Program

(as of October 4, 2021 and subject to change)
 

Event Schedule:

8 a.m.: Venue Opens
9 a.m.: Opening Remarks/General Sessions Begin
10:30 a.m.: Networking Break
12:30 p.m.: Networking Break
2 p.m.: General Sessions Resume
5:30 p.m.: Closing Remarks/Networking Reception

 

Event Program:

 

Adopting Zero Trust – What is it, What’s Working and What Isn’t
Delivering security and protecting content is essential in enabling your organizations to thrive, build brand awareness and establish customer trust. But how can this be achieved in highly collaborative, perimeter-less environments with shared ownership and control, where almost none of which can be implicitly trusted? A Zero Trust approach can be an incremental, iterative process to implement controls that verify and enforce security every step of the way. This can help ensure that only the appropriate access to resources is granted to those users and entities that need it and when.
Alden Hutchison, Partner, IBM Security
 

KEYNOTE: Minimizing Risk and Maximizing Resiliency in a Post-COVID World
Our Keynote speaker brings decades of experience, in both public and private sector risk management and mitigation, to our CDSA forum at NAB. While we all endure the ongoing impact of the global pandemic, she reminds us that hurricanes will continue to touch down on land, terrorists will adapt to new security measures, and hackers will always find a new way to get at your personal or corporate information. As a Harvard Faculty Member, Juliette teaches evolving risk management and resiliency strategies across many organizations and disciplines. Her “Five Investments in a Resilient System,” provides unique and practical lessons our industry. From the frontlines as a mother of three and a homeland security expert. tshe’s here to discuss the importance of preparedness, private and public sector capabilities, and resiliency. She’ll inspire us to understand, in this thought-provocking Keynote presentation, that we will always be vulnerable, but there is so much we can still do to lower our risks.
Juliette Kayyem Expert/Analyst/Author
 

“Is Private the New Secure?” De-Risking Storage and the Journey to the Cloud
In an increasingly decentralized and remote workforce, the importance of fluid interoperability between cloud providers, teams and workflows has never been more apparent. To make security concerns a thing of the past, our approaches to networking and storage face existential, fundamental shifts. Join two experts in the field as they review what’s new and what’s needed to deliver security to an industry that needs it more than ever.
Tony Gaughan, Chief Technology Officer, RStor
Dave Ward, Chief Excecutive Officer, PacketFabric
 

Disrupting Piracy: Using Multi-DRM and Watermarking to Combat Illegal Viewing and Distribution of Content.
It’s not often that an industry undergoes the revolutionary shift that streaming video has undergone in the past 3 years. It’s as if someone just made a switch in the tracks and streaming is now the primary media and entertainment platform. COVID has catalyzed this shift by effectively moving the majority of digital pre-production and post-production for theatrical and series-based releases to the cloud. As a result of these two factors, forensic watermarking with DRM have become the norm for the lifecycle of content. Watermarking and DRM carry the day for content as it’s produced, edited, distributed and viewed with encryption and embedded data imperceptible to the viewer’s eyes. Disrupting piracy in the streaming industry is now a crucial component to success for live sports, theatrical releases and popular series. Here, we take a deeper look into how Watermarking with Multi-DRM disrupts piracy of your content while enabling new viewing models and playback platforms.
Christopher Levy, Chief Executive Officer & Founder, BuyDRM
 

The Bad Guys Are Everywhere – A Threat Assessment for 2021
2021 has not exactly been a dream for identifying (and stopping) threat actors. We find ourselves at a difficult crossroads: businesses are mandated to manage the evolving risks and rewards of a hybrid work environment. For malicious and increasingly sophisticated digital criminals, this new and liquid dynamic fuels their search for vulnerabilities at hyperdrive speed. From common compromise vectors to new and frightening hacks at the uppermost levels of our infrastructure, digital aggressors are always finding new methodologies with which to escape IT notice and exploit emerging weaknesses. This session shares the latest strategies in technological analysis, detection and defense measures to keep your business ahead of the intruders.
Chris Taylor, Director, ME-ISAC and Director, Content Security, Skydance
 

Deep Dive: Adopting Zero Trust – Where to Start
What can you trust? If you are following a strict zero trust philosophy, the answer is nothing and no one. This session will discuss the principles that underlie the zero trust philosophy, how it has evolved to become a top concern for organizations today as well as some specific guidance as to where to start to begin reducing risk. IBM Security has helped hundreds of organizations with any or all parts of this journey, so please join this deep-dive to hear what we have learned from those experiences, and where we think you should start.
Alden Hutchison, Partner, IBM Security
 

By the Numbers: Piracy in a Post-Pandemic World
Cybersecurity and content protection are imperative, but protecting people and physical assets are important too. A big question for content creators right now is the fact that the assets and resources to accomplish both these industry challenges are uniqure and require their own assessment approaches. There is a clear need in the wider industry for a dedicated standard for physical security of productions to be aligned with and synergetic to existing content protection guidelines. In this session, we will look at the fundamentals required for our industry to evolve in these rapidly changing workflows and environments.
Steven Hawley, Founder and Managing Director, Piracy Monitor
Colin Dixon, Founder and Chief Analyst, nScreenMedia
 

Always-on Security: The Importance of Watermarking in Production and Post-Production
The global pandemic has reiterated the criticality of quality content. Industry dynamics that were thought to be years away happened in the blink of an eye, with new business, production, and distribution models appearing. These new market dynamics make for a perfect storm where content is vulnerable to theft and leaks, paving the way for revenue loss and endangering creativity. Join experts from Vision Media and NAGRA for insights into the absolute minimum security you need to protect pre-release content. Learn why there has never been a more critical time to secure high-value content assets in the production and post-production stage.
 

New Tools & Rules for Creating Content in the Cloud
By now the M&E space has had close to a year and a half to devise workflows and inovative tools required for today’s content creation paradigm. With global production building cloud-based studio space as never before, the most mission-critical elements of the ecosystem have never been more exposed. The protection of cloud pathways has become a topline item of strategic planning. The entire creative food-chain may now be housed in a hybrid environment, but are we meeting expectations for all stakeholders? What new platforms, systems and practices will ensure the stregthening of this new workflow? This selection of presentations addresses a world that has evolved from emergency measures to the reality of S.O.P. cloud creation and connectivity.
 

Physical Security in a Digital World
Cybersecurity and content protection are imperative, but protecting people and physical assets are important too. A big question for content creators right now is the fact that the assets and resources to accomplish both these industry challenges are uniqure and require their own assessment approaches. There is a clear need in the wider industry for a dedicated standard for physical security of productions to be aligned with and synergetic to existing content protection guidelines. In this session, we will look at the fundamentals required for our industry to evolve in these rapidly changing workflows and environments.
 

Stay tuned, more details to come…