Program

(As of December 1st, subject to change)

Event Schedule:

8 a.m.: Registration Opens
9 a.m.: General Sessions
1 p.m.: Networking Luncheon
4 p.m.: Breakout Sessions
5:30 p.m.: Networking Reception/MESA Holiday Party

——————————————————————————————————————
9 – 9:10 a.m.
Opening Remarks
Bryan Ellenburg, Security Consultant, CDSA and Conference Chair
Guy Finley, Executive Director, MESA

 

9:10 – 9:15 a.m.
Conference Welcome Remarks
Kai Pradel, Founder and Chief Executive Officer, MediaSilo

 

9:15 – 9:30 a.m.
Setting the Stage for CPS 2016
This session provides perspective on the strategic importance of the roles CDSA and the Content Protection Summit play within the Media & Entertainment industry.
Richard Atkinson, Corporate Senior Director, Global Piracy Conversion Team, Adobe, and Chairman of the Board, CDSA

 

9:30 – 10 a.m.
KEYNOTE: Protecting Your Content in Today’s Age of Cyber-Espionage
With this year’s hack of the Democratic National Committee (DNC) and the subsequent flood of WikiLeaks, cyber theft is now the number one issue for businesses and government agencies alike. The modern spy is responsible for these attacks; they’re sophisticated, brilliant, devious and technologically advanced, and they are targeting your company’s content (and data). Our Keynote speaker has helped capture the most notorious spy in United States history: Robert Hanssen, a 25-year veteran of the FBI. The remarkable true events of his life are the inspiration behind the critically acclaimed dramatic thriller Breach, starring Ryan Philippe as O’Neill. O’Neill will use this and other real-life spy stories to show how careful diligence, counter espionage techniques and restraint in social media can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard. In addition, he also addresses the issues of confidence and patriotism, the threat to United States security posed by terrorism, foreign intelligence services, the cyber threat to our national infrastructure and the national conscience in a monitored society.
Eric O’Neill, Cyber-Security Expert and National Security Strategist

 

10 – 10:15 a.m.
The Global State of Information Security
PwC presents the results of their Global State of Information Security Survey 2017. The study shows entertainment and media executives are enhancing security to align with changes in technology; and in turn, have substantially improved privacy measures, business processes and strategies. Armed with the knowledge and data on threats, assets and adversaries, hear key findings that support creating an evolved, business-focused security program.
Wendy Frank, Principal, Cybersecurity, Privacy & Risk Practice, PwC

 

10:15 – 10:45 a.m.
Assessing New Gaps and Vulnerabilities: The C-Suite Perspective
In today’s dynamic digital landscape new vulnerabilities in our increasingly complex supply chains are constantly emerging. How do companies assess (and ultimately defend against) the emerging cyber-threats they are constantly encountering as well as potentially devastating security threats caused by either ingenious hackers or plain-old technical lapses? A panel of security experts, technologists and analysts will share what they’re coming across most, where the biggest vulnerabilities are and how they are working to plug these new, and forever changing, security gaps.
Moderator:
Sean Flynn, Technology & Security Innovator and Former CTO, Marvel Studios
Panelists:
Dan Meacham, Chief Information Security Officer, Legendary Entertainment
Tom Mendelboim, Co-Chief Technology Officer, Bad Robot
Jason Smolanoff, Chief Executive Officer, CISO Advisory & Investigations

 

10:45 – 11 a.m.
Securing the Content Lifecycle in the Modern Enterprise
The most advanced security controls today can become obsolete in a matter of months or days. As risks rapidly evolve, organizations must also adapt to counter complex threats. Similar to sandcastles, it feels like security programs must continually be rebuilt. This session looks at how the world’s leading organizations are building their security programs, how to define and measure success and how to periodically tear down and rebuild again without disrupting your critical business infrastructure.
Joel de la Garza, Chief Security Officer, Box

 

11 – 11:30 a.m.
NETWORKING BREAK

 

11:30 – 11:45 a.m.
Budgeting for Security in Production and Post Production

How are studios and production companies creating budget guidelines for providing security of feature and television products? What are the most critical baseline security measures that should be included on all projects? For smaller budgeted projects, where is the most value, and what security measures can be scaled down or eliminated? This session explores what is “nice to have” v. “need to have” at the onset of planning or greenlight.
Lulu Zezza,
Production Executive, New Regency Productions

 

11:45 a.m. – 12:15 p.m.
Securing Workflows of All Things Digital

Content creation begins at the script stage, builds during pre-production, and explodes during production and post production. Collaboration is a necessity, but it is essential that it is done in a secure framework that is cost effective and operationally efficient. Sensitive and confidential information includes scripts, budgets, casting, locations, concept art, pre-visualization, props, costumes, call sheets, camera cards, video assist, dailies, editing systems, visual effects, sound, music, and more. The production and post production digital workflows are like snowflakes — no two are the same. With such a diverse ecosystem of technologies and vendors, how do we as an industry work with common best practices to secure the supply chain?
Moderator:
John Canning,
Chair, New Media Council, Producers Guild of America
Panelists:
Eric Diehl,
Vice President, Media and Content Security, Sony Pictures Entertainment
Kai Pradel,
Founder and Chief Executive Officer, MediaSilo
Lulu Zezza
, Production Executive, New Regency Productions
Introduction: Matt Thomas,
Head of Sales, MediaSilo

 

12:15 p.m. – 12:45 p.m.
Protecting Against Unauthorized Redistribution of Content

Illegal streaming of content is rapidly becoming one of the biggest threats to Media & Entertainment. Inexpensive devices that typically connect into a home theatre environment via a simple USB or HDMI input can be easily jailbroken and configured in just a few minutes (thanks to YouTube tutorials and step-by-step instructions on the Internet). The financial impact of these “platforms” will continue to rise as pre-release movies, subscription programming and live events become easily available to consumers who purchase or configure these devices. Additionally, new disruptive technologies such as Facebook Live, Periscope and Meerkat have become problematic for unauthorized re-distribution of broadcast, live and short form content. Traditional defenses, such as digital fingerprinting that is used to deny uploads on feature films and television content, may not be as effective for streaming content. What are the downsides to these emerging technologies? This session looks at the impact of this type of piracy, and what can be done to combat this problem. Learn first hand strategies utilized by companies in the middle of this ever-increasing problem.
Moderator:
Bryan Ellenburg,
Security Consultant, CDSA and Conference Chair
Panelists:
Steve Holyhead,
Director, Technical Operations, Fox Broadcasting
Mark Nakano,
Senior Director, Product Marketing & Partnerships, NexGuard, Kudelski Group
Cyril Rickelton-Abdi,
Senior Director, Content Security, Turner Broadcasting
Kevin Taylor,
Fellow, Comcast

 

12:45 – 1 p.m.
Introduction to CPS Innovation and Technology Showcases (Multi-Track Break-Out Sessions)
Guy Finley,
Executive Director, MESA

 

1 – 2 p.m.
NETWORKING LUNCHEON

 

2 – 2:15 p.m.
Bridging Law Enforcement and Private Industry in a Cyber World
Addressing cybercrime and cyber-enabled crime is a significant priority of law enforcement and the International Association of Chiefs of Police. The federal government has recognized that cybercrime represents a significant and growing threat to our national security. Less talked about, but just as important, is the impact cyber-enabled crime has on our community each day. This presentation will focus on the need for a joint collaborative and cohesive effort of law enforcement and the private industry as it relates to prevention, detection and prosecution of cyber and cyber-enabled crimes. The integration of government, law enforcement and industry leaders is essential to the success of each of our efforts. Building effective and productive partnerships is vital to creating a strong and diverse foundation as we confront these issues on a global stage.
Paul Cell,
Vice President, International Association of Chiefs of Police

 

2:15 – 2:30 p.m.
The Economics of Enforcement: Carrots, Sticks, and Social Benefit
Debates around copyright enforcement often center on who should bear the cost of protecting IP. Should firms be required to entice consumers to legal goods and away from piracy, or should governments take stronger measures to eliminate piracy and enforce copyright law? Economic evidence shows that, in spite of what some may claim, there are both firm strategies and government policies that can convert pirates into paying consumers, but no one action is a panacea. And most of these strategies and policies have associated costs, which may be born by firms and/or consumers. This session summarizes evidence around what works, and what does not, and then present a framework for how our industry should think about potential copyright reform in the digital era.
Brett Danaher,
Assistant Professor of Economics and Management Science, Chapman University

 

2:30 – 3 p.m.
Ending The Golden Age of Internet Theft: How to Monetize Piracy
The software industry has found creative ways to incentivize pirates to move consumption to revenue generating platforms. Other companies have used litigation to recover potential losses to pirates, by promoting a “browser hijacking system to ISPs”, where pirating subscribers eventually have to pay a fine to regain Internet access. While both proactive and reactive approaches have proven to be effective, how can the Media & Entertainment industry come up with a cohesive strategy for their film and television product to convert piracy into a revenue generating business? What lessons can we learn from efforts made Internationally? Why haven’t large social media platforms helped to solve this problem by using fingerprinting technologies to redirect the consumer to legitimate content? Are social media platforms a greater piracy threat then peer to peer, and what should Facebook and Google and YouTube be doing to help monetize unauthorized content?
Moderator:
Richard Atkinson,
Corporate Senior Director, Global Piracy Conversion Team, Adobe, and Chairman of the Board, CDSA
Panelists:
Brett Danaher,
Assistant Professor of Economics and Management Science, Chapman University
Jane Sunderland,
Content Protection Strategist, Lionsgate

 

3 – 3:40 p.m.
An Innovator’s Perspective on Security and Content Protection
Recent events have made content protection a top priority for leading media & entertainment professionals. Which technologies do innovators swear by today, that everyone else will use tomorrow? Designed for Hollywood executives by leading venture capital firm Andreessen Horowitz, and including their a16z portfolio pioneers, this session defines what content security and visibility mean (across every application and device), discusses how technology is disrupting the M&E business and presents cutting edge solutions for implementing best practices.
Introduction: Naithan Jones,
Partner, Andreessen Horowitz

 

3:40 – 3:55 p.m.
Protecting the Most Important Physical Asset…YOU!
Corporate travel involves risk. Depending upon the location/stability/culture of your destination, how you react in an unexpected moment could make a real difference in what happens to you both physically and emotionally. A little exposure and training can go a long way. Arming yourself with some basic knowledge can potentially keep you out of harm’s way or get you out of (or even prevent) a crisis situation; it’s a matter of knowing what to do. This session will share some simple tips and tactics to help you stay safe when traveling domestically or abroad and raise your everyday vigilance.
Shelley Klingerman,
Founder, Savvy Femme and Executive Director, Launch Terre Haute

 

3:55 – 4 p.m.
Closing Remarks and Breakout Sessions Instructions
Guy Finley,
Executive Director, MESA

 

CPS INNOVATION and TECHNOLOGY SHOWCASES (Multi-Track Break-Out Sessions)

Industry experts share innovative ideas, processes, or perspectives in an interactive and intimate way with the audience who are free to choose which topic/area they find most interesting. Sessions will address key areas on separate tracks.

 

ROOM A:
4:30 – 5 p.m.
Why You No Haz Content Protection: “Secure by Default” Workflows are No Laughing Matter
It’s the classic Catch-22: Content protection protocol relies on creatives and executives to implement it. Every extra step added reduces the chance protection measures will actually be followed on a regular basis. New technology makes it easier than ever to incorporate security seamlessly into existing workflows. From SSO to MFA to role-based access control to on-demand watermarking, flexible toolsets exist to combat rogue workarounds, without sending creatives running for the hills. See concrete examples of cutting-edge security features integrated directly into post-production workflows in this meme-based look at best practices.
Alex Nauda, Lead Developer, MediaSilo
Kai Pradel, Founder and Chief Executive Officer, MediaSilo

 

5 – 5:30 p.m.
Transforming Access Control from Risk to Competitive Edge
Access management is core to every content security strategy, yet traditional solutions have failed agile, global, media companies. User experience is compromised (I lost my RSA token, now what?), productivity is crushed (weeks to make new apps available), and operational costs impact project profits (on-prem infrastructure, maintenance and operations). But thanks to new innovations it doesn’t have to be this way. In this session we’ll introduce cloud identity and access management, as well as share how companies like 20th Century Fox are shipping new films faster, at lower cost, and with improved security thanks to this new technology.
Nadav Benbarak, Group Product Marketing Manager, Okta

 

ROOM B:
4:30 – 5 p.m.
Balancing Security with Global Distribution
According to IBISWorld, more than 60% of US TV content is now distributed internationally, and the MPAA and SNL Kagan report that 70% of studio revenue now comes from international box office. Realizing this global opportunity requires content to be localized, watermarked, equipped with DRM, packaged and more to address the unique delivery requirements of each market, a range of devices, and individual consumers. All of these processes expose assets to compromise and piracy at multiple points of transfer across additional services, vendors and delivery platforms. In 100+ years of serving top content creators, rights holders, and distributors, Deluxe has developed a culture of security and practices that have been adopted across the industry. In this session Deluxe will share its practices that extend to physical and digital security policies to protect content throughout the entire supply chain — from initial creation all the way through delivery via IP, traditional broadcast, OTT and VOD/SVOD.
Scott Gicking, Chief Security Officer, Deluxe Entertainment Services Group

 

5 – 5:30 p.m.
Storage and Security: A Fireside Chat
This session is an intimate discussion between Western Digital, the largest storage maker, and a leading M&E security expert. The dialogue will center around the role that storage plays in securing content assets, and how to think about the implications that both business and technical decisions about storage technologies make on system security. Attendees will be left with a sense for how hackers think and how to consider defense paradigms accordingly.
Erik Weaver, Global Director, M&E Market Development, HGST
and Invited Guest

 

ROOM C:
4:30 – 5 p.m.
Encryption While You Work
The theft of content or accidental leaks during the post production phase remains a serious concern. At this stage of editing the movie or TV episode may be unfinished but the video content is often in final form. Any leaks can have serious financial or reputational consequences for both the content owner and any supply chain partners involved. Given the need for shared access during this stage, it is also a time when the content is at its most vulnerable to accidental distribution, system hacks or piracy. In this session we learn about some of the steps that can and should be taken to protect content at-rest.
Mathew Gilliat-Smith, Chief Executive Officer, Fortium Technologies

 

5 – 5:30 p.m.
Anti-Piracy Solutions with Forensic Watermarking: Practical Implementations
From just a single leak, content is made available for free to millions of potential customers instantly across the world; it’s not just distribution revenue but also executive careers on the line. Forensic Watermarking is here to stay as the only proven anti-piracy technology that can provide actionable intelligence on global piracy. Come learn about practical implementation steps when implementing available forensic watermarking technology in conjunction with strong piracy monitoring services. It’s your chance to review, question and compare the available solutions from DWA members and “swipe right” with a professional partner to meet your specific needs.
Rajan Samtani, Senior Advisor, Digital Watermarking Alliance

 

Followed by a Networking Reception and MESA’s Annual Holiday Party