Presentations

9 a.m.: General Sessions
11 a.m. – 1 p.m. – CPS Innovation and Technology Showcases
4 – 6 p.m.: Trusted Partner Network Workshop
4 – 6 p.m.: WiTH Workshop
 

9 – 9:05 a.m.
Opening Remarks
Martin Porter, President, CDSA
Click here to download audio
 

9:05 – 9:10 a.m.
Conference Welcome Remarks
Kai Pradel, Founder and Chief Executive Officer, SafeStream
Click here to download audio
 

9:10 – 9:15 a.m.
Setting the Stage for CPS 2018
This session provides perspective on the strategic importance of the roles CDSA and the Content Protection Summit play within the Media & Entertainment industry.
Guy Finley, President, MESA and Executive Director, CDSA
Ben Stanbury, Chairman of the Board, CDSA
Click here to download audio
 

9:15 – 9:45 a.m.
OPENING KEYNOTE: The LA Cyber Lab: Fighting Cybercrime, Together
The nature of the cybersecurity threat in the United States mandates the need for leadership in preventing, mitigating, and recovering from adverse events in cyberspace. There is a critical need for enhanced bilateral information-sharing, cybersecurity workforce and education development, multifaceted incident response strategies, and protection of critical infrastructure. Fortunately, Los Angeles is at the forefront of cybersecurity defense and innovation. Launched in August 2017, the Los Angeles Cyber Lab is the first of its kind public-private-partnership. It is a non-profit organization dedicated to protecting personal and protected information from malicious cyber threats by facilitating and promoting innovation, education, and information sharing between Los Angeles’ public and private sectors for the benefit of all our city’s businesses and residents. LA Cyber Lab is dedicated to sharing the latest cybersecurity threat data, alerts, and intelligence gathered by the City of Los Angeles and its partners. Under the leadership of Mayor Eric Garcetti, the lab develops policy and practices to support businesses, residents, families, and the community. Our Opening Keynote provides an inside look at the lab’s initiatives and ways to get involved.
Jeff Gorell, Deputy Mayor of the City of Los Angeles for Homeland Security and Public Safety
Click here to download audio
Click here to download presentation
 

9:45 – 10 a.m.
The Importance of Threat Intelligence in Protecting Content
Media & Entertainment companies play a key role in shaping public opinion and national image, making it a target for advanced persistent threats and other forms of hacktivism. An Information Sharing and Analysis Center (ISAC) is a community effort within an industry that provides a central resource for gathering and disseminating information about cyber threats pertinent to its industry. With so much information coming in via news, blogs, tweets, alerts from cyber security vendors, alerts from government agencies, and other sources, it can be overwhelming for a company to keep on top all of that data when they are trying to focus on doing their core business tasks. This is where the ISAC comes in to provide a curated feed that distills down the mountain of data to what is relevant specifically to media & entertainment companies. To help you understand how threat intelligence fits into your security program, we’ll attempt answer these questions for you. What is threat intelligence? Why do you need it? How does it help you stay safe online?
Guy Finley, President, MESA and Executive Director, CDSA
Ben Stanbury, Chairman of the Board, CDSA
Click here to download audio
Click here to download presentation
 

10 – 10:30 a.m.
KEYNOTE: Securing Global Moments and Creating a Stronger BBC
The leak of scripts and unedited episodes in 2014 from the famous sci-fi program Doctor Who was an agent of change for the BBC. Now in its 55th year, the show has garnered a loyal fan base worldwide that closely charts every detail of the adventures of The Doctor and the time-travelling TARDIS. In this keynote conversation, BBC Studios Content Security Director Alex Pickering will describe the security challenges faced in delivering global moments for shows like Doctor Who, Sherlock and Blue Planet II and the approach taken in creating a stronger BBC via a combination of stakeholder engagement, incident management, and vendor cooperation.
Alex Pickering, Global Content Security Director, BBC Studios
Presentation and audio not available per speakers request
 

10:30 – 10:40 a.m.
CDSA’s Production Security Best Practices
How are industry leaders, guilds and associations working together to create a new series of collaborative controls to secure our content on the production set? Through CDSA’s Television Production Working Group (TVPWG), content holders have explored and created and extensive Best Practices document to guide security requirements during feature and episodic production. This introduction provides CPS attendees with the first look at the guidelines and sets the stage for the panel discussion.
Cyril Rickleton-Abdi, Co-Chair, CDSA Television Production Working Group
Lulu Zezza, Co-Chair, CDSA Television Production Working Group
Click here to download audio
Click here to download presentation
 

10:40 – 11 a.m.
The New Frontier: Securing Production
Content protection during production requires a unique approach due to the complexity, scope, speed and nature of how we create feature and television content. With a cast and crew of sometimes hundreds, how do you ensure you have the necessary protocols in place that balance an increased need for digital infrastructure and information security with the range of roles and responsibilities on set. This panel discussion looks at how content creators approach creating and promoting corporate best practices around e-mail, authentication and device management.
Moderator: Lulu Zezza, Co-Chair, CDSA Television Production Working Group
Panelists:
Jaclyn Knag, Executive Director, Content Security, Paramount Pictures
Alex Nauda, Chief Technology Officer, SHIFT and Screeners.com
Cyril Rickleton-Abdi, Co-Chair, CDSA Television Production Working Group
Click here to download audio
 

11 – 11:15 a.m.
Morning Innovation and Technology Showcases Introductions
Bob Gold, Principal, Bob Gold & Associates
 

11:15 – 11:30 a.m.
NETWORKING BREAK
 

11:30 a.m. – 1 p.m.

CPS Innovation and Technology Showcases


Track 1: SOFTWARE & COLLABORATION
Track 2: WATERMARKING & CLOUD
Track 3: PERFORMANCE & MONITORING
 

1 – 2:15 p.m.
NETWORKING LUNCHEON
 

2:15 – 2:45 p.m.
Keynote: How to Make Your Security Awareness Program FAIL (and then SUCCEED!)
Hollywood’s core competencies of entertaining, storytelling, tapping into current cultural trends and influencing consumer behavior, are exactly the attributes every organization needs to launch a successful security awareness campaign. This keynote by security awareness expert Winn Schwartau will provide step-by-step guidelines for designing and implementing an awesome organization-wide security awareness program, from concept to launch to metrics Named one of the Top-5 Security Thinkers by SC magazine and annually one of the top-rated speakers at the annual RSA Conference, Schwartau will challenge the audience to set a new standard for security awareness programs that inspires all industry sectors to create better security behavior.
Winn Schwartau, Author and Founder, The Security Awareness Company
Click here to download audio
Click here to download presentation
 

2:45 – 3:15 p.m.
Addressing Online Piracy Together via the Alliance for Creativity and Entertainment (ACE)
Since the launch of ACE in the summer of 2017, this global coalition has dedicated itself to protecting the legal market and reducing online piracy. This session provides an overview of ACE and some of its successes to date, including the civil case against TickBox, a seller of piracy devices.
Karen Thorland, Senior Vice President, Deputy General Counsel, Global Content Protection Legal, MPAA
Introduction by: David Würgler, Senior Director, Anti-Piracy Litigation, NAGRA
Click here to download audio
Click here to download presentation
 

3:15 – 3:30 p.m.
Making it Real: Cloud-Native Feature Production
This session discusses how end-to-end content production can occur in the cloud for feature, TV, and short-form media. There’s no longer a need to upload/download data and risk breaches, loss or errors. Instead, you keep everything in the cloud and bring artists securely to the data through managed identities, access policies, and isolated cloud network environments. Artist tools can be virtualized in GPU-powered VMs, feeding directly into render managers. And when the shots are done, pull everything together on a cloud-based editorial workstation and asset manager. You’ll learn that this is no longer a vision of the future, rather it is in use today.
Moderator: John Canning, Executive Producer, Digital Domain
Erick Geisler, Chief Executive Officer, G2 Immersive Studios
Joel Sloss, Senior Program Manager, Microsoft Azure
Click here to download audio
 

3:30 – 4 p.m.
KEYNOTE: Defending Against Disinformation and Social Media Manipulation
In his third appearance on the CPS stage (first at NAB, then in NYC and now, for the first time at our biggest show of the year in LA), Jonathon Morgan will update the audience how new adversaries are using the same disinformation tactics being used in politic to attack entertainment brands, target journalists, and manipulate the media. How can Hollywood protect their productions and their consumers?
Jonathon Morgan, Chief Executive Officer, New Knowledge; and Founder, Data for Democracy
Click here to download audio
Click here to download presentation
 

CPS Innovation and Technology Showcases

Track 1: SOFTWARE & COLLABORATION
Track 2: WATERMARKING & CLOUD
Track 3: PERFORMANCE & MONITORING
 

Track 1: SOFTWARE & COLLABORATION
11:30 a.m. – 12 p.m.
Watchers on the Wall: How to Safely Share Content with Wildlings on a Multi-Tenant Platform
Internet sharing of pre-release content is with us to stay, and the threats from beyond our protected networks are real. In this talk, we’ll reveal some of the distinctive challenges faced by a web software vendor as we enable a loosely allied group of content owning kingdoms to share high value assets on the open internet, how we monitor for dragons and raiders, keep our villagers safe, our troops well trained, and our lands well guarded.
Alex Nauda, Chief Technology Officer, SHIFT and Screeners.com
Click here to download audio
Click here to download presentation
 

12 – 12:30 p.m.
Collaborate with Confidence – How to Create a Secure Digital Workplace
In the digital era being competitive requires organizations to be both collaborative and secure. It is a fine balancing act between freely sharing information in and out of a business, whilst also maintaining a security and compliance posture. The shared challenged amongst IT leaders and security specialists worldwide is -“How do I enable a collaborative digital workplace, whilst also ensuring we have the security protections in place to protect our IP and sensitive information?”. Join LiveTiles SVP Daniel Diefendorf as he shares real customer use cases on how to support information and content sharing in your business, while also staying protected.
Daniel Diefendorf, Senior Vice President, Americas, LiveTiles
Steve Marsh, Vice President, Product, Nucleus Cyber
Click here to download audio
Click here to download presentation
 

12:30 – 1 p.m.
Using AI to Boost Content Protection and Maximize Income
In this session we describe ways in which new video search technology, based on machine learning, is used to significantly boost content rights protection across all social and video platforms and ensure that income and revenue streams are fully optimized. During the presentation we will also learn about the ways in which duplication patterns analytics and actual viewership measurement assist in helping to drive commercial priorities and decision making across different business units.
Eyal Arad, CEO & Co-Founder, Videocites
Click here to download audio
Click here to download presentation
 

Track 2: WATERMARKING & CLOUD
11:30 a.m. – 12 p.m.
Limitless Creativity (Secure and on Schedule) in the Cloud
Join us for a 2019 update on the exploration of secure content workflows in the cloud. Using solutions such as Media Composer, artists, editors, and IT alike can take advantage of near limitless scale and creative process control. When you add Microsoft devices such as Surface Studio and Surface Book 2, creativity is unbounded, while analytics and artificial intelligence services for image/face and audio recognition from Microsoft will let you get the most out of your production schedule.
Joel Sloss, Senior Program Manager, Microsoft Azure
Click here to download audio
Click here to download presentation
 

12 – 12:30 p.m.
Optimize your Content Value Chain with Distribution Watermarking
With the proliferation of distribution outlets, including both traditional broadcasters and pay TV operators as well as on demand streaming providers, the licensing of movies and episodic TV has become a very complex exercise. Until recently, assessing the impact of distribution and windowing strategies on piracy has been more art than science but today forensic watermarking is helping to reverse that trend. By embedding a “distributor mark” in offline assets and linear TV feeds and subsequently monitoring the internet for pirated files and streams, content owners can uncover the prevalent patterns of piracy and optimize their content distribution strategies. They can also leverage the information gained to enforce their distributors to implement increased security measures such as Conditional Access, DRM and subscriber-level
Harrie Tholen, Vice President, Sales, NAGRA Anti-Piracy & NexGuard Watermarking
Click here to download audio
Click here to download presentation
 

12:30 – 1 p.m.
SPEKE-ing of Content Protection & DRM
Encrypting high-value content has long been a challenge for media customers. The number of digital rights management (DRM) schemes, transcoding and packaging vendors, and packaging formats created hundreds of potential integration points, each requiring extensive engineering resources and time. The Secure Packager and Encoder Key Exchange (SPEKE) is a single, open REST API specification for authentication and key exchange between DRM platforms and encryptors (transcoders and packagers) that reduces the number of integration points and accelerates time-to-market for customers for on-premises, hybrid, and cloud video workflows. In this session, learn about the SPEKE API and the Content Protection Information Exchange (CPIX) format, and how SPEKE establishes secure key exchange using Amazon API Gateway, document encryption, IAM roles, and Signature Version 4 signing for live and file-based video workflows.
Ian McPherson, Senior Partner Development Manager for Media & Entertainment, Amazon Web Services
Click here to download audio
Click here to download presentation
 

Track 3: PERFORMANCE & MONITORING
11:30 a.m. – 12 p.m.
Vulnerability Management – From B Movie to Blockbuster
With the increasing spend in security budgets and the apparent increasing frequency of data breaches, managing vulnerabilities in an organization can seem like a never-ending game of blind whack-a-mole. How organizations approach vulnerability management in the past simply does not cut it with today’s technology stack and development methodologies. We will discuss some of the problems associated with the vulnerability management status quo and some ideas on how to shift your VM program away from a B Movie and towards a Blockbuster.
Rahim Jina, Chief Operating Officer & Co-Founder, Edgescan
Click here to download audio
Click here to download presentation
 

12 – 12:30 p.m.
Are you Ready to Handle a Security Emergency?
Join this interactive session by Convergent Risks where a fictitious security emergency scenario will be presented to the breakout session audience who will then vote on the possible courses of action using a mobile app. The panel and audience will then debate the pros and cons and implications of each action. It’s too often the case that businesses are faced with irreversible nightmare scenarios which, perhaps with better preparation, may have been averted.
Janice Pearson, Vice President, Global Content Protection, Convergent Risks
Alex Pickering, Global Content Security Director, BBC Studios
Ben Schofield, App & Cloud Digital Media Consultant
Mathew Gilliat-Smith, Consultant & Advisor, Convergent Risks
Click here to download audio
Click here to download presentation
 

12:30 – 1 p.m.
Beyond Compliance – Supplier Assessment Security Considerations
As a security product company, Illumio sees supplier security assessments which include compliance-oriented questions centered on organizational structure, policy, background checks, awareness training, and occasionally basic product testing. The questions are certainly important and necessary – however, there is seemingly a range of topics absent from these questionnaires that could yield some valuable insight to help guide your decisions as a company and for your customers. This session shares important evaluation topics that can be used to expand your assessment from being compliance-oriented to one that includes other security considerations.
Terence Runge, Head of Security, Illumio
Audio not available per speaker request
Click here to download presentation
 

Trusted Partner Network Workshop
4:30 – 5 p.m.
TPN 101
The Trusted Partner Network (TPN) is an industry-wide, content security initiative supported by MPAA and CDSA and their 28 member companies that provides a voluntary process by which vendors can assess the security preparedness of their facilities, staffs, and workflows against industry best practices. Nearly 500 entertainment services companies are currently in the process of qualifying to join the TPN. This session is where your company can learn the industry objectives of the TPN and how to get involved.
Guy Finley, Chief Executive Officer, Trusted Partner Network (TPN)
Kurt Fischer, Director, Content Security, Motion Picture Association of America (MPAA) and Chief Operating Officer, Trusted Partner Network (TPN)
Ben Stanbury, Chairman, Content Delivery & Security Association (CDSA) and Chief Technology Officer, Trusted Partner Network (TPN)
Click here to download audio
Click here to download presentation
 

5 – 5:30 p.m.
The State of Vendor Security
A panel of TPN-vendors will share their experiences of having gone through an assessment and what it has meant to the security of their sites, employees and customers’ content.
Click here to download audio
 

5:30 – 6 p.m.
TPN App & Cloud Initiative
Coming in 2019, the next phase of TPN will begin working with technology vendors and their customers to identify and prevent application, device, storage and workflow vulnerabilities. This critical work within application and cloud environments looks to the future of security and protection in content creation and information management through the centralized TPN Platform. In this session you’ll learn the latest developments and timelines for launch.
Keith Ritlop, Chair, App & Cloud Subcommittee, TPN Technology & Development Advisory Committee
Click here to download audio
Click here to download App & Cloud presentation
Click here to download Guardians presentation
 

Register ‍

Program

Other Events