• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • DAY ONE
  • Welcome / Introductions
  • Trust Issues? Building Your Cyber Security Confidence Through Zero Trust 9:20 am

    Presented by IBM Canada

    Zero Trust is the topic of the day in the cyber security market. Vendors seem to be producing zero trust “silver bullet” platforms that will deliver zero trust in a tidy bundle.

    But what is “Zero Trust” really?

    In truth, zero trust is not entirely new… it repackages very familiar security concepts of least privilege, assume breach, defense in depth, need to know, and continuous improvement.

    In this talk, Brad Stocking will share insights and a point of view on Zero Trust and the implementation of Zero Trust strategies with a focus on the typical pitfalls and successes that can be expected from looking deep inside your security posture.

    Click to Expand

    Panel Participants:

    Brad Stocking
    Brad Stocking

    Brad Stocking

    Associate Partner, Zero Trust Lead at IBM Security

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 9:50 am

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

    In this session, Joseph Salazar will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. 

    Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • A Modern Approach to Information Protection 10:30 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection.

    In this session, we will cover: 

    • Modern data security challenges 
    • The convergence of data and threat protection to secure data from internal and external threats 
    • How people-centric investigations lead to more rapid investigative outcomes

     

    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • Understanding and Combating Credential Stuffing Attacks 10:50 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    •        How credential stuffing attacks work
    •        What effect they can have on your company
    •        Steps to detect and mitigate these attacks

    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • Expert Panel Discussion: Empowering Users 11:10 am

    Empowering Users to Be the Best Human Firewall in Your Organization

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.

    Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Michael Doucet
    Michael Doucet

    Michael Doucet

    Executive Director, Office of the CISO at Optiv

    Angelo Comazzetto
    Angelo Comazzetto

    Angelo Comazzetto

    Principal, OCISO at Amazon / AWS

    Collapse This Item

  • Lunch Break
  • Keynote: Cross-Border Talk on Borderless CyberCrime: SIM Swapping 12:15 pm

    If it hasn’t already, SIM card swapping is coming to a mobile phone near you. A SIM swap is a low-cost, non-technical way for attackers to gain control of a victim’s wireless phone account. The majority of wireless phone accounts are vulnerable to SIM swaps. For those that hold cryptocurrency, attackers north and south of the border are especially interested to find you.  

    Highlighting recent cross-border cases, this exclusive presentation for the Canada-East Virtual Summit audience will elaborate on recent cases.  It will uniquely be presented by agents from the United States Secret Service, the Toronto Police Service Intelligence Services Coordinated Cyber Centre (C3), and REACT – the Regional Enforcement Allied Computer Team. 

    Moreover, the agency representatives will talk about how they partner to thwart cybercrime, and stay ahead of the threat actors that prey on organizations in the area, especially those that have a good deal of cross-border trading activity. Each of them will further explain their agency’s mission, take questions from Community Members, and detail the steps to take before you or your organization are the target of an attack. 

    Click to Expand

    Panel Participants:

    Det. Con. Kenrick Bagnall
    Det. Con. Kenrick Bagnall

    Det. Con. Kenrick Bagnall

    Detective Constable at Toronto Police Service Intelligence Services - Coordinated Cyber Centre (C3)

    Sima Racine
    Sima Racine

    Sima Racine

    Investigative Specialist at USSS - Montreal Office

    David Berry
    David Berry

    David Berry

    Criminal Investigator at Santa Clara County Office of the District Attorney

    John Alldredge
    John Alldredge

    John Alldredge

    Detective at Los Gatos-Monte Sereno Police Department - REACT Task Force

    Collapse This Item

  • Faking It: Stopping Impersonation Attacks with Cyber AI 1:15 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products at Darktrace

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 1:35 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • To Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution 2:15 pm

    Presented by Okta

    Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. 

    Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily. 

    Join us to discover how Okta’s pre-built identity solutions: 

    • Accelerates time to market 
    • Lowers the total cost of ownership (TCO) of Application Development 
    • Focuses resources on Core Application Functionality 
    • Reduces the Risk of a Security and Compliance Breach 
    • Helps ensure a better user experience
    Click to Expand

    Panel Participants:

    Dimitri Melchior
    Dimitri Melchior

    Dimitri Melchior

    Sr. Solutions Engineer at Okta

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 2:35 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Expert Panel Discussion: Ransomware 3:00 pm

    Rescue from Ransomware - What to Know Before You Get That Nasty Email

    Ransomware has been a hot topic of 2021. As bad actors show, there is no honor among thieves – they target hospitals, health care organizations, and other firms in the throes of COVID-19 response. Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    Click to Expand

    Panel Participants:

    Dr. Srinivas Mukkamala
    Dr. Srinivas Mukkamala

    Dr. Srinivas Mukkamala

    SVP of Security Products at Ivanti

    Ray Boisvert
    Ray Boisvert

    Ray Boisvert

    Associate Partner for Security Strategy at IBM Security

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Guest Keynote: Upgrading the Fabric of the Canadian Internet – Keeping Malware Out and IoT Devices Secure 3:45 pm

    Organizations and households should consider that the internet is one of the most important networks they use. Yet, most IT managers still draw it like a cloud when there are services that make up the fabric of the internet that can be used by them to be more cybersecure. This is where the Canadian Internet Registration Authority (CIRA) comes in. 

