Cybersecurity regulation in Europe is evolving rapidly, and iGaming businesses must prepare now for two major incoming frameworks: the NIS2 Directive and the EU cyber resilience act (CRA). These regulations introduce stricter security obligations, tighter reporting deadlines and heightened accountability across the iGaming ecosystem.

In our recent webinar, “iGaming’s new cybersecurity rules”, Oliver Crofton (Regional Sales Director – Cybersecurity at Continent 8 Technologies) hosted an in‑depth discussion with Craig Lusher (Principal Solutions Architect EMEA at Continent 8 Technologies) and Jo Joyce (Partner and Head of Regulatory, IP & Digital at Taylor Wessing Ireland). Together, they provided clarity on the regulatory landscape and outlined what operators, suppliers and technology partners must do to stay ahead.
Here’s a breakdown of the key takeaways.
The iGaming industry operates in a high‑risk digital environment. Real-time financial transactions, complex technology stacks, and large volumes of sensitive personal data (including government-issued identity documents attached to financial information) make it a prime target for attackers. As cyber threats grow more sophisticated, regulators are raising the bar to ensure resilience.
NIS2 and the CRA aim to:
For iGaming, where uptime, trust and compliance underpin commercial success, these changes are significant.
NIS2 is fully live and enforcement has begun. This is no longer about preparation; the question is whether your organisation is compliant right now.
According to Craig and Jo, NIS2 represents a major overhaul of Europe’s cybersecurity framework. It replaces the original NIS Directive (2016), which was fragmented, voluntary in practice, and allowed each country to implement it differently.
Key updates include:

Whilst NIS2 focuses on how organisations manage security, the CRA concentrates on the digital products those organisations depend on and produce.
CRA reporting obligations begin on 11 September 2026. From that date, manufacturers must report actively exploited vulnerabilities and severe incidents affecting the security of their products, following the same 24-hour early warning, 72-hour notification structure. For vulnerabilities, the final report must be submitted within 14 days of a corrective measure becoming available. Full product standards, including CE-marking requirements for software and connected devices, come into force in December 2027.

Jo highlighted that the CRA requires manufacturers and developers of digital tools – including gaming software, APIs, hardware and integrated systems – to
Given the heavy reliance on third‑party tech in iGaming, this places strong emphasis on vendor due diligence and supply‑chain oversight.
Jo: “I think one of the things that I’ve spotted is quite a lot of operators and firms within the iGaming ecosystem haven’t really necessarily accepted that they’re in scope.”
If your organisation provides or supports any of the following, NIS2 likely applies:
There are two additional points worth flagging. First, white-label and B2B providers are often managed service providers (MSPs) without realising it. If you run a player account management (PAM) system for 20 other brands, you are managing their core services, which, by definition, makes you an MSP. Under NIS2, MSPs are designated as essential entities, meaning they face ex ante supervision (proactive inspections and audits at any time), the same regulatory tier as a data centre or cloud provider.
Second, there is no “group privilege” under NIS2. If an internal IT arm provides services to the wider corporate group, it may be classified independently as an essential entity in its own right. Being part of a larger group does not shield individual subsidiaries or divisions from independent classification.
A readiness assessment is the essential first step.
Craig emphasised how the threat landscape facing iGaming businesses has intensified – including a 400% surge in cyber attacks targeting the gambling industry. This is not a gradual trend; attackers have industrialised their approach.

Operators and suppliers now face:
The interconnected nature of the sector amplifies the impact of any single vulnerability.
The cost of downtime in the industry now exceeds $6,000 per minute, and attacks are more visible in the news than ever, and recent breaches have seen hundreds of thousands of user profiles and identity documents exposed through relatively basic misconfigurations.
Craig highlighted several country‑specific differences in how NIS2 is being implemented, here are a few examples:
Malta moved faster than most EU member states, issuing Legal Notice 71 of 2025, with the CIPD as the ‘competent authority’. Self‑registration was due September 2025, so organisations that missed the deadline are now operating in a regulatory grey area. Governance and risk‑management controls must be live by March 2026, which at the time of the webinar was just weeks away.
Malta also goes further than EU baseline requirements by mandating a 24/7 security operations centre for digital infrastructure providers. Properly staffing a round-the-clock SOC requires at least 12 people to maintain a true rotation, which is a substantial operational investment for mid-sized operators.
The ultimate sanction isn’t just a fine; Malta can suspended MGA licences. For Malta-licensed gaming companies, this is an existential threat. If you lose your MGA licence, you are effectively locked out of dozens of global markets overnight.
Germany passed its implementation late, in November 2025. Registration deadlines for German‑based entities land in April 2026, leaving limited time for compliance.
Other member states are at various stages of transposition, and several missed the original October 2024 deadline. For operators with a presence in multiple EU countries, the practical challenge is managing compliance against several different national timelines and requirements simultaneously.
NIS2 is an EU directive, which means each member state must transpose it into national law. The result is that implementation timelines and specific requirements vary from country to country, and organisations operating across multiple jurisdictions need to track each one independently.
Both speakers stressed that NIS2 and the CRA require visible, ongoing engagement from senior management. Leading organisations will:
Under NIS2, leadership accountability is explicit. Executive training is not optional; it is a legal requirement under the directive.
Jo: “Just because something bad has happened doesn’t mean that you’re necessarily at fault… but you are going to have to produce reasonable reporting in layman’s terms… and explain that we’re operating in different risk parameters.”
Craig added the importance of training: “It’s mandatory for board‑level staff… you’ve got to keep training and constant training.”
Craig and Jo discussed the importance of reporting – especially when something goes wrong.
Jo: “The kind of reporting that one has to do under NIS2 is not a million miles away from the pre‑existing reporting… but there’s a real shift when you are experiencing a very serious incident.”
The 24‑hour reporting window is the operational flashpoint. Many companies are not ready for this. Under NIS2, the clock starts as soon as you become aware of a significant incident. You then have 24 hours to submit an early warning to the relevant CSIRT, 72 hours for a more detailed incident notification, and one month for the final report. A single incident can also trigger reporting obligations under the CRA and DORA simultaneously, each with different data requirements, formats, timelines and regulators.
Businesses need to prepare now by having supplier lists to hand, knowing exactly where to submit reports for each applicable regulation, and understanding that multi-jurisdictional reporting may be required.
Top tip from Jo:
Please print out a copy of your breach response plan… print out your incident response team list with phone numbers, ideally personal ones. If you can’t access your systems, it will take you an astonishing amount of time to pull this together.
Jo highlighted that enforcement activity under the CRA and NIS2 will be phased but increasingly serious.
From September 2026, the CRA introduces mandatory reporting of actively exploited vulnerabilities and severe incidents affecting product security. Full product‑related obligations take effect in December 2027, including the requirement for CE‑marking digital products, software included.
According to Jo, failure to report will likely be the first area where regulators take action, and penalties will be treated seriously.
Many NIS2 requirements are already enforceable. For essential entities that breach Articles 21 or 23, fines can reach up to EUR 10 million or 2% of total worldwide annual turnover, whichever is higher. For important entities, the maximum is EUR 7 million or 1.4% of worldwide turnover (Article 34 of NIS2). Regulators also have the power to issue binding instructions, order security audits, and, for essential entities, temporarily suspend or prohibit individuals from exercising managerial functions (Article 32(5)).
Jo: “They will factor in whether it’s going to bankrupt you… but they want these fines to hurt.”
This means businesses must act now to ensure reporting pathways, governance structures, supplier oversight and security controls are ready.
Craig and Jo recommended several clear actions for organisations:

There is a growing issue around the use of open‑source software (OSS) under the CRA. Although many OSS developers lobbied for exemption, OSS is widely used in commercial products. The CRA makes clear that organisations relying on OSS within regulated products remain fully responsible for meeting all cybersecurity and update obligations, including providing security updates for the minimum five-year support period.
Managing updates is difficult when you did not write the code – but the responsibility remains. The Software Bill of Materials (SBOM) requirement compounds this: manufacturers must maintain a machine-readable inventory of every library, open-source component and module in their products, kept as a living record.
Top tip from Jo:
If your business relies heavily on OSS, pay close attention to how it’s managed, seek specialist guidance and plan how you will meet long‑term update and security requirements.
The introduction of NIS2 and the EU cyber resilience act marks a significant shift for cybersecurity in iGaming. While the regulations bring real compliance challenges, they also create an opportunity for the industry to strengthen its defences, reduce operational risk and future‑proof operations.
Early preparation will help businesses stay compliant, competitive and trusted.
👉 Watch the full webinar here:
The 2026 Super Bowl weekend has once again demonstrated just how significant this event has become for the US sports betting ecosystem. This year’s matchup – New England Patriots vs. Seattle Seahawks at Levi’s Stadium – drew enormous national attention, with sportsbooks and operators preparing for yet another sharp spike in traffic and transaction volume. Super Bowl LX kicked off at 6:30 p.m. ET on February 8, with NBC broadcasting and Peacock streaming the game.
But what truly defined this year wasn’t just the on‑field drama – it was the scale and evolution of betting activity. Sportsbooks were expected to handle a record-breaking $1.76 billion in wagers across the US as betting continued to surge nationwide. Alongside traditional sportsbook action, prediction markets have been said to take center stage, allegedly boosted by a recent shift in federal regulatory posture. Industry analysts identified that, following a decision by the Commodity Futures Trading Commission to reverse its earlier proposal restricting political and sports-related contracts, platforms like Kalshi and Polymarket saw explosive participation heading into the game.
Notable betting storylines include a Nevada bettor who placed three preseason futures bets totalling $150,000 on Seattle – including $50,000 at 60‑1 odds for the Seahawks to win the Super Bowl – secured a combined payout approaching $4.5 million after Seattle’s championship win. These futures wagers represented some of the largest liabilities for US sportsbooks this season, highlighting the growing sophistication and long‑horizon strategies of certain bettors.
Our Super Bowl 2026 infrastructure performance reflected the scale and intensity of this year’s betting and iGaming activity. A review of Continent 8 network data revealed several notable trends across connectivity, cloud workloads, and B2B platform traffic:
Outbound traffic from transit customers to hyperscale cloud providers between Feb 9, 2026 (00:00) and Feb 10, 2026 (10:00)

Outbound traffic from US transit customers to all destination ASNs from Feb 6, 2026 (00:00) to Feb 9, 2026 (10:00)

These insights highlight how operators, platforms, and cloud‑driven services collectively leaned on Continent 8’s global network to handle one of the busiest betting weekends of the year – ensuring fast, secure, and uninterrupted connectivity throughout Super Bowl week.
In the weeks leading up to any Super Bowl, the world sees the spectacle on the field – but behind the scenes, operators rely on robust, resilient infrastructure to support record-breaking engagement. For Continent 8, preparation for Super Bowl LX began months in advance, with teams across the business working to ensure a seamless and interruption‑free experience for customers.

Justin Cosnett, Chief Product Officer, explains the technical groundwork:
“Our technical preparation began months prior to the Super Bowl. This centred around infrastructure and network upgrades and optimisation – including bandwidth increases in all key peering and IX locations, cloud infrastructure refreshes, among other changes – to ensure an interruption‑free operation.”
As the big weekend approached, this preparation evolved into a detailed readiness programme built around five core pillars:
This disciplined, collaborative approach ensured that every layer of our infrastructure was optimized for the surge in demand.
While a Super Bowl broadcast lasts just over 3 hours and 37 minutes, our “live” operational window was far broader – spanning five continuous days, from Thursday through Monday. During this period, Continent 8 operated in full Super Bowl mode, with:
This extended readiness window allowed us to anticipate and respond to shifting traffic patterns as early Super Bowl wagering, promotional campaigns, and late‑week betting surges ramped up toward game time.
Continent 8 teams were monitoring network performance across our global ‘locker rooms,’ ensuring optimal conditions no matter where traffic originated.

