Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Article»DATA CENTRIC SECURITY MODEL AND WHY IT MATTERS

    DATA CENTRIC SECURITY MODEL AND WHY IT MATTERS

    July 10, 2024 Article Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a recent survey of attendees at the annual Black Hat Security conference, 77% responded that they believe no passwords are safe from hackers or the government. With so many enterprises facing so many different challenges it’s no wonder why security seems like such an overwhelming and difficult thing to do well. Every CIO and CISO tries to balance the need for data security and user access to allow them to do their job, but far too often this balancing act becomes untenable because of rapid changes to their business and the need to react fast to changing conditions. IT Security needs to provide business safe guards while not impeding the ability of the business to meet their needs and service their customers.

    There are several ways and methods that are considered best practices to protect enterprises from breaches from the edge of your network all the way down to access controls. As cyber attacks continue to dominate news headlines it stands to reason that many enterprises struggle with implementing and staying current with security best practices. As hackers get more sophisticated and find new ways to breach your security protections, it seems that user access (passwords) tends to be the area with the most success. It stands to reason that all enterprises will eventually have some form of a breach.

    So what are hackers after? Most of the time it’s what your business holds and maintains that keeps you in business. For Gaming and Hospitality enterprises much of that is sensitive customer data and what drives your business everyday such as credit card numbers, addresses, player data, etc. There has been much work on securing application systems, but what about the data itself? Too often there are business reasons that users need to access the data for a myriad of reasons such as reporting, analysis, and even to share information with other departments that may not have access to the system in question, but need to access a portion of the data. How many times have you gotten an Excel spreadsheet that contains sensitive data over email? Hopefully this doesn’t occur often, but when it does there probably was a good intention that has resulted in data without the security safeguards put in place by IT security personnel. This leads me to the conclusion that IT Security professionals need to treat the data itself as another layer of protection in their Cyber Security strategy.

    Traditional Information Technology Encryption Security

    In many cases IT Security professionals employ strategies such as encryption to protect the data and keep it secure. Encryption is simply the process of encoding information in such a way that only authorized parties can read it. There are many methods of encryption such as Hashing, Public Key and Private Key. These all use algorithms to change the clear text information into a format that is essentially unreadable and protected if the data is intercepted by someone who is unauthorized.

    The problem with this method is that it basically leaves the data unreadable to anyone and any program that uses this data unless it is entirely decrypted. This can be a problem if an application needs to use part of the data because unless the program is capable of using credentials to decrypt the data and then re-encrypt the data when it is done using it, the data is basically unusable. This is typically known as Cypher Block Chaining(CBC) encryption.

    In contrast, another method of encryption that can deal with encrypting or “scrambling” certain characters or fields of data is called Format Preserving Encryption (FPE). This method refers to encrypting data in a way that the results after encryption is in the same format as the input. The input is typically called clear-text and the encrypted output is known as the cypher-text. This is sometimes referred to as tokenization and essentially is the process of substituting sensitive data with a non-sensitive version that has no extrinsic or exploitable meaning or value.

    Traditional Encryption Models and Next Generation Encryption/ Tokenization Models

    To illustrate how FPE compares to CBC encryption, please refer to Figure 1: FPE and CBC Encryption Comparison. In this example there are two different records for two different kinds of information, but both require protection because of the sensitive nature of the data. This is typical data that gets collected through many different methods such as hotel reservation systems, Casino Player card information, credit applications and similar points of customer service.

    In the first example, the customer’s first name, last name, social security number and date of birth need protection. By using FPE, the characters are replaced with text so that when the data is stored it retains the same characteristics or field requirements without breaking field integrity of the database. The unique advantage of this type of encryption is that it is possible to define what fields or what characters should be scrambled and what fields or individual characters should not be scrambled. In the first example the first name and last name have been scrambled completely. However, for the social security number the last four digits can remain clear while the rest of the numbers are scrambled. This allows other programs, systems, or individual users to use or see this data without full exposure to all of the sensitive data. If you compare these encryption results with the results of the CBC encryption, absolutely none of the data is useful unless it is all unencrypted.

    Typically, CBC encryption does not retain datafield integrity and strings of encrypted data areunusable by other programs, systems, or users without full decryption of all of the data. (As shown in Figure 1)

    • Advanced Encryption Standard (AES) – Cypher Block Chaining (CBC)
    • Advanced Encryption Standard (AES) – Format-Preserving Encryption (FPE) and Tokenization

    In the second example, we focus on the fields for first name, last name, and checking account number. In this case the business needs to have portions of the checking account number to be readable, but the last nine digits need to be scrambled. With FPE this can be accomplished as compared with the CBC results that encrypt everything, again all or none of the data.

    Data Centric Security Model

    In today’s IT Security models there are multiple layers of protection and each one serves a purpose that is intended to safeguard sensitive business and customer information. As sensitive data traverses each one of these layers there are potential security gaps that exist and are potential areas of exploit. On top of this potential problem, how many vendors would a multi-layer model employ? And then of course are the challenges between vendors and interoperability and compatibility. This quickly can become overwhelming especially during audits and other regulatory exercises. A method that many IT Security professionals are implementing is a data centric security approach in addition to the existing security safeguards.

    An example representation is in Figure 2. If encryption or tokenization is implemented at the data ingestion or creation point, then that data will be protected regardless of what layer of data ecosystem it passes through. This also opens up the possibility to use real data, which has been tokenized and protected, in other areas of the business without having the potential to increase the PCI scope because sensitive data is already encrypted. Initiatives such as Big Data projects can now use real data for real business value without PCI scope impacts or fear that sensitive data will be seen by any user. Test and Dev environments can now use real data as well since the source is tokenized and only elements are of the data are unencrypted and the format fields are maintained.

    These are just two examples that could bring significant value to a business while still maintaining strong safeguards for what is important to any operator, their customer data.

    Summary

    Today cyber security is such an important aspect of an IT operation and this adds to the already huge demand to maintain operational efficiency. With the constant security threats that every IT Security professional faces, it makes it difficult to maintain a consistent security model with so many points of data entry and so many demands from the business for easy access to needed data. As hackers become more sophisticated and security breaches occur more often, an additional approach to protecting the primary asset, sensitive customer data, would make sense while maintaining operational access without any additional burden on systems or users.

    Through the use of tokenization encryption, enterprises can protect the important data so that if it is compromised it has little to no value for the attacker. And in today’s world of connected systems, it seems it’s not a matter of if an enterprise will have a data breach, but more likely a question of when it will occur.

    Victor Barajas serves as the Enterprise Architect and Chief Technologist for Hospitality and Gaming at HP Enterprise supporting gaming operations across North America. Mr. Barajas is responsible for establishing the technology roadmap for customers that look to HP Enterprise to help develop strategic business transformation within technology and the digital guest experience. Mr. Barajas has over 15 years in the Hospitality and Gaming industry and he has been involved in more than 6 casino resort ground-up projects and major system conversions. Prior to joining the HP Enterprise, he served as part of the Hospitality and Gaming vertical team at Microsoft Corp. and served as its Technology Strategist for Las Vegas for 5 years.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    2025 Transformation and Change

    March 16, 2026

    Train the Mind, Tune the Machine: Designing AI for Human Self-Efficacy

    March 16, 2026

    AI Agents Are Silently Accessing Your Most Sensitive Data, and Most Companies Have No Idea

    March 16, 2026

    Comments are closed.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT