Presentations

9 – 9:15 a.m.
Opening Remarks & Conference Welcome

Richard Atkinson, President, CDSA
Guy Finley, President and Chief Executive Officer, MESA
Ben Stanbury, Chairman, CDSA
 

9:15 – 9:45 a.m.
OPENING KEYNOTE: Evolving Threats and Where We’re Headed – A National Perspective

In this session, a follow-on from their virtual keynote at NAB back in April, we will get an in-person update on the grand myriad of threats being directed against our industry, businesses and customers… and how we are evolving in our responses. As the Chief of Staff, Kiersten is right in the middle of the battle, and Roger Cressey will be our session host. For those that do not know CISA (Cybersecurity & Infrastructure Security Agency), they are the “tip of the spear” for all coordination and communication across all the US Government agencies, and with Industry through the structure of ISAC’s (CDSA has the M&E ISAC as a part of our organization).
Roger Cressey, NBC Counter-terrorism Analyst & Former Presidential Advisor
Kiersten E. Todt, Chief of Staff, Cybersecurity and Infrastructure Security Agency (CISA)
 

9:45 – 10:15 a.m.
KEYNOTE: Evolving Threats and Where We’re Headed: Hacker’s Perspective


Give us your perspective on the Cyber threat environment and the mitigation(s) required to stay ahead of the bad guys. Has this evolved since your virtual keynote in 2020? What’s changed? Has anything improved? Once you are compromised, what are they doing next? Is Ransomware-as-a-Service a real thing? With the breadth and depth of your experience, where do you see this heading on the macro and what’s in store for M+E companies and their collaborative partners? This session takes us through an attack that caused headaches within a seasoned team.
Ralph Echemendia, “The Ethical Hacker” and Executive Advisor
Click here to download presentation
 

10:15 – 10:45 a.m.
KEYNOTE: Evolving Threats and Where We’re Headed: Storyteller’s Perspective

Creatives bring a different perspective to our conversations on threats and direction. Their challenge is making the greatest content that embodies their story’s vision while still keeping it secure. This session looks at where the world’s collide and where there’s synergy. It also discusses how we can work together to help bring these disparate cultures together under the same strategic, secure focus.
Jerry Rees, Film Director and Animator
Click here to download presentation
 

10:45 a.m.
Introduction To Multi-Track Sessions
Guy Finley, President and Chief Executive Officer, MESA
 

10:55 – 11:15 a.m.
NETWORKING BREAK
 

HERSCHER A:

11:15 – 11:45 a.m.
How Evolving Workplaces Demand a New Approach

Learn how a leading visual effects organization achieved clear business benefits by modernizing its approach to today’s Work-from-Everywhere workforce. It is possible to have consistent security from the perimeter edge to the cloud, while simplifying operations and obtaining the data intelligence needed for AI/ML to drive better user experiences.
John Jacobs, Field Chief Information Security Officer, Fortinet
Click here to download presentation
 

11:50 a.m. – 12:05 p.m.
Responding to Demand: How Much are we Leaving on the Table?

This session is all about understanding and measuring the “demand” side fueling piracy, and what the businesses are potentially leaving on the table as we remove the bad guys/pirate-supply without backfill from the business.
Christopher Elkins, Co-Founder, CBDO – Data, IP, Media, MUSO
Click here to download presentation
 

12:10 – 12:40 p.m.
Getting Application Security Right for M+E

This session discusses the range of security measures that SaaS application providers go through for approval by investors, content owners and partners. There are many audiences both internally and externally, each with their own set of demands and there are multiple levels of security to consider. Balancing risk with innovation is a key consideration and security should complement rather than stifle progress. With continual enhancements through rapid development cycles, being able to identify potential areas of vulnerability in advance can serve to make life less stressful. The panelists will discuss different perspectives and common themes of application security.
Edward Churchward, Co-Founder & Chief Technology Officer, Arch Platform
Stephen Chow, Chief Executive Officer, SetKeeper
Mathew Gilliat-Smith, Executive Vice President, Convergent Risks
Jeremy Roche, Vice President, IT Security Extreme Reach
Introduction by: Chris Johnson​, Chief Executive Officer & President, Convergent Risks
Click here to view SetKeeper slides
 

HERSCHER C:

11:15 – 11:45 a.m.
(Zero) Trust Issues – Fireside Chat


There is no silver bullet within the cybersecurity space. Many theories and frameworks have been developed to help organizations understand their maturity and risk posture but still successful cyberattacks are on the rise. With Prevention being only one aspect of cyber resilience, newer architectures have emerged to minimize the blast radius of cyberattacks. Join this fireside chat on the anatomy of a Cyberattack and how the concept of Zero Trust architecture can minimize the blast radius of cyberattacks.
Sean Kalinich, Cybersecurity Architect, Richey May
Alvin Tugume, Cybersecurity Engineer, Richey May
Click here to download presentation
 

11:50 a.m. – 12:05 p.m.
Driving Cost Savings in Effective Production Security Operations

Update on our workstream to help bring the latest content security best practices into focus for production crew on set and location. Constructing a common template that can be easily adapted by productions and the use of a secure wiki to provide the latest information online to authenticated crew members and allow feedback and tracking of activity
Ben Schofield, Technical Director, CDSA
Click here to download presentation
 

12:10 – 12:40 p.m.
Residential IP Addresses: A Rising Threat to Content Exclusivity


Over-the-top (OTT) streaming services are facing a new threat: hijacked residential IP addresses. An estimated 200 million people have unknowingly had their home IP address hijacked, often because they have used a ‘free’ VPN. Pirate viewers use these IP addresses to access territorially restricted content for free or at a reduced price. By hiding behind a legitimate domestic IP address, pirate viewers can easily bypass VPN restrictions because streaming providers can’t risk blocking genuine users. Yet the failure to stop this form of geo-piracy puts OTT streaming services at risk for non-compliance with rights holders’ agreements for content exclusivity. With a sudden flurry of people searching for a free VPN to watch the World Cup, this session will discuss the risks this poses to the media industry and the effect it is having on cyber criminality.
James Clark, General Manager, Media & Entertainment, GeoComply
Brian Paxton, Managing Director, Kingsmead Security
Click here to download presentation
 

12:45 – 2 p.m.
NETWORKING LUNCH
 

2 – 2:30 p.m.
AFTERNOON KEYNOTE: Perspective from Leadership

Our afternoon keynote conversation follows on from their discussion at IBC and digs deeper to gain their leadership perspectives on the evolution of our M&E industry and related security issues that transcend technology.
Simon Crownshaw, Worldwide Strategy Director, Media + Entertainment, Microsoft
Interviewed by: Allan McLennan, Founder, Chief Executive & Global Market Technologist, Padem Media Group
 

HERSCHER A:

2:30 – 3 p.m.
DCIM for Risk Management in M&E Operations

Imagine facility security and health alerts on your watch, monitoring the stage’s digital infrastructure, notifying you of a pending back-up failure or power outage. Data Center Infrastructure Management (DCIM) systems centrally monitor, measure, manage, and control the security and health of a facility’s digital infrastructure, from WiFi, storage, and servers, to power, cooling, and security access, and more. M&E companies such as ARRI are already introducing DCIM products of their own, providing fault-finding information to staff located anywhere in the world. How can DCIM support virtual and traditional production operations today, and why aren’t they being adopted?
Moderator: Eric Rigney, Executive Vice President, MEDCA
Panelists:
Lisa Griffin, Executive Director, MEDCA
Joe Reele, Vice President, Solution Architects, Schneider Electric
Sean Tajkowski, Technical Director, MEDCA
Jim Weinheimer, Director of Solutions Engineering, Virtual Power Systems
Click here to view Canto Digital presentation
Click here to view Schneider Electric presentation
 

3 – 3:30 p.m.
Dealing with BotNets

There are many threats to our companies, our operations, and our customers…and botnets are one of the major threats that continue to evolve and survive. In this session, Don Smith of Comcast will share their work to better understand and deal with botnets in ways that we could/should leverage. Exactly the kind of “common problem/common solutions” that we focus on facilitating in CDSA.
Don Jones, Director of Strategic Fraud Intelligence, Comcast
Click here to download presentation
 

HERSCHER C:

2:30 – 3 p.m.
Getting There Before the Boom!
This session looks at common threats and persistent bad actors across the M+E supply chain. How they are breaking in, what they are looking for, and where the FBI can (or can’t!) come in to assist. It also addresses the importance of partnership and community while providing relevant prevention tactics to ensure your company is best positioned to deal with whatever may come next. Be sure to attend to learn more about how the FBI is working with Hollywood and other Los Angeles-based businesses across Media + Entertainment.
Michael Sohn, Supervisory Special Agent (SSA), FBI Cyber Division and Liaison to the National Cyber-Forensics & Training Alliance
Video and presentation not available per speaker request
 

3 – 3:30 p.m.
Wrap Your Head Around the Cloud

With 94% of companies utilizing cloud services in 2022, an organization’s attack surface has changed dramatically. Understanding the benefits and risks of transition to cloud services is overwhelming.  Join this session as we break down the ambiguity of what the cloud is and dive into Cloud Security Trends and Emerging Threats moving into 2023.
Michael Nouguier, Chief Information Security Officer & Director of Cybersecurity Services, Richey May Technology Solutions
Jim Reavis, Co-Founder and Chief Executive Officer, Cloud Security Alliance
Click here to download presentation
 

3:30 – 4 p.m.
NETWORKING BREAK
 

HERSCHER A:

4 – 4:30 p.m.
Growing the Business through Strategic Enforcement: A Case Study

Using a case study that was very closely measured, this session will share some examples showing the clear business uplift, which is gained through effective strategic enforcement.
Ygor Valerio, Chief Executive Officer, LtaHub
Richard Atkinson, President, CDSA
Click here to download presentation

 

4:30 – 5 p.m.
Private vs Public Enforcement

By taking a “private” approach to enforcement, and leveraging available “open source” data in your investigations, you can be much more successful in your enforcements versus taking a standard public/referral-type approach.
Ygor Valerio, Chief Executive Officer, LtaHub
Richard Atkinson, President, CDSA

 

HERSCHER C:

4 – 4:30 p.m.
APT Groups: What are They and Why Should You Care?

Major ransomware attacks are making headlines every week. Who is behind these attacks? How many of these attackers are there? If we get attacked, how would we know which group we are fighting against? How would knowing that help us? Answers to all of these questions and more in this quick introduction to some of the most active attackers on the Internet.
Chris Taylor, Director, ME-ISAC and Director, Content Security, Skydance
Click here to download presentation
 

4:30 – 5 p.m.
Advantages Gained by our Members through Information Sharing

As an integrated part of CDSA, the M&E ISAC is leveraging the Cyware platform for alerts and communications in a collaborative environment. In this session, we will hear how these communications platforms can supercharge the communities/working groups and dramatically increase their overall effectiveness.
Aaron Perkins, Customer Success Manager, Cyware
Chris Taylor, Director, ME-ISAC
Click here to download presentation
 

HERSCHER B:

5 – 5:30 p.m.
CDSA Working Groups Panel

Are you aware of all the CDSA Working Groups? In this session, each of the Working Group Chairs will give us a brief overview of what they are focused on and why.
Moderator: Guy Finley, Executive Director, CDSA
Richard Atkinson, President, CDSA
Ben Schofield, Technical Director, CDSA
Click here to download presentation
 

5:30 -6 p.m.
CLOSING CONVERSATION: Delivering Content Securely with Speed and at Scale? Yes You Can!

The M&E Industry is at an inflection point with content volume and distribution methods exploding. Consumers and fans demand more and more of their favorites, while content creators struggle with a solid strategy to provide the goods. In this discussion, our panel of experts will reveal if it is possible to have all three. From challenges within the content supply chain to design and deployment choices have yielded the best results and hold the most future promise. Selecting all three options – Speed, Security and Scale can ensure profitable growth as the new measure. Join us to find out how!
Richard Atkinson, President, CDSA
John Jacobs, Field Chief Information Security Officer, Fortinet
 

6 p.m.
Conference Closing Remarks

Richard Atkinson, President, CDSA
Guy Finley, President and Chief Executive Officer, MESA
Ben Stanbury, Chairman, CDSA
 

Register ‍

Program

Other Events