InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Out Playing the Hackers: How Roblox Protects Their Brand from Impersonations

Presented by

Riley Pace (Bolster), Courtney Smith (Roblox), Michelle Toborowski (Roblox)

About this talk

From fake accounts to elaborate scam campaigns, Roblox faces a diverse group of cybersecurity threats targeting their popular online platform. As a video game developer with digital currency translating to real-world money, Roblox must constantly stay vigilant against social media impersonation, web spoofing, and other scam tactics that aim to steal sensitive financial data from their users. Roblox relies on Bolster to combat an evolving suite of cybersecurity threats, with automated detection and takedown technology that works across social, web, and app stores. In this webinar, hear from Roblox’s team of cyber risk professionals on how they’ve reduced the online attack surface for their customers. In this panel discussion, learn: 1. What types of online threats Roblox experiences 2. How Roblox protects the integrity of their gaming network 3. What are best practices for reducing the attack surface 4. How Roblox integrates digital risk protection into their environment
Bolster AI

Bolster AI

4168 subscribers25 talks
Delivering continuous, real-time protection for brands and customers
Thought provoking webinars featuring cybersecurity subject matter experts discussing recent trends on generative AI, information security, phishing attacks, threat intelligence, large language models, trademark infringement, online scam and fraud, SecOps excellence, dark web insights, brand protection, and more! The channels is educational for for CIOs, CISOs, S/VPs, Directors, Managers, Architects, Engineers, SecOps and Analysts in Security and IT.
Related topics