Hyatt Regency Company Cyber Security Posture

hyatt.com

Welcome to Hyatt Regency hotels, where connections flow seamlessly whether youโ€™re traveling for business or leisure. With more than 150 hotels in over 30 countries, Hyatt Regency is a welcome place for convention goers, business travelers, and leisure seekers alike. Find yourself surrounded by enthusiastic service, eager to make sure all your needs are met. Because no detail goes unnoticed here. Our worldwide hotels are conveniently located in urban, suburban, airport, convention, and vacation destinations.

Hyatt Regency Company Details

Linkedin ID:

hyatt-regency

Employees number:

17241 employees

Number of followers:

558484.0

NAICS:

721

Industry Type:

Hospitality

Homepage:

hyatt.com

IP Addresses:

Scan still pending

Company ID:

HYA_2978202

Scan Status:

In-progress

AI scoreHyatt Regency Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreHyatt Regency Global Score
blurone
Ailogo

Hyatt Regency Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Hyatt Regency Company Cyber Security News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
Hyatt Hotels CorporationBreach5023/2017HYA456072525Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Washington State Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on October 12, 2017. The breach occurred between March 18, 2017 and July 2, 2017, potentially affecting 640 Washington residents with unauthorized access to payment card information, including cardholder names, card numbers, expiration dates, and internal verification codes.

Hyatt Hotels CorporationBreach6028/2015HYA550072525Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Washington Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on January 14, 2016. The breach, which involved unauthorized access to payment card data, occurred between August 13, 2015, and December 8, 2015, affecting 15 individuals. The breach was due to malware specifically designed to target payment card data.

Hyatt Hotels CorporationRansomware90501/2016HYA1348522Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Hyatt Hotels chain across the was infected by a malware attack back in January 2016. The attackers designed the malware to exfiltrated payment card information including cardholder names, card numbers, expiration dates, and internal verification code affected payment processing systems. The hotel chain offered one yearโ€™s free protection to those affected by the breach,

Hyatt Regency Company Subsidiaries

SubsidiaryImage

Welcome to Hyatt Regency hotels, where connections flow seamlessly whether youโ€™re traveling for business or leisure. With more than 150 hotels in over 30 countries, Hyatt Regency is a welcome place for convention goers, business travelers, and leisure seekers alike. Find yourself surrounded by enthusiastic service, eager to make sure all your needs are met. Because no detail goes unnoticed here. Our worldwide hotels are conveniently located in urban, suburban, airport, convention, and vacation destinations.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hyatt-regency' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Hyatt Regency Cyber Security News

2025-04-22T07:00:00.000Z
4 cybersecurity and AI trends hoteliers should know

The hospitality industry is seeking to strike a risk-reward balance around AI and cybersecurity as the technology landscape continues to evolve.

2025-05-20T07:00:00.000Z
RSU cybersecurity teams place among the top in national competition

Rogers State University's cybersecurity teams showcased their skills at the Spring 2025 National Cyber League Competition (NCL).

2025-02-26T08:00:00.000Z
Cybersecurityโ€™s Brightest Minds Unite at SANS 2025 Flagship Training Event โ€”Donโ€™t Miss This Exclusive Industry Event

The First-Ever SANS Curriculum + Product Tradeshow โ€“ Witness game-changing curriculum updates and SANS product innovations before anyone else!

2025-02-24T08:00:00.000Z
Orlando Cybersecurity Job Market: Trends and Growth Areas for 2025

The global cybersecurity workforce needs are massive - we're looking at 3.5 million unfilled positions by 2025! For anyone interested in techย ...

2025-01-17T08:00:00.000Z
Otelier data breach exposes info, hotel reservations of millions

The threat actors behind the Otelier breach told BleepingComputer that they initially hacked the company's Atlassian server using an employee'sย ...

2024-09-04T07:00:00.000Z
MSSP Alert Live: How Bad Actors Use AI and Learning to โ€œThink Evilโ€

โ€œToo many people don't know enough about AI, how it works or how to protect against cybersecurity threats that are amplified by bad actors'ย ...

2024-10-23T07:00:00.000Z
GovTechCon 2024: The Event Thatโ€™s Revolutionizing Government Tech Careers

A transformative, two-day career expo, two days of technical and career workshops, and 3 days of GovTech talks all about the opportunities, and future, of theย ...

2024-08-16T07:00:00.000Z
Cybersecurity Trends, Challenges and Responses

The reason why business staff should take cybersecurity online courses instead of self-learning is due to the technology sophistication,ย ...

