Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

The Show Must Go On: Defending Large-Scale Sporting Events From Cyber Disruption

Dec 04, 2024 - forbes.com
The article discusses the increasing threat of cyberattacks on major sporting events, which are appealing targets due to their global reach and large audiences. The sports and entertainment industry's growing reliance on technology for various aspects, including ticketing, data analytics, and fan engagement, has made it more complex to protect. The article emphasizes the need for proactive cybersecurity measures, particularly as the industry prepares for major events like the NFL Super Bowl and FIFA World Cup 2026.

The article suggests that security teams should shift from a reactive to a proactive approach, focusing on cyber resilience. It highlights the role of AI-powered tools in detecting unusual activity and initiating targeted responses at machine speed. The article also underscores the importance of choosing the right type of AI for the specific security problem at hand, considering factors like how the model was trained and the integrity of the training data.

Key takeaways:

  • Major league sporting events are appealing targets for cybercriminals due to their large global audiences and reach, with successful attacks causing significant disruptions and financial and reputational repercussions.
  • The sports and entertainment industry's increasing use of new technology and the distributed nature of the industry across physical and digital ecosystems has made it more complex to protect than ever before.
  • The digital infrastructure underpinning sporting events is becoming increasingly complex, and the convergence of IT and OT infrastructure creates new opportunities and entry points for attackers.
  • AI-powered tools have become critical for evening the operational playing field and staying one step ahead of challenges, with AI technologies able to be deployed across complex environments to develop an understanding of “normal” activity and then flag unusual activity or potential threats accordingly.
View Full Article

Comments (0)

Be the first to comment!