logo

Contents

Hyatt Digital Audit

1. Executive Intelligence Summary & Strategic Overview

1.1. Audit Scope and Objectives

This Technographic Audit was commissioned to evaluate the “Digital Complicity Score” of Hyatt Hotels Corporation (“Hyatt”). The objective is to determine the extent to which Hyatt’s leadership, capital allocation, and technological operations materially support, rely upon, or integrate with the State of Israel’s military, surveillance, and intelligence apparatus. The analysis focuses on the convergence of Hyatt’s cybersecurity infrastructure (the “Unit 8200” stack), its adoption of biometric surveillance technologies, its digital transformation partnerships (“Project Future”), and its alignment with data sovereignty initiatives such as Project Nimbus.

The methodology utilized in this report is Technographic Profiling, which maps the vendor relationships, software dependencies, and capital flows that constitute Hyatt’s operational existence. By analyzing public disclosures, technical case studies, and industry intelligence, we reconstruct the “digital DNA” of the corporation to assess its geopolitical entanglement.

1.2. The “Digital Complicity” Assessment

Based on the exhaustive analysis of the available intelligence, Hyatt Hotels Corporation exhibits a High Degree of Integration with the Israeli technology sector, particularly in the domains of cybersecurity and intelligence-adjacent defense systems.

The audit identifies four primary vectors of complicity:

  1. Cyber-Kinetic Dependency: Hyatt’s defensive posture is fundamentally reliant on the “Unit 8200” stack. The corporation has standardized its network, endpoint, identity, and cloud security on vendors founded by veterans of the Israel Defense Forces (IDF) intelligence units, specifically Check Point Software Technologies, SentinelOne, CyberArk, and Wiz. This creates a strategic dependency where Hyatt’s operational continuity is inextricably linked to the capabilities of the Israeli cyber-defense establishment.
  2. Capital & Governance Feedback Loops: The Pritzker family, maintaining controlling influence over Hyatt, directs significant capital back into the Israeli deep-tech ecosystem through investment vehicles like Deep Insight and The Pritzker Organization. This establishes a circular economy: Hyatt profits fuel Israeli R&D, which produces the security tools Hyatt subsequently procures.
  3. Surveillance Normalization: Hyatt has updated its governance frameworks to explicitly permit facial recognition and biometric data collection. While actively deploying partners like Cozera (Daon), the corporation’s ecosystem intersects with vendors previously linked to surveillance in occupied territories, and its “Mobile Entry” initiatives rely on digitizing guest physical access, creating high-fidelity tracking logs.
  4. Operational Alignment: The corporation acts as a stable revenue source for the “Project Nimbus” cloud providers (AWS and Google Cloud) and has demonstrated a willingness to align operational decisions with geopolitical sensitivities, evidenced by the cancellation of Palestinian advocacy events under security pretexts.

2. Governance, Ownership, and Capital Flows

To understand the technological decisions made by a conglomerate like Hyatt, one must first analyze the source of its capital and the geopolitical posture of its controlling interests. Technology procurement is rarely devoid of political affinity, especially when the ownership structure maintains deep ideological and financial ties to a specific nation-state.

2.1. The Pritzker Dynasty: Capital as a Geopolitical Instrument

Hyatt was founded and is controlled by the Pritzker family, one of the wealthiest dynasties in the United States. While Hyatt functions as a public entity, the family’s influence remains paramount through executive roles, board positions, and voting power. This audit reveals that the Pritzker family serves as a primary conduit between American hospitality revenue and the Israeli technology ecosystem.

2.1.1. The “Deep Insight” Investment Nexus

The Pritzker Organization (TPO), which serves as the merchant bank for the family’s business interests, is a key limited partner and investor in Deep Insight, an Israeli venture capital firm based in Tel Aviv.1

Deep Insight is not a generic investment fund; it specifically targets “deep tech” sectors—technologies rooted in substantial scientific or engineering challenges. The firm invests in semiconductors, bio-convergence, robotics, advanced materials, photonics, and quantum technologies.1

  • Strategic Implication: These sectors are inherently “dual-use,” meaning they have applications in both civilian commerce and military defense. By funding Deep Insight, the Pritzker capital (derived in part from Hyatt’s global operations) directly subsidizes the R&D engines that feed the Israeli military-industrial complex.
  • The Feedback Loop: This investment creates a strategic feedback loop. Hyatt generates revenue from global guests -> Pritzker entities invest this capital into Israeli startups (via Deep Insight) -> These startups develop advanced cyber and surveillance tools (often staffed by IDF veterans) -> Hyatt procures these tools to secure its hotels. This cycle effectively utilizes Hyatt’s operational budget to sustain the Israeli innovation base.

2.1.2. Philanthropic and Political Alignment

Beyond commercial investment, the family’s philanthropic arm, the John Pritzker Family Fund, explicitly states a mission to support “work in, and related to, Israel,” including civic projects and educational experiences.2 This demonstrates that support for the state is a core tenet of the family’s value system, influencing corporate governance culture.

The political activities of family members also reflect this alignment. J.B. Pritzker, the Governor of Illinois and a Hyatt heir, has faced public scrutiny regarding the family’s “bankrolling” of organizations involved in the geopolitical discourse surrounding Israel.3 His vetting for national office included analysis of his positions on Israel, and he has publicly embraced his heritage and the family’s immigrant success story, often intertwined with their support for Jewish causes.4

2.2. Operational Censorship: The Hyatt Regency O’Hare Incident

A critical component of a “Technographic Audit” is assessing how corporate infrastructure is used to facilitate or deny assembly. In 2024, the Hyatt Regency O’Hare Chicago cancelled the annual convention of American Muslims for Palestine (AMP), a significant advocacy group.6

  • The Official Pretext: Hyatt cited “heightened threats” and “increased risk to the safety and security of hotel guests” as the rationale for the cancellation.
  • Intelligence Assessment: Hospitality entities routinely manage high-risk events involving heads of state or controversial figures. The swift cancellation of a Palestinian human rights conference suggests an asymmetric application of risk tolerance. Intelligence suggests that this decision was not purely operational but influenced by the ownership’s geopolitical alignment. By denying physical infrastructure to Palestinian advocacy groups, Hyatt materially impeded their ability to organize and fundraise. This action aligns with the “Operational Complicity” vector, demonstrating that the hotel’s physical assets are gated by ideological parameters.

3. The “Unit 8200” Stack: Cybersecurity Architecture

The core of this audit focuses on Hyatt’s cybersecurity infrastructure. Our analysis confirms that Hyatt has standardized its defense on the “Unit 8200” stack—a suite of technologies developed by firms founded by veterans of the IDF’s elite signals intelligence unit (Unit 8200). This is not a heterogeneous mix of global vendors; it is a near-total reliance on Israeli capability for critical defense layers.

3.1. Network Perimeter Defense: Check Point Software Technologies

Vendor Origin: Israel (Tel Aviv)

Founders: Gil Shwed (Unit 8200)

Status: Confirmed Enterprise Vendor 7

Check Point is the foundational pillar of the Israeli cyber-defense export market. The audit confirms Hyatt as a marquee customer, utilizing Check Point for network security and firewalling.7

3.1.1. Technical Integration & Deep Packet Inspection

Check Point’s appliances and virtual cloud firewalls (CloudGuard) provide Deep Packet Inspection (DPI) for Hyatt’s network traffic.

  • The Panopticon Effect: Every byte of data entering or leaving a Hyatt property—whether it is a guest’s Wi-Fi traffic, a credit card authorization, or internal corporate email—passes through inspection engines designed in Tel Aviv.
  • ThreatCloud AI: These firewalls are connected to Check Point’s “ThreatCloud,” a global intelligence network. This means telemetry from Hyatt’s network is constantly fed back to Check Point’s central servers to update threat signatures. While this improves security, it also grants the vendor high-level visibility into the traffic patterns of Hyatt’s global guest base, which includes diplomats, military personnel, and business leaders.

3.1.2. Operational Risks

Reliance on Check Point introduces specific risks:

  • Supply Chain Vulnerability: In 2024, Check Point admitted to a data incident involving its own portals.9 While they downplayed the severity, it highlights that the security vendor itself is a target.
  • Single Point of Failure: By bundling multiple security products (firewall, cloud, mobile) into the Check Point “Infinity” platform, Hyatt increases its dependency. If Check Point were compelled by Israeli state security services to provide access or throttle traffic (a theoretical but technically feasible scenario), Hyatt would have few immediate alternatives.

3.2. Endpoint Detection & Response (EDR): SentinelOne

Vendor Origin: Israel (Founded by Tomer Weingarten and Almog Cohen, IDF Intelligence background)

Status: Confirmed Deployment 10

In modern cybersecurity, the “perimeter” has dissolved; the defense line is now the endpoint (laptops, servers, POS terminals). Hyatt utilizes SentinelOne for this critical layer.11

3.2.1. The “Autonomous” Agent

SentinelOne markets its platform as “autonomous AI” endpoint protection.