2024-06-12T22:20:14.000Z
CyberSat 2024

CyberSat has been at the forefront of the space industry's burgeoning cybersecurity landscape since launching in 2017. This year, our program has undergoneย ...

similarCompanies

Hyatt Regency Similar Companies

Taj Hotels

Established in 1903, Taj is The Indian Hotels Company Limitedโ€™s (IHCL) iconic brand for the worldโ€™s most discerning travellers seeking luxury and authentic experiences. Taj has been rated as Indiaโ€™s Strongest Brand across all sectors for an unprecedented fourth time and also as the Worldโ€™s Strongest

Hilton Garden Inn

Hilton Garden Innยฎ is an award-winning brand that provides business and leisure guests upscale, affordable accommodations and modern amenities for an experience that is simply on another level. The Hilton Garden Inn Promise affirms the brandโ€™s goal to make each guestโ€™s stay better and brighter. Guar

Minor Hotels

Minor Hotels is a global hospitality leader with over 560 hotels and resorts across six continents, a diverse portfolio of F&B businesses and a selection of luxury transportation services. With over four decades of experience, we build stronger brands, foster lasting partnerships, and drive business

Landry's is a multinational, diversified restaurant, hospitality, gaming, and entertainment leader based in Houston, Texas. The company operates more than 600 establishments around the world, including well-known concepts, such as Landryโ€™s Seafood House, Bubba Gump Shrimp Co., Rainforest Cafe, Mo

Scandic Hotels

Scandic is the largest hotel company in the Nordic countries with a network of about 280 hotels with 58,000 rooms in operation and under development, in more than 130 destinations. The company is the leader when it comes to integrating sustainability in all operations and its award-winning Design

Deutsche Hospitality

Deutsche Hospitality stands for an exceptional portfolio comprising more than 130 hotels in 20 countries on three continents, about 30 hotels are currently under development. Deutsche Hospitality stands for an exceptional portfolio comprising more than 130 hotels in 20 countries on three continents

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Hyatt Regency CyberSecurity History Information

How many cyber incidents has Hyatt Regency faced?

Total Incidents: According to Rankiteo, Hyatt Regency has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at Hyatt Regency?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Hyatt Hotels Corporation Data Breach

Description: The Washington Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on January 14, 2016. The breach, which involved unauthorized access to payment card data, occurred between August 13, 2015, and December 8, 2015, affecting 15 individuals. The breach was due to malware specifically designed to target payment card data.

Date Detected: 2016-01-14

Date Publicly Disclosed: 2016-01-14

Type: Data Breach

Attack Vector: Malware

Vulnerability Exploited: Unauthorized access to payment card data

Motivation: Financial Gain

Incident : Data Breach

Title: Hyatt Hotels Corporation Data Breach

Description: The Washington State Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on October 12, 2017. The breach occurred between March 18, 2017 and July 2, 2017, potentially affecting 640 Washington residents with unauthorized access to payment card information, including cardholder names, card numbers, expiration dates, and internal verification codes.

Date Detected: 2017-10-12

Date Publicly Disclosed: 2017-10-12

Type: Data Breach

Incident : Malware Attack

Title: Hyatt Hotels Malware Attack

Description: Hyatt Hotels chain across the was infected by a malware attack back in January 2016. The attackers designed the malware to exfiltrated payment card information including cardholder names, card numbers, expiration dates, and internal verification code affected payment processing systems.

Date Detected: 2016-01-01

Type: Malware Attack

Attack Vector: Malware

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach HYA550072525

Data Compromised: Payment card data

Payment Information Risk: High

Incident : Data Breach HYA456072525

Data Compromised: cardholder names, card numbers, expiration dates, internal verification codes

Payment Information Risk: True

Incident : Malware Attack HYA1348522

Data Compromised: Cardholder Names, Card Numbers, Expiration Dates, Internal Verification Code

Systems Affected: Payment Processing Systems

Payment Information Risk: True

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card data, payment card information and Payment Card Information.

Which entities were affected by each incident?

Incident : Data Breach HYA550072525

Entity Type: Corporation

Industry: Hospitality

Customers Affected: 15

Incident : Data Breach HYA456072525

Entity Type: Hospitality

Industry: Hospitality

Location: Washington

Customers Affected: 640

Incident : Malware Attack HYA1348522

Entity Type: Hotel Chain

Industry: Hospitality

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach HYA550072525

Type of Data Compromised: Payment card data

Number of Records Exposed: 15

Sensitivity of Data: High

Incident : Data Breach HYA456072525

Type of Data Compromised: payment card information

Number of Records Exposed: 640

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Incident : Malware Attack HYA1348522

Type of Data Compromised: Payment Card Information

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

References

Where can I find more information about each incident?

Incident : Data Breach HYA550072525

Source: Washington Office of the Attorney General

Date Accessed: 2016-01-14

Incident : Data Breach HYA456072525

Source: Washington State Office of the Attorney General

Date Accessed: 2017-10-12

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington Office of the Attorney GeneralDate Accessed: 2016-01-14, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2017-10-12.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Malware Attack HYA1348522

Customer Advisories: The hotel chain offered one yearโ€™s free protection to those affected by the breach

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was The hotel chain offered one yearโ€™s free protection to those affected by the breach.

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2016-01-14.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2016-01-14.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Payment card data, cardholder names, card numbers, expiration dates, internal verification codes, Cardholder Names, Card Numbers, Expiration Dates and Internal Verification Code.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Payment Processing Systems.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Payment card data, cardholder names, card numbers, expiration dates, internal verification codes, Cardholder Names, Card Numbers, Expiration Dates and Internal Verification Code.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 655.0.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are Washington Office of the Attorney General and Washington State Office of the Attorney General.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an The hotel chain offered one yearโ€™s free protection to those affected by the breach.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge