Mishaal Khan

Cybersecurity Expert

Mishaal Khan is a subject matter expert in cybersecurity, Open Source Intelligence, social engineering, ethical hacking, and privacy. Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a Chief Information Security Officer (CISO) to manage risk and avoid breaches.

Mishaal is a frequent speaker at cybersecurity conferences like DEFCON and the Wild West Hacking Fest, universities and industry events where he takes a hands-on approach to display his passion for security by involving people in live demos making it fun and thought-provoking. Mishaal also runs a cybersecurity practice as a Virtual Chief Information Security Officer (vCISO), owns a privacy management and investigations firm along with a dozen industry-standard credentials. Published in March 2023, his book The Phantom CISO offers a practical and comprehensive approach to becoming a successful cybersecurity leader.

 

SESSION DESCRIPTION
CORE Training: Casino Cybersecurity

As the gaming industry faces a rapidly evolving landscape of cyber threats, it’s essential for executives to cultivate a strategic approach to cybersecurity. This course is designed to elevate leaders’ understanding of key cyber risks and equip them with the insights needed to build an effective, resilient cybersecurity strategy. Through focused discussions and case studies, participants will gain awareness of the critical elements in cyber defense, emphasizing strategy over tactics.

Module 1: Understanding Online Threats
This module introduces executives to the core threats affecting the casino industry, including social engineering, insider threats, OSINT, and the influence of the dark web. Through real-world case studies, leaders will gain a high-level view of how these threats impact organizations and the importance of a proactive, strategic response.

Module 2: Building a Cybersecurity Strategy
In this module, participants will explore foundational elements of a cybersecurity strategy, including risk assessments, policy development, and resource allocation. The focus will be on building a robust framework that supports risk-informed decision-making. Topics will also cover the role of incident response planning and exercises, budgeting, training programs, as well as strategies for managing vendor-related risks.

Module 3: Advanced Strategic Considerations
The final module addresses privacy management, data protection, breaches, and the role of deception and disinformation techniques in a holistic security strategy. Through examples of high-level protection strategies, participants will learn to prioritize cybersecurity initiatives that align with the organization’s objectives and risk tolerance.

Cybersecurity Expert