Use cases

How consumer sector companies tackling cybersecurity challenges

Credit: Bert van Dijk/Getty images.

Powered by

AB InBev is brewing up cybersecurity tools as well as beer

Belgian beer brewers Anheuser-Busch InBev SA have been at the forefront of the beverages market in developing cybersecurity tools. Following a rise in cyberattacks seen across the industry, AB InBev opened a cybersecurity unit at its base in Israel to analyze threats and potential attacks on the company. Increased digitalization of operations was cited alongside rising industry attacks as the need for the hub.   

In 2020 it developed an AI-powered technology called ‘BrewRight’ to detect corruption and fraudulent activities within its organization and among its business partners. The platform runs with the support of Microsoft Azure cloud and a Salesforce interface. This analytics platform enables swift tracking and identification of compliance risks associated with expansive supply chain networks.  

In March 2023, Anheuser-Busch InBev SA implemented a new digital tool, dubbed Lighthouse, aimed at assisting top-level executives in comprehending the multitude of cybersecurity and privacy risks confronting the company globally. This platform facilitates collaboration between AB InBev’s technology and legal departments to effectively address cybersecurity threats and privacy concerns that may have previously gone unnoticed.  

Recognizing that top executives often possess access to and responsibility for critical private data, AB InBev prioritized ensuring their thorough awareness of potential risks. Moreover, the dashboard serves as a mechanism for analysts to translate technical subjects into easily understandable insights for executives and board members.  

As well as developing its own tools, AB InBev also has partnerships with cybersecurity firms like Orange Business to offer connectivity services and support further developments AB InBev is making in the cybersecurity tools.   

Arby’s faces a class action lawsuit after a data breach in 2024

In March 2024, a data breach affecting an Arby’s franchise run by DRM resulted in the personal information of many employees being accessed. The impact on the business has been profound.  

Arby’s is a US-based foodservice franchise that sells various fast food products. It is owned by the multi-brand restaurant company Inspire Brands, which owns other restaurant franchises including Baskin-Robbins, Dunkin, and Buffalo Wild Wings. Arby’s has over 3,500 branches and employs more than 22,000 people, and DRM runs 121 Arby’s franchises across the US.  

The Cactus Ransomware group targeted DRM Arby’s on March 12, 2024, with current and former employees’ names, social security numbers, driver’s license numbers, passport numbers, and health data being accessed without authorization. Despite the severity of this data breach, DRM took more than a month to alert affected individuals.   

As a result of this breach, the DRM Arby’s franchise is facing a proposed class action lawsuit. This lawsuit claims that DRM failed to properly train its staff and set up the proper cybersecurity systems and that the attack by Cactus Ransomware was “foreseeable”. It also alleges that DRM’s delay in notifying employees whose data had been accessed increased their vulnerability to identity fraud.   

This data breach and the company’s response have seriously impacted DRM Arby’s reputation, and the proposed class action lawsuit could result in serious financial damage. DRM Arby’s has not yet publicly responded to the data breach with any new cybersecurity announcements. 

Avery Dennison partners with Abnormal to automate email investigation

Avery Dennison has faced significant challenges in maintaining email security, with over 36,000 employees operating in more than 50 countries. Its security team needs to prevent advanced attacks and minimize mail flow interruptions to protect intellectual property and ensure uninterrupted production. However, Google Workspace’s built-in security struggled to detect phishing messages from compromised vendor accounts, making investigation and remediation time-consuming for the small security team.  

Jeremy Smith, VP and Information Security Officer, said “Our vendors were being compromised and sending us phishing messages. Overall, Google does a decent job of hygiene, but they didn’t have much context about past messages to detect these external threats.”  

In September 2023, Avery Dennison turned to Abnormal for an automated, API-based email security solution. It cited a quick setup and efficient performance during the proof of value phase as some of the key reasons for the collaboration.  

The company used Abnormal’s system to analyze past email logs and quickly identify compromised vendors by integrating Abnormal with Google Workspace. Furthermore, Abnormal’s automation capabilities significantly reduced the manual work required for investigations and remediation. The platform included an integrated phishing reporting button in Gmail inboxes, streamlining the process of blocking and managing malicious emails.  

Implementing Abnormal’s automated security solution strengthened Avery Dennison’s vendor relationships. In addition, its security team regained 40 hours per week, which they redirected towards strategic projects like improving security information and event management (SIEM) tuning and detection capabilities. This contributed towards Avery Dennison improving its overall risk posture, allowing it to focus on more critical areas of its security infrastructure.   

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData’s Thematic Intelligence uses proprietary data, research, and analysis to provide a forward-looking perspective on the key themes that will shape the future of the world’s largest industries and the organisations within them.

Go to article: Home | Cybersecurity in the age of AIGo to article: ContentsGo to article: BriefingGo to article: Foreword: Cybersecurity in the age of AI Go to article: Navigating the AI-driven cybersecurity landscapeGo to article: Key trends impacting cybersecurity Go to article: Timeline: a history of cybersecurity Go to article: Explainer: The most common types of cyberattacks Go to article: AI attacks now ‘the main cybersecurity concern’ for businesses across sectors Go to article: The state of cybersecurity: AI and geopolitics mean a bigger threat than ever Go to article: Companies’ own AI applications are ‘a huge cybersecurity problem’ Go to article: Regulators must protect the cybersecurity market from a private equity takeover Go to article: HealthcareGo to article: The impact of cybersecurity on healthcareGo to article: Case studies: cybersecurity in healthcare Go to article: Leading cybersecurity adopters and providers in healthcareGo to article: How healthcare cybercrime is predicted to escalate Go to article: Healthcare cybersecurity risk ‘higher than ever’ due to pandemicGo to article: Industry takes: Keeping healthcare businesses cybersecure Go to article: Rubrik’s Richard Cassidy on cyberattacks and resilience in healthcare organisationsGo to article: Cyberattacks on healthcare: Russia’s tool for mass disruption Go to article: Traceability technologies tighten supply chain fakery Go to article: Could brain-computer interfaces be hacked? Go to article: Deal activity related to cybersecurity in the pharma industry since 2021 Go to article: Deal activity related to cybersecurity in the medical industry since 2021 Go to article: EnergyGo to article: The impact of cybersecurity on the energy sector Go to article: Case studies: cybersecurity in energy Go to article: Leading cybersecurity adopters and providers in power Go to article: Cyberattacks on critical energy infrastructure ‘have increased dramatically’ Go to article: Report: Nuclear industry faces acute cybersecurity threats Go to article: The energy transition means increased attack surfaces for hackers Go to article: Deal activity related to cybersecurity in the power industry since 2021  Go to article: Cyber threat to oil and gas driven by geopolitics, extortion Go to article: How has cybersecurity changed since the Aramco hacks? Go to article: Deal activity related to cybersecurity in the oil and gas industry since 2021  Go to article: MiningGo to article: The impact of cybersecurity on miningGo to article: Case studies: cybersecurity in miningGo to article: Leading cybersecurity adopters and vendors in miningGo to article: Proactive approach to cybersecurity key for minesGo to article: ‘Operational disruption’ the main cybersecurity threat in miningGo to article: Why the mining sector should prioritise investment in cybersecurityGo to article: Will the Northern Sea Route become commercially viable in the near future?Go to article: Deal activity related to cybersecurity in the mining industry since 2021Go to article: DefenceGo to article: The impact of cybersecurity on defence Go to article: Case studies: cybersecurity in defence Go to article: Leading cybersecurity adopters and providers in defence Go to article: Latest news: Ukraine war dominant in cyber operationsGo to article: Sweden’s Nato accession: a cyberattack-filled saga Go to article: Germany recalls ambassador to Russia over cyberattacks Go to article: Why have cyberattacks in Poland spiked since Donald Tusk’s election? Go to article: How did China hack the UK Ministry of Defence? Go to article: Will IoT in defence continue to grow amid cybersecurity concerns? Go to article: AI Innovations wants to use semi-autonomous drones to save lives in Ukraine Go to article: Deal activity related to cybersecurity in the aerospace & defence industry since 2021  Go to article: Consumer GoodsGo to article: The impact of cybersecurity on the consumer goods sector Go to article: Case studies: cybersecurity in the consumer sector Go to article: Leading cybersecurity adopters and providers in consumer goodsGo to article: Latest news: Cybersecurity in packagingGo to article: Cybersecurity rising concern for packaging firms as digitalisation raises threat Go to article: Packaging companies must protect production lines from cyberattacks –analyst Go to article: Cybersecurity boost: Packaging learns from recent IT outages Go to article: Deal activity related to cybersecurity in the packaging industry since 2021  Go to article: Latest news: Cybersecurity in drinks Go to article: Drinks industry faces cybersecurity challenges from smart manufacturing Go to article: Brown-Forman chief talks cybersecurityGo to article: Modern supply chains open up cyber weak spotsGo to article: BankingGo to article: The impact of cybersecurity in banking and payments Go to article: Case studies: cybersecurity in banking Go to article: Leading cybersecurity adopters and providers in banking & payments Go to article: Latest news: cybersecurity in bankingGo to article: AI needed to tackle AI fraud – cybersecurity expert Go to article: What are the main cybersecurity trends of 2024? Go to article: What does the Economic Crime Act mean for foreign investors to the UK? Go to article: Regulators make crypto more attractive to institutions – NYU professor Go to article: Finance firms and ex-spies: strange bedfellows in a war-torn world Go to article: Monzo adds friction to fight fraud—but the features may not be popular with customers Go to article: Looking to stop payment fraud? Modernise your approach to bank validation Go to article: Governments must intervene on anti-fraud funding for real-time payments Go to article: Knowledge sharing puts finance sector among best for cybersecurity Go to article: Deal activity related to cybersecurity in the retail banking industry since 2021  Go to article: Sponsorship opportunitiesGo to article: GlobalData Thematic IntelligenceGo to article: Next issue