5 Messy Event Cybersecurity Breaches—And How to Make Sure Yours Isn’t Next

Cybersecurity breaches at events are devastating and can destroy your reputation.

Let’s look at five of the messiest breaches in event history — and what you need to do to ensure your event isn’t next.

5 Messy Event Cybersecurity Breaches

1. CES Hack (2018)

Hackers hit the CES app and stole personal info from over 1,000 attendees, exposing names, emails, and addresses.

Lesson:
No tool is foolproof. Vet all platforms and encrypt sensitive data before your event launches.

2. SXSW Ticketing Breach (2016)

Hackers accessed SXSW’s ticketing system, leaking attendee financial data and leading to widespread fraud.

Lesson:
Secure your payment systems with encryption and frequent audits. Financial data is a prime target for cybercriminals.

3. Zoom Bombing (2020)

During the pandemic, “Zoom bombings” disrupted virtual conferences with offensive content, forcing many event shutdowns.

Lesson:
Virtual platforms need protection too — use passwords, waiting rooms, and strict controls on who joins.

4. Marriott Data Breach (2018)

Hackers stole personal data from 500 million Marriott guests, affecting many event attendees booking hotel rooms.

Lesson:
Your vendors’ cybersecurity is just as important as yours. Make sure all partners and hotels have secure protocols in place.

5. Ticketmaster Breach (2018)

Ticketmaster’s systems were breached, exposing the financial data of 40,000 customers.

Lesson:
Registration and ticketing platforms are hacker goldmines. Protect them with strong encryption and real-time monitoring.

What You Can Do

  • Conduct regular risk assessments.
  • Encrypt sensitive attendee and payment data.
  • Vet all vendors and partners for cybersecurity compliance.
  • Work with a Cybersecurity Event Strategist (AHEM…me) to ensure every layer of your event is protected.
  • Have a response plan ready in case anything goes wrong.

Don’t let your event turn into the next messy headline.

Stay Tuned

Stay tuned for more tips on safeguarding your event and ensuring everything runs smoothly — without any of the mess from cyber attacks.

Other Posts You May Love

Leave a Reply

Your email address will not be published. Required fields are marked *