Event Schedule

Times for this Event are in Eastern Standard Time (EST)

  • Welcome
  • IAM at the Forefront of Digital Transformation 9:40 am

    Presented by Auth0

    It’s hard to find a company that isn’t investing in digital transformation. Particularly in the face of a pandemic, which has forced us all to adapt the way we work and interact, digital transformation is here to stay. As companies accelerate their digital transformation timelines, many are finding that identity and access management (IAM) is essential to the speed and success of their endeavors. Discover how four brands–Babylon, Naranja, Siemens, and Kiva–approached their digital transformation and how they handled the identity portion of their transformation journey. We’ll discuss:

    • How and why managing identity is a critical step in your digital transformation journey.
    • How your identity solution can scale with your digital transformation goals.
    • Why invest in a dedicated IAM solution so your digital transformation investments will pay off.
    Click to Expand

    Speaker:

    Dave Wilner
    Dave Wilner

    Dave Wilner

    Chief Revenue Officer

    Collapse This Item

  • Humans are the Weakest Link - CORONA EDITION 10:00 am

    Presented by Check Point Software

    Tell the dogs to lie down, grab a fresh coffee from the kitchen, kick your shoes off, and join CyberSecurity Evangelist and Podcast host Brian Linder for a journey into the dark corners of an interwoven mission of bad actors, SpongeBob, face masks, and a few other surprises.

    Plan on leaving with:

    • New perspectives on humans as the weakest link in Corona times, and in the next “Work From Anywhere” normal,
    • The opportunity multiplier effect of pandemic fatigue,
    • A look into a few cybersecurity “blind spots” which may have been revealed,
    • A peek into the minds of a global Cyber research powerhouse,
    • An interconnected and complex threat surface with roads that lead where nobody wants to go.

    Warning: You might be asked to raise your hand even though nobody can see you except the cat. We will be polling the cats afterwards, so your full cooperation is needed.

    Click to Expand

    Speaker:

    Brian Linder
    Brian Linder

    Brian Linder

    CyberSecurity Threat Evangelist

    Collapse This Item

  • Morning Coffee Break
  • Disrupting Lateral Movement by Securing Active Directory 2:25 pm

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.

    In this session Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.

    Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional Vice President

    Collapse This Item

  • Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices 11:00 am

    Presented by Ordr

    Abstract:  For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
    Join Ordr CSO Jeff Horne to learn:

    • Risks and vulnerabilities associated with unmanaged and IoT devices
    • Why traditional networking and security tools fall short
    • Security best practices to protect these devices without impacting business operations
    Click to Expand

    Speaker:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • 2021 Trends - Expert Panel Discussion 11:25 am

    2021 Trends & Directions

    What will define cybersecurity in 2021?  What carries over from 2020?

    Risk comes from all angles in 2020 users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the continent.

    Obviously, COVID and the associated rush to work-from-home played a big part. Beyond that, what are the key cybersecurity trends we need to watch out for in 2021?

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional Vice President

    Rob Lunney
    Rob Lunney

    Rob Lunney

    Country Manager - Canada

    Kim Berry
    Kim Berry

    Kim Berry

    Principal Threat Intelligence Researcher - Auth0

    Collapse This Item

  • Lunch Break
  • Keynote: Cybercrime 2021 12:30 pm

    Cybersecurity technology making an impact

    2020 saw the increase in cyber threats in both frequency and complexity. For every 10 meter wall of cybersecurity that is built, adversaries are painstakingly constructing 11 meter ladders and circumventing defences. The major cyber threats of 2020 will persist into this new year but what are some of the technologies that can help us to gain ground on these attackers and what are the use cases for implementing them? Join me for a discussion on cybercrime and advanced technologies that can make a difference.

    Click to Expand

    Speaker:

    Det. Con. Kenrick Bagnall
    Det. Con. Kenrick Bagnall

    Det. Con. Kenrick Bagnall

    Toronto Police Service C3 Intelligence S

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 1:20 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Speaker:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Cybersecurity Assessments: Do You Want to Look Good or Be Good? 1:40 pm

    Presented by GoSecure

    How secure is your organization truly? You have recently gotten your organization assessed, but how do you know the results are representative of your actual security state? Your security strategy may have been evaluated, but how confident are you that these really correspond to your operational realities?
    Not all assessments are built equal. This talk will help you understand the challenges and approaches that distinguish substantive assessments from the run-of-the-mill offerings currently flooding the market.

    Click to Expand

    Speaker:

    Eric Rochette
    Eric Rochette

    Eric Rochette

    Senior Vice President, Global Services

    Collapse This Item

  • Afternoon Coffee Break
  • Introduction to Risk-Based Vulnerability Management 2:20 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Speaker:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder

    Collapse This Item

  • Cloud Challenges with Database Security 2:40 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Speaker:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Defense in Depth - Expert Panel Discussion 3:05 pm

    Defense in Depth (3rd Party Risk)

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Panel Participants:

    Victoria Granova
    Victoria Granova

    Victoria Granova

    President of the (ISC)² Toronto Chapter Board

    Vanessa Henri
    Vanessa Henri

    Vanessa Henri

    Cybersecurity and Data Governance Lawyer - Fasken

    Christine Smoley
    Christine Smoley

    Christine Smoley

    Security Engineer - Clearbanc

    Karl Galbraith
    Karl Galbraith

    Karl Galbraith

    CISO - Galbraith & Associates Inc.

    Collapse This Item

  • Afternoon Break
  • Guest Keynote: Cybersecurity Through the Eyes of Psychology 3:50 pm

    Cybersecurity: Through the Eyes of Psychology

    This presentation takes a look at how social engineering attacks work from a psychology perspective. Many cybersecurity issues are human problems, and human behaviour has been studied for longer than cybersecurity has existed as an industry. By understanding and explaining the drivers behind human behaviour, people and organizations can learn how to better protect themselves from attacks.

    Click to Expand

    Speaker:

    Victoria Granova
    Victoria Granova

    Victoria Granova

    President of the (ISC)² Toronto Chapter Board

    Collapse This Item

  • Day One Closing Session
  • Day Two
  • Welcome / Introductions
  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 9:40 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises 10:00 am

    Presented by Axis Security

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

    Click to Expand

    Speaker:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO

    Collapse This Item

  • Morning Coffee Break
  • The Rise of Secure Access Service Edge (SASE) 10:40 am

    Presented by Bitglass

    Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

    • Why organizations need SASE
    • The key components of SASE offerings
    • How SASE architectures impact performance
    Click to Expand

    Speaker:

    Jacob Serpa
    Jacob Serpa

    Jacob Serpa

    Senior Product Manager

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 11:00 am

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Director

    Collapse This Item

  • AI in Cybersecurity - Expert Panel Discussion 11:25 am

    AI in Cybersecurity – How will it Help?

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Click to Expand

    Panel Participants:

    Gary Southwell
    Gary Southwell

    Gary Southwell

    General Manager

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO

    Bill Ohlson
    Bill Ohlson

    Bill Ohlson

    Chief Information Security Officer - nanopay Corporation

    Collapse This Item

  • Lunch Break
  • CISO Panel 12:30 pm

    Panel Participants:

    Andrew Vezina
    Andrew Vezina

    Andrew Vezina

    Vice President and Chief Information Security Officer - Equitable Bank

    Tony English
    Tony English

    Tony English

    VP, IT Risk - Butterfield Group

    Robert L. Godbout
    Robert L. Godbout

    Robert L. Godbout

    CDO/CIO - Canada School of Public Service

    Michael Ball
    Michael Ball

    Michael Ball

    Chairman Of The Board - International Association of Virtual CISOs

    Rachel Guinto
    Rachel Guinto

    Rachel Guinto

    AVP, Global Information Security Risk Management - Manulife

    Collapse This Item

  • Institutionalizing Incident Response 1:25 pm

    Presented by Cloudflare

    The 3 keys for incident response are risk reduction, crisis preparation, and communication. Listen as Cloudflare CSO Joe Sullivan shares his thoughts on how security leaders can implement incident response in their organizations.