Dublin Office

Montreal Office

India Office
Long after the final whistle, our work continued. With operators still handling settlement workloads, futures reconciliations, and continued user engagement, network oversight remained critical.
Our Major Incident Management playbook provided structure and clarity throughout the Super Bowl cycle – guiding decision‑making, enabling cross‑team coordination, and serving as a framework for continuous improvement as we transition to subsequent peak events.
Reflecting on this year’s performance, Justin emphasised the impact of the team’s meticulous planning:
“The entire Continent 8 team was instrumental in ensuring a flawless Super Bowl experience. This careful, meticulous planning underscored our commitment to delivering a reliable and unparalleled service to our customers, allowing millions of players to place their bets and engage with the event in real-time.”
The Super Bowl remains the most demanding annual event for US sports betting operators – and 2026 raised the bar again. With sportsbooks handling unprecedented wagering volume and prediction markets adding an entirely new category of high-frequency transactions, operators faced rapid and unpredictable load spikes that required resilient, low-latency infrastructure.

As demonstrated by Super Bowl weekend 2026, operators need to prepare not just for higher traffic, but for traffic patterns that are more volatile, more complex, and more continuous. Ensuring uptime, security, and latency control during these surges is essential to delivering a fault‑free betting experience.
“Super Bowl weekend is one of the biggest moments of the year for our North American customers, and we take that responsibility incredibly seriously. Our team prepares months in advance to ensure operators experience flawless uptime, ultra‑low latency, and the resilience they need when traffic hits its peak. At Continent 8, going the extra mile isn’t the exception – it’s what we deliver every day, and especially during the industry’s biggest events.”
Aidan Rees‑Williams, Head of North America Sales, Continent 8 Technologies
As the US sports betting landscape accelerates – now fueled not only by sportsbook adoption but also possible regulatory green lights for prediction markets – operators require partners who can manage mission‑critical digital resilience at national scale.
Continent 8’s US presence is uniquely aligned to support this environment because we offer:
Contact our team to learn more.

In cybersecurity, intelligence is power. Financial institutions and healthcare providers have long relied on threat intelligence platforms to anticipate attacks and protect critical assets. Yet, the gambling industry, despite handling billions in transactions and sensitive customer data, has been slower to adopt this proactive approach.
The stakes are high. Cyber incidents targeting gaming operators have surged dramatically, with attacks becoming more sophisticated and financially devastating. We have seen land-based casinos forced offline for days.
For an industry built on trust and real-time engagement, the question is no longer whether operators need intelligence, but how quickly they can integrate it into their security posture.
Consider financial services. Banks operate under constant threat from fraud, phishing, and ransomware, yet they’ve built robust intelligence-sharing ecosystems like FS-ISAC (Financial Services Information Sharing and Analysis Center). These platforms allow members to share threat intelligence in real time, creating collective defence that benefits the entire sector.
Gaming needs its own equivalent, but with crucial differences. Our adversaries are unique: organised crime groups targeting high-roller accounts, bonus abuse rings operating across dozens of operators, match fixers probing betting platforms, and in certain jurisdictions, nation-state actors targeting offshore operations. Generic threat intelligence platforms miss approximately 70% of gaming-specific attack patterns because they weren’t designed to recognise these threats.
Effective threat intelligence transforms security operations across several critical areas.
Smarter vulnerability management:Gaming operators run complex technology stacks spanning payment processors, gaming engines, live betting platforms, and player databases. Patching everything according to generic severity scores is impossible during live operations. Intelligence changes the equation from “how severe could this be?” to “is this being actively exploited against gaming platforms now?” When intelligence reveals a payment gateway vulnerability under active exploitation against European operators, that patch moves to the front of the queue regardless of theoretical severity.
Faster incident response:Intelligence enables teams to build playbooks for gaming-specific scenarios before incidents occur. When attacks happen, context accelerates decisions. A generic PowerShell alert becomes high priority when intelligence identifies it as a technique used by gaming-targeting ransomware groups. The MITRE ATT&CK framework provides common language for this intelligence, allowing teams to measure defensive coverage objectively and identify gaps systematically.
Example: Champions League final, an operator detected unusual API calls to their odds calculation engine. Intelligence immediately revealed the same pattern had appeared at three other sportsbooks in the preceding 48 hours. A pre-built playbook isolated affected systems automatically. The attack was contained in four minutes rather than 45.
Proactive threat hunting:Shared intelligence generates hunting hypotheses no single operator could develop alone. When multiple operators detect reconnaissance against payment systems using specific techniques, everyone can search for identical indicators. Security teams shift from reactive firefighting to actively hunting for bonus abuse automation, payment fraud patterns, and early reconnaissance.
Reduced alert fatigue:Gaming platforms generate millions of security events daily. Intelligence-driven contextualisation transforms “this IP attempted 50 logins” into “this IP is part of a credential stuffing botnet that hit six gaming sites today.” Alerts receive priority based on actual gaming industry impact. Analysts escape false positive overload and focus on genuine threats.

Intelligence extends beyond traditional cybersecurity. iGaming’s ecosystem of platform providers, payment processors, and affiliate networks creates significant supply chain risk. When a major provider suffers a breach, operators need immediate notification and indicators to hunt for compromise in their own environments.
Fraud prevention benefits enormously from shared intelligence. Credential stuffing, bonus abuse rings, and synthetic identity creation operate across multiple operators simultaneously. Real-time sharing allows the entire industry to block known fraudsters before they cause widespread damage.
iGaming operates under intense regulatory scrutiny across multiple jurisdictions. Intelligence programmes must account for data sovereignty when sharing across borders, maintain evidence chains for incident reporting, and demonstrate due diligence to regulators.
Rather than complicating compliance, intelligence sharing strengthens it. Documented participation demonstrates proactive security investment. Standardised incident categorisation streamlines reporting. Cross-operator intelligence identifies systemic risks that regulators will certainly notice even if individual operators miss them.
None of this works without trust. Operators compete fiercely, and sharing incident details raises legitimate concerns about competitive exposure.
Effective programmes offer anonymity where needed – operators can share indicators without identifying themselves. Clear data governance establishes who accesses what information. Critically, the value must be obvious. Operators need to see that participation makes them measurably safer, that what they receive far exceeds what they contribute. As membership grows, network effects compound: more operators sharing means better intelligence for everyone.
Gaming operations run around the clock with no maintenance windows during major sporting events. Attacks deliberately target peak revenue periods. Response times measured in hours are unacceptable.
This demands SOAR (Security Orchestration, Automation & Response) automation. When intelligence identifies malicious infrastructure, indicators must flow automatically into firewalls and detection systems. Pre-configured playbooks must execute without waiting for human intervention.
Operators with mature programmes report mean time to detect dropping from 14 hours to under 10 minutes. Mean time to respond falls from four hours to 12 minutes. False positives reduce by 70%.
With average gaming breach costs exceeding $5M including regulatory fines and customer compensation, preventing one major incident justifies significant investment. When a zero-day in payment gateway software was identified through shared intelligence, operators with access isolated vulnerable systems 48 hours before public disclosure. Those without suffer breaches averaging $5M each.
The gaming industry has reached an inflection point. We can continue operating in silos, or recognise that collective defence serves everyone’s interests. The attackers are already collaborating; we must do the same.
Financial services learned this lesson years ago. For gaming, the question is whether we learn proactively or wait for a sector-wide incident to force the conversation.
For more information on Threat Exchange, visit continent8.comor email sales@continent8.com.
**Source: EGR Digital Edition 248
Artificial Intelligence (AI) is rapidly reshaping how governments, enterprises, and communities operate – and tribal nations are no exception. To explore these opportunities, the Tribal Leadership Council, in partnership with Continent 8 Technologies, recently hosted a specialised webinar titled “Practical AI for Tribal Organizations.”
The session featured two expert presenters:
These speakers guided attendees through a practical, sovereignty-focused understanding of how AI can support tribal governance, cybersecurity, community engagement, and enterprise operations.
It was important to Cris to set the scene on AI from the offset – and the fact that AI is not a single product or technology – it’s a broad set of capabilities that are already embedded in much of the systems and software we use today.
With that said, below is a summary of the key insights shared during the webinar.
AI is no longer a future concept – it is a tool tribal leaders can use right now to increase efficiency, strengthen decision-making, and improve the delivery of services. The webinar highlighted the ability of AI to:
By automating repetitive tasks and analysing information at scale, AI frees tribal leadership to focus on strategy, sovereignty, and community impact.
Cris stressed that the success of AI isn’t dependent on the algorithm, but the quality of the data used: “trash in, trash out.”
Jerad and Cris outlined a crucial distinction between generative AI and agentic AI – two categories that offer very different capabilities and also associated risks.
Designed to create content.
Useful for drafting policies, summarizing documents, producing reports, or generating communications. Content should always be verified – there is a risk for errors and hallucinations.
Designed to take actions based on rules or goals.
Capable of performing tasks such as compliance checks, initiating workflows, alerting staff, or managing routine operational processes.
Understanding the difference allows tribal organizations to choose the right AI tool for the right job – and avoid over-automating areas that require human oversight.
Key takeaway: generative AI assists people, whereas agentic AI acts on behalf of the organization.
Examples shared during the webinar demonstrated how AI can streamline workflows, including:
One powerful use case: automating regulatory certification steps reduced staff workload while improving accuracy – allowing tribal teams to focus on meaningful leadership and community priorities. One tribal organization took a 6-month manual process down to a 2.5-week workload.
AI-powered tools can enhance how tribes communicate with and support their citizens. This includes:
These capabilities help tribal governments stay connected to their people while reducing demand on staff.
But it’s important to understand: AI does not replace human judgment or community leadership.
The presenters also explored how tribal enterprises – from gaming to hospitality to broadband and beyond – can benefit from AI through:
These efficiencies translate to better productivity, fewer errors, cost savings, and stronger competitive advantage.
From data exposure and enhanced fraud, it is important tribal leaders understand the risks associated with AI. Sensitive data should be kept out of public platforms.
Both speakers emphasized that AI adoption must reinforce – not compromise – tribal sovereignty. Key considerations include:
These measures ensure tribal nations maintain full control over their data, decisions, and digital future.
As AI expands, cybersecurity must evolve with it. Cris highlighted essential protections such as:
AI itself can strengthen cyber defense by detecting suspicious activity earlier and accelerating response times.
The speakers outlined a practical roadmap for responsible, sovereignty-aligned AI implementation:
AI is not about replacing people or traditions. It is about protecting sovereignty, improving services, and controlling your digital future.
By taking a careful, strategic approach, tribal leaders can harness AI to strengthen governance, protect sovereignty, and uplift their communities.
You can watch the full webinar recording here:
Continent 8 Technologies, a leading provider of cutting-edge managed IT solutions designed for the global iGaming and online sports betting industry, announces that it is officially open for business in Alberta, Canada. This expansion follows the province’s release of its competitive iGaming regulatory framework and the publication of detailed hosting and security requirements by the Alberta Gaming, Liquor and Cannabis Commission (AGLC), marking another significant milestone in Continent 8’s long-standing commitment to serving the North American market.
With proven operations in Ontario – where the company successfully launched its Public Cloud solution in Toronto in direct response to the province’s opening of its iGaming market in 2022 – Continent 8 brings to Alberta the same depth of regulatory understanding, technical capability, and customer-driven innovation that has established it as a trusted partner across Canada.
Alberta’s iGaming framework sets out detailed hosting and data governance obligations for operators and suppliers. For example, all data centres used by licensees must receive AGLC approval, covering data residency, cross-border transfers, and encryption key controls.
The province also mandates fully functional disaster recovery infrastructure and immutable, encrypted backups, with strict requirements for quarterly testing and offsite storage – areas where Continent 8’s experience provides immediate value.
In addition to hosting requirements, Alberta introduces some of the most comprehensive security requirements in the country, including mandatory MFA, SOC 2 and ISO 27001 compliance, annual penetration testing and extensive log retention requirements.
“Our heritage means we understand the rigorous regulatory expectations, and the operational challenges operators and suppliers face when entering new markets,” said Michael Tobin, CEO and Founder of Continent 8 Technologies. “Alberta’s standards are comprehensive, particularly around disaster recovery, backups, and security. We have built our solutions so customers can meet these requirements confidently from day one. We are excited to support customers as Alberta opens its market and continues Canada’s growth story.”
Continent 8’s network now spans every major regulated province or state in North America, supported by facilities across more than 100 locations globally. Customers benefit from end-to-end services including managed hosting, cloud, connectivity, and cybersecurity, all engineered for regulated industries.