{"id":204129,"date":"2025-02-27T16:17:06","date_gmt":"2025-02-27T16:25:10","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/"},"modified":"2026-04-07T16:43:18","modified_gmt":"2026-04-07T20:43:18","slug":"ep-2-dispatch-from-retails-frontline-building-cyber-resilience","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/","title":{"rendered":"EP 2 &#8211; Dispatch From Retail&#8217;s Frontline: Building Cyber Resilience"},"content":{"rendered":"<p>In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats. <\/p>\n<p>Discover the strategies for building cyber resilience, the role of AI in retail, the importance of protecting consumer trust and the critical role of identity in safeguarding sensitive data. JJ&#8217;s journey from tech enthusiast to CIO offers actionable insights and expert advice for cyber professionals, business leaders and anyone with a seat at or view of the cybersecurity table.<\/p>\n<p>More security resources via the <a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\">CyberArk Blog<\/a><\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">David Puner: You&#8217;re listening to the Security Matters podcast. I&#8217;m David Puner, a Senior Editorial Manager at CyberArk, the global leader in identity security.<\/p>\n<p>Imagine this scenario: A major retail chain is in the middle of its busiest shopping season. Shoppers jam checkout lines, employees restock shelves at record speed, and credit cards dip and swipe in a rhythmic pulse. But something isn\u2019t right.<\/p>\n<p>An attacker\u2014maybe an insider, maybe someone who just walked in off the street\u2014manages to plug a small, inconspicuous device into a point-of-sale terminal.<\/p>\n<p>At first, nothing seems off. Transactions process as usual. But the retailer\u2019s entire payment system is compromised. The attacker is siphoning credit card data and cloning credentials. The worst part? The breach isn&#8217;t detected until customers start reporting fraudulent charges days later.<\/p>\n<p>This scenario isn\u2019t just hypothetical. Retail\u2014one of the most targeted sectors for cyberattacks\u2014faces unique challenges where digital security meets real-world exposure. From AI-powered phishing scams to evolving ransomware threats, attackers are becoming more sophisticated.<\/p>\n<p>The good news? Leaders like our guest today are working to stay ahead of these threats\u2014integrating AI-driven defenses, strengthening cyber resilience, and ensuring that the trust between retailers and consumers remains intact.<\/p>\n<p>Let\u2019s dive in.<\/p>\n<p>Jason James, Chief Information Officer at Aptos Retail, thanks so much for coming on the podcast.<\/p>\n<p>Jason James: Yeah, thanks for having me today.<\/p>\n<p>David Puner: Really excited to talk to you. We haven&#8217;t really gone deep on retail in this podcast for a while\u2014maybe ever\u2014so we&#8217;ll have to dial that up at some point.<\/p>\n<p>But let\u2019s start with your role. As CIO of Aptos Retail, what does your role entail, and what was your career path to becoming CIO?<\/p>\n<p>Jason James: In my current role, I oversee our cloud operations and global internal IT group, which manages everything from CRM and business systems to talent management systems with HR. I also oversee our business intelligence teams and lead our cybersecurity and compliance divisions.<\/p>\n<p>Aptos is one of the largest software companies in the world that focuses exclusively on retail. We handle everything from point-of-sale to order management and CRM\u2014but specifically within the retail space. If you go into a mall, think of everyone except the anchor stores. Companies like Michael Kors, New Balance, and Crocs\u2014those are the types of brands we serve. We provide our services as a software-as-a-service platform.<\/p>\n<p>As for how I got here\u2014well, it\u2019s been quite the winding road. Every job I\u2019ve ever had has been in technology. I live in Atlanta now, but I grew up a couple of hours south of here in Alabama. When I was 15, while other kids were mowing lawns or working retail jobs, I was laying out Lantastic networks and upgrading PCs.<\/p>\n<p>Since then, I\u2019ve worked in various sectors\u2014telecom, enterprise tech, retail analytics, and even healthcare tech. I\u2019ve been a CIO at two different healthcare tech organizations before returning to retail. But the common thread throughout my career has been infrastructure, data centers, cloud computing, and SaaS delivery.