    Click to Expand

    Speaker:

    Joe Sullivan
    Joe Sullivan

    Joe Sullivan

    CSO

    Collapse This Item

  • The Hunt is On! 1:45 pm

    Presented by SentinelOne

    “I do have a very particular set of skills, skills I have acquired over a very long career. Skills that make me a nightmare for people like you.” – Bryan Mills (Taken)

    Threat hunting should be something that every organization is capable of. Attacking your organization should be a nightmare for hackers. Too many organizations are blind to the depth and even the presence of threats in their environment. It’s not all about specific skills learned over a long career. Skills make it easier;tools make it accessible. We have seen small organizations with a single administrator develop threat hunting as a part of an IT practice and seen organizations with established threat hunting teams streamline and augment their practice using the right tools.

    The planned take away for this session will be for participants to understand the value proposition of threat hunting, when is threat hunting most important, what are the key elements of a threat hunt, and what tools can facilitate any team in becoming the most efficient hunters. It can be the difference between threats living in your environment for seconds or hours or months.

    Click to Expand

    Speaker:

    Matthew Balcer
    Matthew Balcer

    Matthew Balcer

    Senior Solution Engineer - SentinelOne

    Collapse This Item

  • Afternoon Coffee Break
  • Tackling User Behavior Head-On 2:25 pm

    Presented by Proofpoint

    Today’s popular attacks like phishing, credential compromise, and business email compromise have one thing in common: they need people to work. InfoSec professionals add technology on top of technology, but still the problems persist. How do you take people from the weakest link to active defenders of your organization? Based on our experiences with tens of millions of users, we’ll share with you best practices, strategies, and benchmarks to be successful. 

    Join our presentation to learn about: 

    • Best practices for running an effective security awareness program 
    • Strategies for driving behavior change and improving security culture 
    • Benchmarks for making real impacts to your risk posture
    Click to Expand

    Speaker:

    Mike Bailey
    Mike Bailey

    Mike Bailey

    Senior Product Manager

    Collapse This Item

  • 2021 Trends - Expert Panel Discussion 2:45 pm

    2021 Trends & Directions

    What will define cybersecurity in 2021?  What carries over from 2020?

    Risk comes from all angles in 2020 users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the continent.

    Obviously, COVID and the associated rush to work-from-home played a big part. Beyond that, what are the key cybersecurity trends we need to watch out for in 2021?

     

    Click to Expand

    Panel Participants:

    Robert Falzon
    Robert Falzon

    Robert Falzon

    Engineering Office of the CTO

    Matthew Balcer
    Matthew Balcer

    Matthew Balcer

    Senior Solution Engineer - SentinelOne

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Jeffrey Freedman
    Jeffrey Freedman

    Jeffrey Freedman

    Country Manager - Proofpoint Canada

    Collapse This Item

  • Afternoon Break
  • Keynote: NC3 Approach to Address Cybercrime Landscape Agile Adaptable, and Innovative 3:35 pm

     The Canadian National Cybercrime Coordination Unit (NC3) Director General Lynam will update the recent developments within the National Cybercrime Coordination Unit and provide important details about ongoing cyber attacks, especially on ransomware that were introduced around the pandemic circumstances of 2020 but continue to evolve and threaten Canadian industries including healthcare, financial services, government agencies as well as general business and individual users.

    Click to Expand

    Speaker:

    Chris Lynam
    Chris Lynam

    Chris Lynam

    Director General, Royal Canadian Mounted Police - NC3

    Collapse This Item

  • Summit Closing Session