February 12-13, 2020
Renaissance Hotel at Sea World — A Marriott Property in Orlando
Engineering + IT: Breaking Down Walls to Build Resilience
TVNewsCheck’s Cybersecurity for Broadcasters Retreat gathers TV broadcasting’s engineering, IT and security communities to exchange information in a highly confidential setting.
The retreat features Private Information Exchanges where broadcasters can safely discuss sensitive issues in a secure environment. Targeted educational sessions and networking time round out the experience.
The 2020 retreat will open with a two-hour Incident Response Simulation of an escalating breach to the television production and distribution environment.
Technology, IT and security executives, managers and professionals working at media companies, technology providers and in allied fields.
All CBR participants must sign a confidentiality agreement. Chatham House Rules will be enforced.
Incident Response Simulation
A high-pressure, interactive exercise in which attendees break into groups to play the roles of TV managers - from engineering, IT, security and other departments, as they react, in real time, to an escalating security breach of the television production and distribution environment.
The simulation will focus specifically on staffers on the front line and how they collaborate to solve problems. Teams will experience high pressure and oversight from key stakeholders.
Private Information Exchanges — Broadcasters Only
Back by popular demand, private information exchanges permit security, IT and technology leaders to safely exchange information in a highly secure environment.
Private Information Exchanges — Broadcast Technology Vendors Only
Held simultaneously with broadcaster private exchanges, these highly private meetings permit security, IT and technology managers at technology providers to tackle issues and solutions.
Securing the News Environment for 2020 Election Season
A hands-on workshop designed to create a set of specific practices for protecting the newsroom and journalists from fake news, ransomeware attacks and other threats, while also addressing other threats likely to arise during the upcoming election year.
Minimizing Insider Threats
Forty percent of security breaches result from threat actors or unwitting employees or contractors working within a company or organization. What are the best strategies for coaching employees and contractors to avoid exposing the enterprise to risk?
Planning and Implementing Secure Mergers & Acquisitions
Security leaders map out how to plan for and execute a security strategy for integrating new properties. Conversation will include strategies for small groups and individual stations or networks to plan ahead so security won't create a barrier to an acquisition.
Let's Get Real: Engineering + IT — Breaking Down Walls to Build Resilience
A candid dialogue between TV engineers, who have been keeping networks and stations on air for decades, and IT / security managers working to secure the production and distribution environment (and driving the engineers increasingly crazy).
Securing the Television Supply Chain
How have engineering and IT teams addressed security issues at pioneering IP facilities?
Managing Security in the Cloud
Leading cloud specialists discuss managing assets, provisioning access, providing redundancy and other issues.
Communicating With the C-Suite
What's it like to experience a security breach and how does it change the outlook of corporate leaders toward strategy, budgeting and security governance? Candid advice for communicating with the C-Suite.