JW Marriott Company Cyber Security Posture

jwmarriott.com

No loud pretense. No excess formalities. Just understated elegance youโ€™ll feel the moment you walk into one of over 80 worldwide destinations. JW Marriott is part of Marriott Internationalโ€™s luxury portfolio and consists of beautiful properties in gateway cities and distinctive resort locations in 28 countries around the world. These elegant hotels cater to todayโ€™s sophisticated, self-assured travelers, offering them the quiet luxury they seek in a warmly authentic, relaxed atmosphere lacking in pretense. JW Marriott properties artfully provide highly crafted, anticipatory experiences that are reflective of their locale so that their guests have the time to focus on what is most important to them.

JW Marriott Company Details

Linkedin ID:

jw_marriott

Employees number:

15169 employees

Number of followers:

270347.0

NAICS:

721

Industry Type:

Hospitality

Homepage:

jwmarriott.com

IP Addresses:

Scan still pending

Company ID:

JW _2903603

Scan Status:

In-progress

AI scoreJW Marriott Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreJW Marriott Global Score
blurone
Ailogo

JW Marriott Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

JW Marriott Company Cyber Security News & History

Past Incidents
4
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
Marriott HotelsBreach100507/2022MAR1318722Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: A third attack against the hotel chain, Marriott, has resulted in yet another data breach. This is the second time this year that data has been stolen from the hotel firm. An employee at the BWI Airport Marriott in Baltimore stated that about 20GB of data, including credit card numbers and PII of visitors and employees, had been stolen. The hacking organisation requested a ransom from Marriott to keep the data they had obtained from being released, but the money was not paid.

Marriott InternationalBreach80406/2022MAR13023722Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Hotel giant Marriott International suffered a data breach after an unknown threat actor breached one of its properties and stole 20GB of files. The hackers stole 20GB worth of documents containing non-sensitive internal business files and some credit card information. Marriott hired a third-party security firm to investigate the incident and notified the affected individuals.

Marriott International, Inc.Breach6039/2019MAR327072925Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The California Office of the Attorney General reported on October 30, 2019, that Marriott International, Inc. experienced a data breach involving 1,552 California residents. The breach was caused by unauthorized access to information about certain associates through a vendor's network, compromising personal data including names, addresses, and Social Security numbers. Marriott has terminated its relationship with the vendor and is offering credit monitoring services.

Marriott InternationalData Leak60309/2019MAR81730423Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Hotel giant Marriott International suffered a data breach after an unknown person gained access to information about certain Marriott associates by accessing the network of an outside vendor formerly used by Marriott. Marriott immediately confirmed that the vendor was taking appropriate to steps to investigate the incident. The vendor reported that it was working with a forensic firm and had notified law enforcement. This incident did not impact the security of Marriottโ€™s internal HR systems or platforms. The information in the document received by this vendor that contains your information includes your name, address, and Social Security number. Marriott hired a third-party security firm to investigate the incident and notified the affected individuals.

JW Marriott Company Subsidiaries

SubsidiaryImage

No loud pretense. No excess formalities. Just understated elegance youโ€™ll feel the moment you walk into one of over 80 worldwide destinations. JW Marriott is part of Marriott Internationalโ€™s luxury portfolio and consists of beautiful properties in gateway cities and distinctive resort locations in 28 countries around the world. These elegant hotels cater to todayโ€™s sophisticated, self-assured travelers, offering them the quiet luxury they seek in a warmly authentic, relaxed atmosphere lacking in pretense. JW Marriott properties artfully provide highly crafted, anticipatory experiences that are reflective of their locale so that their guests have the time to focus on what is most important to them.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=jw_marriott' -H 'apikey: YOUR_API_KEY_HERE'
newsone

JW Marriott Cyber Security News

2024-10-10T07:00:00.000Z
FTC settles yearslong investigation into Marriottโ€™s โ€˜security failuresโ€™

The federal agency alleges Marriott and Starwood failed to implement appropriate password controls, access controls, firewall controls orย ...

2024-10-09T07:00:00.000Z
US FTC says Marriott will boost security to settle data breach charges

The U.S. Federal Trade Commission said on Wednesday it will require Marriott International and its subsidiary Starwood Hotels & Resortsย ...

