
Virtual Summit
Canada East
Virtual Cybersecurity Summit
The rate of change in the world of cybersecurity is unlike any other industry, and that’s why it’s so important to continue staying on the leading edge. Join the Canada East Virtual Cybersecurity Summit and ensure that you and your organization are prepared for whatever comes next. You’ll hear from industry experts, discussing the specific needs of Canadian cyber pros, including some of the region’s top cyber cops.
Log on to this immersive virtual environment, and gain access to executive-level insights for the modern cyber landscape. You can collect CPE credits for your time spent in these educational sessions, and network with your peers in a fully interactive platform. You’ll walk away with a broader skill set and better resources to be ready for whatever comes next.
Date
Wed. Sep 08 — Thu. Sep 09
-
Featured Speakers
Mike Stacy
Expert Panel Discussion: Empowering Users
Mark SangsterExpert Panel Discussion: Empowering Users
Michael DoucetExpert Panel Discussion: Empowering Users
Angelo ComazzettoExpert Panel Discussion: Empowering Users
Det. Con. Kenrick BagnallKeynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping
Sima RacineKeynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping
David BerryKeynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping
John AlldredgeKeynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping
Natasha D’SouzaGuest Keynote: Upgrading the Fabric of the Canadian Internet – Keeping Malware Out and IoT Devices Secure
Andrew VezinaCISO RoundTable
Sachin JainCISO RoundTable
Ferris AdiCISO RoundTable
Carlos A.P. ChalicoCISO RoundTable
Shannon BrazilCISO RoundTable
Ranjeet KhannaCISO RoundTable
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Summit will be open from 8AM to 6PM.
- DAY ONE
- Welcome / Introductions
-
Trust Issues? Building Your Cyber Security Confidence Through Zero Trust 9:20 am
Zero Trust is the topic of the day in the cyber security market. Vendors seem to be producing zero trust “silver bullet” platforms that will deliver zero trust in a tidy bundle.
But what is “Zero Trust” really?
In truth, zero trust is not entirely new… it repackages very familiar security concepts of least privilege, assume breach, defense in depth, need to know, and continuous improvement.
In this talk, Brad Stocking will share insights and a point of view on Zero Trust and the implementation of Zero Trust strategies with a focus on the typical pitfalls and successes that can be expected from looking deep inside your security posture.
Panel Participants:
-
Disrupting Lateral Movement by Securing Active Directory 9:50 am
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session, Joseph Salazar will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.
Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
-
A Modern Approach to Information Protection 10:30 am
Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021?
Join us as we discuss how you can reimagine data privacy with a modern approach to information protection.
In this session, we will cover:
- Modern data security challenges
- The convergence of data and threat protection to secure data from internal and external threats
- How people-centric investigations lead to more rapid investigative outcomes
Panel Participants:
-
Understanding and Combating Credential Stuffing Attacks 10:50 am
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
• How credential stuffing attacks work
• What effect they can have on your company
• Steps to detect and mitigate these attacksPanel Participants:
-
Expert Panel Discussion: Empowering Users 11:10 am
Empowering Users to Be the Best Human Firewall in Your Organization
Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.
Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.
Panel Participants:
- Lunch Break
-
Keynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping 12:15 pm
If it hasn’t already, SIM card swapping is coming to a mobile phone near you. A SIM swap is a low-cost, non-technical way for attackers to gain control of a victim’s wireless phone account. The majority of wireless phone accounts are vulnerable to SIM swaps. For those that hold cryptocurrency, attackers north and south of the border are especially interested to find you.
Highlighting recent cross-border cases, this exclusive presentation for the Canada-East Virtual Summit audience will elaborate on recent cases. It will uniquely be presented by agents from the United States Secret Service, the Toronto Police Service Intelligence Services Coordinated Cyber Centre (C3), and REACT – the Regional Enforcement Allied Computer Team.
Moreover, the agency representatives will talk about how they partner to thwart cybercrime, and stay ahead of the threat actors that prey on organizations in the area, especially those that have a good deal of cross-border trading activity. Each of them will further explain their agency’s mission, take questions from Community Members, and detail the steps to take before you or your organization are the target of an attack.
Panel Participants:
-
Faking It: Stopping Impersonation Attacks with Cyber AI 1:15 pm
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.
Panel Participants:
-
Rethinking Data Protection in the Age of Ransomware 1:35 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
To Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution 2:15 pm
Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster.
Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily.
Join us to discover how Okta’s pre-built identity solutions:
- Accelerates time to market
- Lowers the total cost of ownership (TCO) of Application Development
- Focuses resources on Core Application Functionality
- Reduces the Risk of a Security and Compliance Breach
- Helps ensure a better user experience
Panel Participants:
-
Introduction to Risk-Based Vulnerability Management 2:35 pm
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
- Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
- Details the findings on how risk-based is the way to get ahead in vulnerability management
- Lays out several factors that drive better remediation performance
- Provides steps for setting up a successful risk-based vulnerability management program
Panel Participants:
-
Expert Panel Discussion: Ransomware 3:00 pm
Rescue from Ransomware - What to Know Before You Get That Nasty Email
Ransomware has been a hot topic of 2021. As bad actors show, there is no honor among thieves – they target hospitals, health care organizations, and other firms in the throes of COVID-19 response. Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
Panel Participants:
-
Guest Keynote: Upgrading the Fabric of the Canadian Internet – Keeping Malware Out and IoT Devices Secure 3:45 pm
Organizations and households should consider that the internet is one of the most important networks they use. Yet, most IT managers still draw it like a cloud when there are services that make up the fabric of the internet that can be used by them to be more cybersecure. This is where the Canadian Internet Registration Authority (CIRA) comes in.
CIRA is a not-for-profit organization with over 20 years managing critical infrastructure in Canada. We work to make this fabric a critical tool that both organizations and households can use to help improve their security.
The CIRA IoT Registry makes it possible to manage a fleet of IoT devices and ensure they are not communicating with unauthorized parties. Many IoT devices including medical services, remote sensing, power plants, and municipal services are harder to secure and manage. The efficiency gains quickly evaporate, are hard to keep organized, and are notoriously vulnerable to cyber attacks. Our experts will show how the CIRA IoT Registry can provide a method to ensure secure device management.
Panel Participants:
- Day One Closing Session
- DAY TWO
- Breakfast Briefing
- Welcome / Introductions
-
Attackers Go Mobile in the Face of a Global Pandemic 9:25 am
The pandemic has changed everything- the way we live, the way we work and the way we protect what’s important to us. The most impactful change to enterprises was the transition to hybrid work and how it shifted the threat landscape for mobile attacks.
Everyone relies on their mobile devices to connect to enterprise infrastructure, making both personal and corporate assets susceptible to sophisticated threat actors. In response to heightened security measures, threat actors are getting creative; perpetuating the cat-and-mouse game between attackers and their targets.
In this session, we’ll look at how the mobile threat landscape has shifted over the course of the transition toward widespread hybrid work, how some of the most successful attackers have manipulated unsuspecting users into compromising their devices and discuss solutions for mitigating these attacks.
Panel Participants:
-
The Last Line of Defense: Data Protection 9:45 am
With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense.
Panel Participants:
-
Zero Trust Security for Everywhere Workplace 10:30 am
As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before.
Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.
Panel Participants:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 10:50 am
Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.
Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.
WHY SHOULD I ATTEND?
– Learn about the latest ransomware trends
– Dissect discoveries from Cybereason’s Nocturnus team
– Become empowered to defend against ransomware
Panel Participants:
-
Expert Panel Discussion: DevOps Security and the Cloud 11:10 am
DevOps & the Cloud
DevOps enables you to release features and bug fixes faster than ever before. However, traditional security activities can’t seem to keep up with this fast-paced tempo. How can you make sure security doesn’t get left behind? Ignoring security bugs won’t make them go away. Slowing down the DevOps team isn’t an option. How can we make DevOps and DevSecOps work well in the fast-paced cloud environment we live in?
Panel Participants:
- Lunch Break
-
Keynote: A Deeper Look Into the Recent Cybercrime Threats Affecting Canada 12:20 pm
Detective Sergeant Vern Crowley will discuss the most recent attacks, the vulnerabilities being exploited, and the concerns Law Enforcement has regarding the security of the systems in the coming months.
Panel Participants:
-
Rise of Secure Access Service Edge (SASE) 1:10 pm
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.
In this presentation, you will learn:
- The core components of a SASE platform like Bitglass
- The functionality you need to secure cloud, web, and remote access use cases
- Architectural considerations you should keep in mind when comparing SASE vendors
Panel Participants:
-
Why Office 365 Backup is ESSENTIAL 1:30 pm
The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.
Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.
Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential. They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.
Panel Participants:
-
Expert Panel Discussion: Author Interview: No Safe Harbor 2:05 pm
Mark is the author of the recent book no Safe Harbor: the inside truth about cyber crime and how to protect your business. In this short discussion, Mark will address the stories in the book, what the key takeaways are, and the process of writing it.
Panel Participants:
-
Application Security Beyond Effective Bot Mitigation 2:25 pm
The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms.
Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.
Panel Participants:
-
How Passwordless Authentication Enables a Secure, Seamless Customer Experiences 2:45 pm
Passwordless takes the guesswork out of secure, frictionless authentication, an increasingly urgent priority as customer experience moves online.
Seamless authentication cultivates customer trust and can improve conversion rates, since a user frustrated by a clunky login or checkout process is likely to abandon their shopping cart without making a purchase.
Panel Participants:
-
Expert Panel Discussion: AI/ML 3:05 pm
AI/ML and Other Leading-Edge Innovations in Cybersecurity
We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?
Panel Participants:
-
CISO RoundTable 3:45 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Final Closing Session
-
Partners
Platinum Partner
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners