Event Schedule

  • Your CEO Is Not Your CEO! How to Defend Against Email Fraud 9:00 am

    Presented by Proofpoint

    Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.

    Join our session and learn about:

    • What is BEC and EAC? And how do they work?
    • What are the common attack tactics regarding this new form of email threats?
    • Best practices to defend against BEC and EAC
    Click to Expand

    Speaker:

    Collapse This Item

  • Evolution of An Attack: How a Persistent Threat Actor Adapts to Fool Microsoft 9:25 am

    Presented by Avanan

    The arms race between email attackers and defenders is a long and expensive one. In this webinar, we analyze the attack methods of a single advanced persistent threat organization that guarantees its dark-web customers that their messages will bypass Microsoft security.

    We review the software they use to send email from anywhere in the world, their techniques that take advantage of both short- and long-lived vulnerabilities and the infrastructure to harvest credentials and perform attacks almost instantaneously.

    You will be surprised by the sophistication of the tools as well as their ease of use. Updated regularly with release notes and training videos, they are not ‘hackers’, so much as software developers with a very clear product offer: 100% access to your inbox.

    We watch them over time and show how the tricks they use provide us with the indicators-of-attack we need to stop them.

    Click to Expand

    Speaker:

    Michael Landewe
    Michael Landewe

    Michael Landewe

    Cofounder

    Collapse This Item

  • Identity and Access Management: Embracing the Complexity 9:50 am

    Presented by Auth0

    Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.

    Click to Expand

    Speaker:

    Matthew Marji
    Matthew Marji

    Matthew Marji

    Senior Product Security Engineer

    Collapse This Item

  • The Impossible Puzzle of Cybersecurity 10:30 am

    Presented by Sophos

    With IT teams around the world struggling to keep up with the latest cybersecurity threats, it is now the norm to be hit by a cyberattack.

    Finding an end-to-end security solution that can protect against all types of cyberattacks can be difficult, and ensuring that your organization has the resources to manage the different security products can be an even bigger challenge.

    Sophos simplifies the management of all of your security needs with our Synchronized Security technology, and provides the latest in threat analysis and attack mitigation capabilities to maximize your protection, for your endpoints, servers and mobile devices.

    Click to Expand

    Speaker:

    Collapse This Item

  • Driving the End Game in Cyber Hygiene 10:55 am

    Presented by Forescout Technologies

    Critical labor shortages in Cyber Security have created unprecedented demand for solutions to deliver real-time actions that immediately reduce risk to operations. To do this, companies must have complete knowledge of everything on the network, machine-speed assessment of endpoint risk, and a willingness to automate actions to quarantine threats from high-risk devices or to isolate and protect vulnerable systems. In this session, Greg will share why automating your Cyber Hygiene at global scale is crucial to reducing risk across your extended enterprise.

    Session highlights include:

    • What is ”Cyber Hygiene” and why does it matter?
    • How business-specific IOT complicates enterprise scale compliance
    • Why properly managed network segmentation can “secure the un-securable” (or in other words: how to live in a state of known vulnerability)
    Click to Expand

    Speaker:

    Collapse This Item

  • Risk Management – Insights in a World Gone Crazy 11:20 am

    Presented by Ivanti

    Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.

    Click to Expand

    Speaker:

    Phil Richards
    Phil Richards

    Phil Richards

    CISO at Ivanti

    Collapse This Item

  • Day 1: Morning Q&A Panel
  • Canadian Cybercrime Awareness and Prevention in 2020 12:35 pm

    Presented by Ontario Provincial Police

    The rapid advancement and penetration of cyber and digital technologies is changing the world, and with it, the landscape of threats from terrorism and organized crime. Every day there are new reports of data breaches, new kinds of online fraud, and increasingly criminals are moving traditional forms of crime online to evade law enforcement.

    The public expects the police to be able to protect them from criminals regardless of what platform those criminals operate on or what technologies they use to commit crime.

    The OPP Cybercrime Investigations Team is made up of civilian members and sworn officers like Detective Sergeant Crowley, who are dedicated to manage  risks, reduce threats, and minimize harm caused by crime involving digital technologies. By proactively sharing the latest trends, attack vectors, and  vulnerabilities being exploited, the OPP hopes to raise the level of awareness so organizations can take preventative measures to target harden their systems  whereby reducing the level victimization caused by cybercrime in Ontario.

    Click to Expand

    Speaker:

    Collapse This Item

  • The IoT Storm… Will We Survive the Coming Deluge? 1:20 pm

    Presented by Check Point Software Technologies

    IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!

    Click to Expand

    Speaker:

    Robert Falzon
    Robert Falzon

    Robert Falzon

    Engineering Office of the CTO

    Collapse This Item

  • Shifting PAM Into High Gear with Zero Standing Privilege (ZSP) 1:45 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • The Importance of Having a Robust and Comprehensive Data Protection Strategy 2:25 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cyber-crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • How to Counter Data Theft by Eliminating the Insider Threat 2:50 pm

    Presented by Tenfold

    Insider threats are among the top IT security risks organizations today must brace for. Conventional security measures typically focus on external attacks, but do not provide protection against attacks from potential internal perpetrators. Simon Cuthbert, responsible for International Business Development at tenfold, will demonstrate why you must never underestimate the threat from within and how you can use identity and access management to minimize the risk of insider threats in your company.

    Click to Expand

    Speaker:

    Collapse This Item

  • Acceleration of Digital Transformation by COVID-19 3:15 pm

    Presented by ESET

    In response to “work from home” and other lockdown measures due to the COVID-19 pandemic, many companies have transformed their businesses by integrating digital technology to fundamentally change how they operate and how they deliver value to customers.

    Join this presentation where we will discuss security considerations and how the pandemic has forced short-term adaptation, which could be viewed as a leap towards digital transformation, offering more flexibility to customers and employees — potentially opening new revenue opportunities.

    Click to Expand

    Speaker:

    Collapse This Item

  • Day 1: Afternoon Q&A Session
  • Day 1: Closing Session
  • Shift Left – Building Security into the Application Development Lifecycle 9:05 am

    Presented by Micro Focus

    By building security into your application development lifecycle you not only help reduce your attack surface, but also save roughly 30% in costs associated to resolving the application security vulnerabilities afterwards… never mind the costs associated to a breach, such as shareholder value and brand tarnishing.

    Click to Expand

    Speaker:

    Collapse This Item

  • Managing Digital Risk in Transformative Times 9:30 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Improving Security for Remote Working: 13 Key Recommendations 9:55 am

    Presented by Mimecast

    Many organizations are in the middle of a work from home (WFH) trial by fire. What are the security implications of this abrupt change? What are some key security best practices that have become clear during this time? Even after this current pandemic recedes it is fair to assume that WFH is now firmly part of the business continuity new normal. In rapid fire form, this session will provide 13 key recommendations that you can apply now and into the future to improve the security of your WFH program.

    Click to Expand

    Speaker:

    Collapse This Item

  • Achieving Secure Remote Access with RDP 10:40 am

    Presented by Axis Security

    With so many employees sheltering in place due to the coronavirus, enterprises with Windows are depending on VPNs and Microsoft’s Remote Desktop Protocol (RDP). However, while this allows employees to access company apps and files, using VPN and RDP surfaces other, longer-lasting problems. Adopting additional security measures can help. Check out this session to learn how; by providing a layer of security over all RDP servers under management, isolating hosts from the Internet, effectively eliminating the application attack surface.

    Click to Expand

    Speaker:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • Building an Effective Cyber Training Program for Your Cyber-Pros 11:05 am

    Presented by RangeForce

    In the cybersecurity triad of people, process, and technology, much time and money is spent on technology and very little on people or process. Even today, as security awareness training matures for end users, security leaders have few choices when it comes to effectively and affordably training their cyber pros. Certificate programs are designed for individuals and not for teams, and the skills learned are quickly lost if not used in a cyber-pros day to day job as no practice environment exists to hone skills. The final straw is the forced move to an “at home work environment” completely disrupting traditional onsite training.

    This presentation will focus on cutting edge training technologies and strategies for security team managers and cyber-pros that will help to overcome limited budgets and time, as well as train in place requirements. In this presentation, the audience will learn about the latest advances in interactive computer based training, advanced simulation, and cyber range exercises so that managers and cyber pros can find effective methods to affordably develop and hone their team’s cyber skills.

    Click to Expand

    Speaker:

    Collapse This Item

  • Day 2: Morning Q&A Session
  • Cybercrime in a Post-Pandemic World 12:15 pm

    Presented by Toronto Police Service

    This presentation will take a 360 degree look at how Cybersecurity needs have changed and Cybercrime has evolved in the wake of COVID-19. We’ve all had to adjust to new ways of living and working, this has changed the threat landscape and impacted individuals and organizations large and small in unprecedented ways. The cybercriminals know this, so how has law enforcement been impacted as we evolve to continue to serve and protect our citizens in an increasingly complex virtual world? Join me for this Keynote presentation and I share what I hope will be some valuable insight.

    Click to Expand

    Speaker:

    Det. Con. Kenrick Bagnall
    Det. Con. Kenrick Bagnall

    Det. Con. Kenrick Bagnall

    Detective Constable at Toronto Police Service Intelligence Services - Coordinated Cyber Centre (C3)

    Collapse This Item

  • Day 2: Closing Session
  • Day 2: Solutions Showcase Open Until 2:00 PM
Partners