Cybersecurity Needs and Strategies of Retailers on the Road to Smart Retail (pre-order)
The retail industry is closely related to people’s daily life. Therefore, smart retail services powered by emerging technologies have been most directly felt digital services for consumers. Various technologies have been used for smart retail, including IoT (Internet of Things), AI (Artificial Intelligence), edge computing, and fog computing. While these emerging technologies can make digital services and applications smarter, they also spark a variety of cybersecurity concerns, which may cause distrust and disruption in the smart retail services for consumers and significantly impact retail businesses. This report analyzes cybersecurity needs of retailers on the road to smart retail and their strategies in response to cybersecurity issues.
1. CYBERSECURITY ISSUES AND POTENTIAL NEEDS OF SMART RETAIL
1.1 Key Cybersecurity Issues
1.2 Potential Cybersecurity Needs
1.2.1 Protect both New and Existing Digital Systems
1.2.2. Defend against Advanced Cybersecurity Threats
1.2.3 Strengthen Digital Content Protection
1.2.4 Improve Staff's Cybersecurity Awareness
2. RETAILERS' CYBERSECURITY STRATEGIES FOR SMART RETAIL
2.1 Strategy #1: Set up Comprehensive Cybersecurity Risk Management Plans for Outsourced Information Services
2.2 Strategy #2: Develop Core Security Technology to Keep Track of Cyber Attack Patterns
2.3 Strategy #3: Set up Security Policies and Multi-level Authorization Processes
2.4 Strategy #4: Establish Security Self-assessment Programs and Hold Regular Drills
3. MIC PERSPECTIVE
APPENDIX
List of Companies
1.1 Key Cybersecurity Issues
1.2 Potential Cybersecurity Needs
1.2.1 Protect both New and Existing Digital Systems
1.2.2. Defend against Advanced Cybersecurity Threats
1.2.3 Strengthen Digital Content Protection
1.2.4 Improve Staff's Cybersecurity Awareness
2. RETAILERS' CYBERSECURITY STRATEGIES FOR SMART RETAIL
2.1 Strategy #1: Set up Comprehensive Cybersecurity Risk Management Plans for Outsourced Information Services
2.2 Strategy #2: Develop Core Security Technology to Keep Track of Cyber Attack Patterns
2.3 Strategy #3: Set up Security Policies and Multi-level Authorization Processes
2.4 Strategy #4: Establish Security Self-assessment Programs and Hold Regular Drills
3. MIC PERSPECTIVE
APPENDIX
List of Companies
LIST OF TABLES
Table 1 Cybersecurity Technology Required for Smart Retail
Table 1 Cybersecurity Technology Required for Smart Retail
LIST OF FIGURES
Figure 1 Cybersecurity Needs of Smart Retail
Figure 1 Cybersecurity Needs of Smart Retail