Media and Entertainment
While the Film and Television Production Security Guidelines provided the industry with a universal standard, its complexity can be overwhelming to navigate. Every part of production need protection: the scripts, work spaces, ad-hoc production offices, editing suites, computers and discs, emails, websites, on-premise and cloud servers, as well as all the processes and policies that all your employees use every day.
As a full-service technology consulting firm, we offer customized technology solutions for media and entertainment companies. From process and policy to cybersecurity, compliance to cloud migration, security to systems effectiveness, our experts help you protect intellectual property against physical or cyber breach and comply with the Guidelines.
Media & Entertainment Compliance
While the Trusted Partner Network (TPN) program has been around for less than a year, it is expected to quickly replace individual studio audits with major motion picture houses, such as Disney, contributing to the best practice guidelines. The TPN program compares your content security controls against the Motion Picture Association of America’s (MPAA) best practices. Richey May Technology Services professionals were among the first to become certified TPN Accredited Assessors in the program’s inaugural year. With over 30 years of excellence providing tax and assurance services, our firm has proven we understand compliance. We’ll work with you to help you meet studio and TPN compliance requirements with minimal impact to operations. Your assessment report will be available for studios to review for one year.
Pre-Assessment Readiness Check Up with Implementation Roadmap
Getting ready for the Assessment can be challenging while still meeting the daily demands of running your business. Our TPN Accredited Assessors can help you understand where you are and build the plans to help you get where you need to be.
Our skilled team of cybersecurity experts have decades of combined experience in both the private and public sectors. We understand business cases sometimes outweigh best practices and we’ll work with you on generating a fair and realistic report.
Best Practice Process and Policy Development and Implementation
Once you have received your Assessment, what’s next? Your TPN assessment will generate a list of remediation items that will be tracked by the TPN and studios. We’ll help you bridge the gap and get you ready for next year’s assessment. Following our RM2 Methodologysm, you’ll see real improvements – fast. Don’t wait, show studios you take content security seriously and get more work.
In 2014, a hacker group targeted Sony Pictures studio, resulting in a leak of confidential data including employee information, e-mails, and unreleased media. Another hacking group infiltrated a Hollywood post production company, stealing Netflix content, then demanded $50,000 in hush money. US Senator Maggie Hassan told the US Federal Trade Commission, “Loot boxes are now endemic in the video game industry.” It’s clear that cybercriminals are targeting media & entertainment companies. Are you safe?
The cybersecurity industry has a critical shortage of qualified professionals. Most organizations find it difficult to identify and hire the right candidates, let alone retain them.
Through Richey May Technology Solutions’ Virtual Chief Information Security Officer (vCISO) services, we provide you with access to our entire team of seasoned cybersecurity experts at a fraction of the cost of hiring a single cybersecurity professional.
Network Architect & Design
Your network and systems were probably built on a budget and expanded as the business grew. This approach results in a weak foundation and will leave you one step behind the bad guys.
The MPAA, NIST, SANS, ISO and other organizations have detailed secure frameworks that Richey May Technology Solutions can help you build upon, so you don’t have to reinvent the wheel.
Our seasoned veterans know how to securely design networks around your workflow.
Data breaches can be costly, directly impacting your bottom line. Richey May Technology Solutions is ready to help you deal with a breach, ransomware and threat hunting.
We have Digital Forensics and Incident Response (DFIR) experts on call to address your questions:
- What happened?
- What was taken?
- How did it happen?
- Now what?
- How can we prevent this from happening again?