Featured CBR Logo

Published on July 17th, 2022 📆 | 2090 Views ⚑

0

Cybersecurity for Broadcasters Retreat: Security Strategies for a High-Profile Industry


Text to Speech Voices

Agenda Highlights

Security and the Road to Modernizing Broadcast Technology

The threat of ransomware attacks and other cybersecurity issues are compelling media companies to overhaul their broadcast technology and speed their transitions to IP. How are companies designing the technology workflows of the future? What kinds of investments are necessary and do CEOs understand the level of need? A panel of security and technology leaders talks about the challenge, strategies and timetables.

 

Managing the Media’s Expanding Security Compliance Needs 

SEC and insurance company rules are raising the pressure on media companies to regularly audit their technology vendors’ security practices.  What are networks and station groups doing to standardize the way they communicate and collaborate with vendors to ensure compliance? Should the industry coalesce around a third party to audit and certify vendors? How can large media companies agree on rules and procedures that smaller companies can participate in?

 

Leading-Edge Strategies for Securing the Network 

Zero trust, segmentation, end-point protection: Leading media industry security executives talk about their strategies for securing the network or networks, including the backbone of the increasingly IP broadcast environment. Are best practices emerging? How well are broadcast technology vendors participating in the process and how are they addressing security interoperability issues?

 

Securing Content Repositories and Media Pipelines

Asset management and storage are critically important parts of an increasingly hubbed, connected production environment and they are often the first part of distribution or production workflows moved into the cloud. How are station and network groups managing security in their content management systems whether they are on premise, hybrid or in the cloud?

 

Engineering – IT – Security: Partnering to Mitigate Risk





IT and security managers can’t secure the broadcast environment without help from traditional TV engineers. How are engineering, IT and security leaders forging working partnerships to design secure networks, pursue security goals and recruit and train the teams needed to move their companies forward?

 

Workshop: Minimizing the Risk of Ransomware Attacks 

What are the five most important strategies for managing risk, at large companies and small ones, in this critically important area? How are station and network groups refining their strategies for coping in the aftermath of an attack? How can security leaders manage expectations and governance in the C-suite? Retreat attendees break into small groups to come up with their best strategies and then share them with the conference at large.

 

Private Information Exchanges 

Back by popular demand, private information exchanges permit engineering, IT and security leaders to safely exchange information in an informal, highly private setting. Separate private information exchanges are held simultaneously for broadcast technology vendors in attendance.

 

Incident Response Simulation

Participants will work with team members to react to a staged cybersecurity breach, deciding how to secure systems while communicating with the FBI, press, employees and insurance companies. This two-hour exercise trains executives, managers and professionals to react quickly and calmly in the event of an actual attack.

 

Source link

Tagged with: • • • • • • •



Comments are closed.