The Cyber Business Podcast

How Movie Studios Defend IP at Massive Scale with Dan Meacham


Listen Later

Guest Introduction

Dan Meacham serves as Vice President of Cyber and Content Security at Legendary Entertainment, a global film and television production company behind some of the most recognizable franchises in modern media. In his role, Dan is responsible for securing not only traditional enterprise systems, but also the creative content, intellectual property, and complex supply chains that power large scale movie and television production. His work spans cyber defense, digital forensics, vendor risk, and emerging AI driven security models in an industry where collaboration extends far beyond corporate boundaries.

Here's a Glimpse of What You'll Learn
  • Why securing a movie studio is fundamentally different from securing a traditional enterprise

  • How content production relies on thousands of external collaborators and temporary environments

  • The role of digital forensics and watermarking in protecting unreleased media

  • How sophisticated attackers target individuals through social engineering and custom applications

  • Why AI driven analytics are essential for threat detection at massive scale

  • How long term log retention enables rapid decision making during incidents

  • What shared learning intelligence could mean for the future of security operations

In This Episode

Dan Meacham explains how Legendary's business model reshapes cybersecurity strategy. Each film or television project operates like its own company, complete with a unique technology stack, vendor ecosystem, and lifecycle. Security must adapt quickly to environments that appear and disappear over months or years.

He walks through the realities of protecting creative content across the production pipeline. From dailies and post production workflows to global distribution, large media files are constantly replicated, shared, and transformed. Watermarking, stenography, and forensic techniques play a critical role in tracing leaks back to their source.

The conversation highlights how attackers exploit human behavior rather than systems alone. Dan shares real world examples where threat actors built targeted applications to extract photos from personal devices, demonstrating how deeply personal and contextual modern attacks have become.

Dan also outlines how AI and machine learning have long existed in both filmmaking and cybersecurity. Today's challenge is not adopting AI, but governing it across devices, platforms, and supply chains. He introduces the concept of shared learning intelligence as a way to aggregate insights from multiple AI systems without centralizing sensitive data.

The episode closes with a discussion on scale and speed. By retaining over a decade of security logs, Dan's team can quickly identify anomalous behavior and shut down access before damage spreads. AI accelerates analysis, but human accountability remains central to every decision.

...more
View all episodesView all episodes
Download on the App Store

The Cyber Business PodcastBy Matthew Connor