2024-10-10T07:00:00.000Z
Marriott Gets $52 Million Slap On Wrist For Breaches Due To โ€˜Lax Securityโ€™

Marriott has agreed to pay $52 million in a settlement with the FTC for its failure to keep customers' data safe. getty. M arriott continues toย ...

2024-10-10T07:00:00.000Z
Marriott will pay $52M, improve cybersecurity to settle multiple data breaches

The FTC complaint alleges Marriott failed to do multiple things, including implementing appropriate password control, patching outdated softwareย ...

2024-10-29T07:00:00.000Z
Ambassador Kathleen Kavalec at Bucharest Cybersecurity Conference 2024

Ambassador Kathleen Kavalec delivers remarks at the Bucharest Cybersecurity Conference in Bucharest, Romania.

2024-12-23T08:00:00.000Z
Marriott and Starwood hotels will have to get better at data security

The FTC announced its charges in October, accusing the companies of having โ€œdeceived consumersโ€ with false claims of โ€œreasonable and appropriateย ...

2024-10-11T07:00:00.000Z
Marriott & Starwood Face $52M Settlement After Security Breaches

Marriott and its subsidiary Starwood Hotels have agreed to pay $52 million in fines and create a revamped information security program,ย ...

2023-09-01T07:00:00.000Z
What a Cybersecurity Internship at Marriott Really Looks Like

Marriott's slogan, โ€œPeople First,โ€ is a new perspective that you don't see in many businesses. I wanted to be part of a company that cares aboutย ...

2024-10-08T02:54:12.000Z
Marriott International discloses its second security incident affecting 5.2 million guests

A security breach has exposed the personal information of more than 5 million guests that found comfort at the Marriott Bonvoy Hotel, according to anย ...

similarCompanies

JW Marriott Similar Companies

Scandic Hotels

Scandic is the largest hotel company in the Nordic countries with a network of about 280 hotels with 58,000 rooms in operation and under development, in more than 130 destinations. The company is the leader when it comes to integrating sustainability in all operations and its award-winning Design

Caesars Entertainment

Caesars Entertainment, Inc. is the largest casino-entertainment Company in the U.S. and one of the world's most diversified casino-entertainment providers. Since its beginning in Reno, NV, in 1937, Caesars Entertainment, Inc. has grown through development of new resorts, expansions and acquisitions.

Mandarin Oriental

Mandarin Oriental Hotel Group is the award-winning owner and operator of some of the worldโ€™s most luxurious hotels, resorts and residences. Having grown from its Asian roots into a global brand, the Group now operates 41 hotels, 12 residences and 23 exclusive homes in 26 countries and territories, w

Hilton Hotels & Resorts

As the most recognized hospitality brand in the industry, guests around the globe rely on us as a trusted place for their stay. With 600+ hotels located in the worldโ€™s mostย exciting destinations, we are the place where people gather to experience exceptional hospitality,ย inspiring design, and energi

Club Med

Since it was founded in 1950 and it created the all-inclusive vacation concept, Club Med has been the world leader on its market, and has developed a resolutely upscale, friendly and multicultural spirit. Club Med boasts 70 resorts located in the most beautiful sites in the world, a cruise ship and

Two Roads Hospitality

Founded in 2016, Two Roads Hotels is an international lifestyle hotel company that manages and operates the Alila Hotels & Resorts, Destination Hotels, Joie de Vivre Hotels, Thompson Hotels, and tommie Hotels brands. At Two Roads, we create extraordinary experiences for those unafraid to break f

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

JW Marriott CyberSecurity History Information

How many cyber incidents has JW Marriott faced?

Total Incidents: According to Rankiteo, JW Marriott has faced 4 incidents in the past.

What types of cybersecurity incidents have occurred at JW Marriott?

Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak and Breach.

How does JW Marriott detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Terminated relationship with the vendor, Offering credit monitoring services and third party assistance with Forensic firm and law enforcement notified with Yes and communication strategy with Affected individuals notified and third party assistance with Hired a third-party security firm to investigate the incident and communication strategy with Notified the affected individuals.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Marriott International Data Breach

Description: Unauthorized access to information about certain associates through a vendor's network, compromising personal data including names, addresses, and Social Security numbers.

Date Publicly Disclosed: 2019-10-30

Type: Data Breach

Attack Vector: Unauthorized Access

Incident : Data Breach

Title: Marriott International Data Breach

Description: Hotel giant Marriott International suffered a data breach after an unknown person gained access to information about certain Marriott associates by accessing the network of an outside vendor formerly used by Marriott.

Type: Data Breach

Attack Vector: Access to vendor network

Threat Actor: Unknown

Incident : Data Breach

Title: Marriott International Data Breach

Description: Hotel giant Marriott International suffered a data breach after an unknown threat actor breached one of its properties and stole 20GB of files.

Type: Data Breach

Threat Actor: Unknown

Incident : Data Breach

Title: Data Breach at Marriott Hotel Chain

Description: A third attack against the hotel chain, Marriott, has resulted in yet another data breach. This is the second time this year that data has been stolen from the hotel firm. An employee at the BWI Airport Marriott in Baltimore stated that about 20GB of data, including credit card numbers and PII of visitors and employees, had been stolen. The hacking organisation requested a ransom from Marriott to keep the data they had obtained from being released, but the money was not paid.

Type: Data Breach

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Vendor network.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach MAR327072925

Data Compromised: Names, Addresses, Social Security numbers

Incident : Data Breach MAR81730423

Data Compromised: Name, Address, Social Security number

Incident : Data Breach MAR13023722

Data Compromised: Internal business files, Credit card information

Incident : Data Breach MAR1318722

Data Compromised: Credit Card Numbers, PII

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security numbers, Personally Identifiable Information, Internal business files, Credit card information, Credit Card Numbers and PII.

Which entities were affected by each incident?

Incident : Data Breach MAR327072925

Entity Type: Corporation

Industry: Hospitality

Customers Affected: 1552

Incident : Data Breach MAR81730423

Entity Type: Company

Industry: Hospitality

Incident : Data Breach MAR13023722

Entity Type: Hotel

Industry: Hospitality

Incident : Data Breach MAR1318722

Entity Type: Hotel Chain

Industry: Hospitality

Location: Baltimore

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach MAR327072925

Remediation Measures: Terminated relationship with the vendor, Offering credit monitoring services

Incident : Data Breach MAR81730423

Third Party Assistance: Forensic firm

Law Enforcement Notified: Yes

Communication Strategy: Affected individuals notified

Incident : Data Breach MAR13023722

Third Party Assistance: Hired a third-party security firm to investigate the incident

Communication Strategy: Notified the affected individuals

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Forensic firm, Hired a third-party security firm to investigate the incident.

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach MAR327072925

Type of Data Compromised: Names, Addresses, Social Security numbers

Number of Records Exposed: 1552

Sensitivity of Data: High

Personally Identifiable Information: True

Incident : Data Breach MAR81730423

Type of Data Compromised: Personally Identifiable Information

Sensitivity of Data: High

Personally Identifiable Information: Name, Address, Social Security number

Incident : Data Breach MAR13023722

Type of Data Compromised: Internal business files, Credit card information

Data Exfiltration: 20GB of files

Incident : Data Breach MAR1318722

Type of Data Compromised: Credit Card Numbers, PII

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Terminated relationship with the vendor, Offering credit monitoring services.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Data Breach MAR1318722

Ransom Demanded: True

Data Exfiltration: True

References

Where can I find more information about each incident?

Incident : Data Breach MAR327072925

Source: California Office of the Attorney General

Date Accessed: 2019-10-30

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2019-10-30.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach MAR81730423

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through were Affected individuals notified and Notified the affected individuals.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach MAR81730423

Entry Point: Vendor network

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Forensic firm, Hired a third-party security firm to investigate the incident.

Additional Questions

General Information

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Unknown and Unknown.

Incident Details

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-10-30.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security numbers, Name, Address, Social Security number, Internal business files, Credit card information, Credit Card Numbers and PII.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Forensic firm, Hired a third-party security firm to investigate the incident.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Addresses, Social Security numbers, Name, Address, Social Security number, Internal business files, Credit card information, Credit Card Numbers and PII.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 157.0.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was True.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Vendor network.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge