When hackers attack, game publishers and developers shoulder the blame, taking massive financial and reputational hits. Join digital security experts in this VB Live event, and learn how to lock out the hackers, keep your users safe, and your intellectual property secure.

Don’t miss out!

Register now for free.

Cyber attacks are ramping up: they’ll cost the world $6 trillion annually by 2021, and games are a particularly tempting target, costing developers not just revenue, but time and resources as well. And the more successful your game becomes, the more hackers you’ll attract.

“Security and fraud is core to the business but that doesn’t help us in developing new features or attracting more users,” says Sudhir Vallamkondu, CTO of JumpRamp Games.

JumpRamp is a promotions and sweepstakes app developer; their flagship app, Lucktastic, is in the top 10 in the lifestyle section for Android, with more than 12 million unique touch points in a week, and the kind of high profile that catches the eye of the discerning hacker.

But the company also presents a particularly juicy target for two more reasons: the contests they run, in which players can win anything from a cool one million bucks to resort getaways and vacations, and their monetization strategy, in which players have to engage over a period of time in order earn tokens redeemable for gift cards or real money.

“It’s multiple-fold – hackers want to find a way to win these contests or up their odds of winning, and they want to hack into other users’ accounts to steal tokens,” Vallamkondu explains.

The other issue is all about user error – too many players tend to use the same email and password across the wide variety of accounts they sign in to – they could be using their Equifax password for everything from their email to their Game Center log-in. Whenever there’s a big data breach, the number of attacks ramp up as hackers use that info to see which lucky consumers forgot about account protection best practices. And a data breach at one company impacts all companies in the industry, from both revenue and reputation loss.

“Everyone involved in the security side of things has to always be aware of everything that’s happening in the hacking world, and at other companies,” Vallamkondu says.

Protecting properties means a multi-layered approach — whenever there’s a major data breach, they ask their users to change their passwords. There’s also double verification, encrypting calls to the server, participating in hacker channels to stay aware of what might be coming down the pike, as hackers get more sophisticated, along with bug bounties, where legit white hat hackers are rewarded if they find a security loophole, passive and active caching to ensure critical systems are not overloaded, and more. Plus always trying to get ahead of the game and anticipate the next point of entry.

Player data is a particularly important tool, says Vallamkondu, essential for predicting anomalies and acting on them immediately.

“We get tons of data of how users are using the app and we have tons of historical data to look against,” he explains. “So one of the biggest things we focus on is how to detect that something’s not normal.”

The most important fraud-fighting tool is eliminating your assumptions about what’s possible, because hackers are growing increasingly sophisticated in leaps and bounds, and your strategy needs to stay nimble.

“We don’t assume anymore that a user is always going to access from this geolocation or from this IP – we’ve taken out any assumptions that we had about what might or might not happen, Vallamkondu says. “We know that anything can happen and we have to be ready for it.”

To learn more about developing a shatterproof cyberattack strategy, selecting the right solutions and tools for your business, and rebounding in worst-case-scenarios, don’t miss this VB Live event!

Register here for free.

You’ll learn about:

  • How to prevent data breaches, SQL injections, cross-site scripting, remote file inclusion, and other cyberattacks.
  • Integrating cloud and on-premises solutions
  • How to handle larger, Internet-scale attacks
  • Preventing the reputation hit that hacked accounts or downed sites bring


  • Ryan Safarian, VP Engineering, JumpRamp Games
  • Arash S.Haghighi, Manager of Infrastructure, Smilegate West
  • Stewart Rogers, Analyst-at-Large, VentureBeat
  • Rachael Brownell, Moderator, VentureBeat

Sponsored by: Akamai