• Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ
Best Information Security Services | Cyber Intelligence | Data Diode
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ
Picture

Trusted Partner Network
Assessment

Trusted Partner Network (TPN) Framework Consultancy & Assessment Assistance

What is TPN Assessment?
The Trusted Partner Network (TPN) is a global, industry-wide film and television content protection initiative. The TPN helps companies prevent leaks, breaches, and hacks of their customers’ movies and television shows prior to their intended release.
How will the TPN address escalating content security threats?
The TPN establishes a single benchmark of minimum security preparedness for all vendors and their teams, wherever they work, and whatever their specialty. By creating a single, global directory of “trusted partner” vendors, content companies will have access to a centralized database to learn their TPN status.
Are there any precedents for such a program?
Other industry-wide security initiatives are well-established in finance, IT, payment processing, and healthcare. They have raised the levels of effectiveness and efficiency of their overall industry security.
What are the benefits for vendors in the TPN program?
The TPN program provides a number of benefits to vendors, including:
  • Reduce the number of assessments conducted at each facility annually.
  • Reduce the number of different controls used by various content owners.
  • Create competitive, market-driven assessment pricing.
  • Accelerate assessment report turn-around.
  • Offer controls that are specific to the needs and workflows of specific vendor types.
  • Assist in identifying vulnerabilities and communicate remediation through the TPN Platform.
  • Allow vendors to promote their security preparedness.
What are the benefits for content owners in the TPN program?
The TPN program provides a number of benefits to content owners, including:
  • Create a single, central global directory of “trusted partner” vendors.
  • Expand the community of approved, media & entertainment focused content security assessors.
  • Elevate the security standards and responsiveness of the vendor community.
  • Assist in identifying vulnerabilities and communicate remediation to the vendor community through the TPN Platform.
  •  Increase the number of third-party vendor facilities that are assessed annually.
Can I “fail” a TPN assessment?
The TPN assessment does not provide a “pass/fail” grade, certification, or rating. It provides an assessment of a facility’s security preparedness for conformance with the MPA content security best practices. If an assessment indicates non-conformance with a control or practice, any necessary remediation may be conducted by a separate but similarly approved TPN assessor. The vendor may also provide evidence of their own remediation to the TPN. The TPN also has a formal review and submission process for any assessment disputes. Assessors will be regularly measured and evaluated through the TPN Qualified Assessor Program.

MPA Best Practices: Common Guidelines

The Motion Picture Association (MPA) Content Security Best Practices Common Guidelines (CSBP-CG) is an Information Security Management System (ISMS) framework derived from ISO/IEC 27002-2013 and NIST 800-53. The MPA Content Security Best Practices Common Guidelines is industry specific and designed to be of use by any organisation that is engaged in the Media and Entertainment Industry. The framework can be used standalone or in conjunction with other ISMS or risk management regime such as the ISO/IEC 27000 family, ITIL and COBIT.
Book Your Consultation Today.
Picture
TROJAN HUNT INDIA LLP
Review Us on Google  
https://bit.ly/thi_review

Services

Products

  Connect with us

Red Team Exercise & Assessment
Vulnerability Assessment & Penetration Testing
Privacy & Data Protection
Risk Advisory Services
Third Party Risk Management
Cyber Threat Management

Data Recovery Services

Mobile Threat Defense
Encrypted Communication Suite
Insider Threat Prevention Suite
Digital Forensic Products
Data Diode
​Data Recovery Products

​OSINT
Global Helpline:
+91-8178440079
+91-11-41671961
Chat With Us:
+91-8178440079
Working Hours:
​Monday - Saturday
1000 Hrs - 1900 Hrs
Corporate Office:
Level 3, Gate Number 1, Plot No 9-11, Vardhman Trade Center, Lala Lajpat Rai Road, Nehru Place - 110019, New Delhi, India

    Subscribe to our newsletter

Subscribe
Member of:
Picture
Certifications:
Picture
Picture
© Trojan Hunt India LLP 2019 - 2022. ​All Rights Reserved.
Disclaimer: All images are licensed and text copyrighted material of Trojan Hunt India LLP. Logo is Trademark Registered. No unauthorized copy or distribution allowed.
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