Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Security Leaders Should Prepare for World Cup Scams

By Jordyn Alger, Managing Editor
Soccer ball
Wesley Tingey via Unsplash
May 21, 2026

As the 2026 World Cup approaches, it’s likely that cybercriminals will increase scam activity to take advantage of the excitement surrounding the event. A recent threat alert from Radware warns that the “convergence of geopolitical instability, hyper-connectivity and critical infrastructure interdependence” creates an environment in which effective cybersecurity is paramount for this year’s event. 

Key insights from the report include: 

  • The tournament’s notable reach makes it an attractive target for politically-motivated attackers. 
  • Interdependent digital systems may lead to widespread risks; for instance, a security failure at one third-party vendor could freeze essential event operations such as broadcasting, transportation and hospitality. 
  • Generative AI and deepfakes will likely be leveraged to scam fans. 

Why does this matter for security leaders? If even one employee falls for a scam on a work device, the entire organization could be at risk. 

“When employees use their corporate devices, accounts or AI agents for personal activities such as hunting for World Cup tickets, booking travel or browsing personal emails, they become directly susceptible to the event-driven scams,” warns Pascal Geenans, VP of Cyber Threat Intelligence for Radware. “If an employee falls for a phishing link, a fraudulent visa site hosting malware or their AI agent gets compromised by an indirect prompt injection on a work laptop, they aren’t just risking their own personal data. That compromised device effectively turns an external attacker into an insider threat. Because the attacker inherits the employee’s legitimate access, they can bypass standard perimeter defenses, access private and confidential data, move undetected through the system and potentially move laterally across the network and into core corporate systems.”

The report further warns that organizations across North America may be collateral targets due to “integration into the World Cup’s digital and physical supply chains.” In the event that organizations may be onboarding temporary, voluntary staff to accommodate the event, the insider risk profile grows. Temporary workforces often come with the risk of inadequate cyber hygiene as well. 

Advice for Organizations 

  • Manage insider and vendor risk 
  • Leverage behavioral and hybrid DDoS protection methods
  • Monitor for disinformation, especially in relation to infrastructure failures or other incidents that may incite panic 
  • Assemble a cybersecurity emergency response plan
  • Audit networks and secure access points
  • Enact comprehensive web application and API security

“Security leaders at sponsors, broadcasters, and their suppliers have a month to run purple-team exercises against identity and email paths, implement phishing-resistant MFA on every vendor and volunteer account, and enforce DMARC in full on every owned domain,” says Collin Hogue-Spears, Senior Director of Solution Management at Black Duck. “If a company’s brand shows up in a counterfeit ticket email in June, they did not lose to a sophisticated adversary. They lost to a checklist you did not finish.”

KEYWORDS: event security planning scam scams World Cup security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Four presents

    Security leaders discuss risks and offer advice on seasonal scams

    See More
  • Burst of light

    Cyber leaders must prepare quantum security now, research finds

    See More
  • Digital human mind

    Should Organizations Block AI Browsers? Security Leaders Discuss

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing