
Marriott International Company Cyber Security Posture
marriott.comMarriott International, Inc. is based in Bethesda, Maryland, USA, and encompasses a portfolio of approximately 9,000 properties across more than 30 leading brands in 141 countries and territories. Its heritage can be traced to a root beer stand opened in Washington, D.C., in 1927 by J. Willard and Alice S. Marriott. Marriott International is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. Marriott International does not discriminate on the basis of disability, veteran status or any other basis protected under federal, state or local laws. Community Guidelines:ย We reserve the right to remove without any notice content that we determine in our sole discretion is offensive or illegal, contains personally identifiable information, trademarks or copyrights belonging to a third party, advertises a third partyโs products or services, or is otherwise inappropriate. Application Tips:ย We encourage job seekers to protect themselves from email and recruiting scams. Please note: 1) We do not accept applications via email or fax; 2) We never ask for money as part of the application process; 3) We only contact job applicants from approved email domains. Please find more information about Marriott Internationalโs job application process and approved email address domainsย here: http://www.careers.marriott.com/tips-for-applying/
Marriott International Company Details
marriott-international
218361 employees
2813520.0
721
Hospitality
marriott.com
373
MAR_8090579
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Marriott International Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Marriott International Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Marriott Hotels | Breach | 100 | 5 | 07/2022 | MAR1318722 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: A third attack against the hotel chain, Marriott, has resulted in yet another data breach. This is the second time this year that data has been stolen from the hotel firm. An employee at the BWI Airport Marriott in Baltimore stated that about 20GB of data, including credit card numbers and PII of visitors and employees, had been stolen. The hacking organisation requested a ransom from Marriott to keep the data they had obtained from being released, but the money was not paid. | |||||||
Marriott International | Breach | 80 | 4 | 06/2022 | MAR13023722 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Hotel giant Marriott International suffered a data breach after an unknown threat actor breached one of its properties and stole 20GB of files. The hackers stole 20GB worth of documents containing non-sensitive internal business files and some credit card information. Marriott hired a third-party security firm to investigate the incident and notified the affected individuals. | |||||||
Marriott International | Data Leak | 60 | 3 | 09/2019 | MAR81730423 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Hotel giant Marriott International suffered a data breach after an unknown person gained access to information about certain Marriott associates by accessing the network of an outside vendor formerly used by Marriott. Marriott immediately confirmed that the vendor was taking appropriate to steps to investigate the incident. The vendor reported that it was working with a forensic firm and had notified law enforcement. This incident did not impact the security of Marriottโs internal HR systems or platforms. The information in the document received by this vendor that contains your information includes your name, address, and Social Security number. Marriott hired a third-party security firm to investigate the incident and notified the affected individuals. |
Marriott International Company Subsidiaries

Marriott International, Inc. is based in Bethesda, Maryland, USA, and encompasses a portfolio of approximately 9,000 properties across more than 30 leading brands in 141 countries and territories. Its heritage can be traced to a root beer stand opened in Washington, D.C., in 1927 by J. Willard and Alice S. Marriott. Marriott International is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. Marriott International does not discriminate on the basis of disability, veteran status or any other basis protected under federal, state or local laws. Community Guidelines:ย We reserve the right to remove without any notice content that we determine in our sole discretion is offensive or illegal, contains personally identifiable information, trademarks or copyrights belonging to a third party, advertises a third partyโs products or services, or is otherwise inappropriate. Application Tips:ย We encourage job seekers to protect themselves from email and recruiting scams. Please note: 1) We do not accept applications via email or fax; 2) We never ask for money as part of the application process; 3) We only contact job applicants from approved email domains. Please find more information about Marriott Internationalโs job application process and approved email address domainsย here: http://www.careers.marriott.com/tips-for-applying/
Access Data Using Our API

Get company history
.png)
Marriott International Cyber Security News
Marriott wins US appeals order striking down data breach class action
The proposed class action accused Marriott of violating consumer protection and other laws by failing to provide adequate data protectionย ...
FTC settles yearslong investigation into Marriottโs โsecurity failuresโ
The federal agency alleges Marriott and Starwood failed to implement appropriate password controls, access controls, firewall controls orย ...
4th Circ. Again Decertifies Marriott Data Breach Classes
The Fourth Circuit on Tuesday once again scrapped class certification of potentially millions of Marriott International Inc. guests inย ...
Marriott Gets $52 Million Slap On Wrist For Breaches Due To โLax Securityโ
Marriott has agreed to pay $52 million in a settlement with the FTC for its failure to keep customers' data safe. getty. M arriott continues toย ...
Marriott wins US appeals order striking down data breach class action
Hotel giant Marriott MAR has persuaded a U.S. appeals court to reverse a ruling that allowed tens of millions of guests to sue together as aย ...
Data Privacy Breaches: A Wake-Up Call for Hotel Operators
Practical Steps to Protect Your Hotel ยท Conduct a Data Audit: Map out where guest data is collected, stored, and shared. ยท Vet Third-Partyย ...
Marriott will pay $52M, improve cybersecurity to settle multiple data breaches
The settlements resolve a case with 49 states and come with an FTC directive to implement a โrobust information security program.โ
Marriott required to pay $52 million, beef up information security in wake of data breaches
Marriott also agreed on Wednesday to pay $52 million to 49 states and the District of Columbia to resolve similar allegations. The FTC did notย ...
Marriott agrees to pay $52 million settlement, improve data security practices
Marriott agrees to pay $52 million settlement, improve data security practices. The actions will settle investigations into security failuresย ...

Marriott International Similar Companies

Steigenberger Hotels and Resorts
Pure luxury and hospitality at its best - thatโรรดs what our about 60 Steigenberger Hotels & Resorts stand for in their fascinating locations around the globe. Immerse yourself in an exclusive cosmos full of character, glamour, and elegance. From historic and traditional establishments to vibrant cit

Resorts World Sentosa
ABOUT RESORTS WORLD SENTOSA Resorts World Sentosa (RWS), Asiaโรรดs premium lifestyle destination resort, is located on Singaporeโรรดs resort island of Sentosa. Spanning 49 hectares, RWS is home to world-class attractions including Universal Studios Singapore, S.E.A. Aquarium, Dolphin Island and Adven

Minor Hotels Europe and Americas
Minor Hotels is a global hospitality leader with a network of more than 560 hotels across six continents. We drive growth through eight diverse hotel brands and a portfolio of related hospitality businesses. Perpetually driven by an entrepreneurial spirit, we create better brands, businesses and p

Hyatt
Hyatt is guided by its purpose: to care for people so they can be their best. Hyattโs portfolio includes 1,000+ hotel and all-inclusive properties in over 75 countries across 6 continents. Hyattโs offerings include brands in the Timeless Collection, including Park Hyattยฎ, Grand Hyattยฎ, Hyatt Regency

Taj Hotels
Established in 1903, Taj is The Indian Hotels Company Limitedโs (IHCL) iconic brand for the worldโs most discerning travellers seeking luxury and authentic experiences. Taj has been rated as Indiaโs Strongest Brand across all sectors for an unprecedented fourth time and also as the Worldโs Strongest

Jin Jiang International Hotel Group
Jin Jiang International Hotel group is the largest hotel owner and operator of 460 hotels and 80,000 rooms across China. The breadth of portfolio range from budget, economy to upscale and heritage hotels. Jin Jiang International Hotel Group is a business unit of Jin Jiang International, one of Ch

Frequently Asked Questions (FAQ) on Cybersecurity Incidents
Marriott International CyberSecurity History Information
Total Incidents: According to Rankiteo, Marriott International has faced 3 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include ['Data Leak', 'Breach'].
Total Financial Loss: The total financial loss from these incidents is estimated to be {total_financial_loss}.
Cybersecurity Posture: The company's overall cybersecurity posture is described as Marriott International, Inc. is based in Bethesda, Maryland, USA, and encompasses a portfolio of approximately 9,000 properties across more than 30 leading brands in 141 countries and territories. Its heritage can be traced to a root beer stand opened in Washington, D.C., in 1927 by J. Willard and Alice S. Marriott. Marriott International is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. Marriott International does not discriminate on the basis of disability, veteran status or any other basis protected under federal, state or local laws. Community Guidelines:ย We reserve the right to remove without any notice content that we determine in our sole discretion is offensive or illegal, contains personally identifiable information, trademarks or copyrights belonging to a third party, advertises a third partyโs products or services, or is otherwise inappropriate. Application Tips:ย We encourage job seekers to protect themselves from email and recruiting scams. Please note: 1) We do not accept applications via email or fax; 2) We never ask for money as part of the application process; 3) We only contact job applicants from approved email domains. Please find more information about Marriott Internationalโs job application process and approved email address domainsย here: http://www.careers.marriott.com/tips-for-applying/.
Detection and Response: The company detects and responds to cybersecurity incidents through {description_of_detection_and_response_process}.
Incident Details

Incident 1: Ransomware Attack
Title: {Incident_Title}
Description: {Brief_description_of_the_incident}
Date Detected: {Detection_Date}
Date Publicly Disclosed: {Disclosure_Date}
Date Resolved: {Resolution_Date}
Type: {Type_of_Attack}
Attack Vector: {Attack_Vector}
Vulnerability Exploited: {Vulnerability}
Threat Actor: {Threat_Actor}
Motivation: {Motivation}

Incident 2: Data Breach
Title: {Incident_Title}
Description: {Brief_description_of_the_incident}
Date Detected: {Detection_Date}
Date Publicly Disclosed: {Disclosure_Date}
Date Resolved: {Resolution_Date}
Type: {Type_of_Attack}
Attack Vector: {Attack_Vector}
Vulnerability Exploited: {Vulnerability}
Threat Actor: {Threat_Actor}
Motivation: {Motivation}
Common Attack Types: The most common types of attacks the company has faced are ['Breach'].
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through {description_of_identification_process}.
Impact of the Incidents

Incident 1: Ransomware Attack
Financial Loss: {Financial_Loss}
Data Compromised: {Data_Compromised}
Systems Affected: {Systems_Affected}
Downtime: {Downtime}
Operational Impact: {Operational_Impact}
Conversion Rate Impact: {Conversion_Rate_Impact}
Revenue Loss: {Revenue_Loss}
Customer Complaints: {Customer_Complaints}
Brand Reputation Impact: {Brand_Reputation_Impact}
Legal Liabilities: {Legal_Liabilities}
Identity Theft Risk: {Identity_Theft_Risk}
Payment Information Risk: {Payment_Information_Risk}

Incident 2: Data Breach
Financial Loss: {Financial_Loss}
Data Compromised: {Data_Compromised}
Systems Affected: {Systems_Affected}
Downtime: {Downtime}
Operational Impact: {Operational_Impact}
Conversion Rate Impact: {Conversion_Rate_Impact}
Revenue Loss: {Revenue_Loss}
Customer Complaints: {Customer_Complaints}
Brand Reputation Impact: {Brand_Reputation_Impact}
Legal Liabilities: {Legal_Liabilities}
Identity Theft Risk: {Identity_Theft_Risk}
Payment Information Risk: {Payment_Information_Risk}
Average Financial Loss: The average financial loss per incident is {average_financial_loss}.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are {list_of_commonly_compromised_data_types}.

Incident 1: Ransomware Attack
Entity Name: {Entity_Name}
Entity Type: {Entity_Type}
Industry: {Industry}
Location: {Location}
Size: {Size}
Customers Affected: {Customers_Affected}

Incident 2: Data Breach
Entity Name: {Entity_Name}
Entity Type: {Entity_Type}
Industry: {Industry}
Location: {Location}
Size: {Size}
Customers Affected: {Customers_Affected}
Response to the Incidents

Incident 1: Ransomware Attack
Incident Response Plan Activated: {Yes/No}
Third Party Assistance: {Yes/No}
Law Enforcement Notified: {Yes/No}
Containment Measures: {Containment_Measures}
Remediation Measures: {Remediation_Measures}
Recovery Measures: {Recovery_Measures}
Communication Strategy: {Communication_Strategy}
Adaptive Behavioral WAF: {Adaptive_Behavioral_WAF}
On-Demand Scrubbing Services: {On_Demand_Scrubbing_Services}
Network Segmentation: {Network_Segmentation}
Enhanced Monitoring: {Enhanced_Monitoring}

Incident 2: Data Breach
Incident Response Plan Activated: {Yes/No}
Third Party Assistance: {Yes/No}
Law Enforcement Notified: {Yes/No}
Containment Measures: {Containment_Measures}
Remediation Measures: {Remediation_Measures}
Recovery Measures: {Recovery_Measures}
Communication Strategy: {Communication_Strategy}
Adaptive Behavioral WAF: {Adaptive_Behavioral_WAF}
On-Demand Scrubbing Services: {On_Demand_Scrubbing_Services}
Network Segmentation: {Network_Segmentation}
Enhanced Monitoring: {Enhanced_Monitoring}
Incident Response Plan: The company's incident response plan is described as {description_of_incident_response_plan}.
Third-Party Assistance: The company involves third-party assistance in incident response through {description_of_third_party_involvement}.
Data Breach Information

Incident 2: Data Breach
Type of Data Compromised: {Type_of_Data}
Number of Records Exposed: {Number_of_Records}
Sensitivity of Data: {Sensitivity_of_Data}
Data Exfiltration: {Yes/No}
Data Encryption: {Yes/No}
File Types Exposed: {File_Types}
Personally Identifiable Information: {Yes/No}
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: {description_of_prevention_measures}.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through {description_of_handling_process}.
Ransomware Information

Incident 1: Ransomware Attack
Ransom Demanded: {Ransom_Amount}
Ransom Paid: {Ransom_Paid}
Ransomware Strain: {Ransomware_Strain}
Data Encryption: {Yes/No}
Data Exfiltration: {Yes/No}
Ransom Payment Policy: The company's policy on paying ransoms in ransomware incidents is described as {description_of_ransom_payment_policy}.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through {description_of_data_recovery_process}.
Regulatory Compliance

Incident 1: Ransomware Attack
Regulations Violated: {Regulations_Violated}
Fines Imposed: {Fines_Imposed}
Legal Actions: {Legal_Actions}
Regulatory Notifications: {Regulatory_Notifications}

Incident 2: Data Breach
Regulations Violated: {Regulations_Violated}
Fines Imposed: {Fines_Imposed}
Legal Actions: {Legal_Actions}
Regulatory Notifications: {Regulatory_Notifications}
Regulatory Frameworks: The company complies with the following regulatory frameworks regarding cybersecurity: {list_of_regulatory_frameworks}.
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through {description_of_compliance_measures}.
Lessons Learned and Recommendations

Incident 1: Ransomware Attack
Lessons Learned: {Lessons_Learned}

Incident 2: Data Breach
Lessons Learned: {Lessons_Learned}

Incident 1: Ransomware Attack
Recommendations: {Recommendations}

Incident 2: Data Breach
Recommendations: {Recommendations}
Key Lessons Learned: The key lessons learned from past incidents are {list_of_key_lessons_learned}.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: {list_of_implemented_recommendations}.
References
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at {list_of_additional_resources}.
Investigation Status

Incident 1: Ransomware Attack
Investigation Status: {Investigation_Status}

Incident 2: Data Breach
Investigation Status: {Investigation_Status}
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through {description_of_communication_process}.
Stakeholder and Customer Advisories

Incident 1: Ransomware Attack
Stakeholder Advisories: {Stakeholder_Advisories}
Customer Advisories: {Customer_Advisories}

Incident 2: Data Breach
Stakeholder Advisories: {Stakeholder_Advisories}
Customer Advisories: {Customer_Advisories}
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: {description_of_advisories_provided}.
Initial Access Broker

Incident 1: Ransomware Attack
Entry Point: {Entry_Point}
Reconnaissance Period: {Reconnaissance_Period}
Backdoors Established: {Backdoors_Established}
High Value Targets: {High_Value_Targets}
Data Sold on Dark Web: {Yes/No}

Incident 2: Data Breach
Entry Point: {Entry_Point}
Reconnaissance Period: {Reconnaissance_Period}
Backdoors Established: {Backdoors_Established}
High Value Targets: {High_Value_Targets}
Data Sold on Dark Web: {Yes/No}
Monitoring and Mitigation of Initial Access Brokers: The company monitors and mitigates the activities of initial access brokers through {description_of_monitoring_and_mitigation_measures}.
Post-Incident Analysis

Incident 1: Ransomware Attack
Root Causes: {Root_Causes}
Corrective Actions: {Corrective_Actions}

Incident 2: Data Breach
Root Causes: {Root_Causes}
Corrective Actions: {Corrective_Actions}
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as {description_of_post_incident_analysis_process}.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: {list_of_corrective_actions_taken}.
Additional Questions
General Information
Ransom Payment History: The company has {paid/not_paid} ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was {last_ransom_amount}.
Last Attacking Group: The attacking group in the last incident was {last_attacking_group}.
Incident Details
Most Recent Incident Detected: The most recent incident detected was on {most_recent_incident_detected_date}.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on {most_recent_incident_publicly_disclosed_date}.
Most Recent Incident Resolved: The most recent incident resolved was on {most_recent_incident_resolved_date}.
Impact of the Incidents
Highest Financial Loss: The highest financial loss from an incident was {highest_financial_loss}.
Most Significant Data Compromised: The most significant data compromised in an incident was {most_significant_data_compromised}.
Most Significant System Affected: The most significant system affected in an incident was {most_significant_system_affected}.
Response to the Incidents
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was {third_party_assistance_in_most_recent_incident}.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were {containment_measures_in_most_recent_incident}.
Data Breach Information
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was {most_sensitive_data_compromised}.
Number of Records Exposed: The number of records exposed in the most significant breach was {number_of_records_exposed}.
Ransomware Information
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was {highest_ransom_demanded}.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was {highest_ransom_paid}.
Regulatory Compliance
Highest Fine Imposed: The highest fine imposed for a regulatory violation was {highest_fine_imposed}.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was {most_significant_legal_action}.
Lessons Learned and Recommendations
Most Significant Lesson Learned: The most significant lesson learned from past incidents was {most_significant_lesson_learned}.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was {most_significant_recommendation_implemented}.
References
Most Recent Source: The most recent source of information about an incident is {most_recent_source}.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is {most_recent_url}.
Investigation Status
Current Status of Most Recent Investigation: The current status of the most recent investigation is {current_status_of_most_recent_investigation}.
Stakeholder and Customer Advisories
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was {most_recent_stakeholder_advisory}.
Most Recent Customer Advisory: The most recent customer advisory issued was {most_recent_customer_advisory}.
Initial Access Broker
Most Recent Entry Point: The most recent entry point used by an initial access broker was {most_recent_entry_point}.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was {most_recent_reconnaissance_period}.
Post-Incident Analysis
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was {most_significant_root_cause}.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was {most_significant_corrective_action}.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
