SVG Cybersecurity Work Group


Gary Olson, GHO Group, Managing Director

Keith Anderson, Turner Information Security, VP
Brian Bark, Sinclair, CIO
Bernie Courtney, CBS Corporation, Director IT & Engineering
Albert Faust , Arista, Technical Lead
John Gierl, NEP Group, SVP, Information Technology
Seann Harding, Dome Productions, Technical Manager Engineering
Kolin Hodgson, University of Notre Dame, Senior Information Security Analyst
Darryl Jefferson, NBC Sports & Olympics, VP, Post Operations & Digital Workflow
Samuel Jones, NBA, Global Head of Security for Games
Keith Martin, Game Creek Video, Engineering Project Manager
John McClure, Sinclair, CISO
John Naylor, Ross, VP
Scott Rothenberg, NEP Group, SVP, Technology and Asset Management
Tom Sahara, Media Technologist and Advisor
Jason Taubman, Game Creek Video, SVP, Technology
Dan Turk, NEP Group, Chief Engineer
Marc Zorn, HBO, Productions & Content Security

For More Information

If you have any questions or comments or would like to join the SVG Cybersecurity Work Group, please email Martin Porter, SVG Executive Director at: [email protected].

SVG Cybersecurity Work Group Best Practices

DOWNLOAD: Work From Home? These Guidelines Can Help Keep Your Home Network Safe

Scanning Removable Drives Version 1.0 (January 2019)

  • All trucks and flypacks should have a separate computer that is set up to perform a malware scan on all portable drives prior to those drives being used. Drives with media should be scanned if time permits; however, configuration files for switcher, audio console, and other systems should be scanned.
  • The facilities provider should provide this capability with hardware and software of their choosing and its staff should be responsible for making sure that the software is up to date.
  • The company that hires the crew should communicate that all crew (above and below the line) should comply with this process.
  • This computer should be “air-gapped” from the internet except when getting software updates.

Wireless Networks Version 1.0 (January 2019)

  • Facilities should be set up with at least two networks: Engineering and Public.
  • There should be a hardware firewall between the networks and only the representatives or those specifically authorized by the facilities provider should have access to the engineering network. Hiding this network might be a prudent additional step.
  • The Public Wifi is only allowed through Access Control List to public internet and the network should be password protected. Frequent resets or purges of allowed users is a prudent additional step.
  • Only company-approved VPNs will be allowed; use of other VPN’s are not permitted.

Password must contain the following:

A lowercase letter

A capital (uppercase) letter

A number

Minimum 8 characters