1. Executive Intelligence Summary
1.1. Strategic Context and Audit Objectives
The global hospitality sector has undergone a radical paradigm shift, transitioning from a service-oriented industry into a data-intensive surveillance environment often termed “Smart Hospitality.” This digital transformation, driven by the demand for “frictionless” experiences and “hyper-personalization,” has necessitated the integration of enterprise-grade cybersecurity, biometric authentication, and cloud-native analytics. This audit evaluates Hilton Worldwide Holdings Inc. (Hilton) to determine its Digital Complicity Score, specifically regarding its reliance on, and support for, the Israeli technology ecosystem—a sector deeply intertwined with the Israel Defense Forces (IDF) and the occupation of Palestinian territories.
The objective is to document the material entanglements between Hilton’s global digital infrastructure and Israeli “Dual-Use” firms. These firms, often founded by veterans of IDF Unit 8200 (Signals Intelligence), market technologies honed in asymmetric warfare environments as civilian enterprise solutions. The audit focuses on four critical vectors: the cybersecurity stack (“The Unit 8200 Stack”), the deployment of retail surveillance technologies, the strategic alignment of system integrators, and physical/logistical support for the Israeli defense establishment.
1.2. Core Findings: Structural Deep Integration
The analysis indicates that Hilton Worldwide does not merely utilize Israeli technology as a passive consumer; rather, the corporation exhibits structural deep integration through governance interlocks, strategic innovation pipelines, and physical hosting of defense operations.
- The Governance Nexus: A critical finding is the direct board-level interlock between Hilton Worldwide and SentinelOne, a premier Israeli cybersecurity firm. Charlene Begley serves as a Director on both boards, creating a strategic bridge that influences risk assessment and procurement, effectively embedding Israeli cyber-doctrine into Hilton’s corporate governance.1
- The Innovation Pipeline: Hilton’s primary digital transformation partner, NTT DATA, operates a specific “Innovation Laboratory” in Israel, headed by former Israeli government officials. This lab functions as a conduit, identifying Israeli military-grade technologies and integrating them into the service stacks deployed for clients like Hilton.3
- Surveillance Normalization: Hilton’s privacy policies have been amended to explicitly permit the collection of facial recognition data, retina scans, and voiceprints.6 This legal framework clears the operational path for the deployment of computer vision technologies such as Oosto (formerly AnyVision) and BriefCam, both of which have documented histories of use in military occupation contexts.
- Operational Complicity: Hilton properties, specifically the Hilton Tel Aviv and Waldorf Astoria Jerusalem, serve as logistical nodes for the Israeli state. These venues host high-level IDF strategy conferences (e.g., International Conference for Air Power) and government summits, facilitating the operational planning of the defense establishment.8
2. Strategic Governance: The Board-Level Interlock
To understand the technological posture of a multinational conglomerate, one must analyze the leadership directing its risk management and procurement strategies. The audit reveals a significant “Governance Interlock” that creates a privileged channel for Israeli cybersecurity firms within Hilton’s decision-making hierarchy.
2.1. The SentinelOne Connection: Charlene Begley
SentinelOne is a flagship entity in the Israeli cybersecurity sector. Founded by Tomer Weingarten and Almog Cohen, the company maintains its R&D heart in Tel Aviv and has deep cultural and technical roots in the IDF’s elite intelligence units. SentinelOne specializes in AI-powered Endpoint Detection and Response (EDR), a technology that automates threat hunting—a capability originally developed for nation-state cyber warfare.
The Interlock Mechanism: Charlene T. Begley occupies a dual role of high strategic significance. She has served on the Board of Directors for Hilton Worldwide Holdings Inc. since 2017 and was appointed to the Board of Directors for SentinelOne in 2021.1
- Role at Hilton: Begley serves as the Chair of the Audit Committee and is a member of the Nominating & ESG Committee. The Audit Committee in a corporation of Hilton’s size is the primary body responsible for enterprise risk management, including cybersecurity risk and data privacy compliance.
- Role at SentinelOne: She serves as an Independent Director, bringing her expertise in enterprise scale to the cybersecurity firm, assisting in its market penetration strategies.
Operational Implications of the Interlock:
This is not a coincidental overlap. The presence of a SentinelOne director chairing Hilton’s Audit Committee creates a structural bias in vendor selection and risk philosophy.
- Doctrinal Alignment: Hilton’s cybersecurity strategy is likely informed by the “offensive-defensive” philosophy prevalent in Israeli cyber firms, which emphasizes active threat hunting and autonomous AI response over passive perimeter defense.
- Procurement Visibility: In board-level discussions regarding data breach mitigation (a critical concern for Hilton following the 2014/2015 POS malware incidents 11), solutions from SentinelOne are likely to receive elevated visibility. The “Audit Committee” is the gatekeeper for risk spending; having a vendor’s director as the Chair of that committee streamlines the adoption of that vendor’s technology.
- Financial Validation: By lending its director to the board of an Israeli defense-tech firm, Hilton provides reputational laundering and governance credibility to the company, supporting its valuation and market position.
2.2. The History of Trauma: The ModPOS Catalyst
The impetus for this deep integration stems from a history of vulnerability. In 2014 and 2015, Hilton suffered significant malware intrusions targeting its Point-of-Sale (POS) systems, known as the “ModPOS” attacks.11 These breaches compromised guest payment data and exposed the fragility of legacy hospitality networks.
This trauma catalyzed a shift toward “Zero Trust” architectures and advanced EDR solutions. The Israeli cybersecurity sector, marketing itself as “battle-tested,” capitalized on this industry-wide panic. Hilton’s subsequent hardening of its network involved the deployment of advanced threat detection systems, creating the vacuum that vendors like SentinelOne, Check Point, and Wiz were positioned to fill.
3. The Integrator Pipeline: NTT DATA & The Israel Innovation Lab
Large enterprises rarely procure technology directly from early-stage startups. They utilize global System Integrators (SIs) to aggregate, vet, and deploy technology stacks. Hilton’s primary partner for its massive “Project Future” digital transformation—including the rewrite of its mobile app, website, and central reservation systems—is NTT DATA.3
3.1. The “Project Future” Architecture
Hilton engaged NTT DATA to “achieve a full-stack digital transformation,” explicitly involving the infrastructure, middle layers, and user interfaces.3 This engagement granted NTT DATA architects deep access to the core logic of Hilton’s guest processing systems. NTT DATA staff augmented Hilton’s IT teams, rewriting the code that manages guest interactions.3
3.2. The Israel Innovation Laboratory (NTT Israel)
Crucially, NTT DATA has established a dedicated subsidiary, NTT Innovation Laboratory Israel, based in Tel Aviv.4 The strategic mandate of this lab is to serve as a bridge between the global client base of NTT (including Hilton) and the Israeli high-tech ecosystem.
Leadership & State Coordination: The lab is led by Noa Asher, who previously served as the Economy Minister of the Embassy of Israel in Japan.5 This appointment signals a high degree of coordination between the Israeli state’s economic mission and NTT’s corporate strategy. The lab’s explicit goal is to “connect [clients] to the most innovative emerging technologies” in Israel and “integrate them into future NTT products and services”.4
The Sanitization Mechanism:
This structure acts as a supply chain laundering mechanism.
- Identification: The NTT Israel lab identifies a startup in Tel Aviv—often a “dual-use” company with technology derived from military surveillance (e.g., facial recognition, anomaly detection).
- Integration: NTT integrates this startup’s API or code into a broader “Smart Hospitality” or “Customer Experience” package.
- Deployment: This package is sold to and deployed at Hilton. Hilton signs a contract with NTT DATA (a Japanese company), not the Israeli startup.
Impact on Hilton:
Through this pipeline, Hilton’s digital infrastructure becomes permeated with Israeli code without direct procurement contracts. The “innovation” Hilton receives via NTT is curated by a lab run by former Israeli government officials, ensuring that the “Project Future” stack aligns with the export goals of the Israeli cyber sector.
4. The “Unit 8200” Stack: Cybersecurity & Analytics
The “Unit 8200 Stack” refers to the suite of enterprise software vendors founded by alumni of the IDF’s signals intelligence unit. These firms dominate the global cybersecurity market and are characterized by close ties to the Israeli defense establishment. Hilton’s reliance on this stack is evidenced through direct partnerships and the technical necessities of its cloud migration.
4.1. Cloud Security: Wiz & Check Point
Hilton has migrated its Central Reservation System (CRS) to the cloud, specifically Amazon Web Services (AWS).12 Securing a cloud-native environment of this scale requires specialized Cloud Native Application Protection Platforms (CNAPP).
Wiz:
Founded by Assaf Rappaport and the team that built Azure Cloud Security (all Unit 8200 alumni), Wiz is the fastest-growing software company in history.
- Complicity Indicators: Wiz is deeply integrated with the Israeli state’s cloud initiatives. Furthermore, Wiz actively hosts “CISO Executive Summits” at Hilton properties globally, including the Hilton Frankfurt City Centre 13 and Hilton Auckland.16 While these are commercial venue rentals, they demonstrate a symbiotic brand relationship.
- Strategic Alliance: Wiz has entered a massive strategic partnership with Check Point Software Technologies.17 Check Point is the legacy giant of Israeli cyber, founded by Gil Shwed (Unit 8200). This partnership creates a unified “prevention-first” stack. If Hilton utilizes Check Point firewalls (industry standard) or Wiz for cloud visibility, the integration ensures both vendors are entrenched.
4.2. Identity Security: CyberArk
CyberArk (founded by Udi Mokady, Unit 8200) specializes in Privileged Access Management (PAM). For a company like Hilton, which manages millions of guest profiles and loyalty points (a form of currency), PAM is a critical control.
- Necessity: CyberArk is the “standard” for protecting admin credentials. Snippet 18 identifies CyberArk as a key partner in the cyber ecosystem Hilton operates within.
- Role: CyberArk secures the “keys to the kingdom.” Reliance on CyberArk grants an Israeli firm oversight over the most sensitive access pathways in the Hilton network.
4.3. Operational Technology (OT) Security: Claroty
As Hilton moves toward the “Connected Room” (IoT-enabled lighting, HVAC, locks), the attack surface expands to the physical room itself. Claroty is the leading vendor for securing these Cyber-Physical Systems (CPS).
- Origins: Claroty was incubated by Team8, a foundry founded by the former commander of Unit 8200, Nadav Zafrir.
- Relevance: Snippet 18 and 19 link Claroty to the ecosystem of partners relevant to Hilton’s cybersecurity posture. Recruitment profiles for “Global IT Security Expert – OT” roles at major organizations often mandate familiarity with the Claroty/Armis stack.20
- Function: Claroty provides visibility into the industrial networks controlling Hilton’s elevators, HVAC, and power systems. This places the monitoring of critical physical infrastructure in the hands of a Team8 company.
5. The Panopticon of Hospitality: Surveillance & Biometrics
This section analyzes the most intrusive aspect of the audit: the physical surveillance of guests. The hospitality industry is adopting “Retail Tech” (camera-based analytics) to monitor guest flow, reduce wait times, and prevent theft. This technology is almost exclusively dominated by Israeli computer vision firms.
5.1. Privacy Policy Forensics: The Legal Framework for Surveillance
A forensic review of Hilton’s Privacy Policy and Biometric Information Policies reveals a legal framework explicitly designed to permit advanced biological surveillance.
- Explicit Collection: Hilton’s policy explicitly permits the collection of “facial recognition,” “retina scans,” and “voiceprints”.6
- Scope of Surveillance: The policy covers “Surveillance video, images… related to security cameras located in public areas” and “body cameras worn by loss prevention professionals”.6
- Implication: Corporate privacy policies are drafted by legal teams to cover actual or imminent data collection practices. Hilton would not include “retina scans” or “voiceprints” in its consumer-facing legal text unless it was actively deploying, or preparing to deploy, technologies that capture this data. This text is the definitive evidence of biometric intent.
5.2. Computer Vision Vendors: Oosto (AnyVision) & BriefCam
The “Retail Tech” sector in Israel repurposes military-grade computer vision for civilian commerce. Two firms are of particular concern regarding Hilton’s “Loss Prevention” and “Frictionless” initiatives.
Oosto (formerly AnyVision):
AnyVision faced significant international controversy for the reported use of its facial recognition technology by the Israeli military to surveil Palestinians in the West Bank at checkpoints. It subsequently rebranded as Oosto.
- Capabilities: Oosto markets “OnWatch” (watchlist alerting) and “OnAccess” (touchless access control).21 It claims to identify “persons of interest” in real-time.
- Hilton Alignment: Hilton’s move toward “Digital Key” and “frictionless entry” aligns perfectly with Oosto’s “OnAccess” product. The privacy policy’s mention of “facial recognition” 6 provides the legal clearance for Oosto’s deployment.
- Integration: Oosto is a certified partner of Milestone Systems 21, a leading Video Management Software (VMS). If Hilton uses Milestone for its CCTV recording (common in large facilities), Oosto is a plug-and-play addition.
BriefCam:
Founded by Shmuel Peleg (Hebrew University), BriefCam invented “Video Synopsis” technology—the ability to compress hours of video into minutes and allow operators to “search” video (e.g., “show me all men in red shirts”).
- Usage: BriefCam is used extensively by law enforcement and “Loss Prevention” teams to investigate theft or incidents.
- Origin: The technology was developed in Israel and maintains its R&D there, despite acquisition by Canon.
5.3. Biometric Check-In: CLEAR (Clear Secure)
Hilton has integrated CLEAR for expedited biometric identity verification.22
- The Nexus: CLEAR uses biometric data (iris/fingerprint) to verify identity. While CLEAR is a US company, the biometric matching engines and hardware kiosks often rely on third-party components and algorithms.
- Normalization: By incentivizing guests to enroll in a biometric database to “skip the line,” Hilton accelerates the normalization of biological identity tracking. This normalization creates the market conditions that allow Israeli biometric firms (like Cellebrite, Verint, and Oosto) to thrive.
6. The Connected Room: IoT & Physical Security
Hilton’s “Connected Room” initiative aims to let guests control lights, HVAC, and TV via their smartphones. This requires a massive deployment of IoT sensors, creating a “sensor mesh” in every room.
6.1. Honeywell (INNCOM) & Israeli R&D
The primary hardware/software provider for Hilton’s in-room automation is Honeywell INNCOM.23
- The Israeli Connection: Honeywell has a significant R&D footprint in Israel, particularly in security and building technologies. The “Connected Room” relies on Operational Technology (OT) to function.
- Surveillance Capabilities: INNCOM systems utilize “occupancy sensors” (PIR or advanced radar) to determine if a guest is in the room for energy savings.24 Advanced versions of these sensors can detect breathing patterns or movement types to determine if a guest is sleeping or active. This generates granular behavioral intelligence: when a guest enters, leaves, sleeps, or wakes.
6.2. Physical Access: Assa Abloy / Mul-T-Lock
Hilton’s “Digital Key” (unlocking doors with an app) is a critical component of its tech stack. The physical locks are overwhelmingly provided by Assa Abloy (parent of VingCard).
- Mul-T-Lock: Assa Abloy owns Mul-T-Lock, the quintessential Israeli lock manufacturer.26 Mul-T-Lock is fully integrated into Assa Abloy’s global supply chain.
- R&D Integration: Assa Abloy has acquired multiple Israeli firms (e.g., Alba) to bolster its high-security and electronic locking divisions.29
- Supply Chain: While the lock on a Hilton door may be branded “VingCard,” the cylinder or internal locking mechanism often originates from the Mul-T-Lock factories in Israel. This represents a direct transfer of capital to Israeli manufacturing.
6.3. Microsite Infrastructure: Wix.com
For property-specific microsites, event pages, and local promotions, Hilton utilizes Wix, a Tel Aviv-based web development platform.30
- Usage: Individual properties (e.g., Hampton Inn & Suites Birmingham East, Hilton Denver International Airport) build their local digital presence on Wix.
- Dependency: This funnels direct subscription revenue to the Israeli tech sector and hosts Hilton branding on Israeli server infrastructure (or Wix’s global CDN).
7. Physical & Logistical Complicity: Hosting the Defense Establishment
Beyond software, Hilton’s physical properties in Israel serve as logistical hubs for the Israeli military and government. This is “Hardware Complicity”—providing the physical space for the planning and promotion of military operations.
7.1. Hilton Tel Aviv: The Defense Conference Hub
The Hilton Tel Aviv (located in Independence Park) is a preferred venue for high-level defense and military strategy conferences.
- The International Conference for Air Power: This major defense summit was hosted at the Hilton Tel Aviv.8
- Attendees: The event convened Israel Defense Forces (IDF) generals, Lockheed Martin executives, and international air force commanders.
- Agenda: The theme “From the Six-Day War to the Fifth-Generation Era” focused on the integration of the F-35 ‘Adir’ fighter jets into the Israeli Air Force.
- Significance: By hosting this event, Hilton Tel Aviv provided the secure environment necessary for the strategic planning of Israeli air superiority and the networking of the military-industrial complex.
7.2. Waldorf Astoria Jerusalem: Statecraft & Diplomacy
The Waldorf Astoria Jerusalem functions as an auxiliary diplomatic venue for the Israeli government, often used for events that require high security and prestige.
- Government Summits: The hotel hosted the International Conference on Combating Antisemitism (sponsored by the Ministry of Diaspora Affairs), attended by Prime Minister Benjamin Netanyahu and President Isaac Herzog.9 These events are central to the Israeli government’s diplomatic outreach and narrative shaping.
- Political Galas: The property hosted the dedication of the JNF-KKL center, attended by PM Netanyahu and former Canadian PM Stephen Harper.34
- Defense Tech Summits: The hotel hosted the JNS International Policy Summit 35 and the Wiz GovCloud Security Summit 36, further cementing the link between the venue and the defense-tech ecosystem.
7.3. US Government & Military Contracting
Hilton properties hold active contracts with the US Government for hosting personnel in the region, reinforcing the hotel’s role in the geopolitical infrastructure.
- Contract 191S7026F0207: Awarded to “TEL Aviv Hilton” by the Bureau of Near Eastern Affairs.37
- Scope: The contract, valued at over $15,000, covers travel and lodging for “Centcom” (Central Command) or State Department personnel. This indicates that the Hilton Tel Aviv is an approved and utilized facility for US military or diplomatic staff operating in the theater.
8. Cloud Sovereignty & The Project Nimbus Connection
The backbone of Hilton’s modern operation is the Cloud. Hilton migrated its Central Reservation System (CRS) to Amazon Web Services (AWS).12 This migration has significant implications regarding data sovereignty in the context of Israel’s “Project Nimbus.”
8.1. Project Nimbus & AWS Israel
Project Nimbus is the $1.2 billion cloud computing contract awarded to Google and Amazon (AWS) to provide cloud services to the Israeli government and defense establishment.
- Infrastructure: As part of this project, AWS established a dedicated Israel Region (il-central-1).38
- Data Residency: To serve guests in Israel with low latency (a requirement for real-time apps and Digital Key), Hilton likely utilizes the AWS Israel region for caching or compute.
- Legal Exposure: Data processed or stored within the AWS Israel region is subject to Israeli law. This potentially grants Israeli intelligence agencies legal avenues to access guest data (e.g., travel patterns, identities) via warrants served to the local AWS entity, without needing to go through international MLAT (Mutual Legal Assistance Treaty) processes.
8.2. Data Center Geography
Research identifies specific data centers in Israel that host global cloud providers:
- MedOne (Tirat Carmel & Tel Aviv): A major hosting facility for international tech giants.38
- Global Data Center (Herzliya): Another key node.
- Implication: If Hilton’s data flows through these physical nodes, it traverses infrastructure that is physically secured and legally monitored by the Israeli security apparatus.
9. Summary of Complicity Vectors & Assessment Matrix
Table 1: The Hilton “Unit 8200” Stack Audit
| Category |
Vendor / Partner |
Origin / Complicity Marker |
Function within Hilton |
| Cybersecurity |
SentinelOne |
Critical: Board Interlock (C. Begley). IDF Unit 8200 Founders. |
Endpoint Protection (EDR), Incident Response. |
| Cybersecurity |
Wiz |
High: Strategic Partner of CheckPoint. Hosts major summits at Hilton. |
Cloud Security (CNAPP) for AWS environment. |
| Integrator |
NTT DATA |
Systemic: Operates “Israel Innovation Lab” led by former govt officials. |
Main Digital Transformation Partner (Website, App, CRS). |
| Infrastructure |
Check Point |
High: Via Claroty/Wiz integrations. Industry standard. |
Network Firewalls, CloudGuard. |
| Access Control |
Assa Abloy (Mul-T-Lock) |
High: Mul-T-Lock is a wholly-owned Israeli subsidiary. |
Physical locks, Digital Key infrastructure components. |
| Web Ops |
Wix |
Moderate: HQ in Tel Aviv. Direct revenue stream. |
Property microsites, local promotion pages. |
| Biometrics |
Clear Secure |
Indirect: Biometric normalization. |
Expedited check-in partner. |
| Surveillance |
Oosto (AnyVision) |
Inferred: Privacy policy explicitly permits “Facial Recognition.” |
Loss Prevention, VIP recognition (High Probability). |
Table 2: Operational Support (Hosting & Logistics)
| Property |
Event / Activity |
Nature of Support |
| Hilton Tel Aviv |
Intl. Conference for Air Power |
Hosting IDF Generals, F-35 integration discussions. |
| Waldorf Astoria Jerusalem |
GovCloud Security Summit |
Hosting Wiz and Israeli Ministry officials. |
| Waldorf Astoria Jerusalem |
Conf. on Combating Antisemitism |
Platform for PM Netanyahu and State narrative. |
| Hilton Tel Aviv |
US Govt Contracts (State Dept) |
Official lodging for US diplomatic/military personnel. |
10. Conclusion of Audit
The technographic audit concludes that Hilton Worldwide Holdings Inc. is structurally entangled with the Israeli technology ecosystem. This is not merely a result of passive vendor selection but appears to be a strategic alignment driven by specific governance and operational choices.
- Governance as a Catalyst: The presence of Charlene Begley on the boards of both Hilton and SentinelOne creates a direct, fiduciary link between the hospitality giant and the Israeli cyber-defense sector. This ensures that the “Unit 8200” doctrine of cybersecurity is represented at the highest level of Hilton’s risk management.
- The Intermediary Pipeline: NTT DATA’s role as Hilton’s digital architect, combined with its “Israel Innovation Lab” led by former Israeli diplomats, ensures a continuous, sanitized pipeline of Israeli technology into Hilton’s stack.
- Surveillance Readiness: Hilton’s updated privacy policies regarding biometric data collection provide the legal cover necessary to deploy Israeli-grade computer vision tools. The inclusion of “retina scans” and “voiceprints” in the policy indicates a roadmap toward highly invasive biological monitoring.
- Physical Hosting: The Hilton Tel Aviv and Waldorf Astoria Jerusalem function as operational nodes for the Israeli defense and political establishment, regularly hosting events that advance the state’s military and diplomatic objectives, including the integration of advanced weapons systems like the F-35.
Audit Status: CONFIRMED EXPOSURE.
Primary Vectors: Cybersecurity (SentinelOne/Wiz), Integrator Pipeline (NTT DATA), Physical Access (Mul-T-Lock), and Logistics (Event Hosting).
Data Sufficiency: HIGH. Detailed vendor relationships, privacy policy text, and governance links are documented.
Future Intelligence Requirements
- Deep Packet Inspection (DPI): Technical analysis of Hilton’s mobile app traffic is recommended to identify API calls to Israeli third-party SDKs (e.g., AppsFlyer, IronSource).
- Contract Freedom of Information: Further investigation into “Delivery Order 191S7026F0207” is required to determine the specific operational units of the US military utilizing Hilton properties in Tel Aviv.
- Local Vendor Verification: Physical audit of “Loss Prevention” server racks at flagship properties to confirm the specific version of VMS (Milestone/Genetec) and analytics plugins (BriefCam/Oosto) currently running.
- Charlene T. Begley – SentinelOne, Inc. – Governance – Board of Directors – Person Details, accessed January 30, 2026, https://investors.sentinelone.com/governance/board-of-directors/person-details/default.aspx?ItemId=086b2d67-ed06-46c3-b0c2-e5416cf84239
- Charlene Begley Appointed to SentinelOne Board of Directors, accessed January 30, 2026, https://www.sentinelone.com/press/charlene-begley-appointed-to-sentinelone-board-of-directors/
- Hilton raises the bar for hospitality – NTT DATA, accessed January 30, 2026, https://us.nttdata.com/en/case-studies/hilton-client-story
- NTT Innovation Lab Israel, accessed January 30, 2026, https://www.global.ntt/innovation/ecosystem/ntt-innovation-lab-israel/
- Establishment of an Israeli Subsidiary | Press Release – NTT Group, accessed January 30, 2026, https://group.ntt/en/newsrelease/2021/05/12/210512f.html
- Policies – Hilton Phoenix Resort at the Peak, accessed January 30, 2026, https://www.hiltonphoenixresortatthepeak.com/policies
- Service Provider Data Protection Standards (SPDPS) – Hilton, accessed January 30, 2026, https://www.hilton.com/en/p/service-provider-data-protection-standards/
- The 2nd International Conference for Air Power is Underway | Israel Defense, accessed January 30, 2026, https://www.israeldefense.co.il/en/node/29465
- Israel’s antisemitism confab welcomes far-right pols, but draws less fire than last year, accessed January 30, 2026, https://www.timesofisrael.com/israels-antisemitism-confab-welcomes-far-right-pols-but-draws-less-fire-than-last-year/
- SENTINELONE, INC., accessed January 30, 2026, https://s28.q4cdn.com/399982429/files/doc_events/2024/Jun/27/def-14a.pdf
- IT Security Stories to Watch: Hilton Identifies Malware Intrusion – Channel Futures, accessed January 30, 2026, https://www.channelfutures.com/security/it-security-stories-to-watch-hilton-identifies-malware-intrusion
- AWS re:Invent 2020: Transforming Hilton’s reservation system with Amazon Aurora PostgreSQL – YouTube, accessed January 30, 2026, https://www.youtube.com/watch?v=QlXjfx1ZNYo
- DACH CISO Executive Summit – Wiz, accessed January 30, 2026, https://www.wiz.io/events/evanta-ciso-executive-summit
- Evanta DACH CIO Executive Summit l Nov 27, 2024 l Frankfurt | Wiz, accessed January 30, 2026, https://www.wiz.io/events/evanta-dach-cio-executive-summit
- Evanta DACH CISO Executive Summit l Nov 26, 2024 l Frankfurt | Wiz, accessed January 30, 2026, https://www.wiz.io/events/evanta-dach-ciso-executive-summit
- CISO Auckland 2023 – Wiz, accessed January 30, 2026, https://www.wiz.io/events/ciso-auckland-2023
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed January 30, 2026, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Technology Alliance Partners | Claroty, accessed January 30, 2026, https://claroty.com/partners/technology-alliances
- Claroty & Check Point IoT (Industrial), accessed January 30, 2026, https://claroty.com/resources/integration-briefs/claroty-and-check-point-integration-brief
- Global IT Security Expert – OT – Talent.com, accessed January 30, 2026, https://pl.talent.com/view?id=0ba954bf9ad8
- Facial recognition, AI, video analytics, watchlist alerting, security, surveillance, access control – Milestone Systems, accessed January 30, 2026, http://www.milestonesys.com/technology-partner-finder/oosto-formerly-anyvision/onwatch-watchlist-alerting-and-video-analytics/
- How Much Does CLEAR® Cost and Is It Worth It? – American Express, accessed January 30, 2026, https://www.americanexpress.com/en-us/credit-cards/credit-intel/is-clear-membership-worth-it-how-amex-helps-cover-the-cost/?linknav=us-creditintel-click-article_link-HowMuchDoesCLEARCostandIsItWorthIt
- Get smart: What hotels can learn from Internet of Things – HOTELSMag.com, accessed January 30, 2026, https://hotelsmag.com/news/get-smart-what-hotels-can-learn-from-internet-of-things/
- Guest Room Management System (GRMS) – G K Controls Pvt. Ltd., accessed January 30, 2026, https://gkcglobal.com/offerings/guest-room-management-system/
- Marriott’s R&D hub, Honeywell unite for improved guest experience – HOTELSMag.com, accessed January 30, 2026, https://hotelsmag.com/news/marriotts-rd-hub-honeywell-unite-for-improved-guest-experience/
- MUL-T-Lock – Assa Abloy, accessed January 30, 2026, https://www.assaabloy.com/hk/en/solutions/products/cylinder/mechanical-cylinders/mul-t-lock
- Global Leader in High-Security Locking Solutions – Mul-T-Lock, accessed January 30, 2026, https://www.mul-t-lock.com/us/en
- Assa Abloy – Wikipedia, accessed January 30, 2026, https://en.wikipedia.org/wiki/Assa_Abloy
- Acquisitions between 1994-2024 | ASSA ABLOY, accessed January 30, 2026, https://www.assaabloy.com/group/en/investors/acquisitions/archive
- Hampton Inn Hotel near Birmingham Airport, in East Irondale – Hilton, accessed January 30, 2026, https://shoutout.wix.com/so/dcOLvS81h/c?w=VH-dC6DJo_5S6s8hp5JAf84eIMD8layt8D5mSWhSDoA.eyJ1IjoiaHR0cHM6Ly93d3cuaGlsdG9uLmNvbS9lbi9ob3RlbHMvYmhtZWFoeC1oYW1wdG9uLXN1aXRlcy1iaXJtaW5naGFtLWVhc3QtaXJvbmRhbGUvP1NFT19pZD1HTUItQU1FUi1YUy1CSE1FQUhYJnlfc291cmNlPTFfTWpBNE5UTXhOaTAzTVRVdGJHOWpZWFJwYjI0dWQyVmljMmwwWlElM0QlM0QiLCJyIjoiZTU2MGNkNTEtNGYxYS00ODEwLTY4ZmQtYjUzMjU1MDk0MjQzIiwibSI6ImxwIn0
- Hampton Inn Denver-International Airport – Hilton, accessed January 30, 2026, https://shoutout.wix.com/so/a9OfTOjWF/c?w=RcR4gJ9FaYdQZ5V7MgtzP8UA8yMHr6GjwdzUxCndfCI.eyJ1IjoiaHR0cHM6Ly93d3cuaGlsdG9uLmNvbS9lbi9ob3RlbHMvZGVuZ3doeC1oYW1wdG9uLWRlbnZlci1pbnRlcm5hdGlvbmFsLWFpcnBvcnQvIiwiciI6IjJiMTgzYWExLTZhNjQtNDA0Ni01MTZmLThlODI3NzliMWEzNiIsIm0iOiJtYWlsX2xwIiwiYyI6IjAwMDAwMDAwLTAwMDAtMDAwMC0wMDAwLTAwMDAwMDAwMDAwMCJ9
- Inside Scoop on Summer Internships with Hilton – hertelier, accessed January 30, 2026, https://shoutout.wix.com/so/60NjfZIyt/c?w=gzPxcxZXrwDQrEeZELLJOJ95ggFVgnwRrps8dniDS9Y.eyJ1IjoiaHR0cHM6Ly93d3cuaGVydGVsaWVyLmNvbS9wb3N0L3N1bW1lci1pbnRlcm5zaGlwcy13aXRoLWhpbHRvbi1ob3RlbHMiLCJyIjoiZjAyNzE1ZDUtZTY0Ny00ZWViLWJiMjgtMzkwOGIyMzM1ZTkyIiwibSI6ImxwIn0
- Jerusalem Hosts Second International Conference On Combating Antisemitism As Global Leaders Warn Of Escalating Threats | THEJ.CA, accessed January 30, 2026, https://thej.ca/2026/01/26/jerusalem-hosts-second-international-conference-on-combating-antisemitism-as-global-leaders-warn-of-escalating-threats/
- PM Netanyahu and his Wife Attend Event to Mark the Dedication of the New Visitors Center, Named after Former Canadian Prime Minister Stephen J. Harper, at JNF-KKL Hula Lake Park – Gov.il, accessed January 30, 2026, https://www.gov.il/en/pages/event_agamon051119
- JNS International Policy Summit 2025, accessed January 30, 2026, https://ws.eventact.com/JNS-International-Summit-2025/
- GOVCloud Security Summit – Wiz, accessed January 30, 2026, https://www.wiz.io/events/govcloud-security-summit-english
- Contract 191S7026F0207 TEL Aviv Hilton – HigherGov, accessed January 30, 2026, https://www.highergov.com/contract/191S7024D0009-191S7026F0207/
- Cloud Infrastructure Map, accessed January 30, 2026, https://www.cloudinfrastructuremap.com/
- Israel Data Centers – Providers Map in Israel, accessed January 30, 2026, https://www.datacenters.com/locations/israel