Final Program

(As of November 24th, subject to change)

Event Schedule

8 a.m.: Registration Opens
9 a.m.: Conference Sessions
6 p.m.: Networking Reception


Conference Sessions

9 – 9:10 a.m.
Opening Remarks

Bryan Ellenburg, Security Consultant, Production & Post Production Editorial, CDSA and Conference Chair, CPS 2015

9:10 – 9:15 a.m.
Welcome Remarks

Michael G. Rose, President, Movie Magic Scenechronize Technologies, Entertainment Partners

9:15 – 9:30 a.m.
CDSA, Security, and CPS: A Focus on the Right Things at the Right Time

This session provides perspective on the strategic importance of “all things security”, and the roles CDSA and the Content Protection Summit play in helping all of us, as an industry, be increasingly effective at a time when the environment is more and more complicated.
Richard Atkinson, Global Director, Piracy Conversion, Adobe and Chairman, Content Delivery & Security Association (CDSA)

9:30 – 10 a.m.
KEYNOTE CONVERSATION: IP Security – The Creative Perspective

Brian McNelis is known for his work as the music supervisor on Drive (2011), The Lincoln Lawyer (2011), Crank (2006) and Napoleon Dynamite (2004). He kicks off the Summit with an exclusive conversation with CreativeFuture, the industry association dedicated to promoting the value of creativity in today’s digital age, whose mission is to empower the creative community to speak with one collective and powerful voice – advancing a positive, dynamic vision of a digital future that better serves audiences and artists alike.
Brian McNelis, Senior Vice President, Music & Soundtracks, Lakeshore Entertainment
Interviewed By: Adam Leipzig, Chief Operating Officer, CreativeFuture

10 – 10:15 a.m.
Breakthroughs In Watermarking

In a world in which consumer perception of digital media’s value is zero, the value of territorial and windowing rights is lost to free ranging pirate sites across the globe. Advances in Digital Watermarking, included in Movie Labs ECP requirements, hold the potential to minimize piracy with ever present content identification and accountability. Isn’t it time for a re-evaluation of how business is conducted?
Graham Oakes, Chairman, Digital Watermarking Alliance

10:15 – 10:45 a.m.
The Move To Digital Pre-Release Screeners — DVD R.I.P.

Are physical DVD screeners a thing of the past? How do you get high quality content into a home theatre environment, securely, session based watermarked, with revocability, and without buffering issues? Should the industry look to improve security on existing platforms (Chromecast, Netflix, Amazon, iTunes) by creating secure, watermarked, DRM’d channels, instead of building something new? What about solutions for Press Screeners and Talk-Show Screeners?
Moderator: Kurt Fischer, Director of Content Security, MPAA
Anthony Anderson, Director, Film Security, Universal Pictures
Eugene Tang, Executive Director, Content Security, 20th Century Fox
Dmitry Primachenko, Senior Vice President Business Development and Information Technology, Deluxe Media

10:45 – 11:15 a.m.

11:15 – 11:35 a.m.
The Global State of Information Security

PwC presents the results of their Global State of Information Security Survey 2016 which shows that executives in the global entertainment & media industry are heeding the need to fund enhanced security activities and have substantially improved technology safeguards, processes and strategies. This session shares key findings from the research that supports creating an evolved, business-focused security program that is driven by knowledge of threats, assets and adversaries.
Wendy Frank, Principal, Cybersecurity, Privacy and Risk Practice, PwC

11:35 – 11:45 a.m.
Would You Rather be Red and Blue, or Black and Blue?

Join us for a quick discussion on adapting IT security strategies for the cloud world. Microsoft’s cloud services teams approach proactive threat response using “Assume Breach”—a fundamental shift in prevent-breach security practices, using real-world attack mechanisms on actual live-site infrastructure. Sometimes called “Red Team / Blue Team”, it allows your security forces to probe and detect vulnerabilities in your solutions before your enemies leave you bruised and battered.
Joel Sloss, Program Manager, Security, Privacy, and Compliance, Microsoft Azure

11:45 a.m. – 12:15 p.m.
It’s Not “If” But “When” You’ll Get Hacked: Secrets to Building An Incident Response Team

Security executives in this panel session discuss how to build and manage your company’s Incident Response Team (IRT) and if you don’t already have an IRT, you’ll learn how to get one started.
Moderator: Guy Finley, Executive Director, MESA
Hans Cathcart, Senior Product Manager, Security, Akamai
Cyril Rickelton-Abdi, Senior Director, Content Security, Turner
Joel Sloss, Program Manager, Security, Privacy, and Compliance, Microsoft Azure

12:15 – 12:50 p.m.
An Innovator’s Perspective on Security and Content Protection

Recent events have made content protection a top priority for leading media & entertainment professionals. Which technologies do innovators swear by today, that everyone else will use tomorrow? Designed for Hollywood executives by leading venture capital firm Andreessen Horowitz, and including their a16z portfolio pioneers, this session defines what content security and visibility mean (across every application and device), discusses how technology is disrupting the M&E business and presents cutting edge solutions for implementing best practices.
Mark McAndrew, Partner, Market Development, Andreessen Horowitz
Ryan Carlson, Vice President, Marketing, Okta

12:50 – 1 p.m.
Introduction to CPS Innovation and Technology Showcases (Multi-Track Break-Out Sessions)
Guy Finley, Executive Director, MESA

1 – 2:15 p.m.

1:30 – 2:15 p.m.
LUNCHEON KEYNOTE: NextWar – The Science Fiction and Reality of Future Tech and Geopolitics

The 21st century is being shaped by a range of exciting, and scary, new trends and technologies that seem like they are right out of the entertainment world, in part because they are. The impact of Robots, Artificial Intelligence, Cyberwar, 3D printing, bio-enhancements, and the risks of World War III will all be addressed in this exclusive keynote presentation. A bestselling author described by the Wall Street Journal as “one of Washington’s pre-eminent futurists,” and a consultant for groups that range from the CIA and Pentagon to Hollywood, Singer uses an exciting speaking style to explore the key trends emerging today that will shape the world of technology and security tomorrow.
Peter W. Singer, Strategist and Senior Fellow, New America Foundation

2:15 – 2:45 p.m.
Vulnerability Scanning / Penetration Testing

Can traditional security testing identify gaps in security enabling organizations remediation and retesting? There are a few different flavors of such testing, such as “penetration testing” where a person tries to access from the outside via black-box or white-box, or “vulnerability scanning” when testing for inside weaknesses, typically done with internal resources. Another fundamental limitation is the fact that these tests are run for a defined set of time, usually varying from 1 day to 5 days for standard web application testing. In most cases, this is inadequate for security testers to identify issues as compared to a malicious attacker, where the security tester is restricted by time and cost, a malicious attacker has all the time required to successfully penetrate an IT system. How necessary is penetration testing for an air-gapped production network, as commonly found in editing rooms? What about testing of Cloud applications, where it is common to expect quarterly pen testing and monthly vulnerability scanning? Likewise, should testing be required when newer versions are rolled out, along with a code review?
Moderator: Aaron Guzman, Director of Research, Cloud Security Alliance LA/SoCal Chapter
Alec Everts, Director of IT Infrastructure, Broad Green Pictures
Chris Johnson, Global Director, Anti-Piracy Compliance Programs, Content Delivery & Security Association (CDSA)
Dan Meacham, Chief Information Security Officer, Legendary Entertainment
Michael V. Montecillo, Director, Security Intelligence, North America, IBM

2:45 – 3 p.m.
Best Practices In Sending & Receiving Content

How is technology evolving to securely transmit content as file size grows and demand increases across the spectrum of business units, production, post and distribution workflows? In the high volume distribution world, there are challenges with managing the landing pad. What are the legacy and emerging “tools of the trade?” Many more pixels are being sent and, with these heavy payloads, is there a risk in corruption of files. This brief session looks at the current state of the business and technology of send & receive as part of content production workflows.
Tom Moran, Solution Development, CenturyLink

3 – 3:30 p.m.
AFTERNOON KEYNOTE: Isolating Pre-Release Content from the Web

The web has become the air businesses breathe, but to be connected to the Internet is to risk everything. Browsers are designed to run untrustworthy code from servers beyond your control, potentially compromising your network by way of “malvertising”, “drive-by downloads” and other emerging web exploits. These threats have become the #1 source of cyber breaches and pose the biggest risk to corporate networks, as well as feature film/television projects. Editing rooms commonly protect their content by creating an isolated “air-gapped” production network and implement cumbersome processes for moving content in-and-out of this network. However, complexity and inconvenience give way to human ingenuity as teams find backdoors and workarounds that undermine the security of the system. A new category of security practices is emerging based on new thinking around isolation, instead of air gapping. Our afternoon Keynote will explore these concepts and offer insights into a fresh approach to security and operational connectivity challenges.
Branden Spikes, Founder & Chief Executive Officer, Spikes Security (former CIO of SpaceX)

3:30 – 4 p.m.
Production In The Cloud

What problem is Production In The Cloud really solving? Does it introduce more risks than solutions? How do you handle the high-speed on-ramps in remote locations? Is there a high-speed bottleneck at the last mile? How can producers share information about locations around the world with adequate bandwidth and security? What technological breakthroughs are on the horizon to transmit content directly from the camera and into a secure cloud environment? How is technology evolving to securely transmit content as file size grows and demand increases across the spectrum of business units, production, post and distribution workflows? In the high volume distribution world, there are challenges with managing the landing pad. How do you “throttle” the volume within a transmission environment, getting the right content (securely) while make sure your systems are going fast enough across all suppliers? What are best practices to securely send and receive content to-and-from air-gapped production networks?
Moderator: Erik Weaver, Project Lead, Production in the Cloud, Entertainment Technology Center at University of Southern California (ETC@USC)
Brandon Bussinger, Director of Post Production Technology, Legendary Pictures
Eric Diehl, Vice President, Media & Content Security, Sony Pictures
Matthew O’Connor, Product Manager Security & Compliance, Google Cloud Platform
Chuck Parker, Chairman and Chief Executive Officer, Sohonet
Introduction by: Darren Ehlers, Vice President, Products, Movie Magic Scenechronize Technologies, Entertainment Partners

4 – 4:15 p.m.
Data Loss: Causes, Impact and Prevention

The Ponemon institute recently published their 2015 Cost of a Data Breach Study where they note that the average total cost of a data breach for the participating companies increased 23 percent, over the past two years, to $3.79 million. This session looks at some of the common causes of data loss such as broken business processes, malicious insiders and targeted attacks. The presentation also discusses how content-aware, data loss prevention technologies can be effectively deployed to mitigate some of the risks.
Dr. Ratinder Paul Singh Ahuja, Founder & Chief Executive Officer, ShieldX Networks

4:15 – 4:45 p.m.
Production Security Compliance: Thinking “Inside The Box”

Production Security is a combination of Technology & Collaboration systems, Best Practices, and having key members of the Production Team embrace efforts to protect the content. What are the latest communication and collaboration technologies/software used across the industry (including enterprise level e-mail) for productions, scripts, production schedules, location images, costumes, call sheets, sides, etc.? Is the industry ready to go “all-digital” from the production office, to the set and back to editing/post? How do you handle certain members of a crew who are resistant to change, that feels they must have pen / paper / highlighters? How do you handle kit rentals vs. provisioning computers? How do you handle Wi-Fi in remote locations, for crew members to securely access collaboration tools? Where do you stop and start with training, education, compliance paperwork? Which essential tools are “Inside The Box” for making a secure production? This panel of industry executives explores the evolution and challenges involving BYOD, secure wireless connectivity on or near-set, the logistics of production deployed devices and their impact on the enterprise.
Moderator: Bryan Ellenburg, Security Consultant, Production & Post Production Editorial, CDSA and Conference Chair, CPS 2015
John Canning, New Media Council Board Member, Producers Guild of America
Ashish Chandra, Consulting Partner, Domain Security Solutions, Wipro Technologies
Darren Ehlers, Vice President, Products, Movie Magic Scenechronize Technologies, Entertainment Partners
Janice Pearson, Manager, Content Protection Strategy & Operations, Warner Bros. Entertainment
Lulu Zezza, Production Manager, New Regency

4:45 – 6 p.m.
CPS Innovation and Technology Showcases
(Multi-Track Break-Out Sessions)

Industry experts share innovative ideas, processes, or perspectives in an interactive and intimate way with the audience who are free to choose which topic/area they find most interesting. Sessions will address key areas on separate tracks.

ROOM A: (Palisades)

5 – 5:30 p.m.
Cover Your Assets in the Cloud
Microsoft Azure offers a comprehensive platform for developing and delivering powerful media solutions in a secure and compliant way. Get an overview of how Azure services such as Storage, Virtual Networking, and Media Services leverage built-in encryption, license management, transcoding, and more to deliver secure content workflow for media production and distribution.
Joel Sloss, Program Manager, Security, Privacy, and Compliance, Microsoft Azure

5:30 – 6 p.m.
Entertainment Supply Chain Security
Content producers and owners continue to face many security challenges today. As the industry continues to migrate toward new digital platforms and workflows, security technologies must evolve and adapt to meet these challenges. In this session, Deluxe security experts will discuss key security technologies and innovations which enable security in a connected content supply chain.
Mark Lemmons, Chief Technology Officer, Media Services, Deluxe
Dmitry Primachenko, Senior Vice President, Business Development & IT-MediaVu, Deluxe

ROOM B: (Malibu/Santa Monica)

5 – 5:30 p.m.
Trust No One… Get Nowhere
Great collaboration can produce great content, but in benefiting from a wider source of talent you inevitably extend your perimeter of trust. This session discusses the key challenges of balancing the desire to protect your assets with the need to trust your partners.
Chuck Parker, Chairman and Chief Executive Officer, Sohonet

5:30 – 6 p.m.
Surveying the Online Threat Landscape: It’s not Fear Mongering if it’s True
Online attacks are not only becoming larger, more frequent and increasingly complex, they’re also getting simpler to launch thanks to easy-to-find software and online services. This democratization of malicious capabilities poses a growing challenge to media companies, which are among the most-targeted organizations. In his presentation, Akamai security expert Hans Cathcart will review the various forms of existing and emerging attacks, how they’re executed and, most importantly, how organizations can mitigate these online assaults before suffering negative consequences.
Hans Cathcart, Senior Product Manager, Security, Akamai

ROOM C: (Venice/Peninsula)

5 – 5:30 p.m.
The Future of Watermarking
With a trend toward dispersed production teams and the increasing use of online distribution methods, watermarking seems like a no-brainer. In an era where a single leak can jeopardize careers and revenue, it should be a best practice. But most media and entertainment companies are failing to enforce clear policies around watermarking. Because let’s face it, it’s expensive, in both dollars and manpower. And it always presents a compromise between security, ease of use, and cost. This session explores the pros and cons of today’s watermarking solutions and previews new technology that aims to fix a broken process.
Kai Pradel, Chief Executive Officer and Founder, MediaSilo

5:30 – 6 p.m.
Maintaining Encryption At-Rest Throughout the Workflow
The risk profile for pre-release leaks increases through the life cycle culminating when fully finished content resides in unencrypted form on servers during subtitling, ADR, VFX and screener distribution both inside and outside your organisation. Fortium explains how ‘encryption at-rest’ maintains the safeguard regardless of the file type, operating system or editing program to help avoid the all too frequent intentional or accidental leaks while also providing audit trails of who accessed what files when and where.
Mathew Gilliat-Smith, Chief Executive Officer, Fortium

6 p.m.

Followed by the MESA Holiday Party Sponsored by WiTH (Women in Technology Hollywood) from 6:30 to 8:30 p.m.

air max air max

 Tank Carradine Jersey