<\/p>\n<p>If the internet made every company a tech company, what we\u2019re seeing now is AI making every tech company an AI company. And that\u2019s where we\u2019re focused as well.<\/p>\n<p>David Puner: That\u2019s a really interesting career path. We\u2019ll definitely get into AI in a few minutes, but let\u2019s go back to your early days. When you were a teenager and everyone else was mowing lawns or taking retail jobs, you were doing what exactly?<\/p>\n<p>Jason James: I was setting up Lantastic networks\u2014think of it as networking for dummies. Small and medium-sized businesses were just starting to network their computers together, connecting three or four desktops so they could share data.<\/p>\n<p>It\u2019s wild to think about now. In my house today, between my wife, my kids, and me, we probably have 40 to 50 connected devices\u2014everything from smart thermostats to doorbell cameras to our laptops and tablets. That\u2019s more networked devices than the businesses I worked on back then.<\/p>\n<p>David Puner: It sounds like tech has always been a passion for you, and ultimately, that\u2019s what led you to where you are today.<\/p>\n<p>Jason James: Absolutely. But it\u2019s more than just the tech side\u2014it\u2019s also the entrepreneurial side. When I was a teenager, those early jobs were essentially consulting gigs. I\u2019d go out to local businesses\u2014sometimes ones my dad knew\u2014who needed help with their IT.<\/p>\n<p>When I started college at Auburn University, I ended up buying the value-added reseller I was working for when I was 19 years old. I took a sabbatical from school to run the business full-time. Later, I went back to finish my degree\u2014I ended up getting my undergrad from Oregon State and my master\u2019s in Applied Information Management from the University of Oregon.<\/p>\n<p>But that entrepreneurial mindset, solving business problems with technology, made me a CIO long before I ever had the title.<\/p>\n<p>David Puner: In your role as CIO of Aptos Retail, are you both outward- and inward-facing?<\/p>\n<p>Jason James: Absolutely. Day-to-day, I\u2019m responsible for keeping the lights on\u2014the foundational things every CIO does. That includes managing business systems, ensuring data integrity, maintaining internal security, and overseeing IT operations.<\/p>\n<p>But I\u2019m also working directly with our largest clients. What security needs do they have? How do we differentiate our products? How do we support their upgrades and deployments? How do we ensure our technology is making their business more efficient and driving profitability?<\/p>\n<p>I\u2019m not in sales, but I serve as a sounding board. CIOs want to talk to other CIOs\u2014we share pain points, discuss challenges, and exchange insights. Sometimes, our conversations extend beyond our own technology. They might ask for guidance on an ERP implementation or a security initiative, and my job is to be a trusted partner and advisor.<\/p>\n<p>David Puner: Retail is one of the most targeted sectors by cyber attackers. Why is that? How does retail compare to other heavily targeted industries, like healthcare?<\/p>\n<p>Jason James: The three most attacked sectors in the U.S. are:<\/p>\n<p>Finance \u2013 Because that\u2019s where the money is.<br \/>\nHealthcare\/Healthcare Tech \u2013 Sensitive personal data makes it a huge target.<br \/>\nRetail \u2013 A unique mix of financial transactions and physical exposure.<br \/>\nRetail presents challenges similar to healthcare. You have seasonal or hourly workers who may not have cybersecurity training. But what really makes retail unique is that it\u2019s so physically accessible.<\/p>\n<p>Think about it: what other business allows you to walk right up to the register that handles money? You can literally touch the point-of-sale system in a retail store. That\u2019s not the case in enterprise environments, where it\u2019s nearly impossible to walk into an office building and access a corporate desktop.<\/p>\n<p>This physical accessibility makes retail more vulnerable to threats like credit card skimmers and USB-based attacks. A bad actor could discreetly plug in a rogue device without drawing suspicion. Since retail is customer-centric, businesses hesitate to put up barriers that might interfere with the shopping experience.<\/p>\n<p>And there\u2019s another factor\u2014familiarity. So many people have worked in retail at some point in their lives. They know how these systems work. That includes hackers who may have started out in retail jobs and later learned how to exploit the industry\u2019s weak points.