Virtual Cybersecurity Summit
For security experts and leaders, it’s never been more important to stay on top of the latest threats and trends in cyber. Join the Canada West Virtual Cybersecurity Summit to connect with like-minded executives, innovative solutions providers, experts and luminaries. This event combines the networking and educational opportunities of in-person events, and puts them in a live, immersive virtual experience.
You’ll gain exclusive insights from local CISOs, subject matter experts and topical panels, along with plenty of opportunities to network virtually with your peers or with solutions providers. This Summit is specifically curated for the Western Canada audience, offering a rare opportunity to connect with the cyber community like never before.
Tue. Nov 23
Associate Managing Director, Cyber Risk at Kroll
Keynote: From the Ransomware Frontlines: R-Rated TakeawaysDr. Chandana Unnithan
Dr. Chandana Unnithan
Chief Scientific Officer at Lifeguard Digital Health
CISO RoundTableTamika Bass
Cybersecurity Technology Director at Gannett Fleming
CISO RoundTableDeepak Rout
Global Executive and Trusted Advisor at Microsoft
CISO RoundTableAndrew Vezina
VP and CISO at Equitable Bank
CISO RoundTableSabino C Marquez
Sabino C Marquez
Chief Information Security Officer & Dir., Privacy Operations -...
Times for this Event are in Pacific Time (PDT/PST)
The Summit will be open from 8AM to 6PM.
- Welcome / Introductions
10 Biggest and Boldest Insider Threats Incidents of 2021 8:50 am
Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams. Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat. Many organisations are learning that the hard way.
Join us for this presentation with Brian Reed to explore some of the biggest insider attacks of 2021 – and what you can do to avoid similar threats. You’ll learn:
- The unexpected ways insiders can steal money, disrupt business and tarnish your brand
- How third-party vendors can pose as big of an insider threat as your employees
- Tricks that outside attackers use to gain insider access
- Tips for managing insider threats and risks in your organization
Using Data Protection for Ransomware Recovery 9:15 am
With the growth of ransomware and cybercrime, Data Protection is rapidly becoming the go to solution to help organizations recover from a Ransomware event and avoid paying the Ransom and hope your data made available. Current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical.
Join this session to learn best practices of how to evaluate your current data protection solution and what changes you may need to make to be ready to recover from a Ransomware event.
The Ultimate Vendor Risk Assessment Checklist 9:50 am
Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches.
In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including:
- Actionable takeaways to quickly improve your assessment operations
- Long-term changes you can make to set yourself up for success
- Real advice and lessons learned from leading assessment experts
Securing the Modern API Ecosystem 10:10 am
APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:
- API discovery and inventory management
- continuous vulnerability identification and testing
- runtime prevention and detection
Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.
Expert Panel Discussion: Planning Your 2022 Cybersecurity Budget 10:30 am
As 2021 draws to a close, CISOs and other cybersecurity leaders turn their attention to budgeting and planning for 2022. Resources, new technologies, and staffing all take a part—getting the balance right can be tricky.
Cybersecurity headlines have made asking for more budget somewhat easier; however, managing line items and spending wisely will always be the core focus.
In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.
Panel Participants:Tony Anscombe
Chief Security Evangelist at ESET North AmericaMark Sangster
Cybersecurity Expert & Author “No Safe Harbor”Curtis Blais
CISO - Cybera
Ransomware Resilience 11:15 am
Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs.
Join this live session and hear how your company can:
- Instantly resume operations post-attack
- Reduce your data loss from days to seconds/minutes
- Test and isolate data to ensure a safe recovery
To Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution 11:35 am
Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster.
Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily.
Join us to discover how Okta’s pre-built identity solutions:
- Accelerates time to market
- Lowers the total cost of ownership (TCO) of Application Development
- Focuses resources on Core Application Functionality
- Reduces the Risk of a Security and Compliance Breach
- Helps ensure a better user experience
- Lunch Break
Keynote: From the Ransomware Frontlines: R-Rated Takeaways 12:25 pm
From the Ransomware Frontlines: R-Rated Takeaways
For every ransomware attack that hits the news, hundreds of others go uncovered and several are effectively stopped. Jaycee Roth has handled nearly every possible attack scenario and along her team, has investigated well over 1000 ransomware incidents. In this session, Jaycee dissects the latest ransomware TTPs, including double and triple extortion, the exponential growth of the initial access marketplace, and practical steps proven to work (if deployed in time).
- How initial access brokers are leveraging 0-days and a wide variety of CVEs to fuel more destructive ransomware attacks
- What adversaries look for during reconnaissance, how to spot them, and a clever tactic to misguide them
- Encryption, exfiltration, and DDOS – the rise of the triple extortion and what it means for blue teams
- Which steps precede ransomware detonation? Effective precursors to monitor for and how to act before detonation
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 1:10 pm
Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.
Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.
WHY SHOULD I ATTEND?
– Learn about the latest ransomware trends
– Dissect discoveries from Cybereason’s Nocturnus team
– Become empowered to defend against ransomware
Why Office 365 Backup is ESSENTIAL 1:30 pm
The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.
Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.
Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential. They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.
Global Technologist, Product Strategy at Veeam SoftwareRick Vanover
Senior Director, Product Strategy at Veeam Software
A Realistic Take on Zero Trust 2:05 pm
Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.
Improving Cyber Resilience Against Ransom Attacks 2:25 pm
Ransomware and Ransom DDoS attacks have been targeting many Canadian companies. Cloudflare’s Cybersecurity expert, Ameet Naik, will describe these types of attacks, differences and impacts to businesses, best practices to minimize risks, and some recommendations for companies to improve cyber resiliency against all threats.
This session will help you:
- Learn more about industry trends for Ransomware and Ransom DDoS
- Understand how organizations can mitigate these threats
- Implement proactive defenses to prevents ransomware attacks against your organization
Expert Panel Discussion: Cloud Clarity in 2022: Strategy, Execution & Alignment 2:45 pm
Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.” In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.
Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.
Panel Participants:Justin Henkel
Head of CISO Center of Excellence at OneTrustRobert Falzon
Engineering Office of the CTO
CISO RoundTable 3:45 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:Dr. Chandana Unnithan
Dr. Chandana Unnithan
Chief Scientific Officer at Lifeguard Digital HealthTamika Bass
Cybersecurity Technology Director at Gannett FlemingDeepak Rout
Global Executive and Trusted Advisor at MicrosoftSabino C Marquez
Sabino C Marquez
Chief Information Security Officer & Dir., Privacy Operations - Allocadia Software, Inc.
- Closing Session + Prize Drawing