Preliminary Program as of Feb 24, 2020 (subject to change)
12 p.m.: Registration Opens (Westgate Hotel, Ballroom C)
1 – 6 p.m.: General Sessions
6 – 7 p.m.: Networking Reception
KEYNOTE: Securing the Future of Media & Entertainment
As media & entertainment accelerates its digital transformation on the back of a range of new technologies (5G, Blockchain, ATSC, etc.), how are companies and engineers planning to protect these emerging systems, and what are the new threats and vulnerabilities that increased interactivity and interconnectivity between operating systems will produce? Governments, political and geopolitical situations now view “hacking’ as a tool for manipulating perceptions. Essentially, you can take any message and make it “real’ on the Internet, and this isn’t a typical intelligence-agency act or a coordinated effort with exorbitant cost. This is a completely new tool for the masses, where they hack not a machine but individual perceptions. Understanding what is real is now even more opaque and the hack exposes everyone to the threat risk. Our Keynote speaker looks at the impact of technology on the cybersecurity space, the subsequent challenges as the hacker community migrates their strategies of ‘fakes”, and how that impacts the way we create and distribute content.
Ralph Echemendia, “The Ethical Hacker” and Chief Executive Officer, Seguru
Setting the Standards and Systems for Securing Media & Entertainment
Our opening session sets the stage for the afternoon’s conference agenda by highlighting both the individual work and the increased collaboration of industry associations and their members. As entertainment moves toward a more fluid, instant and “always on” infrastructure, these groups play a critical role in how we tackle these increasingly challenging workflows and distribution models, together with a foundation of infrastructure security that speaks across all our memberships.
The Evolution of Content and Information Security
Protecting content is an evolving challenge as the entire media ecosystem is quickly migrating to cloud infrastructure. Content security and information security have intersected for a number of years, mostly depending upon how much of your business/creative workflow or infrastructure is enterprise or cloud-based. Cloud implementation in content workflow sees these teams working to build the processes and skills necessary to maintain control of these content and distribution workflows. The complexity increases with the increasing availability of new tools and services that solve a practical or immediate business need for the business or creative user. As new applications become the “go-to” options, it is increasingly important for companies to deploy a workflow for onboarding and managing these services. This session discusses new approaches to this federated workflow.
Moderator: Ben Schofield, Project Manager, CDSA and Product Manager, TPN
Driving the Content Creation Business Based on Piracy and Demand
Continuing to accept piracy as an inevitability costs our industry billions of dollars globally. Consumers are under-educated and often misled as to the long-term effects piracy and content theft has on future content creation. This session offers an inside look at the opportunities and challenges, from an IP creator and developer perspective, by turning the casual pirate, or an ignorant consumer, into a paying customer.
Richard Atkinson, General Manager & Senior Director, Global Non-Genuine Segment & Fraud Prevention, Adobe
The Global Approach to the ME-ISAC
In operation by CDSA for less than a year, the Media & Entertainment Information Sharing & Analysis Center (ME-ISAC) is designed to complement the TPN by providing threat analysis, information and guidance for protecting your business, regardless of size or location, against emerging cybersecurity and digital threats. The Internet is a scary place. Yet we are shifting more and more services to the cloud, requiring Internet access even as part of production workflows. The only way we can operate such critical processes over such inhospitable terrain is by knowing what the threats are and avoiding them. The way we find out about these threats is via information sharing. The ISAC provides the platform and means for secure and timely collaboration about threats, risks, vulnerabilities, and incidents between trusted partners of the media and entertainment industry.
Christopher Taylor, Director, ME-ISAC
A Global Community: The Trusted Partner Network
In April of 2018 CDSA and the Motion Picture Association (MPA), launched a global, industry-wide, content security initiative: The Trusted Partner Network (TPN), to elevate the security standards of the film & television industry’s production and distribution supply chain. What are the top-level takeaways from performing (and reviewing) global assessments of facilities across the entertainment supply chain? How can we work together to socialize the basic security needs for the broad range of businesses providing services to content creators? TPN Board members take the stage to provide an update on how its site security program has progressed and what’s in store for securing the next generation of core technologies for media & entertainment.
Guy Finley, President, CDSA and Chief Executive Officer, Trusted Partner Network (TPN)
Ben Stanbury, Chairman Emeritus, CDSA and Chief Technology Officer, Trusted Partner Network (TPN)