<\/p>\n<p>David Puner: That\u2019s a great point. We all interact with retail\u2014whether as employees or consumers. What\u2019s your perspective on consumer trust and how it relates to security in retail?<\/p>\n<p>Jason James: Consumer trust is everything. If you think about brand loyalty, people have strong preferences. You probably have a favorite sneaker brand, right?<\/p>\n<p>Retailers work hard to protect that relationship. But trust is fragile. A single data breach can damage a brand\u2019s reputation overnight.<\/p>\n<p>Nobody wants to receive an email saying:<br \/>\n&#8220;Your personal information has been compromised.&#8221;<br \/>\n&#8220;Your credit card was exposed.&#8221;<br \/>\n&#8220;Your Social Security number was leaked.&#8221;<\/p>\n<p>Because of this, retailers are making big investments in next-generation security. Five or six years ago, many were still using traditional antivirus. Now, they\u2019re moving toward next-gen endpoint detection and response (EDR) to stay ahead of threats.<\/p>\n<p>Ultimately, protecting customer data means protecting trust\u2014and that trust translates directly into brand loyalty and revenue.<\/p>\n<p>David Puner: Is protecting retail data different from protecting healthcare data? How do regulatory differences impact security strategy?<\/p>\n<p>Jason James: Data is data. The way you protect it is fundamentally the same. What changes is the penalty for failing to protect it.<\/p>\n<p>For example:<\/p>\n<p>PCI compliance violations (credit card data) could lead to fines or a forced reissue of credit cards.<br \/>\nHIPAA violations (healthcare data) could involve U.S. Marshals showing up at your office\u2014a whole different level of enforcement.<br \/>\nComing from healthcare tech, I brought those highly regulated security best practices into retail. That means:<\/p>\n<p>Next-generation security frameworks<br \/>\nData segmentation<br \/>\nStrict access controls<br \/>\nEven though retail data may not be regulated to the same extent as healthcare, trust violations can be just as devastating.<\/p>\n<p>David Puner: How do you balance PCI DSS compliance with ensuring a seamless shopping experience?<\/p>\n<p>Jason James: Shift-left security. Build security into the development process, rather than treating it as an afterthought.<\/p>\n<p>There\u2019s an IBM study that found fixing a security issue post-deployment is six times more expensive than addressing it during development.<\/p>\n<p>Security should be woven into the DNA of an organization. Compliance isn\u2019t just about checking a box\u2014it\u2019s about ensuring that every system is designed with security from the ground up.<\/p>\n<p>For us, compliance is a measurement of security, not the goal itself. Security comes first, and compliance is simply a byproduct of good security practices.<\/p>\n<p>David Puner: You mentioned cyber resiliency earlier. What does cyber resilience look like in retail, and how can organizations build it?<\/p>\n<p>Jason James: It\u2019s not just cyber resiliency\u2014it\u2019s business resiliency.<\/p>\n<p>Retail environments can be fragile. Think about the networks at:<\/p>\n<p>Malls \u2013 crowded, congested Wi-Fi.<br \/>\nPop-up events \u2013 temporary infrastructure.<br \/>\nMarathons, concerts, festivals \u2013 makeshift payment systems.<br \/>\nAnd then you have major global disruptions\u2014like last year\u2019s CrowdStrike outage, which affected businesses worldwide.<\/p>\n<p>The question is: Can your system withstand disruptions?<\/p>\n<p>With our product, for example, we build a highly resilient system that allows transactions to continue even if the network goes down.<\/p>\n<p>We\u2019ve all been there\u2014holiday shopping season, a packed store, and suddenly the register stops working. That\u2019s frustrating for shoppers, but it\u2019s even worse for seasonal employees trying to keep things moving. They just want to process the sale, close their shift, and go home.<\/p>\n<p>Retailers need systems that can withstand outages without interrupting sales\u2014because resiliency protects revenue and customer trust.<\/p>\n<p>David Puner: Speaking of those seasonal employees\u2014how difficult is it to properly train retail workers on cybersecurity awareness?<\/p>\n<p>Jason James: It\u2019s extremely challenging. The biggest problem? Training has to be engaging.<\/p>\n<p>Think about it:<\/p>\n<p>Retail workers already go through a ton of training\u2014POS systems, customer service, inventory management.<br \/>\nIf cybersecurity training is boring, they\u2019ll click through without paying attention.<br \/>\nBut cybersecurity is fascinating!<\/p>\n<p>Deepfakes are changing the way we verify identities.<br \/>\nAI-powered phishing is tricking even savvy employees.<br \/>\nThat\u2019s why we need interactive training\u2014not just long, boring computer modules.<\/p>\n<p>One thing I do with my security teams is Cybersecurity AMAs (Ask Me Anything).<\/p>\n<p>We discuss: Real-world threats, new attack trends, security tools.<br \/>\nWe open the floor: Employees can ask anything.<br \/>\nThe goal is to make security relatable. If I can get people to care about protecting their personal data, they\u2019ll also care about protecting corporate data.<\/p>\n<p>David Puner: That makes a lot of sense. At the end of the day, individuals make up organizations\u2014so security starts with each person.<\/p>\n<p>Let\u2019s shift to emerging threats. How do you stay ahead of new cyber threats, especially the unknown ones?<\/p>\n<p>Jason James: It\u2019s a continuous learning process.<\/p>\n<p>I\u2019m constantly engaging with security partners, CISOs, CIOs, CTOs\u2014we share what\u2019s working and what\u2019s not.<br \/>\nI follow threat intelligence feeds for real-time updates.<br \/>\nBut beyond that, it\u2019s about relationships\u2014talking to other security leaders to understand what they\u2019re seeing.<br \/>\nIt\u2019s harder than ever to be a CIO or CISO today. Twenty years ago, a CIO might oversee one ERP implementation every four years\u2014maybe handle the occasional virus.<\/p>\n<p>Today?<\/p>\n<p>Nation-state attacks.<br \/>\nRansomware-as-a-service.<br \/>\nDeepfake scams targeting wire transfers.<br \/>\nGlobal supply chain disruptions.<br \/>\nRemote work vulnerabilities.<br \/>\nIt\u2019s not just a technology job anymore\u2014it\u2019s geopolitical, financial, and strategic.<\/p>\n<p>And let\u2019s be honest\u2014the attackers are using AI too.<\/p>\n<p>David Puner: Speaking of AI\u2014how is AI and generative AI transforming retail? What are the security benefits and risks?<\/p>\n<p>Jason James: AI is revolutionizing retail in two major ways:<\/p>\n<p>1. Operational AI \u2013 Smarter Business Decisions<br \/>\nRetailers are using AI-driven analytics to:<\/p>\n<p>Identify top-selling items.<br \/>\nTrack slow-moving inventory.<br \/>\nOptimize pricing strategies.<br \/>\nEmployees who aren\u2019t data scientists can now use chat-based AI tools to analyze trends and get instant insights.<\/p>\n<p>2. Cybersecurity AI \u2013 Smarter Threat Detection<br \/>\nAI is game-changing for cyber defense:<\/p>\n<p>It detects slow-moving attacks that unfold over weeks or months.<br \/>\nIt spots unusual patterns\u2014for example, if a hacker probes a network subtly over time.<br \/>\nIt prevents lateral movement by stopping threats before they escalate.<br \/>\nBut here\u2019s the flip side: Attackers are using AI too.<\/p>\n<p>AI-powered phishing emails are flawless\u2014no typos, no weird phrasing.<br \/>\nFake conversations can be auto-generated to trick employees into wire fraud.<br \/>\nGenerative AI scams can create entirely fake email chains that look like ongoing conversations.<br \/>\nWe\u2019ve seen cases where an employee receives a fake email thread that looks like a months-long exchange between their CFO and an external vendor\u2014but the whole thing was generated by AI.<\/p>\n<p>That\u2019s why security awareness training can\u2019t be a once-a-year exercise. The threat landscape moves too fast.<\/p>\n<p>David Puner: That\u2019s pretty alarming. Let\u2019s go even further\u2014what about AI agents? As AI evolves beyond task automation, what are the new risks?<\/p>\n<p>Jason James: AI agents are going to completely change cybersecurity\u2014both in good and bad ways.<\/p>\n<p>Right now, AI mostly responds to humans\u2014you type a question, AI gives an answer. But in the near future, AI agents will start talking to each other.<\/p>\n<p>Example:<\/p>\n<p>A Salesforce AI agent talks to a Workday AI agent to process employee data.<br \/>\nA Copilot AI agent fetches analytics from multiple sources to generate reports.<br \/>\nBut what happens if one of those AI agents gets compromised?<\/p>\n<p>A malicious AI agent could start modifying data in subtle ways.<br \/>\nAI could start issuing unauthorized transactions or creating fake reports.<br \/>\nIt\u2019s going to introduce a new kind of insider threat\u2014one that isn\u2019t human.<\/p>\n<p>We have to start thinking now about how to monitor and protect AI agents.<\/p>\n<p>How do we segment AI agents?<br \/>\nHow do we track their activity?<br \/>\nWhat happens if an AI agent starts acting \u201coff\u201d?<br \/>\nThe stakes are high. Just look at what big tech is spending on AI infrastructure:<\/p>\n<p>Google: $75 billion<br \/>\nMicrosoft: $80 billion<br \/>\nAmazon: $100 billion<br \/>\nMeta: $65 billion<br \/>\nThat\u2019s wartime spending. AI is our generation\u2019s Manhattan Project.<\/p>\n<p>And when the technology evolves this fast, security risks evolve just as fast.<\/p>\n<p>David Puner: That\u2019s a great point. With AI advancing so quickly, how does machine identity factor into security?<\/p>\n<p>Jason James: Machine identity is the next big security frontier.<\/p>\n<p>We\u2019ve spent years perfecting human identity security\u2014multi-factor authentication, biometrics, zero trust principles. But what about non-human identities?<\/p>\n<p>How do we verify an AI agent?<br \/>\nHow do we ensure a machine-only process isn\u2019t compromised?<br \/>\nHow do we limit what a machine identity can access?<br \/>\nRight now, organizations struggle with human identity security\u2014there are still companies that haven\u2019t fully implemented privileged access controls. But machine identities? They\u2019re multiplying exponentially.<\/p>\n<p>A modern enterprise might have 10 times more machine identities than human ones.<\/p>\n<p>Every cloud service has an identity.<br \/>\nEvery API connection has an identity.<br \/>\nEvery AI model making business decisions has an identity.<br \/>\nThe challenge is controlling machine identities at scale. If an attacker compromises a machine identity, they could move laterally across multiple systems without triggering traditional alerts.<\/p>\n<p>David Puner: That makes sense\u2014especially when everything is so interconnected. What about supply chain security? How does that play into your security strategy?<\/p>\n<p>Jason James: Supply chain security is top of mind\u2014especially with tariffs and global disruptions.<\/p>\n<p>For retailers, supply chain security has two major concerns:<\/p>\n<p>Product availability \u2013 Where are you sourcing goods?<br \/>\nSoftware security \u2013 Are you using trusted vendors?<br \/>\nFor example, a lot of retail hardware\u2014payment terminals, scanners, kiosks\u2014comes from China. With increased tariffs, we\u2019re seeing shifts to alternative suppliers in Vietnam and Cambodia. That means:<\/p>\n<p>Longer lead times for hardware.<br \/>\nMore third-party vendors in the supply chain.<br \/>\nNew security risks if suppliers aren\u2019t vetted properly.<br \/>\nThen there\u2019s the software side. Many retailers rely on third-party software integrations\u2014from POS systems to order management tools.<\/p>\n<p>If a supplier gets compromised, the whole chain is at risk. That\u2019s why vendor security assessments are critical.<\/p>\n<p>David Puner: Let\u2019s talk digital transformation. How do you approach digital transformation while maintaining strong cybersecurity measures?<\/p>\n<p>Jason James: Transformation should always be tied to a business goal.<\/p>\n<p>Does it improve efficiency?<br \/>\nDoes it reduce costs?<br \/>\nDoes it remove friction?<br \/>\nYou don\u2019t adopt technology for the sake of it. Every transformation should have a clear return on investment.<\/p>\n<p>From a security standpoint, modernizing identity is a huge focus.<\/p>\n<p>Moving from passwords to biometrics.<br \/>\nEmbedding security into authentication.<br \/>\nReducing friction while strengthening protection.<br \/>\nFor example, biometric authentication (face recognition, fingerprint scanning) removes the need for employees to remember 14-character passwords.<\/p>\n<p>And security should never slow down the business. There are tools today that embed VPN connectivity into the operating system, so employees don\u2019t even have to launch a VPN manually.<\/p>\n<p>David Puner: What about cloud security? How do you balance accessibility and security in a cloud-first environment?<\/p>\n<p>Jason James: The security of big cloud providers\u2014AWS, Azure, Google Cloud\u2014is strong. The challenge isn\u2019t securing the cloud itself\u2014it\u2019s:<\/p>\n<p>Managing data sovereignty (keeping data where it legally belongs).<br \/>\nProtecting identities across multiple cloud services.<br \/>\nFor global retailers, data residency laws are a huge factor. You can\u2019t store customer data from France in a U.S. data center without violating regulations. That\u2019s why cloud strategy isn\u2019t just about security\u2014it\u2019s also about compliance.<\/p>\n<p>And then there\u2019s AI\u2019s impact on cloud infrastructure.<\/p>\n<p>AI models require massive computing power.<br \/>\nThe demand for GPUs is skyrocketing.<br \/>\nData centers are running out of power capacity.<br \/>\nCase in point\u2014the first new U.S. nuclear power plant in decades just went online in Georgia, and over 50% of its energy is being allocated to data centers.<\/p>\n<p>The future of cloud security will also be tied to power availability and infrastructure expansion.<\/p>\n<p>David Puner: That\u2019s fascinating. With so much complexity, how do you balance people, process, and technology in your security approach?<\/p>\n<p>Jason James: People are the most important part of the equation.<\/p>\n<p>At the end of the day, technology is just a tool. You need the right people and the right culture to make it work.<\/p>\n<p>A strong security culture means:<\/p>\n<p>Employees understand the &#8220;why&#8221; behind security.<br \/>\nLeaders prioritize security in decision-making.<br \/>\nSecurity teams communicate in a way that makes sense to the business.<br \/>\nAs a CIO, I\u2019m always thinking:<\/p>\n<p>How do I motivate people to embrace change?<br \/>\nHow do I explain security in a way that resonates with executives?<br \/>\nHow do I ensure security is an enabler\u2014not a roadblock?<br \/>\nUltimately, it\u2019s about building trust\u2014within the organization and with customers.<\/p>\n<p>David Puner: That\u2019s a great perspective. One last question\u2014Atlanta is known for a lot of things, but how\u2019s the pizza?<\/p>\n<p>Jason James: Honestly? Not great.<\/p>\n<p>David Puner: Good to know. Up in Boston, we\u2019ve got the same problem.<\/p>\n<p>Jason James: There are a few Neapolitan spots that are pretty solid. But whenever I\u2019m in New York, I make sure to grab a slice.<\/p>\n<p>David Puner: That\u2019s the way to do it. Jason, thanks so much for coming on Security Matters. This was a fantastic conversation, and we hope to have you back soon.<\/p>\n<p>Jason James: Thanks, David\u2014really enjoyed it.<\/p>\n<p>David Puner: And that\u2019s it for this episode of Security Matters. If you enjoyed the show, follow us wherever you get your podcasts so you don\u2019t miss new episodes.<\/p>\n<p>If you have ideas for future topics, drop us a line at securitymatterspodcast@cyberark.com.<\/p>\n<p>Thanks for listening\u2014see you next time!<\/p><\/div>\n","protected":false},"featured_media":213828,"template":"","class_list":["post-204129","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 2 - Dispatch From Retail&#039;s Frontline: Building Cyber Resilience | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 2 - Dispatch From Retail&#039;s Frontline: Building Cyber Resilience\" \/>\n<meta property=\"og:description\" content=\"In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T20:43:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"18\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/\",\"name\":\"EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg\",\"datePublished\":\"2025-02-27T16:25:10+00:00\",\"dateModified\":\"2026-04-07T20:43:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 2 &#8211; Dispatch From Retail&#8217;s Frontline: Building Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/","og_locale":"ko_KR","og_type":"article","og_title":"EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience","og_description":"In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest,...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-07T20:43:18+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"18\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/","name":"EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg","datePublished":"2025-02-27T16:25:10+00:00","dateModified":"2026-04-07T20:43:18+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MmNkNC5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-2-dispatch-from-retails-frontline-building-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 2 &#8211; Dispatch From Retail&#8217;s Frontline: Building Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/podcast\/204129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media\/213828"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=204129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}