Topics
- 2025 BEITC Proceedings
- Immersive Audio, Satellite and OTT Delivery
- Innovations in Live Production and Broadcast Workflows
- IP Networks and the Broadcast Chain: Fast Friends
- AI Applications: Sports, Newsrooms and Archives
- Making ATSC 3.0 Better than Ever
- AM Radio: Measurements and Modeling
- Making Radio Better Than Ever
- Brigital: Integrating Broadcast and Digital
- Production Advancements: Avatars and Immersive Content
- Broadcast Positioning System (BPS): Resilience and Precision
- Resilience, Safety and Protection for Broadcast Service
- Cybersecurity for Broadcasters
- Streaming Improvements: Low Latency and Multiview
- Embracing the Cloud: Transforming Broadcast Operations with ATSC 3.0 and Broadband Technologies
- Enhancing Video Streaming Quality and Efficiency
- 5G in Broadcast Spectrum and Video Quality Metrics
- Getting the Most out of ATSC 3.0
- AI Applications: Captions, Content Detection and Advertising Management
- 2024 BEITC Proceedings
- 2023 BEITC Proceedings
- 2022 BEITC Proceedings
- 2021 BEITC Proceedings
- 2020 BEITC Proceedings
Cybersecurity for Broadcasters
Downtime Management in Multi-CDN Steering Systems - $15
Date: March 21, 2025Topics: 2025 BEITC Proceedings, Cybersecurity for BroadcastersManaging CDN failures in multi-CDN streaming environments requires a careful balance between maintaining Quality of Experience (QoE) and ensuring timely detection of CDN recovery. Traditional methods rely on external probes or client-based monitoring, both of which have limitations in accuracy or feasibility. This paper explores an alternative approach that strategically assigns a small subset of users to a failing CDN while dynamically adjusting their Time-To-Live (TTL) based on buffer length information. By leveraging buffer-aware content steering, the system ensures that only users with sufficient buffer capacity are temporarily assigned to the faulty CDN, minimizing rebuffering events while maintaining continuous monitoring of the CDN’s recovery status.
Through simulations, we evaluate the trade-offs between different user assignment strategies and demonstrate that a Rotating Sacrifice with Buffer-Based TTL approach provides an effective balance. This method achieves rapid recovery detection, typically within seconds, while keeping QoE degradation at levels comparable to a baseline approach where no monitoring is performed. The findings highlight the benefits of incorporating buffer length data into the content steering process, leading to a fairer and more efficient multi-CDN orchestration. We advocate for the inclusion of buffer-level reporting as a standard parameter in content steering systems to improve resilience and service continuity in large-scale streaming operations.
Gwendal Simon | Synamedia | Rennes, France
Securing Hybrid Media and Entertainment Workflows Practical Strategies for Protecting Intellectual Property and Critical Assets - $15
Date: March 21, 2025Topics: 2025 BEITC Proceedings, Cybersecurity for BroadcastersThe media and entertainment industry has undergone a significant shift towards hybrid and cloud-based workflows. As organizations leverage a growing ecosystem of Software as a Service (SaaS) solutions and multi-vendor integrations, new security challenges have emerged. These hybrid environments, which often involve on-premises storage and processing coupled with cloud-based services and remote users, present potential compromise vectors for sensitive data and assets. This paper explores practical strategies to address security threats and safeguard intellectual property, pre-release assets, and other critical resources within hybrid media and entertainment workflows. It will examine the diverse threat vectors malicious actors can exploit, with a focus on vulnerabilities introduced by SaaS solutions and the integration of bespoke vendor offerings.
Johnathan Solomon | Technicall | Columbia, Md., United States
The Liability of Elasticity - $15
Date: March 21, 2025Topics: 2025 BEITC Proceedings, Cybersecurity for BroadcastersThe shift to software-driven cloud infrastructure in the media and entertainment industry offers powerful scalability but introduces complex security challenges. Dynamic scaling capabilities—essential for handling variable demand—expand potential attack surfaces and create risks in tenant isolation, data segregation, and cross-tenant security. Traditional, static security approaches fall short in this fluid environment, necessitating innovative solutions that anticipate inevitable breaches and focus on minimizing the blast radius.
This paper examines critical vulnerabilities that can drive up costs by exploiting elasticity and emphasizes the need for fast detection, segregation of duties, technical standards, and response mechanisms. By adopting lessons from tech sectors and implementing robust, responsive security frameworks, companies can harness elasticity without compromising operational integrity or security.
John Guntenaar, Daniel Murphy, Jorge Llano | NEP Group | Pittsburgh, Pa., United States