  • Kernel-Level Access: To function, the SentinelOne agent requires kernel-level privileges on every Hyatt device. It monitors all running processes, file modifications, and memory injections.
  • Telemetry Stream: The audit identifies that Hyatt streams endpoint data to the SentinelOne Singularity XDR platform.11 This data lake contains granular details of user behavior across the corporation.
  • Data Funneling: Technical documentation regarding the “Cribl Pack for SentinelOne” suggests that Hyatt may be routing this EDR data to its own AWS buckets for analysis.11 However, the primary analysis engine remains SentinelOne’s cloud, often hosted on AWS regions that may be accessible to the vendor’s R&D teams in Israel.

3.2.2. Ransomware Context

Hyatt’s move to SentinelOne appears to be a response to previous ransomware incidents.8 The decision to trust an Israeli firm over US competitors (like CrowdStrike or McAfee) for this “last line of defense” signals a belief in the superior efficacy of Israeli cyber-warfare derived technologies.

3.3. Identity Security & Privilege Management: CyberArk

Vendor Origin: Israel (Petah Tikva)

Status: Confirmed Critical dependency 14

CyberArk is the global leader in Privileged Access Management (PAM). Its software secures the “keys to the kingdom”—the administrative credentials used to manage servers, databases, and cloud infrastructure.

3.3.1. Protecting the Core

Job postings for Hyatt explicitly require experience with CyberArk, indicating it is the standard for securing internal infrastructure.15

  • Strategic Reliance: If a bad actor gains access to a CyberArk vault, they own the enterprise. By entrusting this vault to an Israeli firm, Hyatt places its most sensitive cryptographic assets under the protection of a vendor with deep ties to the Israeli defense establishment.
  • Threat Landscape Definition: Hyatt’s security leadership consumes “Identity Security Threat Landscape” reports produced by CyberArk.17 This allows the vendor to shape Hyatt’s perception of risk, prioritizing threats that justify further investment in Israeli security tools.

3.4. Cloud Security & CNAPP: Wiz

Vendor Origin: Israel (Tel Aviv)

Founders: Assaf Rappaport and the “Adallom” team (Unit 8200)

Status: Confirmed Customer 18

Wiz is a Cloud Native Application Protection Platform (CNAPP) that scans cloud environments for vulnerabilities. Hyatt is identified as a customer and has even sponsored events hosted by Wiz.18

3.4.1. The Cloud Map

Wiz works by connecting via API to Hyatt’s cloud providers (AWS, Google). It scans everything—snapshots, volumes, databases, container registries.

  • Complete Visibility: To function, Wiz builds a “Security Graph” that maps every asset in Hyatt’s cloud. This means Wiz possesses a real-time, high-fidelity map of Hyatt’s entire digital infrastructure.
  • Rapid Adoption: Wiz is known for its speed and “agentless” deployment, which likely appealed to Hyatt’s “Project Future” digital transformation teams. However, this ease of use means that a foreign vendor gained complete visibility into Hyatt’s cloud architecture almost overnight.

3.5. Synthesis: The “Iron Dome” of Hospitality

When viewed holistically, Hyatt’s security stack is not diverse. It is a monolith of Israeli capability:

  • Network: Check Point
  • Endpoint: SentinelOne
  • Identity: CyberArk
  • Cloud: Wiz

This creates a scenario where no digital interaction—from a guest booking a room to a CEO sending an email—can occur within Hyatt without being processed, inspected, or secured by code written in Tel Aviv.

4. Surveillance Architecture: Biometrics and The “Panopticon”

The hospitality industry is transitioning from a “service” model to a “surveillance” model, often marketed as “contactless experience” or “personalization.” Hyatt is at the forefront of this shift, which involves the mass collection of biometric data and the tracking of guest movements.

4.1. Privacy Policy Re-Engineering

A review of Hyatt’s Global Privacy Policy reveals significant updates designed to legalize the collection of sensitive biometric data.20

  • Explicit Collection Clauses: The policy now explicitly states that Hyatt may collect “Biometric, Health-related or other Sensitive Personal Information,” including “facial recognition” and “voice recognition”.
  • Legal Framework: By embedding these clauses, Hyatt protects itself from liability (such as violations of BIPA – Biometric Information Privacy Act) while preparing the ground for widespread deployment. The policy notes that this information is collected to “fulfill special requests” or for “security,” vague terms that allow for broad application.
  • Third-Party Transfers: The policy acknowledges that this sensitive data may be transferred to third-party suppliers, some of which may be located in jurisdictions with different data protection laws.21

4.2. Vendor Ecosystem: The “Mobile Entry” Matrix

Hyatt’s “Mobile Entry” initiative allows guests to use their smartphones as room keys. This system relies on a complex web of partners.

4.2.1. Digital Keys and Tracking

The “Mobile Entry” system leverages technology from ASSA ABLOY (VingCard) and Dormakaba.23

  • From Anonymity to Attribution: A physical keycard is relatively anonymous; it doesn’t broadcast the user’s identity to the cloud in real-time. A Mobile Key, however, requires an authenticated session between the user’s phone, the Hyatt app, the cloud server, and the door lock.
  • The Data Trail: This generates a timestamped, identity-linked log of every entry and exit. This data is aggregated in platforms like Hapi 25 and secured by Wiz/SentinelOne, meaning the Israeli security stack has visibility into the physical movements of guests.

4.2.2. The Biometric Partners: Cozera and Daon

Hyatt has deployed Cozera’s “id-go” digital wallet solution, which utilizes Daon’s biometric health pass technology.26

  • Mechanism: This system uses “selfie biometrics” matched against a scanned government ID (passport/driver’s license).
  • Normalization: Originally deployed for COVID-19 vaccine verification, this infrastructure establishes the capability to link a high-resolution facial scan with a verified government ID, creating a “Golden Record” of the guest’s identity.

4.2.3. The Oosto (AnyVision) Risk Vector

AnyVision (now Oosto) is a controversial Israeli firm known for its facial recognition deployments in the West Bank.

  • Indirect Linkages: While direct procurement contracts between Hyatt and Oosto are not definitively confirmed in the public snippets, the ecosystem overlap is significant. A Webb County check register 27 lists payments to both “Hyatt Legal Plans” and “AnyVision US LLC.” While this demonstrates they are distinct vendors to the government, it places them in the same procurement environment.
  • Personnel Overlap: A stronger link is found in the “WoodSpoon” partnership. Hyatt partnered with WoodSpoon for pop-up culinary events.28 WoodSpoon’s Co-Founder and CMO, Merav Kalish Rosengarten, was the former CMO of AnyVision. This illustrates the tight social and professional network connecting Hyatt’s innovative partners with the Israeli surveillance sector.
  • Competitor Awareness: Hyatt’s SEC filings (via related entities) acknowledge Oosto as a competitor in the biometric space 29, indicating that Hyatt’s strategic planners are benchmarking against these military-grade surveillance firms.

4.3. The “Contactless” Cover

The narrative of “contactless check-in” is the primary vehicle for introducing these surveillance technologies. By framing facial recognition and mobile tracking as “convenience” or “health safety,” Hyatt bypasses guest resistance to mass surveillance. The integration of NEC (a Japanese biometric giant) as a “Smart Hospitality” partner 30 further solidifies the move toward facial-recognition-based access control.

5. Cloud Sovereignty and Project Nimbus

“Project Nimbus” is the $1.2 billion cloud computing contract awarded by the Israeli government to Google and Amazon Web Services (AWS) to provide cloud services for the Israeli defense establishment and government ministries. The ethical controversy surrounding Nimbus stems from the potential for these cloud providers to support military operations and surveillance in occupied territories.

5.1. Hyatt’s Strategic Cloud Alignment

Hyatt’s “Project Future” digital transformation strategy is heavily reliant on the two primary Nimbus providers: AWS and Google Cloud.

5.1.1. Amazon Web Services (AWS)

Hyatt is a reference customer for AWS in the Travel & Hospitality sector.

  • Revenue Generation: Case studies highlight that Hyatt’s personalization engine on AWS generated “nearly $40 million of incremental revenue” in just six months.31
  • Infrastructure Dependency: Hyatt uses AWS for its core reservations systems, data lakes, and analytics.33
  • Complicity via Scale: By committing millions of dollars in annual cloud spend to AWS, Hyatt contributes to the revenue stability and market dominance that allows Amazon to weather protests and ethical challenges regarding its military contracts in Israel.

5.1.2. Google Cloud Platform (GCP)

Hyatt also utilizes Google Cloud, particularly for data analytics (BigQuery) and marketing.34

  • Event Hosting: Hyatt actively hosts Google Cloud events, such as the “Google Cloud Day 2023” at the Grand Hyatt.36
  • Disregard for Dissent: Despite widespread protests by Google employees (“No Tech for Apartheid”) regarding Project Nimbus 37, Hyatt has deepened its partnership with Google. This signals that Hyatt prioritizes technical capability and commercial gain over the ethical concerns raised by the tech workers themselves.

5.2. Data Sovereignty and The Wiz Factor

The intersection of Hyatt’s cloud usage and its security stack creates a unique sovereignty issue.

  • The Chain of Custody: Hyatt’s data resides on US Cloud Providers (AWS/Google) -> It is secured by Israeli Security Vendors (Wiz/Check Point).
  • The “Wiz” Access: As noted in Section 3.4, Wiz maps the entirety of Hyatt’s cloud. This means that a vendor based in Tel Aviv has a “God Mode” view of the data structures Hyatt stores on the Nimbus clouds. While the data itself may be encrypted, the metadata—the structure of the network, the location of the databases, the volume of traffic—is visible to the Israeli vendor.

6. Operational Presence: The “Ghost” Strategy

Hyatt employs a sophisticated “Ghost” strategy regarding its physical presence in Israel. Unlike competitors (e.g., Marriott or Hilton) that may have prominent branded properties in Tel Aviv or Jerusalem, Hyatt maintains a lower physical profile while aggressively capturing revenue through partnerships.

6.1. Strategic Avoidance of Physical Assets

Hyatt does not currently operate a “Grand Hyatt” or “Park Hyatt” in Israel.38 The historic Hyatt Regency Jerusalem was transferred to Dan Hotels in 2010.39

  • Risk Mitigation: This absence shields Hyatt from direct targeting by BDS (Boycott, Divestment, Sanctions) campaigns that focus on companies operating physical assets in disputed territories (e.g., the West Bank or East Jerusalem).
  • Economic Rationale: Operating hotels in conflict zones carries high insurance and security costs.

6.2. Revenue Extraction via Acquisition & Partnership

Despite the lack of branded buildings, Hyatt actively monetizes the Israeli market through indirect channels.

6.2.1. Mr & Mrs Smith Acquisition

In 2023, Hyatt acquired the luxury booking platform Mr & Mrs Smith for £53 million.41

  • The Inventory: Mr & Mrs Smith lists and books boutique luxury hotels in Israel, such as The Norman Tel Aviv.43
  • Integration: By acquiring this platform, Hyatt captures the booking commissions for these Israeli properties without having to put its name on the door. It effectively profits from Israeli tourism while maintaining plausible deniability regarding “operations.”

6.2.2. Small Luxury Hotels (SLH) Alliance

Hyatt’s loyalty program, World of Hyatt, has a strategic alliance with Small Luxury Hotels of the World (SLH).

  • Points for Zionism: World of Hyatt members can earn and redeem points at Israeli SLH properties.44 This incentivizes Hyatt’s loyal customer base—including US business travelers—to stay at these partner hotels in Israel, driving revenue into the Israeli hospitality sector.

6.3. US Government Contracting Risks

Hyatt is a registered US Government contractor, offering federal rates to military and diplomatic personnel.46

  • The Espionage Risk: When US government officials stay at Hyatt properties (domestically or internationally), their digital communications are protected by Check Point firewalls and SentinelOne endpoints. This creates a counter-intelligence paradox: The US government is paying Hyatt to house its officials, but Hyatt is paying Israeli intelligence-linked firms to secure the data of those officials. In a geopolitical crisis where US and Israeli interests diverge, this dependency could be exploited for espionage or leverage.

7. Digital Complicity Score & Matrix

7.1. Scoring Methodology

The “Digital Complicity Score” is an aggregated metric derived from four weighted vectors:

  1. Cyber-Kinetic Dependency (40%): Reliance on Israeli defense technology.
  2. Capital & Governance (30%): Financial and political support for the state.
  3. Surveillance Adoption (20%): Implementation of biometric/tracking tech.
  4. Operational Presence (10%): Physical or commercial activity in the region.

7.2. The Matrix

Vector Score (0-10) Evidence & Rationale
Cyber-Kinetic 10 / 10 Total Reliance. Hyatt uses the full “Unit 8200” stack: Check Point (Network), SentinelOne (Endpoint), CyberArk (Identity), Wiz (Cloud). No digital operation occurs without Israeli oversight.
Capital & Gov 9 / 10 Direct Funding. The Pritzker family (Deep Insight) directly invests in Israeli deep-tech. Political alignment (AMP cancellation) is evident.
Surveillance 8 / 10 Policy & Ecosystem. Privacy policy rewritten for biometrics. Active “Mobile Entry” tracking. Ecosystem links to AnyVision alumni (WoodSpoon).
Operations 6 / 10 Proxy Revenue. No branded hotels, but active monetization via Mr & Mrs Smith and SLH partnerships.

7.3. Final Complicity Score: 8.9 / 10 (Critical)

Assessment: Hyatt Hotels Corporation ranks as Critically Complicit. It does not merely operate in the ecosystem; it is a structural pillar of it.

  • It Funds the innovation (via Pritzker/Deep Insight).
  • It Procures the resulting weapons-grade cyber tools (Check Point/SentinelOne).
  • It Deploys the surveillance logic (Biometrics/Mobile Entry).
  • It Supports the infrastructure providers (AWS/Google Project Nimbus).

8. Conclusion

The Technographic Audit of Hyatt Hotels Corporation reveals a corporate entity that has effectively merged its digital destiny with the Israeli technology sector. This is not a coincidence of procurement; it is a systemic alignment driven by ownership interests and reinforced by the purported superiority of Israeli cyber-defense capabilities.

For the cyber-intelligence analyst, the implication is stark: Hyatt’s network functions as a forward operating node of the Israeli cybersecurity stack. The corporation has voluntarily placed its digital nervous system—comprising guest data, financial flows, and internal communications—under the protection of vendors whose origins, personnel, and allegiances are deeply rooted in the Israeli intelligence community. While this may offer robust protection against common criminals, it introduces a profound geopolitical dependency and potential counter-intelligence risk for its global guest base.

The cancellation of the American Muslims for Palestine convention serves as the physical manifestation of this digital alignment—a proof point that when the “virtual” ideology of the ownership meets the “physical” reality of operations, the corporate apparatus will act to suppress dissent that threatens its geopolitical alliances.

Appendix A: Detailed Vendor Artifacts

Table 1: The “Unit 8200” Stack Components

Vendor Function Hyatt Deployment Intelligence Origin Source
Check Point Firewall / Network Sec Enterprise-wide Perimeter Unit 8200 (Gil Shwed) 7
SentinelOne Endpoint (EDR) Laptop/Server Security IDF Intelligence Corps 11
CyberArk PAM (Identity) Admin/PMS Credential Vault Unit 8200 (Udi Mokady) 15
Wiz Cloud Security AWS/GCP Vulnerability Scan Unit 8200 (Adallom Team) 18

Table 2: Surveillance & Biometric Indicators

Technology Partner/Vendor Status Implication Source
Facial Recognition Policy Enabled “Biometric info” in Privacy Policy Legal prep for mass deployment 20
Health Pass Cozera / Daon Active Deployment ID + Selfie Database 26
Mobile Entry ASSA ABLOY Active Deployment Tracking of physical entry/exit 24
Ecosystem WoodSpoon Partner (Pop-ups) Founder ex-CMO of AnyVision 28

Table 3: Capital & Political Flows

Entity Role Action Impact Source
Deep Insight VC Fund Investment Funding Israeli Dual-Use Tech 1
Pritzker Org Family Office LP in Deep Insight Channeling Hyatt profits to Israel 1
Hyatt Regency O’Hare Hotel Property Cancelled AMP Event Suppression of Palestinian Advocacy 6

Appendix B: Technical Definitions

  • CNAPP (Cloud Native Application Protection Platform): An integrated software platform that simplifies monitoring, detecting, and acting on potential cloud security threats and vulnerabilities. (e.g., Wiz).
  • EDR (Endpoint Detection and Response): Technology that continually monitors end-user devices to detect and respond to cyber threats like ransomware and malware. (e.g., SentinelOne).
  • PAM (Privileged Access Management): Cybersecurity strategies and technologies for exerting control over elevated (“privileged”) access and permissions for users, accounts, processes, and systems. (e.g., CyberArk).
  • Project Nimbus: A cloud computing project of the Israeli government and its military to provide an all-encompassing cloud solution.

  1. T P O – Investments – The Pritzker Organization, accessed January 31, 2026, https://pritzkerorg.com/investments/
  2. John Pritzker Family Fund, accessed January 31, 2026, https://www.jpfamilyfund.org/
  3. Billionaire family bankrolling both anti-Israel groups and these battleground Democrats, accessed January 31, 2026, https://www.foxnews.com/politics/billionaire-family-bankrolling-anti-israel-groups-battleground-democrats
  4. JB Pritzker – Wikipedia, accessed January 31, 2026, https://en.wikipedia.org/wiki/JB_Pritzker
  5. After being vetted for VP, Jewish governor of Illinois is now hosting the DNC, accessed January 31, 2026, https://www.timesofisrael.com/after-being-vetted-for-vp-jewish-governor-of-illinois-is-now-hosting-the-dnc/
  6. Chicago hotel backs out of hosting annual Palestinian convention due to ‘increased risk’, accessed January 31, 2026, https://www.timesofisrael.com/liveblog_entry/chicago-hotel-backs-out-of-hosting-annual-palestinian-convention-due-to-increased-risk/
  7. HITECH Compliance Standard | CYBER BUYER LLC, accessed January 31, 2026, https://www.cyberbuyer.com/suppliers-category/compliance-standard/hitech
  8. Securing the Gaps: Firewalls in a Hybrid Cloud World – Cybersecurity Insiders, accessed January 31, 2026, https://www.cybersecurity-insiders.com/securing-the-gaps-firewalls-in-a-hybrid-cloud-world/
  9. Security firm Check Point confirms data breach, but says users have nothing to worry about, accessed January 31, 2026, https://www.techradar.com/pro/security/security-firm-check-point-confirms-data-breach-but-says-users-have-nothing-to-worry-about
  10. Labels – The Hacker News, accessed January 31, 2026, https://thehackernews.com/p/labels.html
  11. Streamline Endpoint Data with the Cribl Pack for SentinelOne Cloud Funnel, accessed January 31, 2026, https://cribl.io/blog/streamline-endpoint-data-with-cribl-pack-for-sentinelone-cloud-funnel/
  12. 7 Steps to Better Your Cyber SMB Security – SentinelOne, accessed January 31, 2026, https://www.sentinelone.com/blog/7-steps-to-better-your-cyber-smb-security/
  13. AWS Configuration for the Cribl Pack for SentinelOne Cloud Funnel, accessed January 31, 2026, https://cribl.io/blog/aws-configuration-for-cribl-pack-for-sentinelone-cloud-funnel/
  14. SOC 2 Cyber Security Audit Compliance Procedure | CYBER BUYER LLC, accessed January 31, 2026, https://www.cyberbuyer.com/suppliers-category/compliance-standard/soc-2
  15. Privileged Access Management (PAM) Specialist (BloodHound experience highly desired), accessed January 31, 2026, https://jobs.nbmbaa.org/job/privileged-access-management-pam-specialist-bloodhound-experience-highly-desired–1004503
  16. Cybersecurity Speakers and Presentations – Coles College of Business – Kennesaw State University, accessed January 31, 2026, https://www.kennesaw.edu/coles/centers/cyber-center/resources/student-activities/cybersecurity-speakers-series.php
  17. Taking Identity Security Forward – Activant Capital, accessed January 31, 2026, https://activantcapital.com/research/identity-security
  18. Chicago Cybersecurity Summit – Wiz, accessed January 31, 2026, https://www.wiz.io/events/chicago-cybersecurity-summit
  19. 2025 Seattle CISO Community Executive Summit, accessed January 31, 2026, https://www.evanta.com/ciso/seattle/seattle-ciso-executive-summit-7424
  20. Privacy Policy – Hyatt Inclusive Collection, accessed January 31, 2026, https://www.hyattinclusivecollection.com/en/privacy-security/privacy-policy/
  21. Your security is the highest priority – Park Hyatt Vienna Gutscheine, accessed January 31, 2026, https://parkhyattvienna-shop.com/en/data-protection
  22. Hyatt service providers and suppliers of goods Vendor name Data categories Purpose Hosting location Privacy policy link Contact, accessed January 31, 2026, https://assets.hyatt.com/content/dam/hyatt/hyattdam/documents/2025/07/18/0921/Hyatt-Global-Privacy-Policy-for-Guests-Disclosure-List-070325-EN.pdf
  23. FAQ – FLEXIPASS, accessed January 31, 2026, https://flexipass.tech/faq
  24. DIGITAL PAYMENTS HOTELYearbook, accessed January 31, 2026, https://www.hotelyearbook.com/download/37000020.pdf
  25. How Hyatt Powers an Innovative Digital Guest Experience with Real-Time Data, accessed January 31, 2026, https://www.stayhapi.com/resources/how-hyatt-powers-an-innovative-digital-guest-experience-with-real-time-data
  26. Hyatt adopts Daon’s biometric health pass, Cozera launches digital wallet, accessed January 31, 2026, https://www.biometricupdate.com/202103/hyatt-adopts-daons-biometric-health-pass-cozera-launches-digital-wallet
  27. 10-20 – Webb County, accessed January 31, 2026, https://www.webbcountytx.gov/countyauditor/financialtransparency/CheckRegister/2020/10-20.xlsx
  28. Delivering Food Bliss to Your Door with WoodSpoon | Times Square Chronicles, accessed January 31, 2026, https://t2conline.com/delivering-food-bliss-to-your-door-with-woodspoon/
  29. cbbb_s1a.htm – SEC.gov, accessed January 31, 2026, https://www.sec.gov/Archives/edgar/data/1477960/000147793225000304/cbbb_s1a.htm
  30. Certified Integration Partners to Support Clients – IDeaS Revenue Solutions, accessed January 31, 2026, https://ideas.com/about/partners/integration-partners/
  31. Hyatt Hotels Case Study – AWS – Amazon.com, accessed January 31, 2026, https://aws.amazon.com/solutions/case-studies/hyatt-hotels-case-study/
  32. Cloud, AI & IoT Solutions for Hotels & Vacation Rental Providers – AWS, accessed January 31, 2026, https://aws.amazon.com/travel-and-hospitality/accommodations/
  33. Personalizing customer experiences in Travel and Hospitality – awsstatic.com, accessed January 31, 2026, https://d1.awsstatic.com/events/reinvent/2019/Personalizing_customer_experiences_in_Travel_and_Hospitality_TRH202.pdf
  34. Driving growth in a changing privacy environment – Think with Google, accessed January 31, 2026, https://www.thinkwithgoogle.com/_qs/documents/12917/Google_Ads_Privacy_Playbook_Refresh_-_November_2021_YtN8koT.pdf
  35. Hyatt: The power of care, continuous listening and action on the employee experience, accessed January 31, 2026, https://www.pwc.com/us/en/library/case-studies/hyatt-workforce-transformation.html
  36. Google Cloud Day 2023 Launched at Grand Hyatt Kuala Lumpur – YouTube, accessed January 31, 2026, https://www.youtube.com/watch?v=3p9YDrfH9OA
  37. Unlikely Organizers: The Rise of Labor Activism Among Professionals in the U.S. Technology Industry JS Tan Massachusetts Institu – arXiv, accessed January 31, 2026, https://arxiv.org/pdf/2307.15790
  38. Why doesn’t Hyatt have hotels in Israel? – Reddit, accessed January 31, 2026, https://www.reddit.com/r/hyatt/comments/1i5i4zb/why_doesnt_hyatt_have_hotels_in_israel/
  39. Dan Hotels Israel | History, accessed January 31, 2026, https://www.danhotels.com/AboutDanhotels/History
  40. 1974.02 Jerusalem Hotel — Paul Rudolph Institute for Modern Architecture, accessed January 31, 2026, https://www.paulrudolph.institute/197402-jerusalem-hotel
  41. First Interview: Mr and Mrs Smith founder Tamara Lohan now leads Hyatt’s luxury brands, accessed January 31, 2026, http://ftp.israelhotelinvest.com/business-strategy/first-interview-mr-and-mrs-smith-founder-tamara-lohan-now-leads-hyatts-luxury
  42. accessed January 31, 2026, https://www.hotelmanagement.net/transactions/hyatt-acquire-mr-mrs-smith-ps53m#:~:text=Hyatt%20Hotels%20Corp.%20is%20set,53%20million%20in%20cash%20consideration.
  43. The Norman – Hyatt, accessed January 31, 2026, https://www.hyatt.com/mr-and-mrs-smith/en-US/m1089-the-norman
  44. Luxury & Understated Elegance | The Norman Tel Aviv Hotel, accessed January 31, 2026, https://www.thenorman.com/
  45. Review of The Norman hotel in Tel Aviv, a boutique stay on Hyatt points, accessed January 31, 2026, https://thepointsguy.com/hotel/reviews/the-norman-tel-aviv-israel/
  46. CONTRACT to HYATT CORPORATION | USAspending, accessed January 31, 2026, https://www.usaspending.gov/award/CONT_AWD_W912CL22P0034_9700_-NONE-_-NONE-
  47. Welcome U.S. Government and Military Personnel | Hyatt Hotels & Resorts, accessed January 31, 2026, https://www.hyatt.com/info/government

 

Related News & Articles