Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical Security

Cyber Tactics

Securing the casino floor from cybersecurity threats

Upgraded casino technology and innovations require an evolution of the role of security teams within the entertainment industry.

By Kevin Kealy
Casino Floor

StefaNikolic / E+ via Getty Images

August 15, 2023

Advances in technology and the digitalization of casino games should have casino operators looking at slot machines and table games as tech assets managed by the information technology (IT) team, rather than appliances on the casino floor. The upgraded technology and innovations have also required an evolution of the role of security teams within the casino-entertainment industry. The result of including this “new” IT infrastructure is a heightened need for increased cybersecurity within gaming.

Cybersecurity Ventures predicts cybercrime costs to reach $10.5 trillion annually by 2025. At Light & Wonder, a cross-platform gaming and gambling company, we have started to strengthen the relationships with our partner casinos to assist in the transformation of casino security.

The historical lack of understanding and communication between casino operators, IT teams and regulatory boards increases the risk of casinos falling victim to a cyberattack, which would result in property closures, loss of revenue and damaged credibility in an industry where dollars and cents are paramount. In recent years, my position has uniquely evolved to that of a liaison between all stakeholder parties, including the aforementioned casino operators, IT teams and regulatory boards. The important involvement of information security has extended to players and customers as we determine ways to keep casinos safe from problems such as hacks, breaches and ransomware.

Gone are the days of inserting a coin, pulling a lever and watching the mechanical wheels of a slot machine spin. Most modern-day slot machines and table games are operated by PCs, meaning that regular maintenance of a slot machine should be under the purview of information technology professionals. Bridging the gap in communication between casinos and IT at many casinos is critical to sound and safe operations.

Without a clear path and practices for communicating, much of the gaming industry is dependent on out-of-date technology, which can make games — and entire casino floors — more susceptible to cyberattacks. In my industry experience, the technology on casino floors gets patched perhaps once a year, if at all. The need for more frequent fixing, updating and improving is crucial. If an operator is not regularly applying patches and experiences an attack on its system, the entire casino floor could risk shutting down as a result of malware or ransomware.

Regular patches, while needed, create an additional set of complex challenges. For example, every time technology gets patched, it may have to be approved by government regulators, and in a highly regulated industry, this is no easy feat. If casinos were to apply a patch every month to every one of their slot machines or other casino floor devices, the process would become expensive and time-consuming. As chief information security officers, we aim to navigate this huge challenge of ensuring operator safety while meeting or exceeding the expectations of government regulators.

By keeping the lines of communication open between the casino operators, IT and the various regulatory bodies, we can demonstrate the significance of detaching underlying operating systems (such as Windows or Linux) from the game code — that software that makes the graphics, logic and math that you see on the casino floor. With game code generally unimpacted by regular operating system patching updates, it is the responsibility of the gaming industry to educate regulators that regular updates of operating systems are vital to the health of the gaming industry in mitigating ransomware and malware. Writing better and stronger code will also strengthen the security of operating systems.

It is to the benefit of both regulators and casino floor operators to want to further increase security measures to uphold the reputation and credibility of the gaming industry. Without this in the U.S., if ransomware were to take over a casino floor, that operator may be prevented from paying the ransom if the money was going to a prohibited place or organization. The U.S. federal government has also proposed legislation making it illegal to pay a ransom under any circumstances. The problem is that ransomware can and will swiftly spread across a vulnerable environment such as a casino floor. It may then be extremely hard to recover and eradicate the infection. Even if a ransom is paid, we have seen that there is no guarantee of “honor among thieves” — sometimes the victim is left severly compromised, and they’re out the sum they paid.

As casino cybersecurity leaders, it is our responsibility to protect our internal systems and those of our customers. As we continue to move toward a digital gaming landscape, it is imperative to improve communication and cooperation on cybersecurity matters between operators, suppliers and regulators to ultimately benefit the safety and security of players.

KEYWORDS: career development cybersecurity careers cybersecurity skills gap security career security career training talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kealy headshot

Guest columnist Kevin Kealy is Chief Information Security Officer (CISO) at Light & Wonder, a cross-platform gaming and gambling company headquartered in Las Vegas, Nevada.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Malware email detected

    Securing business email accounts from malware threats

    See More
  • insider-threats-freepik1170x658v13.jpg

    Cybersecurity from the inside out — Guarding against insider threats

    See More
  • From the Front Door to the Plant Floor

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing