This article originally appeared in the IABM Journal, issue 100 which is available to view online here John Ive Director of Strategic Insight IABM If the threat of cyber-attack is not yet keeping you awake at night, it is a major concern for many broadcasters and media companies – and if vendors haven’t yet been asked about their product or service’s resilience to cyber-attacks, they will soon. The ever-increasing connection between back-office and front office systems makes not only media organizations’ business systems vulnerable, but also their media assets. You may not hear about such attacks often because the reputational damage is at the very least highly embarrassing for companies, but they are happening with increasing frequency. The attack on Sony Pictures Entertainment in 2014 may have been politically motivated, but such attacks can equally be for financial gain –ransoming assets for example, or obtaining customer personal and financial data for criminal exploitation. Even a grudge or grievance can be the starting point for a highly damaging cyber-attack. TV5Monde was the subject of just such an attack in 2014 –and was only saved from irreparable damage by good fortune – an engineer with the right skills and knowledge happened to...
This article originally appeared in the IABM Journal, issue 102 which is available to view online here Lorenzo Zanni Research Analyst IABM If the threat of cyber-attack is not yet keeping you awake at night, it is a major concern for many broadcasters and media companies – and if vendors haven’t yet been asked about their product or service’s resilience to cyber-attacks, they will soon. TV5Monde was the subject of just such an attack in 2014 – and was only saved from irreparable damage by good fortune – an engineer with the skills and knowledge happened to be on-site, and was able to identify and shut down the portal through which the attack was being conducted just in time. Alongside theft of data and media assets, Denial of Service (DoS) or worse, DDoS (Distributed Denial of Service) is also on the increase, as organizations that don’t share a particular broadcaster or media company’s view of the world come under highly sophisticated cyber-attack in an effort to shut down their operations and damage their infrastructures and reputations. Recently, there has been a growing number of well-publicised ransomware attacks where cyber criminals encrypt a company’s data and will only release the key...
David Meltzer – CTO, TripWire History confirms when it comes to cyber security that one particular pattern always holds. Disconnected systems start to become connected together, and over time these move from proprietary little known protocols to open standards, leading to a proliferation of new applications and uses. Soon these systems are not secure. New vulnerabilities are discovered then security is retrofitted back in. This session reveals how this pattern occurred, and how to apply the lessons learned from other industries to build resilent, secure environments in IP-connected broadcast systems. [maxbutton id="130" ] [maxbutton id="131" ]
With the adoption of IP Systems in the broadcast arena, cyber security must be built in from the start with consideration to future security threats. In this presentation Denis Onuoha (Chief Information Security Officer, Arqiva) aims to dispel the myth that IP Systems are complex to secure and explores basic steps that can be built-in for securing the broadcast chain. Technical and Process controls are discussed that can aid in the reduction of the attack surface. Denis explores the build, operate and maintain lifecycle. Most of the well-publicised attacks that have occurred in the industry have one thing in common which is lack of basic controls and poor users awareness, once these topics are addressed the impact of a cyber-attack will be significantly reduced. [maxbutton id="136" url="https://theiabm.org/wp-content/uploads/2017/10/DenisOnuoha.pdf"]
This article is from The IABM Business Intelligence Digest from September 2018. The full report can be viewed here Cyber security is a growing challenge for media organizations. According to the 2018 Verizon Data Breach Investigations Report, 68% of security breaches across industries took months or longer to discover. As they aggregate and distribute digital content through various channels, modern media companies are becoming increasingly connected enterprises. Cloud-based streaming piracy, theft of protected content, theft of customer data; the sources of threats for media organizations are multiple, and the nature of attacks varies dramatically. Some risks are common to every organization that uses information exchange software, cloud-based infrastructures and customer data. The specific risks to media organizations are related to the production and the distribution of content, which is increasingly subjected to costly attacks and theft. According to the antipiracy consulting firm Muso, traffic on internet piracy sites in 2017 represented a total of 300 billion visits, a 1.6% increase from 2016. This reflects the global increase in mobile use: while just 13% of visits to piracy sites are via desktop, 87% of visits to illegal platforms are from mobile devices. In 2018, the industry is taking security much more...
As technology becomes increasingly important for successful business operations, the value of a strong cyber liability insurance policy will only continue to grow.
The continued rise in the amount of information stored and transferred electronically has resulted in an increase in the potential exposures facing businesses. Regulations, such as the General Data Protection Regulation (GDPR), must also be considered, because a loss of sensitive personal information may subject you to fines and sanctions from your National Data Protection Authority.
The business landscape across Europe and the UK remains challenging for many IABM members. It was particularly gratifying then that all of the members I spoke to at NAB Show in Las Vegas said that the show was very good for them, both in terms of quantity and quality of attendees
Technology is part of every aspect of life. It has transformed our economies, created new ways of doing business and revolutionised how we live our lives. With so much of our lives connected online, our security on the web is top of the agenda, personally and in business. In my role, I look at everything from ethical hacking to threat intelligence and our digital lines of defence. Here’s how we’re managing risks at BT in an increasingly dangerous cyber world
As Les Anderson, global CSO & vice president cyber-security at BT, succinctly put it in his keynote: “It’s too easy to do badness.” His opening line at the entertaining and informative IABM cyber-security event, held at the imposing BT Tower, set the scene nicely for the myriad cyber-threats every business is now facing. And Anderson knows better than most, having spent 16 years as deputy director at the UK’s intelligence and security operation, GCHQ, prior to taking up the security reins at BT.