The Super Bowl has once again set new records for sports wagering. While the final figures are still being confirmed, the American Gaming Association projected an unprecedented $1.39 billion in legal bets on Super Bowl LIX. Sportsbook companies such as FanDuel have already reported a 19% increase in bets compared to the previous year, reaching a new peak of 16.6 million bets from nearly three million active users.

During this historic Super Bowl weekend, Continent 8 Technologies, the leading industry provider of managed global hosting, connectivity, cloud, and cybersecurity solutions, served as the crucial backbone of the Super Bowl’s betting network, enabling the majority of bets worldwide. In this blog, we explore the detailed planning and preparation that support our customers during premier sporting events.

Step 1: KYC – Know Your Customer

Preparation for the Super Bowl began well in advance of the event. In the last couple of years, we have invested heavily in strengthening our network relationships through our enhanced ‘Know Your Customer’ philosophy. This strategy includes launching and engaging in in-depth discussions at our Customer Advisory Board meetings, investing in executive sponsor programs and maintaining ongoing, insightful and strategic dialogues to address our customers’ current and future needs. This KYC approach ensures the creation of tailored, comprehensive road maps for each of our customers, enabling us to proactively anticipate and meet their needs through key support initiatives and activities, including the Super Bowl event

Step 2: Pre-game prep

With the Super Bowl scheduled for the second Sunday of February, we prepared for the anticipated surge in internet activity. Edward O’Connor, our Chief Technical Officer, shares the technical strategy leading up the event. “Our technical preparation began months prior to the Super Bowl. This centred around infrastructure and network upgrades and optimisation – including bandwidth increases in all key peering and IX locations, cloud infrastructure refreshes, among other changes – to ensure an interruption-free operation.”

As the event approached, the team developed a detailed preparation checklist concentrated around five key pillars. The checklist included:

Step 3: Game day-ready

A typical Super Bowl game lasts about 3 hours and 37 minutes. However, our ‘live’ Super Bowl experience lasted over five days, from Thursday to Monday. Our dedicated team managed game-specific operations, while a company-wide communication channel was available for check-ins or service requests.

To enhance our efforts, additional staff and resources were deployed on game day, across multiple global security centres as well as on customer sites, monitoring and optimising network performance in real time.

Continent 8 teams monitoring network activity across our various ‘war rooms’.

Step 4: Post-game analysis

The Philadelphia Eagles’ victory over the Kansas City Chiefs, with a score of 40-22, ended without any network or connectivity issues, despite what Edward described as “record-breaking from an internet traffic perspective.”

Long after the players left the field, our team continued to oversee network activity to ensure ongoing stability of all customer operations. Our Major Incident Management ‘playbook’ was crucial, serving as both a guide and a reminder of the need for continuous process evaluation and improvement as we transition from one event to the next.

As the Super Bowl campaign wrapped up, Edward was pleased with the behind-the-scenes connectivity support we provided for our customers. He shared, “The entire Continent 8 team was instrumental in ensuring a flawless Super Bowl experience. This careful, meticulous planning underscored our commitment to delivering a reliable and unparalleled service to our customers, allowing millions of users to place their bets and engage with the event in real time.

“With Super Bowl LIX now concluded, next up for the US sporting market: NCAA March Madness!”

Your trusted infrastructure and cybersecurity partner

For over 25 years, we have been the leading provider of global managed hosting, connectivity, cloud and cybersecurity solutions for the regulated iGaming and online sports betting industry. To learn more about how our best-in-class managed and professional services can power and protect your gaming platforms and operations, contact sales@continent8.com.

Jerad Swimmer, Regional Sales Director at Continent 8 Technologies, explores the benefits of Vulnerability Assessment and Penetration Testing (VAPT).

Jerad

Tribal casinos are experiencing substantial financial growth. As highlighted in my previous blog, 2023 was a landmark year for the tribal gaming sector, with revenues hitting a record $41.9 billion USD, as reported by the National Indian Gaming Commission. Consequently, tribal casinos are increasingly targeted by cybercriminals, with reports suggesting a nearly 60% increase in cyber attacks on tribes in 2023.

With significant financial and personal data at stake, cybersecurity in tribal gaming and casino environments is a critical priority. But where should you start? In this blog, I’ll explain why Vulnerability Assessment and Penetration Testing (VAPT) is the perfect first step to bolster tribal gaming cybersecurity.

What is VAPT?

Let’s begin by defining VAPT. Craig Lusher, our Product Principal of Secure Solutions, describes VAPT as the following:

“VAPT is defined as a comprehensive set of cybersecurity services that helps organizations identify, assess and mitigate vulnerabilities in their IT infrastructure, applications and networks. Periodic Vulnerability Assessments (VAs) scan to detect exploitable vulnerabilities in customer networks and infrastructure and record them in a register, prioritizing remedial work and demonstrating continuous improvement. Penetration Tests (PTs) use identified vulnerabilities to further exploit and gain access, testing the efficacy of preventative security measures, procedures and technology.”

By simulating real-world cyber attacks, pentesting enables tribal casino IT and cybersecurity teams to identify system weaknesses and address potential vulnerabilities before they can be exploited by malicious actors. This strategy not only strengthens the casino environment but also ensures that cybersecurity measures remain robust and adaptable to evolving threats.

Advantage #1: Hardened cybersecurity posture

VAPT aims to establish what we at Continent 8 call a “hardened cybersecurity posture.”

A hardened cybersecurity posture integrates multiple protective layers, adhering to best practices for adaptability to threats and changes. It begins with technical controls such as network segmentation, access management and encryption, complemented by active defenses including web application and API protection, intrusion detection and cybersecurity monitoring. This approach is guided by policies and procedures for incident response and risk management.

The core components of a hardened cybersecurity posture create a robust defense system. Technical controls prevent attacks, while monitoring systems identify threats. Regular assessments are conducted to uncover vulnerabilities and governance ensures consistent implementation. This comprehensive approach ensures that even if one safeguard fails, multiple other layers remain to protect assets.

Advantage #2: Essential for audit success

Implementing VAPT protocols is a beneficial practice for any tribal gaming organization. These measures not only bolster cybersecurity but also streamline internal and external audits.

By maintaining detailed records of testing and remediation efforts, casinos can demonstrate their commitment to cybersecurity to auditors. This transparency not only aids in passing audits but also enhances the casino’s reputation as a reliable and secure establishment.

Advantage #3: Proactive defense

Regular penetration testing provides tribal casinos with ongoing monitoring and enhancement of cybersecurity protocols, helping them stay ahead of potential cyber threats. This ensures a safer and more secure environment for both operations and players, while also building trust with internal and external parties and stakeholders. This proactive approach, again, is vital in preserving the casino’s integrity and reputation.

Key considerations for pentesting tools

When choosing penetration testing tools for tribal casino and gaming cybersecurity, select tools that offer comprehensive coverage, capable of evaluating a wide range of vulnerabilities across multiple systems and applications.

A comprehensive VAPT service should encompass the following:

For more information on VAPT or to book a meeting with me at TribalHub Cybersecurity Summit or the Indian Game Tradeshow (Booth 18), contact me at jerad.swimmer@continent8.com.

Cybersecurity solutions for a safer tomorrow

Continent 8 provides comprehensive, multi-layered threat prevention, detection and response solutions to secure your tribal organization’s digital assets in the face of evolving cyber threats. For more information on how Continent 8 can support your cybersecurity initiatives, email sales@continent.com or fill out our Contact Us page.

Also, be sure to watch the latest episode in our Tribal Talks: Cybersecurity Unlocked podcast series – also available on Spotify – to gain a deeper understanding of the technological advancements, cybersecurity challenges and best practices shaping tribal gaming landscape.

With the rapid evolution of technology, robust cybersecurity is vital for enterprises to protect sensitive information and systems from a range of cyber threats, including hacking, data breaches and malware attacks. As technology advances, so do the methods used by cyber criminals, necessitating the implementation of protective cybersecurity measures.

Craig Lusher

In this blog, Craig Lusher, Product Principal of Secure Solutions at Continent 8 Technologies, explores how Security Information and Event Management (SIEM) platforms and Security Operations Centres (SOCs) allow organisations to adapt to emerging threats, maintain a robust cybersecurity posture and meet regulatory compliance.

What is SIEM?

SIEM solutions consolidate security monitoring across an organisation’s diverse technology stack, enabling SOC engineers to detect and respond to threats through a unified management interface. SIEM solutions serve as the central hub of an organisation’s security system, collecting and normalising security logs and events from various IT sources including network devices, servers and security systems. They provide a central register for all security events and logs, performing event correlation, threat enrichment and analysis, filtering out informational events and promoting true security events and threats, helping organisations protect their systems from attacks and breaches.

What is SOC?

A SOC, or Managed Security Operations Centre (MSOC), such as those offered by Continent 8 and C8 Secure, is a dedicated team that focuses on safeguarding the company’s systems from security threats. Utilising various tools, such as a SIEM system, they watch over the company’s computer systems, spot any problems or attacks and respond to them quickly. The SOC functions as a cybersecurity team, ensuring everything is running smoothly and securely.

SIEM vs. SOC: the role of SIEM in SOC

SIEM systems are integral in SOC cybersecurity, offering SOC teams with a holistic view of their cybersecurity events.

To begin, the SIEM system correlates and analyses the aggregated security data from internal sources and external threat intelligence to identify any unusual or suspicious activities that could indicate a potential security issue. Upon detection, it promptly alerts the SOC team, enabling them to address the issue swiftly.

In the event of an incident, the SIEM system provides comprehensive information that assists SOC analysts in understanding the nature and severity of the threat. This insight aids in effective response and helps prevent future occurrences.

Additionally, SIEM systems support compliance efforts by generating reports and maintaining logs that demonstrate the organisation’s adherence to necessary regulations. These systems are indispensable for managing security incidents and events, facilitating efficient monitoring, detection and management of security challenges by SOC teams.

Can you have a SOC without a SIEM?

Operating a SOC without a SIEM system would be quite challenging. A SIEM system provides the centralised tool required to gather and interpret security data, which is crucial for effectively preventing, detecting, investigating and responding to threats. While a SOC might use other tools and methods, SIEM systems are integral for streamlining these processes and ensuring comprehensive cybersecurity management. SIEM systems employ advanced analytics and automation to filter and prioritise security alerts, preventing the cognitive overload, or alert fatigue, that occurs when SOC engineers manually process a constant barrage of security logs. This intelligent filtering not only reduces the risk of human error and missed security events but also optimises operational costs by allowing SOC engineers to focus their expertise on critical threat analysis and incident response rather than routine log review. The result is more efficient resource allocation and enhanced security effectiveness.

Keys to effective SIEM and SOC strategies

A successful SIEM and SOC strategy begins with defining clear objectives and goals for each system. Essential components of effective SIEM and SOC strategies include:

Continent 8’s SIEM and MSOC approach

Continent 8 offers a comprehensive SIEM and Managed SOC solution that addresses critical cybersecurity challenges. This platform provides centralised visibility of your entire infrastructure, coupled with 24/7 expert monitoring and rapid threat detection and response, ensuring regulatory compliance while allowing maintaining a robust cybersecurity posture.

Our SIEM and MSOC solution consists of the following key service components:

SIEM MSOC

Continent 8’s SIEM platform is a comprehensive, multi-tenant solution that gathers and correlates security data across a customer’s infrastructure. Enhanced by AI-driven SOAR and correlation capabilities with integrated threat intelligence tools, it delivers advanced analytics and automated incident response workflows. The platform is built for high performance, scalability and real-time threat detection, ensuring rapid identification and resolution of security incidents.

Continent 8’s MSOC solution is a fully managed, multi-tenant service offering real-time security monitoring and incident response for customers. Following the NIST framework, it leverages our sophisticated SIEM platform to collect and analyse security alerts, offering customers actionable insights and remediation strategies through tailored playbooks. By outsourcing security operations to Managed Security Service Providers (MSSPs) such as Continent 8, customers can focus on their core business while benefiting from the expertise of Continent 8’s 24/7/365 global SOC team.

Continent 8’s Sentinel managed device is deployed within the customer’s network, aggregating logs and events from various systems, normalising them and preparing the data for secure transmission to the SIEM. It utilises encryption to ensure data integrity and privacy, compressing and deduplicating data to optimise performance. Sentinel enhances security visibility by enabling seamless data collection and forwarding.

Continent 8’s Incident Response System integrates directly into Continent 8’s SIEM to streamline incident response processes. It provides a centralised platform for managing and tracking security incidents from detection to resolution, with built-in automation for workflows and playbooks. By enabling collaborative responses and providing real-time data sharing, it significantly improves incident resolution times while enhancing post-incident analysis and reporting.

Continent 8’s Cyber Threat Intelligence Service serves as a structured repository for aggregating, analysing and sharing cyber threat intelligence. It allows organisations to collect data on threats, actors and campaigns, helping security teams anticipate and mitigate potential attacks. Through its powerful visualisation tools, the service enhances situational awareness and enables proactive threat detection.

Continent 8’s Security Orchestration and Automated Response (SOAR) tool, implemented within Continent 8’s SIEM, provides a no-code automation platform for orchestrating and automating security workflows. Its drag-and-drop interface simplifies the creation of complex incident response processes, reducing manual effort and improving efficiency. With pre-built templates and over 2,000 app integrations, it enables quick deployment of automated responses, ensuring consistent handling of security incidents.

Continent 8’s Threat Analysers and Responders are automation tools integrated into Continent 8’s SIEM that enrich security events with threat intelligence from multiple sources. With over 100 analysers, they provide critical context for observables such as IPs and URLs, supporting faster decision-making during investigations. These tools enhance threat detection and response by simplifying data analysis and improving the quality of incident responses.

Continent 8’s Intrusion Detection System (IDS), combined with our proprietary Continent 8 Sentinel platform, provides advanced network security monitoring, threat detection and response capabilities, delivering unparalleled visibility and security throughout your entire network infrastructure.

MSOC Ecosystem

SIEM and MSOC – cybersecurity essentials

SIEM and MSOC services deliver significant cybersecurity enhancements through real-time monitoring, detection and response. This proactive approach aids in the early identification and mitigation of threats by collecting, analysing and correlating data from across a customer’s network with other ongoing security events. Collaborating with MSSPs also guarantees access to a dedicated team of SIEM and MSOC specialists who work closely with your IT team, providing playbooks and optimal risk mitigation strategies to address specific exploits or vulnerabilities, thereby ensuring optimal cybersecurity posture.

Cybersecurity solutions for a safer tomorrow

Continent 8 provides comprehensive, multi-layered threat prevention, detection and response solutions to secure your organisation’s digital assets in the face of evolving cyber threats. For more information on how Continent 8 can support your cybersecurity initiatives, email sales@continent8.com or fill out our Contact Us page.

Jerad Swimmer, Regional Sales Director at Continent 8 Technologies, explores the remarkable surge in tribal gaming revenues and its implications for cybersecurity.

Jerad

The year 2023 marked a significant milestone in the tribal gaming industry, with revenues reaching an all-time high of $41.9 billion USD, according to the National Indian Gaming Commission. Advisory firm Wipfli noted that this marked the fourth consecutive year of revenue growth for tribal casinos. This remarkable growth reflects the increasing popularity and expansion of tribal casinos across the United States.

The impressive revenue figures are a testament to the hard work and innovation within the industry, highlighting the importance of tribal gaming as a vital economic driver for many tribal communities. However, with great success comes great responsibility, particularly in the realm of cybersecurity.

Rising cyber attacks on tribal casinos

As tribal casinos flourish financially, they become attractive targets for cybercriminals. The surge in revenue has unfortunately been paralleled by a rise in cyber threats aimed at exploiting vulnerabilities within these establishments, with one source indicating that cyber attacks on tribes surged by almost 60% in 2023.

Cyber attacks on tribal casinos can range from data breaches to ransomware attacks, each with the potential to cause significant financial and reputational damage. The increasing sophistication of these threats demands a proactive and robust approach to cybersecurity to protect both the assets and the patrons of tribal gaming operations.

Notable cybersecurity incidents in tribal gaming

Several high-profile cybersecurity incidents have underscored the vulnerabilities within the tribal gaming sector. For instance, a tribal casino recently experienced a three-week closure due to an undisclosed cybersecurity incident. Casino officials advised previous guests to monitor their financial and credit card statements for any potential issues.

Another notable incident involved a ransomware attack that compromised all internet servers and data, with the attackers demanding up to $500,000 to restore services. These incidents highlight the critical need for enhanced cybersecurity measures to safeguard the integrity of tribal gaming enterprises.

Strategies for strengthening cybersecurity in tribal gaming

To counter the escalating cyber threats, tribal casinos must adopt comprehensive cybersecurity strategies. This includes implementing advanced threat prevention, detection and response systems, regular security audits and continuous employee training to recognize and mitigate potential threats.

Investing in cybersecurity infrastructure, such as firewalls and mobile endpoint protection, can significantly enhance the security posture of tribal gaming operations. Collaborating with cybersecurity experts and adopting industry best practices are also pivotal steps in fortifying defenses against cyber attacks.

The Continent 8 advantage

As cyber threats continue to evolve, tribal casinos can leverage innovative technologies and solutions to enhance their cybersecurity posture and ensure 360-degree protection. Key solutions include:

The future of tribal gaming in 2025 and beyond

As tribal gaming continues to thrive, the critical role of cybersecurity becomes increasingly evident.

In response to the escalating threat of advanced cyber attacks targeting tribal governments and organizations, the Department of Homeland Security announced on July 1, 2024, the allocation of over $18.2 million USD in grants to 32 tribal governments. These inaugural grants, issued under the Tribal Cybersecurity Grant Program (TCGP), represent a commitment to supporting tribal communities and gaming organizations in overcoming cybersecurity challenges within their digital infrastructures and environments.

By prioritizing cybersecurity in 2025 and beyond, tribal casinos can ensure sustained growth and resilience, safeguarding their revenues and reputation in an increasingly digital world. The path forward involves a balanced approach that combines innovation and vigilance, ensuring the prosperity and longevity of the tribal gaming sector.

Cybersecurity solutions for a safer tomorrow

Continent 8 provides comprehensive, multi-layered threat prevention, detection and response solutions to secure your tribal organization’s digital assets in the face of evolving cyber threats. For more information on how Continent 8 can support your cybersecurity initiatives, email sales@continent.com or fill out our Contact Us page.

Also, be sure to watch the latest episode in our Tribal Talks: Cybersecurity Unlocked podcast series – also available on Spotify – to gain a deeper understanding of the technological advancements, cybersecurity challenges and best practices shaping tribal gaming landscape.

Let's work together.

GET IN TOUCH

Asia +65 3165 4649
Europe +44 1624 694625
Latin America +54 11 5168 5637
North America +1 514 461 5120