[go: up one dir, main page]

0% found this document useful (0 votes)
21 views10 pages

Module 2 Assignment

Uploaded by

Sapphire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views10 pages

Module 2 Assignment

Uploaded by

Sapphire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Agboola M’ Odufuwa

Nexford University

MHY6750: MODULE II - Analysing Digital Leadership Positions to Address Role in

Audits and Remediation in Marriot International HQ

Professor Felix Hernandez

June 18, 2025


INTERNAL MEMO MARRIOT INTERNATIONAL

To: Country Leadership Team (CLT) – Marriot Intl Global Office

From: Agboola Odufuwa, Director de Tech.

Date: June 18th, 2025

Subject: Marriot International HQ Digital Leadership Positions Analysis to Address Audit

Roles & Remediation

EXECUTIVE SUMMARY

Marriot International founded ahead of the internet era. in the 1920’s as a “Nine-seat beer

stand in the USA by J William and Alice Marriot (Marriott International, 2025) is considered

a Legacy organization. However the company has come full circle since then considering the

effects and experiences our organization- Marriot International has had and also surmounted

it is imperative we all become forward looking and thinking in our approach to ensuring data

compliance, safety and integrity. This in place and in mind will definitely ensure we do not

dole out millions of USD as in the Starwood Hotel acquisition case.

The increasing sophistication of cyber threats, instances and occurrence can no longer be

undermined, calling for a more intentional drive towards cyber compliance, protection and

watch.

In the wake of this complex threats to safety considering Marriot is a heavily digitalized

organization dealing with a wide and huge variety of personal data is thus the need to ensure

a solid CYNER SECURITY LEADERSHIP.

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

According to Von Solms & Van Niekerk, 2013; Tounsi & Rais, 2018, “Cybersecurity

leadership refers to the strategic and operational guidance provided by individuals or teams

responsible for protecting an organization’s digital assets and infrastructure. It involves

setting a clear vision for cybersecurity, aligning security initiatives with business objectives,

managing cyber risks, and fostering a culture of security awareness across all levels of the

organization. Effective cybersecurity leaders must possess a blend of technical expertise, risk

management acumen, and strong communication skills to influence stakeholders and drive

organizational resilience in the face of evolving cyber threats” (Von Solms & Van Niekerk,

2013; Tounsi & Rais, 2018).

BACKGROUND

After the acquisition of Starwood Hotels Marriot was exposed to a cyber-breach which had

been running from 2014 & 2020 until it was discovered – 4 years later – and was mandated to

pay a heavy fine of $52MILLION to the feds due to same, (Suzanne Rowan Kelleher, 2024).

This breach was said to have occurred due to outdated software, lack of multifactor

authentication, and poor networks structure. (Hoenig, 2025), in wake of the exposure of

highly confidential data of guests including DOB, Passport details, payment information etc.

at the time.

The global office as a result of this incidence was also mandated to upgrade and step up on

their cyber strengths thereby highlighting the importance of adequate cyber checks and

measure during acquisitions and mergers.

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

 CURRENT STRUCTURE OF MARRIOTS IT DEPARTMENT

Find below the present global organogram for Marriot

The Org. (n.d.). Marriott International organizational chart. The Org. https://theorg.com/org/marriott-international

MARRIOT INTERNATIONAL EXTENDED ORGANOGRAM

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

ORGANOGRAM SHOWING CYBER SECURITY AT THE GLOBAL LEVEL

 GAPS IN MARRIOT’S CYBER LEARDERSHIP ROLES

 Absence of CISO – CHIEF INFORMATION SECURITY OFFICER (CISO) –

While MARRIOT has Pinto Drew and Exec Vice President (EVP) Revenue and

IT, there appears to be only a few hands working at a global level protecting the

organization. (MARRIOTT INTERNATIONAL INC /MD/ 10-K Cybersecurity

GRC - 2025-02-11, 2025)

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

 Also there appears to be a lack of proper synergy between locations. For instance

while Thomas White Marsh is the Information Security Manager, reporting to

Kristin Harding VP IT SEC, DELIVERY &OPS, we also have IGNATIUS who

is reporting to JIM SCHOFIELD with the same role., note both Drew and Jim are

reporting to the CEO. The Ideal state should have a form of alignment whereby

Jim reports to DREW and then all others working with Jim do same eventually.

Presently as depicted in picture 1 & 2 above both DREW and SCHOFIELD

report individually.

 There appears to be a lack of AI driven architecture, which undermines Marriot’s

ability to face the present challenged of cyber security inspired by AI.

(MARRIOTT INTERNATIONAL INC /MD/ 10-K Cybersecurity GRC - 2025-

02-11, 2025)

 Not sure if Marriot has a way of ensuring and enforcing compliance across the

various brands and franchises.

 For such a larger global organization as Marriot, the role of Incidence responder

should NOT rest on the shoulders of an individual as we have in the first 2

pictures.

 IT Engineer, Cloud engineer role is not reporting to the EVP IT

 RECOMMENDATION

 Marriot should create and fill a role for CISO, the CISO will synergize all other

related fields and report to the EVP INFORMATION TECHNOLOGY.

 This role and role holder should be made public.

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

 Proper 3rd party risk assessment in synergy with IT team to guard against another

Starwood occurrence

 TRAINING!! TRAINING!! TRAINING!! This bit cannot be overemphasized.

Consistent Periodic training will strengthen the team as well as prepare them to

identify and tackle new forms of threats.

 Invest in human capital : Certification in cyber space will help ensure skilled

talents are made, retained and even built and deployed.

 Investment in infrastructure and skilled talents to manage AI algorithms which

would enable the identification of patterns and subsequently tackle same across

the over 2000 apartments across the world.

 Cyber Safety and Culture – periodic engagement with members of staff will

further make cyber security a norm, a DNA across franchise, labels and properties.

 Auto Threat detection, threat intelligence to put us ahead of possible threats

related to our industry.

CONCLUSION
In conclusion, it is clear that the Marriot Organogram still needs a few touches, for a role that
would unify the related IT team – this is the CISO role. Marriot also needs to pay attention to
empowering the Risk units so to ensure proper checks of 3rd party liabilities and
vulnerabilities that may cost us company her goodwill. This can be achieved by setting up a
Cybersecurity Governance Committee which will encompass a 360 team across the IT,
Compliance, Risk, Ops, and Legal units, this will not only help them understand and grow the
business safely but would also be able to come up with strategies to handle cybersecurity and
risk.
Below are some roles in Cyber security, it important to understand that the essence of these
roles are to protect, secure, ensure compliance and manage risks at all levels across an entity.
Role Primary Responsibilities

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

Chief Information Security Leads the cybersecurity strategy, governance, and risk
Officer (CISO) management from a high level approach
Security Architect Designs resilient secure systems and networks,
Security Engineer Builds and maintains security tools and infrastructure
such as firewalls, intrusion detection systems to
mention a few.
Security Analyst Monitors systems for suspicious activity, trend of same
and pattern if possible, and also investigates incidents,
and analyses threats.
Incident Responder Handles security breaches, coordinates response efforts,
and performs forensic analysis.
Penetration Tester (Ethical Simulates cyber-attacks to find vulnerabilities before
Hacker) malicious actors do.
Threat Intelligence Analyst Tracks emerging threats,.

Governance, Risk & Ensures policies, regulations, and standards are


Compliance (GRC) Analyst followed (e.g. ISO 27001).
Identity and Access Manages user access controls and authentication
Management (IAM) Specialist systems.
Cloud Security Engineer Secures cloud environments such as AWS, Azure, GCP
and ensures compliance.

Research also show emerging roles in this space stated, some of which are stated below all in
the bid to underscore a more robust system management as organizations continue to depend
on Cloud, explore IoT and rely on AI.
Role Focus Area
DevSecOps Engineer Integrates security into DevOps pipelines and software
development workflows (Chavaria, 2022)

Application Security Engineer Secures software applications through code reviews,


vulnerability scanning, and secure coding practices.
(Indeed Editorial Team, 2024)

Security Awareness Trainer Educates employees on cybersecurity best practices and


phishing prevention (Indeed Editorial Team, 2024)

Data Privacy Officer Ensures data handling complies with privacy laws like
GDPR or CCPA (Cemal, 2025)

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

References

Cemal. (2025, February 10). Key Responsibilities of a Data Privacy Officer: A

Comprehensive Guide - Data Privacy Officer. Data Privacy Officer.

https://dataprivacyofficer.org/key-responsibilities-of-a-data-privacy-officer-a-

comprehensive-guide/

CHAVARIA, J. (2022). What does a DevSecOps Engineer Do? | Fluid Attacks.

Fluidattacks.com. https://fluidattacks.com/blog/what-does-a-devsecops-engineer-do

Hoenig, M. (2025, February 7). Marriott Settles for $52M & Enhances Data Protections

After Multi-State Investigations. KJK | Kohrman Jackson Krantz.

https://kjk.com/2025/02/07/marriott-settles-for-52m-enhances-data-protections-after-

investigations/

INDEED EDITORIAL TEAM. (2024). 12 Types of Cybersecurity Roles (With Duties and

Salaries). Indeed Career Guide.

https://www.indeed.com/career-advice/finding-a-job/types-of-cyber-security-roles

Marriott International. (2025). Our Story. Www.marriott.com; Marriott International.

https://www.marriott.com/about/culture-and-values/history.mi

Marriott International - Org chart. (n.d.). THE ORG. https://theorg.com/org/marriott-

international

Marriott International - Org chart. (2025). THE ORG. https://theorg.com/org/marriott-

international

MARRIOTT INTERNATIONAL INC /MD/ 10-K Cybersecurity GRC - 2025-02-11. (2025,

February 11). Board-Cybersecurity.com.

https://www.board-cybersecurity.com/annual-reports/tracker/20250211-marriott-

international-inc-md-cybersecurity-10k/

LUXURY IN EVERY WAKE


INTERNAL MEMO MARRIOT INTERNATIONAL

Suzanne Rowan Kelleher. (2024, October 10). Marriott Gets $52 Million Slap On Wrist For

Massive Security Breaches Due To “Lax Security.” Forbes.

https://www.forbes.com/sites/suzannerowankelleher/2024/10/10/marriott-52-million-

slap-wrist-cybersecurity-breaches-lax-security/

Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of

sophisticated cyber attacks. Computers & Security, 72, 212–233.

https://doi.org/10.1016/j.cose.2017.09.001

Von Solms, R., & Van Niekerk, J. (2013). From Information Security to Cyber Security.

Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004

LUXURY IN EVERY WAKE

You might also like