Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceArenas / Stadiums / Leagues / Entertainment

Top cyber threats targeting the Paris Olympics

By Stuart Wells
Trophy

Image via Unsplash

July 12, 2024

The 2024 Paris Olympics are quickly approaching, captivating the global sporting community. The promise of thrilling competition, and a spirit of international unity has ignited a digital firestorm. However, this surge in online activity presents a compelling opportunity for cybercriminals, as users increasingly engage with digital accounts such as travel, finance and online gambling. 

The 2020 Tokyo Games, for example, witnessed a staggering 450 million attempted cyberattacks, highlighting the vulnerability of major sporting events in today's digital age. Now, with more advanced, AI-powered threats and an increasing number of digital platforms for users to engage with, fraudsters are presented with a golden opportunity to take advantage of unsuspecting Olympics enthusiasts. 

To ensure a secure environment, businesses must be prepared for an influx of sophisticated scams by exploring the key security concerns and strategies to safeguard their platforms and users’ identities during the Olympics and in general.     

Travel fraud

The 2024 Olympics are projected to draw in more than 15 million tourists to Paris. The chaos during major events like this one increases the vulnerability of travelers and means a higher risk of fraud for businesses. Criminals know that travelers are high-value targets, both for their personal information and loyalty program rewards. Travelers must repeatedly provide their passport or other ID to check in for flights and hotel reservations, making them vulnerable to identity theft. Additionally, their loyalty points can be stolen and sold on the dark web.     

Unfamiliar environments and the need to use unverified ATMs make travelers easy targets for credit card skimmers and pickpockets. Stolen cards can then be used to book tickets, car rentals and hotels. Crowded airports, flight delays and frantic rebooking on unsecured Wi-Fi connections also create opportunities for identity theft, account takeovers and fraud.

At the same time, travelers expect digital check-in options, adding another layer of complexity.

As user preferences evolve and cyber threats advance, businesses struggle to balance a seamless user experience with robust security to prevent fraudsters from exploiting online identities. 

AI-powered attacks

The 2024 Olympics presents a major security challenge fueled by the rise of AI. Cybercriminals are leveraging this technology to create intricate online schemes like deepfakes. These realistic manipulated videos and images pose a threat by spreading misinformation and enabling hackers to potentially bypass common biometric-based security strategies. 

However, the bigger concern lies with synthetic identity fraud. By stitching together real and fabricated data, criminals can bypass traditional security measures to access financial accounts or sensitive information related to online gambling, a sector expected to boom during the Olympics.

This accessibility, coupled with the complexity of digital environments, creates a ripe opportunity for scams. As online gaming and gambling expand and attract a wider audience, the pool of digital footprints for fraudsters to manipulate also grows, which leads to increasingly sophisticated synthetic identities.

Staying one step ahead of the threat

To stay ahead of these evolving threats, enterprises must embrace cutting-edge security strategies including the use AI-powered tools.

Biometric authentication

Facial recognition and other biometric technologies analyze unique physical characteristics, making them highly resistant to sophisticated attacks like deepfakes. This ensures a more secure and user-friendly experience, compared to having to remember complex passwords.

Advanced liveness detection

Advanced liveness detection employs sophisticated algorithms to analyze user actions and physical presence. This deters criminals attempting to create fake personas using photos or videos. By verifying that a real person is behind the screen, liveness detection significantly strengthens defenses against identity spoofing and theft attempts.

Predictive analytics

AI analytics systems examine vast amounts of data, including user behavior and transaction patterns. By identifying anomalies and suspicious connections, they can predict and prevent complex fraud rings from forming. This proactive approach ensures robust defense against potential risks, safeguarding user information and business assets.

Game on, threats off

As users digitally engage with travel platforms and online gambling sites, fraudsters will have their sights on a gold mine of identity theft opportunities. With AI-powered attack vectors, cyber threats are only becoming more complex.  

By deploying a combination of modern security techniques including biometrics authentication, advanced liveness detection and predictive analytics, businesses operating during the Paris Olympics can significantly reduce the risk of identity fraud and protect their customers’ critical information. 

KEYWORDS: cybercriminal event security game day security Olympic Games Olympics Security travel cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stuart wells headshot

Stuart Wells is CTO at Jumio. Image courtesy of Wells

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Neon question mark

    Russian disinformation campaign attempts to disrupt the Paris Olympics

    See More
  • Mark Manglicmot podcast news header

    Cybersecurity at the Paris Summer Olympics

    See More
  • Woman holding a cellphone

    Attending the Olympics? Watch out for these mobile threats

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing