Cybersecurity in an IoT World

Find answers and get ahead of the curve.

Today’s highly connected and sophisticated workflows have attracted next-gen security threats, posing the opportunity for significant damage to both content hosts and productions facilities. Learn to proactively approach vulnerabilities, meet threats with advanced security solutions and become better prepared to mitigate the risk of attacks.

  • 5G
  • Cloud Technology
  • Cybersecurity
  • News

View Other Hot Topics

Registration Access

Access varies by offering. Look for the registration icons or "All-Badge Access" icon to see which programs are available to which passholders.

Packages Register

Show Floor Highlights

AI+Cloud Campus

SL8224, South Hall Lower

Advancements in AI and cloud technologies continue to shape content and media in new and exciting ways from production workflows to improved delivery methods.

Open to all registered attendees.
All-Badge Access

Destination 5G

SU13306, South Hall (Upper)

It’s not just an idea anymore - 5G has arrived. Learn how you can tap into the opportunities created by this content delivery shift.

Open to all registered attendees.
All-Badge Access

Session Highlights

Requirements and Work Flow for creating a secure ATSC 3.0 broadcast

Saturday, April 6 | 1:30 pm - 2:50 pm | N260 - D

The next generation ATSC 3.0 broadcast standard allows for many new exciting capabilities and enhanced business models for television broadcast stations to explore. Continuing to provide consumers with a trusted source of content from a local television broadcast is of the utmost importance. There...

Learn More

Sat 6

Cybersecurity & Content Protection Summit

Sunday, April 7 | 1:00 pm - 5:45 pm | Westgate

12:00 PM: Registration Opens
1:00 – 5:45 PM: General Sessions
6:00 PM: Networking Reception

Welcome Remarks Guy Finley, Executive Director, Content Delivery & Security Association (CDSA)Setting the Standards and Systems for Securing Media & Entertainment Our opening session sets the...

Learn More

Sun 7

A Performance Measurement Study of the Reliable Internet Stream Transport Protocol

Monday, April 8 | 1:30 pm - 1:50 pm | N256

The speed and reliability of the Internet has made it possible for broadcasters to use the Internet as a cost-effective low-latency contribution link. Many companies have commercial products providing this functionality, and all of these products are implemented as a variation of the ARQ (Automatic...

Learn More

Mon 8

Security: Table Stakes for Doing Business Today

Wednesday, April 10 | 9:00 am - 9:20 am | N258

File-based workflows, distributed collaboration, cloud-based production and IP replacement of coax and SDI have made content production more agile and efficient. However, these mechanisms have also significantly expanded threat surfaces available to cybercriminals.

There are a variety of adopted...

Learn More

Wed 10

Improving the Odds Against Cyber-Tsunamis and Your Enterprise Risk Posture With Cyber-Resilience

Wednesday, April 10 | 9:20 am - 9:40 am | N258

As the number of cyber-events that organizations are dealing with is now in the billions daily, C-level executives and cyber-security professionals wake up at 3:00 am wondering when they will be fired. As corporations have been under-estimating the toxicity of their risk posture by only depending...

Learn More

Wed 10

A Practical Guide to Security for ST 2110 Systems and What the Standard Organizations are Doing to Help

Wednesday, April 10 | 9:40 am - 10:00 am | N258

Security is becoming an important issue for ST 2110 systems. Using ST 2110 adds new ways your systems can be attacked. For example, an attacker could disable your ST 2059/PTP infrastructure and this would cripple your ST 2110 system. Tackling the entire security issue may seem like a daunting...

Learn More

Wed 10

Securing NAB Gateway Data

Wednesday, April 10 | 10:00 am - 10:20 am | N258

Technuf has provided security solution for cloud-based services to house gateway-specific data. NAB Gateway devices or compatible television sets will send data to the relational database through a set of APIs. Technuf has designed and implemented the overall security of the data and NAB’s cloud...

Learn More

Wed 10

The Changing Face of Pay-TV Piracy

Wednesday, April 10 | 10:40 am - 11:00 am | N258

The way pirated media content is both created and consumed has changed dramatically since the advent of IP video and OTT distribution. The same infrastructure and tools that have revolutionized video distribution and enabled an explosion of content have also been exploited by pirates for illicit...

Learn More

Wed 10

Price of Piracy: The Hidden Threats Within Illicit Streaming Services

Wednesday, April 10 | 11:00 am - 11:20 am | N258

The cost of piracy is often calculated as the theoretical loss of revenue for rightsholders. This calculation however lacks an important additional cost, which is the cost for consumers. While pirated content might be perceived as readily and freely available to the consumer, there is a price to...

Learn More

Wed 10

Adaptable Content Security in the Cloud using Serverless Technology

Wednesday, April 10 | 11:20 am - 11:40 am | N258

Serverless architecture, such as AWS Lambda, simplifies the code deployment and eliminates the need for system administration. While a generic technology, it is very suitable to bring adaptable security into the various stages — ingestion, transformation, and distribution — of the media content...

Learn More

Wed 10

Blockchain - An Opportunity to Refine Intellectual Property Management

Wednesday, April 10 | 11:40 am - 12:00 pm | N258

Blockchain is a relatively new IT architecture, which uses a distributed, peer-to-peer network to create a distributed ledger. It is inherently resistant to modification of the data, while allowing continual updates and growth of the records. Groupe Média TFO is using the architecture to develop a...

Learn More

Wed 10

Cybersecurity: Preparing the C-Suite - Part I

Wednesday, April 10 | 1:30 pm - 2:50 pm | N258

While broadcast engineering and IT professionals have a clear understanding of the need for strong cyber protection, the most rigorous cybersecurity plans start and end in the C-suite. In addition to taking your stations off the air, cyber-attacks can impact your stock value and diminish your image...

Learn More

Wed 10

Cybersecurity: Preparing the C-Suite - Part II

Wednesday, April 10 | 3:20 pm - 4:40 pm | N258

While broadcast engineering and IT professionals have a clear understanding of the need for strong cyber protection, the most rigorous cybersecurity plans start and end in the C-suite. In addition to taking your stations off the air, cyber-attacks can impact your stock value and diminish your image...

Learn More

Wed 10

Explore Other Hot Topics

ATSC 3.0 Global Appeal

With deployments rolling out around the world, the advanced broadcast + broadband capabilities of ATSC 3.0 are catching the attention of broadcast equipment suppliers, broadcasters, and consumer device manufacturers. 

Blockchain in Media

Blockchain is not just about financial services anymore. Media and platform companies have the opportunity to harness blockchain to optimize value chains, facilitate ecosystem-wide efficiencies and support innovative business models. 

AI and Machine Learning

Huge leaps are being made in AI thanks to machine learning and deep learning. This is due to the massive amounts of data required for them to work, married with the amount of data being collected by the billions of sensors that are continuing to come online with the Internet of Things.

Streaming Media

Take a look into the future of streaming media and find solutions to unlock the value of anytime anywhere content. From media management to OTT and broadcasting to transcoding and more.


What are you waiting for?

Register Exhibit Sponsor