Even with the global cost of online crime reaching $6 trillion by 2021.
Even with 50% more cyber-attacks per week on corporate networks in 2021.
Even with the world’s most influential technology leaders claiming cybercrime to be the greatest threat to every company in the world.
…the fact of the matter is most broadcasters are woefully underprepared when it comes to protecting their businesses from cyber-attacks. And this is a big problem.
View More
The recent IABM report on content security trends in conjunction with our good friends at Axinom made for some interesting reading. As Roger Thornton mentions in his summary article, perhaps the most surprising takeaway is the discrepancy between a stated intention to invest in content, and a far lower priority in investment in content security technology to safeguard against the theft of that content, especially given the financial, operational and potentially creative resources that will be required to produce or acquire it. As Roger summarises, this seems counterintuitive, but budgets are finite and it could be argued that prioritizing content over business processes is where dutiful media providers should concentrate their majority resource.
View More
Media companies are connecting across more platforms, services, and networks all the time and securing content or broadcast/streaming data has never been more important… and more difficult.
View More
The issue of cyber security hits on many levels – corporate, product, system and individual. All of these are apparent within the Broadcast Industry with attitudes as well as actions to cyber security increasingly changing, driven in no small part by the rapid adoption of new cloud-based workflows and ‘direct to consumer’ strategies. Below the UK Members’ Council have been given 30 minutes to ‘debate’ two opposing statements around cyber security and what it means for the Broadcast industry.
View More
Cybersecurity has become an increasing concern over the past decade as a result of several high-profile attacks and organizations need to secure valuable data.
View More
A discussion of best practices and alternative cost-effective archive solutions for on-going content protection
View More
Every industry has valuable equipment that is fundamental to how their organisation performs, whether it be in the defence and military sector or in the broadcasting field. With this reliance on expensive equipment comes the need for suitable storage solutions and ways to ensure the protection of property. This is where server racks come in handy. Server racks can be used for many different purposes and are the ideal solution for keeping equipment safe and secure. There are numerous advantages of using server racks including them offering an improved level of security and neatly organising space. Here at CP Cases, we have decided to go that extra mile to offer customisable options for your server racks, designing them specifically so that they are more fitting and beneficial to your personal needs.
View More
The last 24-months have seen substantial disruption to facilities in M&E by virtue of the COVID-19 pandemic. Facilities have been forced to embrace new paradigms including work from home, and adopt new workflows that incorporate SaaS and PaaS based offerings. This talk will examine how facilities should review their approach to cybersecurity risk, risk assessment, and risk treatment in distributed environments. We will also take a brief look at emerging technologies such as SD-WAN, SASE, and ZTNA that may help in reducing risk in these distributed environments.
View More
A cool feature of the IABM Technology and Trends Roadmap is that at a high level it gives us a visual overview of the anomalies and irregularities within our industry that directly affect growth and profitability. Our panel will examine these conflicts and how they affect business and risk. Part 1 will take on the three areas of: Distributed Infrastructure (Home Studios, Backhaul, Workstations, Cloud Production Switching), Compute and Storage (GPU, CPU, FPGAs, NVME, PCIe, SSD), along with Security.
View More
File and object workflows are here to stay. This session will cover key strategies to protect file and object in private and hybrid cloud architectures. Including the full data lifecycle comprises of production , cool and cold data.
View More