Offensive Security Assessments & Compliance Strategy & Resilience Industries Approach FAQ Request Scope

Casino & gaming
cybersecurity, rooted
in Las Vegas.

Adversim is a Las Vegas-based cybersecurity firm with deep experience securing gaming operators — from the Fremont Street downtown corridor and the Strip to tribal properties and emerging sportsbook platforms. We bring NGCB Regulation 5.260-aligned assessments, casino penetration testing, and senior advisory to a vertical that most cybersecurity firms simply don’t understand.

5.260
NGCB cybersecurity rule, effective Dec 2023
Annual
Risk assessment cadence required by NGCB
72h
NGCB cyber incident notification window
Local
Las Vegas HQ · same-day site visits
Gaming-Relevant Frameworks We Cover
NGCB 5.260
NGCB MICS
NIGC MICS
NIST CSF 2.0
PCI-DSS v4.0
SOX (Public Gaming)
GLBA
// Why Gaming Is Different

Gaming has a threat profile nobody else does.

Casinos are operated where four high-value targets converge in a single environment: large cash flows, regulated financial infrastructure, sensitive patron data, and continuous 24/7 operations. Add to that an attack surface that combines IT, OT (gaming systems are operational technology in everything but name), physical access, and a workforce that frequently includes thousands of people across multiple shifts, and you get a target profile that most cybersecurity firms have simply never encountered.

Threat actors know this. Casinos and gaming operators have been disproportionately targeted by both financially-motivated ransomware groups and increasingly sophisticated social engineering campaigns. The 2023 attacks against major Las Vegas operators — and subsequent operational outages that ran into weeks — made cybersecurity a board-level concern across the industry overnight. The Nevada Gaming Control Board responded with Regulation 5.260, the first cybersecurity-specific gaming regulation in the United States, formalizing requirements that progressive operators had already begun to adopt.

Adversim was built in Las Vegas, by practitioners who understand gaming. We know the difference between a casino management system and a player loyalty platform. We know what auditors look for in a NGCB 5.260 review and what regulators look for in a post-incident notification. We know that sportsbook platforms have a different attack surface than the floor itself, and that tribal gaming operators answer to a different regulator entirely. Most importantly, we know that gaming operators don’t have time for consulting theater — every hour the casino floor slows down is revenue out the door.

// Gaming Threat Landscape

Six threats defining
gaming cybersecurity
right now.

The gaming industry is one of the most actively targeted verticals in North America. These are the threat patterns actually being executed against casinos and sportsbooks today — not theoretical risks, but observed attacker behavior.

// THREAT 01 — RANSOMWARE

Targeted Ransomware Operations

Major ransomware groups have repeatedly targeted gaming operators, exploiting the operational pressure that comes with continuous floor operations. Multi-week outages have cost operators tens of millions in lost revenue, regulatory scrutiny, and reputation damage. The threat actors know the leverage they have when every hour of downtime is measured in seven figures.

// THREAT 02 — SOCIAL ENGINEERING

Advanced Vishing & Help-Desk Compromise

Threat groups including those tracked as Scattered Spider have refined social engineering techniques targeting IT help desks, identity providers, and MFA reset workflows. A single successful call to a help desk has been enough to compromise major gaming operators. Awareness training alone doesn’t solve this — process and identity architecture must change.

// THREAT 03 — PATRON DATA EXFILTRATION

High-Value Patron & Loyalty Data Theft

Casino player databases contain names, addresses, dates of birth, government IDs, Social Security Numbers (for W-2G reporting), banking information, and detailed gambling histories. This data has both criminal resale value and direct extortion value. Loyalty platforms — often built on aging infrastructure — are repeatedly identified as the weakest link.

// THREAT 04 — INSIDER THREAT

Insider Threat & Privileged Access Abuse

The combination of large cash flows, complex IT systems, and high employee turnover creates persistent insider threat risk. From cage cashier collusion to IT administrators with excessive privilege, gaming operators face insider threats that don’t fit conventional models. Detection requires both technical controls and human intelligence frameworks.

// THREAT 05 — SPORTSBOOK FRAUD

Sportsbook Platform Abuse

Online and retail sportsbooks face account takeover attacks, bonus abuse rings, multi-account fraud, geolocation spoofing, and increasingly sophisticated arbitrage exploitation. The attack surface is fundamentally different from the casino floor, and most cybersecurity teams haven’t built capability for it.

// THREAT 06 — SUPPLY CHAIN

Gaming Vendor & Third-Party Risk

Gaming operations depend on dozens of third parties: gaming machine vendors, casino management system providers, payment processors, sportsbook platforms, loyalty system vendors, and physical security integrators. Each is a potential attack path, and most operators have limited visibility into their vendors’ actual security posture.

// NGCB Regulation 5.260

Nevada’s cybersecurity rule, explained without the lawyer-speak.

In December 2023, the Nevada Gaming Control Board adopted Regulation 5.260, making Nevada the first gaming jurisdiction in the United States to formalize cybersecurity requirements for licensed operators. The regulation applies to nonrestricted gaming licensees and to manufacturers and operators of interactive gaming systems. If you operate a Nevada gaming license, 5.260 applies to you.

What 5.260 actually requires

The regulation establishes four core obligations:

  • Cybersecurity Best Practices. Operators must implement cybersecurity best practices, with explicit reference to recognized frameworks like NIST CSF, CIS Controls, ISO 27001, and similar.
  • Annual Cybersecurity Risk Assessment. Licensees must conduct a cybersecurity risk assessment at least annually, documenting cyber risks specific to their operations and the controls used to mitigate them.
  • Independent Review. An independent cybersecurity review must be performed by a qualified third party, providing an outside perspective on the effectiveness of cybersecurity controls.
  • Incident Notification. Operators must notify the NGCB of cybersecurity incidents that disrupt operations or expose patron information within 72 hours of discovery.

The regulation is intentionally framework-neutral — NGCB doesn’t prescribe a specific control catalog. That flexibility cuts both ways. It means operators can choose the framework that fits their environment, but it also means the burden is on the operator to demonstrate that their chosen approach actually addresses their cyber risk profile.

How Adversim approaches a 5.260 engagement

Our NGCB 5.260 engagements are structured to produce both the risk assessment and the independent review the regulation requires, in a format designed for regulatory submission and board reporting. A typical engagement includes documentation review and stakeholder interviews across IT, gaming operations, surveillance, and finance; technical validation of controls including configuration reviews and targeted penetration testing; mapping to NIST CSF 2.0 with maturity scoring across all six functions; and a written risk register identifying threats, vulnerabilities, likelihood, impact, and treatment.

Deliverables include an executive-ready report suitable for regulatory submission, a technical findings document with prioritized remediation guidance, a maturity heatmap your board will understand, and a working debrief where your team can ask the questions that matter without a sales engineer in the room.

// Regulatory Landscape

Gaming’s regulatory
maze, mapped.

Gaming operators answer to multiple regulators depending on jurisdiction, ownership structure, and operations scope. We work across the full landscape.

Regulation / Framework
Applicability
Adversim Coverage
NGCB Regulation 5.260
Nevada commercial gaming licensees, interactive gaming operators, and certain manufacturers.
Full coverageAnnual risk assessment, independent review, incident response readiness.
NGCB MICS
Minimum Internal Control Standards for Nevada gaming operations, including IT-specific MICS chapters.
Full coverageIT MICS gap analysis, control validation, and audit-readiness.
NIGC MICS
National Indian Gaming Commission Minimum Internal Control Standards for tribal Class II and III gaming operations.
Full coverageNIGC IT MICS alignment, tribal-specific risk assessment, and TGRA coordination.
NIST CSF 2.0
Default framework cited by NGCB 5.260 and recognized by virtually all gaming regulators.
Full coverageMaturity assessment across all six CSF functions, roadmap development.
PCI-DSS v4.0
All gaming operators processing card transactions: cage, retail outlets, sportsbook, online.
ReadinessScope definition, segmentation validation, pre-QSA gap analysis.
Title 31 / BSA / AML
FinCEN currency transaction and suspicious activity reporting; AML program controls.
IT controlsSystem integrity, audit logging, and access controls supporting AML programs.
SOX (Public Operators)
Publicly-traded gaming operators subject to Sarbanes-Oxley IT general controls testing.
ITGC supportControl design, evidence preparation, and pre-audit readiness.
State-Specific Rules
Operator-by-state cyber and reporting rules (NJ DGE, MGM, PGCB, MS, IN, IL, and others).
Engagement-specificMapping to relevant state controls as part of broader assessments.
// Adversim Services for Gaming

All three pillars,
tuned to gaming.

Every Adversim service applies to gaming, but the highest-leverage engagements for casino operators usually start with one of the three patterns below.

01 / OFFENSIVE

Casino Penetration Testing

External and internal network penetration testing scoped specifically for casino environments: gaming network segmentation, casino management system exposure, surveillance system isolation, kiosk and self-service device security, sportsbook platforms, and patron-facing web and mobile applications.

  • External network penetration testing
  • Internal network & Active Directory abuse
  • Sportsbook web & mobile application testing
  • Wi-Fi & guest network validation
  • Physical security & social engineering
Explore Offensive →
02 / ASSESSMENTS

NGCB 5.260 & Compliance

NGCB Regulation 5.260 annual risk assessment and independent cybersecurity review, NIGC MICS alignment for tribal operators, NIST CSF 2.0 maturity assessment, PCI-DSS readiness for cage and retail card environments, and SOX ITGC support for publicly-traded operators.

  • NGCB 5.260 risk assessment & independent review
  • NIGC IT MICS gap analysis
  • NIST CSF 2.0 maturity scoring
  • PCI-DSS v4.0 readiness
  • Vendor & third-party risk assessment
Explore Assessments →
03 / STRATEGIC

Gaming vCISO & IR Readiness

Fractional CISO advisory for properties without a full-time security executive, incident response readiness aligned to NGCB 72-hour notification requirements, ransomware tabletops calibrated to gaming-specific scenarios, and security program development for operators building out the function from scratch.

  • vCISO / Fractional CISO advisory
  • NGCB-aligned incident response planning
  • Ransomware tabletop exercises
  • Security program development
  • Board & executive reporting
Explore Strategy →
// Las Vegas Local

Same-day site visits
from Fremont Street
to the Strip.

Adversim is headquartered in Las Vegas. That matters for gaming work in ways that don’t apply to most other verticals. When a NGCB examiner shows up, when a regulator asks for clarification on a notification, when an incident escalates on a Friday night and someone needs to be in the operations center by morning — being local is the difference between a phone call and a problem.

We’ve performed work for operators on Fremont Street in downtown Las Vegas, where the gaming properties are tightly clustered, the IT infrastructure is often older than the chrome it’s screwed into, and the operational pace doesn’t pause for testing windows. The downtown corridor has its own personality compared to the Strip, and the cybersecurity considerations follow suit — older systems, tighter property footprints, and a regulatory environment that doesn’t care that your CMS hardware predates the iPhone.

We also work with operators across Nevada, in tribal gaming environments throughout the western United States, and with online operators serving multiple state jurisdictions. The Vegas perspective doesn’t limit our scope; it informs it. We know what gaming operations look like at every scale, from a single tribal property to multi-state operators with thousands of gaming positions across dozens of locations.

For Nevada-based operators, this means a few things that matter at a practical level. We can be on-property within hours for incident response readiness consultation and tabletop facilitation. We can attend NGCB meetings alongside your team if that’s helpful. We understand the operating rhythms of the local industry — including the conventions, the gaming shows, the seasonal patterns that affect when testing can and can’t happen, and the regulatory community that ultimately decides whether your cybersecurity work was good enough.

$100M+
Reported financial impact from a single major Las Vegas casino cyber incident in 2023.
SOURCE: SEC 8-K Filings
72h
NGCB Regulation 5.260 cybersecurity incident notification window.
SOURCE: NGCB REG 5.260
Annual
Required cadence for NGCB cybersecurity risk assessments under 5.260.
SOURCE: NGCB REG 5.260

Gaming cybersecurity,
from down the street.

Whether you’re a downtown property, a Strip operator, a tribal gaming organization, or an interactive operator navigating multi-state compliance — we’ll scope the right engagement and have a fixed-fee proposal back to you in 48 hours.

// Gaming Cybersecurity FAQ

Straight answers
for gaming operators.

NGCB Regulation 5.260 is the Nevada Gaming Control Board’s cybersecurity rule, adopted in December 2023. It requires Nevada-licensed gaming operators to implement cybersecurity best practices, conduct annual cybersecurity risk assessments, perform independent cybersecurity reviews, and notify the Board of cybersecurity incidents that disrupt operations or expose patron information within 72 hours. The regulation is framework-neutral — operators can use NIST CSF, CIS Controls, ISO 27001, or other recognized frameworks — but the burden of demonstrating adequacy rests with the operator. Adversim provides 5.260-aligned risk assessments and independent reviews designed for regulatory submission.
Yes. Adversim works with both commercial Nevada gaming under NGCB and tribal gaming operators regulated by the National Indian Gaming Commission. Tribal engagements typically align to NIST Cybersecurity Framework, NIGC Minimum Internal Control Standards (MICS), and Tribal Gaming Regulatory Authority (TGRA) requirements. We’re familiar with the unique sovereignty considerations, TGRA coordination requirements, and the operational differences between Class II and Class III tribal gaming.
Casino penetration testing engagements typically range from $20,000 to $75,000 depending on property size and scope. A standard external and internal network assessment for a mid-size property runs $30,000 to $50,000. Full-property assessments including gaming systems, IT infrastructure, sportsbook platforms, and player loyalty systems typically run $50,000 to $150,000. Red team operations and multi-property engagements scale from there. All pricing is fixed-fee with scope and assumptions written plainly into the proposal — no T&M ambiguity, no surprise change orders.
Yes. We coordinate testing windows in advance with property IT, gaming operations, and surveillance leadership. We use non-destructive techniques by default and maintain real-time communication during testing — typically a Slack or Teams channel and daily check-in calls. Critical findings are escalated within four business hours of discovery. Destructive testing, denial-of-service validation, or active exploitation of production gaming systems only occurs with explicit written authorization and is generally reserved for pre-production environments or scheduled maintenance windows.
Yes. Our team has direct experience with major gaming platform vendors including IGT, Light & Wonder (formerly Scientific Games), Aristocrat, Konami, Everi, and AGS. We also work with the common casino management systems, sportsbook platforms (including DraftKings, BetMGM, Caesars, Kambi, and others depending on jurisdiction), and player loyalty systems. We understand the unique attack surface gaming platforms present, the constraints around vendor-managed systems, and the segmentation practices that successful gaming operators use to limit vendor access without breaking operations.
No. Adversim is a proactive cybersecurity practice — we focus on readiness, not active response. We do not perform digital forensics, live breach containment, or active incident response work. Those are distinct specialties best handled by firms with dedicated DFIR (Digital Forensics & Incident Response) retainers. What we do is prepare gaming operators before an incident: ransomware tabletops aligned to gaming-specific scenarios, written playbooks calibrated to the NGCB 72-hour notification window, regulatory coordination procedures, and the program-level work that determines how well a property weathers an incident when one occurs. As part of readiness work, we help clients identify and onboard a qualified DFIR partner in advance — so when something happens, the first call is to a known firm, not an unknown one at 2am.
NGCB Minimum Internal Control Standards (MICS) are a long-standing operational control framework covering accounting, surveillance, security, and IT functions across gaming operations. The IT-specific MICS chapters cover topics like change management, access controls, and system integrity. Regulation 5.260 is the newer cybersecurity-specific regulation, adopted in 2023, that addresses cyber risk at a more comprehensive level — including annual risk assessment, independent review, and incident notification. The two work together: MICS establishes baseline operational controls, while 5.260 establishes a cyber risk management program around them.
Yes. Many mid-size gaming operators — independent properties, tribal operators, and smaller multi-property companies — can’t justify a full-time CISO but desperately need senior security leadership. Our vCISO engagements provide fractional executive-level security advisory, board reporting, NGCB regulatory engagement, security program development, and the calm experienced voice gaming operators need when something goes sideways. Typical engagements run 8 to 20 hours per month at a fixed monthly retainer.
// Other Industries We Serve

Specialized depth
across regulated verticals.

Adversim focuses on industries where the stakes — and the regulators — are highest.