Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Article»A GRIM REALITY

    A GRIM REALITY

    July 10, 2024 Article Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Over the past 15 years, G&L has delivered some of the best information in the marketplace quarter after quarter. Delivering critical information, new perspectives and new businesses to thousands of professionals so we can continue to educate our friends, employees, customers and other professionals alike with the latest in Gaming & Hospitality news.

    As a tribute to this anniversary I thought I would do my best to look back at some of the fundamental changes in IT security while highlighting some prominent changes from the past and what might be described as a grim future.

    For many IT professionals directly responsible for security initiatives over the past 15 years, it may be best summarized like salmon swimming up river only to eventually succumb to the teeth of a hungry bear or an angler in search of the big one. Keep up, keep up, keep up change strategies, implement new policies, new hardware, new software only to be steps behind the hackers’ latest advanced attacks – diverse in thousands of ways – to disrupt everything you have worked so hard to deliver to your business.

    It’s probably safe to say that among all of the core technologies under the IT umbrella, security has evolved faster than them all. Due to the nature of the threats, the way companies are being hacked and attacked, and the advancements in the technology the attackers are using, security had to evolve quickly.

    Big Security Changes

    • Public Knowledge – One of the biggest changes to IT Security in general is how public it has become in the market place in the past 15 years. In the early 2000’s it was unheard of for a company to acknowledge a breach. Even more unheard of was for a company to provide any details or results of the breach. Prior to Breach Notification laws going into effect in most U.S. states and territories, the consumer was in the dark about what was happening with their sensitive data and most companies were perceived as having it under control. Fast forward to present day, it is commonplace to read about a security breach with the exact details of how a company was compromised. Security breaches have now become the public’s right to know. Forcing large enterprise companies to not only invest in the security products needed to protect their data, but also focus heavily on brand management to create a strong security perception to their customer base.
    • Data Loss – Breached, hacked, compromised, fraudulent charges. Everyone who has been using a computer over the past 15 years has experienced some form of a security breach whether they know it or not. It’s hard to believe, but the industry has really started to adopt the assumptive breach analogy. Which means that you must assume you have already been breached and you should be taking remediation steps to that effect. From owning your own personal PC to managing massive data centers, mitigating the impact of an attack and protecting as much data as possible is the name of the game. This belief has forever changed the security practices for individuals and corporations alike.
    • Security Posture – Enterprise companies have been forced to change their stance on security as the advancement in criminal activity continues to evolve. Corporate security professionals are no longer looked at as the defenders at the gate tasked with protecting the perimeter of the company. They are now tasked with using proactive forensic tools designed to locate threats that are potentially already hiding within the infrastructure. Constant probes and proactive monitoring just scratch the service of Enterprise Security remediation these days.
    • Tools of the Trade – Year after year IT Security spend has eclipsed the previous year’s spend. More sophisticated attacks equal more sophisticated equipment. More advanced firewalls, proactive monitoring, antivirus software, intrusion detection prevention, encryption, tokenization, dual authentication, etc. The massive list of tools to mitigate risks grows longer, more complicated and more expensive every year.
    • Tools of the Engineer – Advanced tools of the trade naturally lead us into the shrinking pool of professionals who can effectively operate these tools. Administrators who were once responsible for onboarding new users, setting up and maintaining access controls and administering passwords are now responsible for a whole lot more. Keeping up with the security tools needed

      to protect the company will likely determine many engineers’ value and longevity within the organization.

    So by taking a look back are we able to provide some foreshadowing of what is to come in the next 15 years of security? Alright, maybe the next 5 and that would be a reach. The 2015 review of cited breaches reached nearly 4000 with more than 736 million records compromised. This shattered the previous year! Are we left to believe that this will inherently become worse every year? If that’s the case, are the best practice security postures we share within the enterprise community really doing anything to stop the next attack on your business? Or, as previously stated in other articles, are we just preparing to limit the amount of damage the next attack has on the organization and hope we have a job left after?

    It is truly a sad state of affairs when cybersecurity which was once described as really only being an issue for military grade information is now fully backed and sponsored by countries looking to inflict cyber pain. Confirmation of Russian and Chinese backed attacks associated with government systems would prove to just be the start of what is now a full-fledged cyber war between many countries. We have also come to know that their focus is not to just compromise government data, but they are now focused on business espionage. It is clear that many motives of cyber-attacks are not only for competitive, military and government information, but they are targeting business information as well as politically motivated attacks to draw attention to a specific political agenda.

    So just in case you didn’t have enough to worry about in the coming years as an IT Security Advisor to your company, you now get to worry about politically motivated attacks on top of financially motivated attacks. We are now dealing with hacktivist’s whose primary goal is to not steal sensitive or financial data, but rather disrupt your business from operating just to make a point. DDos attacks really started to get popular about five years ago as hackers were looking to expose sensitive data that could potentially shed a negative light on a particular company. One of the most prominent attacks over the past few years being Sony Pictures where the attack was said to be motivated by the release of an upcoming movie.

    I might argue that a DDos attack like this can do more damage to an organization than a typical hack looking to steal data for financial gains. The Sony attack, and a few other enterprise attacks that have impacted some of my largest clients, did significant damage to the company’s brand and many of the high level executives within the organization. Sony’s stock dropped almost 25% during the 15 day period where data was gradually being leaked every day. For weeks this crippled Sony and the ramifications impacted thousands of employees and other companies causing monetary damages that will be added up for years to come.

    And the foreshadowing gets better! A look ahead shows that cyber-attacks will take on more personalization and consumerization which will likely include the rise in attacks against corporate competitors, political opponents, and just ruthless hackers who want to take credit for taking down corporate America. With the evolution of smarter technology comes the burden to keep it secure.

    A look ahead shows the continued explosion of devices such as phones, tablets, wearables, smart TV’s and IoT Devices. The connected devices forecast is projected to exceed more than 200B by 2020. The number of wearable devices alone is expected to jump from 200M this year to more than 750M in less than three years.

    Looking back the last 10-15 years obviously reveals simpler times, and a short look forward is daunting to say the least. It’s safe to say that as we continue to improve the defensive posture within the security community that the continued advancement in technology will make the next 15 years extremely interesting to say the least.

    Ryan Smith has spent most of his IT career supporting the Gaming & Hospitality market. First as an integrator for Cisco Systems, EMC and VMware and then as a Global Enterprise Account leader for Hewlett Packard. Ryan has helped build Enterprise architectures to support the world’s largest Gaming & Hospitality companies in more than a dozen countries. Ryan is the Founder and CEO of LCG, Inc. An IT Security Company with a core focus of helping companies address how new security standards and new payment architectures will impact their business. The team at LCG is focused on addressing the latest in breach and threat mitigation with IT Security Solutions and Software that remove liability from the customer.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    2025 Transformation and Change

    March 16, 2026

    Train the Mind, Tune the Machine: Designing AI for Human Self-Efficacy

    March 16, 2026

    AI Agents Are Silently Accessing Your Most Sensitive Data, and Most Companies Have No Idea

    March 16, 2026

    Comments are closed.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT