Shaan Kauffman
Learner - He / Him
(1)
9
Location
San Clemente, California, United States
Bio

Enthusiastic cybersecurity student with experience in customer service, data analysis, and team leadership. Possessing an A+ CompTIA certification and a have an interest in technology and problem-solving. Seeking opportunities to apply analytical and technical skills in a practical setting, while continuing to learn and contribute to a team environment.

Portals
Categories
Security (cybersecurity and IT security) Information technology

Skills

Information management 2 Infrastructure security 2 Relationship building 2 Security controls 2 Auditing 1

Socials

Achievements

Latest feedback

Recent projects

Entertainment Identifier Registry
Entertainment Identifier Registry
Los Angeles, California, United States

Security Policies and Procedures

EIDR (Entertainment Identifier Registry – eidr.org) is a service provider for the global media and entertainment industry. Our members include some of the largest media companies in the world (eidr.org/eidr-members) and the identification services we provide are integrated directly into their supply chain operations (eidr.org/about-us). The Motion Picture Association (MPA – motionpictures.org) operates the Trusted Partner Network (TPN – ttpn.org), which provides a set of Content Security Best Practices for the industry (v5.3 – ttpn.org/links-resources). We at EIDR do not handle media directly, but we do manage descriptive metadata related to those programs and our services are used in the pre-release window when content security concerns are at their highest. We’re a small, not-for-profit organization. To date, our focus has been on service delivery, not security. Our security policies, procedures, and training programs have largely consisted of “we’re all professionals, so behave yourselves.” As you can imagine, this is not sufficient to meet the formal TPN security standards. The tasks ahead of us include: Reviewing the TPN Security Best Practices to determine which apply to our operation (providing justifications/explanations for those that do not) Comparing the applicable TPN Security Best Practices to our draft policies and procedures and correcting any identified gaps Developing a prioritized implementation plan that will guide us from current state to verifiable compliance with the applicable TPN Security Best Practices

Matches 1
Category Security (cybersecurity and IT security) + 2
Open