A new benchmark report from the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) and research firm IANS indicates a major shift in the priorities and concerns of cybersecurity leaders. According to the 2026 CISO Benchmark Report, Artificial Intelligence (AI) has become the number one source of friction and risk for CISOs in the retail and hospitality sectors, surpassing long-standing threats like ransomware. While organizations are embracing AI to enhance security capabilities, they are simultaneously struggling with the significant risks it introduces, primarily data leakage, insider threats, and a lack of mature governance frameworks. This dual nature of AI as both a tool and a threat is reshaping security strategy, budgets, and the role of the CISO.
While not a regulatory document itself, the report reflects the pressures CISOs face in a landscape shaped by evolving compliance and risk management expectations. The findings highlight a proactive shift as security leaders grapple with governing a transformative technology ahead of formal, widespread regulation.
Key concerns from the report that intersect with compliance include:
The report's findings are most relevant to organizations within the Retail and Hospitality industries. However, the trends identified are broadly applicable to any sector grappling with the rapid adoption of AI. The survey included over 200 CISOs, representing a significant cross-section of these consumer-facing industries.
While explicit "AI compliance" laws are still emerging, CISOs must adapt existing frameworks to govern AI use. The report implies a need for organizations to develop and implement a robust AI governance program that includes:
The report suggests an immediate and ongoing need for action. Unlike a regulation with a fixed deadline, the risks from AI are present now. Organizations should prioritize the following:
The rapid, ungoverned adoption of AI has significant business and operational impacts:
Establish and enforce a clear Acceptable Use Policy for AI tools and train all employees on the risks of entering sensitive data into public models.
Implement Data Loss Prevention (DLP) policies to detect and block the submission of classified or sensitive information to public AI websites.
Mapped D3FEND Techniques:
Ensure strong data classification and protection controls are in place, so sensitive data is encrypted at rest and in transit.
Mapped D3FEND Techniques:
To address the primary AI risk of data leakage, organizations in retail and hospitality must deploy Data Loss Prevention (DLP) solutions capable of monitoring and controlling data sent to public AI services. Configure DLP policies to identify and block the submission of sensitive data patterns, such as customer PII, credit card numbers (PCI data), and internal financial reports, to websites like ChatGPT, Gemini, and others. This involves analyzing HTTP POST requests for content that matches these sensitive data classifiers. By creating a technical control that prevents sensitive data from leaving the corporate environment for AI processing, companies can mitigate the risk of intellectual property loss and regulatory fines for data privacy violations.
To manage the governance gap, CISOs must rapidly develop and promulgate a clear and concise AI Acceptable Use Policy (AUP). This policy should explicitly state what is and is not permissible. For example, it should prohibit the use of any customer, employee, or confidential corporate data with public, third-party generative AI tools. The AUP should also provide guidance on approved, sanctioned AI tools (if any) and the process for requesting a review of a new tool. This policy must be communicated to all employees and integrated into regular security awareness training. A strong AUP provides the foundation for both administrative and technical controls and clarifies employee responsibilities in the age of AI.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats