - ISA
Group Information Security Officer
Head of Information Security
Head of Cyber Security and Risk
Information Security Officer
Senior Information Security Analyst
Group Data Protection Officer
Senior Security Engineer
Information Security Officer and Infosec Lead
Senior InfoSec Analyst
Senior Information Security Analyst
Senior Information Security Analyst

Companies

Currys plc
Wynnstay Group plc
NEXT
River Island
Pentland
Boden
B&S World Supply
OVO Group
Theo Paphitis Retail Group
Stonegate Pub Company
ASOS plc
Sainsbury's
Kurt Geiger
Kingfisher plc
John Lewis Partnership
Kingfisher plc
WHSmith
JD Sports Fashion plc
Deliveroo
Footasylum
S & T Audio Ltd
Tesco
John Lewis Partnership
Charles Tyrwhitt
Sainsbury's
NEXT
ETEL (European Tyre Enterprise Ltd)
Sainsbury's
Clarks
Specsavers
ASOS plc
PayPoint
Wickes
Halfords
Domino's Pizza
The Co-operative Group
PCI Security Standards Council
JD Sports Fashion plc
Waterstones
The Range
Sainsbury's
Boohoo.com
Frasers Group
Maridnach
JD Sports Fashion plc
JD Sports Fashion plc
Howdens Joinery
Clarks
Currys plc
Domino's Pizza
Marie Curie Cancer Care
John Lewis Partnership
Frasers Group
Sainsbury's
H&M
OVO Group
Halfords
Odeon Cinemas
Costa Coffee
Arco
Sainsbury's
Dubai Media Incorporated (DMI)
The Co-operative Group
Waterstones
Paragon Customer Communications
LUSH
Lumanity
Card Factory
END.
IKEA Group
ETEL (European Tyre Enterprise Ltd)
Frasers Group
Halfords
The Walt Disney Company
Kingfisher plc
Clarks
JD Sports Fashion plc
Matalan
Sainsbury's
Costa Coffee
OVO Group
BT
Harvey Nichols Group Limited
All Saints Retail Ltd
N Brown Group
River Island
Dunelm Group plc
ETEL (European Tyre Enterprise Ltd)
All Saints Retail Ltd
Specsavers
Sainsbury's
All Saints Retail Ltd
John Lewis Partnership

Industries

Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail