Cybersecurity for Broadcasters

  • Downtime Management in Multi-CDN Steering Systems - $15

    Date: March 21, 2025
    Topics: ,

    Managing CDN failures in multi-CDN streaming environments requires a careful balance between maintaining Quality of Experience (QoE) and ensuring timely detection of CDN recovery. Traditional methods rely on external probes or client-based monitoring, both of which have limitations in accuracy or feasibility. This paper explores an alternative approach that strategically assigns a small subset of users to a failing CDN while dynamically adjusting their Time-To-Live (TTL) based on buffer length information. By leveraging buffer-aware content steering, the system ensures that only users with sufficient buffer capacity are temporarily assigned to the faulty CDN, minimizing rebuffering events while maintaining continuous monitoring of the CDN’s recovery status.

    Through simulations, we evaluate the trade-offs between different user assignment strategies and demonstrate that a Rotating Sacrifice with Buffer-Based TTL approach provides an effective balance. This method achieves rapid recovery detection, typically within seconds, while keeping QoE degradation at levels comparable to a baseline approach where no monitoring is performed. The findings highlight the benefits of incorporating buffer length data into the content steering process, leading to a fairer and more efficient multi-CDN orchestration. We advocate for the inclusion of buffer-level reporting as a standard parameter in content steering systems to improve resilience and service continuity in large-scale streaming operations.

    Gwendal Simon | Synamedia | Rennes, France



  • Securing Hybrid Media and Entertainment Workflows Practical Strategies for Protecting Intellectual Property and Critical Assets  - $15

    Date: March 21, 2025
    Topics: ,

    The media and entertainment industry has undergone a significant shift towards hybrid and cloud-based workflows. As organizations leverage a growing ecosystem of Software as a Service (SaaS) solutions and multi-vendor integrations, new security challenges have emerged. These hybrid environments, which often involve on-premises storage and processing coupled with cloud-based services and remote users, present potential compromise vectors for sensitive data and assets. This paper explores practical strategies to address security threats and safeguard intellectual property, pre-release assets, and other critical resources within hybrid media and entertainment workflows. It will examine the diverse threat vectors malicious actors can exploit, with a focus on vulnerabilities introduced by SaaS solutions and the integration of bespoke vendor offerings.

    Johnathan Solomon | Technicall | Columbia, Md., United States



  • The Liability of Elasticity - $15

    Date: March 21, 2025
    Topics: ,

    The shift to software-driven cloud infrastructure in the media and entertainment industry offers powerful scalability but introduces complex security challenges. Dynamic scaling capabilities—essential for handling variable demand—expand potential attack surfaces and create risks in tenant isolation, data segregation, and cross-tenant security. Traditional, static security approaches fall short in this fluid environment, necessitating innovative solutions that anticipate inevitable breaches and focus on minimizing the blast radius.

    This paper examines critical vulnerabilities that can drive up costs by exploiting elasticity and emphasizes the need for fast detection, segregation of duties, technical standards, and response mechanisms. By adopting lessons from tech sectors and implementing robust, responsive security frameworks, companies can harness elasticity without compromising operational integrity or security.

    John Guntenaar, Daniel Murphy, Jorge Llano | NEP Group | Pittsburgh, Pa., United States