Morning Technology Showcases

11:30 a.m. – 1 p.m.

CPS Innovation and Technology Showcases



11:30 a.m. – 12 p.m.
Watchers on the Wall: How to Safely Share Content with Wildlings on a Multi-Tenant Platform
Internet sharing of pre-release content is with us to stay, and the threats from beyond our protected networks are real. In this talk, we’ll reveal some of the distinctive challenges faced by a web software vendor as we enable a loosely allied group of content owning kingdoms to share high value assets on the open internet, how we monitor for dragons and raiders, keep our villagers safe, our troops well trained, and our lands well guarded.
Alex Nauda, Chief Technology Officer, SHIFT and

12 – 12:30 p.m.
Collaborate with Confidence – How to Create a Secure Digital Workplace
In the digital era being competitive requires organizations to be both collaborative and secure. It is a fine balancing act between freely sharing information in and out of a business, whilst also maintaining a security and compliance posture. The shared challenged amongst IT leaders and security specialists worldwide is -“How do I enable a collaborative digital workplace, whilst also ensuring we have the security protections in place to protect our IP and sensitive information?”. Join LiveTiles SVP Daniel Diefendorf as he shares real customer use cases on how to support information and content sharing in your business, while also staying protected.
Daniel Diefendorf, Senior Vice President, Americas, LiveTiles
Steve Marsh, Vice President, Product, Nucleus Cyber

12:30 – 1 p.m.
Using AI to Boost Content Protection and Maximize Income
In this session we describe ways in which new video search technology, based on machine learning, is used to significantly boost content rights protection across all social and video platforms and ensure that income and revenue streams are fully optimized. During the presentation we will also learn about the ways in which duplication patterns analytics and actual viewership measurement assist in helping to drive commercial priorities and decision making across different business units.
Eyal Arad, CEO & Co-Founder, Videocites


11:30 a.m. – 12 p.m.
Limitless Creativity (Secure and on Schedule) in the Cloud
Join us for a 2019 update on the exploration of secure content workflows in the cloud. Using solutions such as Media Composer, artists, editors, and IT alike can take advantage of near limitless scale and creative process control. When you add Microsoft devices such as Surface Studio and Surface Book 2, creativity is unbounded, while analytics and artificial intelligence services for image/face and audio recognition from Microsoft will let you get the most out of your production schedule.
Joel Sloss, Senior Program Manager, Microsoft Azure

12 – 12:30 p.m.
Optimize your Content Value Chain with Distribution Watermarking
With the proliferation of distribution outlets, including both traditional broadcasters and pay TV operators as well as on demand streaming providers, the licensing of movies and episodic TV has become a very complex exercise. Until recently, assessing the impact of distribution and windowing strategies on piracy has been more art than science but today forensic watermarking is helping to reverse that trend. By embedding a “distributor mark” in offline assets and linear TV feeds and subsequently monitoring the internet for pirated files and streams, content owners can uncover the prevalent patterns of piracy and optimize their content distribution strategies. They can also leverage the information gained to enforce their distributors to implement increased security measures such as Conditional Access, DRM and subscriber-level
Harrie Tholen, Vice President, Sales, NAGRA Anti-Piracy & NexGuard Watermarking

12:30 – 1 p.m.
SPEKE-ing of Content Protection & DRM
Encrypting high-value content has long been a challenge for media customers. The number of digital rights management (DRM) schemes, transcoding and packaging vendors, and packaging formats created hundreds of potential integration points, each requiring extensive engineering resources and time. The Secure Packager and Encoder Key Exchange (SPEKE) is a single, open REST API specification for authentication and key exchange between DRM platforms and encryptors (transcoders and packagers) that reduces the number of integration points and accelerates time-to-market for customers for on-premises, hybrid, and cloud video workflows. In this session, learn about the SPEKE API and the Content Protection Information Exchange (CPIX) format, and how SPEKE establishes secure key exchange using Amazon API Gateway, document encryption, IAM roles, and Signature Version 4 signing for live and file-based video workflows.
Ian McPherson, Senior Partner Development Manager for Media & Entertainment, Amazon Web Services


11:30 a.m. – 12 p.m.
Vulnerability Management – From B Movie to Blockbuster
With the increasing spend in security budgets and the apparent increasing frequency of data breaches, managing vulnerabilities in an organization can seem like a never-ending game of blind whack-a-mole. How organizations approach vulnerability management in the past simply does not cut it with today’s technology stack and development methodologies. We will discuss some of the problems associated with the vulnerability management status quo and some ideas on how to shift your VM program away from a B Movie and towards a Blockbuster.
Rahim Jina, Chief Operating Officer & Co-Founder, Edgescan

12 – 12:30 p.m.
Are you Ready to Handle a Security Emergency?
Join this interactive session by Convergent Risks where a fictitious security emergency scenario will be presented to the breakout session audience who will then vote on the possible courses of action using a mobile app. The panel and audience will then debate the pros and cons and implications of each action. It’s too often the case that businesses are faced with irreversible nightmare scenarios which, perhaps with better preparation, may have been averted.
Janice Pearson, Vice President, Global Content Protection, Convergent Risks
Alex Pickering, Global Content Security Director, BBC Studios
Ben Schofield, App & Cloud Digital Media Consultant
Mathew Gilliat-Smith, Consultant & Advisor, Convergent Risks

12:30 – 1 p.m.
Beyond Compliance – Supplier Assessment Security Considerations
As a security product company, Illumio sees supplier security assessments which include compliance-oriented questions centered on organizational structure, policy, background checks, awareness training, and occasionally basic product testing. The questions are certainly important and necessary – however, there is seemingly a range of topics absent from these questionnaires that could yield some valuable insight to help guide your decisions as a company and for your customers. This session shares important evaluation topics that can be used to expand your assessment from being compliance-oriented to one that includes other security considerations.
Terence Runge, Head of Security, Illumio

Register ‍


Other Events