    CIRA is a not-for-profit organization with over 20 years managing critical infrastructure in Canada. We work to make this fabric a critical tool that both organizations and households can use to help improve their security.

    The CIRA IoT Registry makes it possible to manage a fleet of IoT devices and ensure they are not communicating with unauthorized parties. Many IoT devices including medical services, remote sensing, power plants, and municipal services are harder to secure and manage. The efficiency gains quickly evaporate, are hard to keep organized, and are notoriously vulnerable to cyber attacks. Our experts will show how the CIRA IoT Registry can provide a method to ensure secure device management.

    Click to Expand

    Panel Participants:

    Natasha D’Souza
    Natasha D’Souza

    Natasha D’Souza

    IoT Product Manager at CIRA

    Collapse This Item

  • Day One Closing Session
  • DAY TWO
  • Breakfast Briefing
  • Welcome / Introductions
  • Attackers Go Mobile in the Face of a Global Pandemic 9:25 am

    Presented by Lookout

    The pandemic has changed everything- the way we live, the way we work and the way we protect what’s important to us. The most impactful change to enterprises was the transition to hybrid work and how it shifted the threat landscape for mobile attacks.

    Everyone relies on their mobile devices to connect to enterprise infrastructure, making both personal and corporate assets susceptible to sophisticated threat actors. In response to heightened security measures, threat actors are getting creative; perpetuating the cat-and-mouse game between attackers and their targets.

    In this session, we’ll look at how the mobile threat landscape has shifted over the course of the transition toward widespread hybrid work, how some of the most successful attackers have manipulated unsuspecting users into compromising their devices and discuss solutions for mitigating these attacks.

    Click to Expand

    Panel Participants:

    Kristina Balaam
    Kristina Balaam

    Kristina Balaam

    Senior Security Intelligence Researcher at Lookout

    Collapse This Item

  • The Last Line of Defense: Data Protection 9:45 am

    Presented by Pure Storage

    With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense.

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Director at Pure Storage

    Collapse This Item

  • Zero Trust Security for Everywhere Workplace 10:30 am

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

    Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO at Ivanti

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 10:50 am

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Panel Participants:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • Expert Panel Discussion: DevOps Security and the Cloud 11:10 am

    DevOps & the Cloud

    DevOps enables you to release features and bug fixes faster than ever before. However, traditional security activities can’t seem to keep up with this fast-paced tempo. How can you make sure security doesn’t get left behind? Ignoring security bugs won’t make them go away. Slowing down the DevOps team isn’t an option. How can we make DevOps and DevSecOps work well in the fast-paced cloud environment we live in?

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Duncan Godfrey
    Duncan Godfrey

    Duncan Godfrey

    VP of Security Engineering at Auth0

    Jean-Marc Dupuis
    Jean-Marc Dupuis

    Jean-Marc Dupuis

    Security Solution Architect at IT SERVICES

    Manny Mand
    Manny Mand

    Manny Mand

    CEO at Hacker's for Change

    Collapse This Item

  • Lunch Break
  • Keynote: A Deeper Look Into the Recent Cybercrime Threats Affecting Canada 12:20 pm

    Detective Sergeant Vern Crowley will discuss the most recent attacks, the vulnerabilities being exploited, and the concerns Law Enforcement has regarding the security of the systems in the coming months.

    Click to Expand

    Panel Participants:

    Vern Crowley
    Vern Crowley

    Vern Crowley

    Detective Sergeant at OPP Cybercrime Investigation Team

    Collapse This Item

  • Rise of Secure Access Service Edge (SASE) 1:10 pm

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    In this presentation, you will learn: 

    • The core components of a SASE platform like Bitglass
    • The functionality you need to secure cloud, web, and remote access use cases
    • Architectural considerations you should keep in mind when comparing SASE vendors
    Click to Expand

    Panel Participants:

    Jonathan Andresen
    Jonathan Andresen

    Jonathan Andresen

    Senior Director at BitGlass

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 1:30 pm

    Presented by Veeam Software

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential. They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Panel Participants:

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy at Veeam Software

    Collapse This Item

  • Expert Panel Discussion: Author Interview: No Safe Harbor 2:05 pm

    Mark is the author of the recent book no Safe Harbor: the inside truth about cyber crime and how to protect your business. In this short discussion, Mark will address the stories in the book, what the key takeaways are, and the process of writing it. 

    Click to Expand

    Panel Participants:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Application Security Beyond Effective Bot Mitigation 2:25 pm

    Presented by Shape Security

    The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms. 

    Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.

    Click to Expand

    Panel Participants:

    Partha Sarathy
    Partha Sarathy

    Partha Sarathy

    Global Fraud Strategist at Shape Security

    Collapse This Item

  • How Passwordless Authentication Enables a Secure, Seamless Customer Experiences 2:45 pm

    Presented by Auth0

    Passwordless takes the guesswork out of secure, frictionless authentication, an increasingly urgent priority as customer experience moves online. 

    Seamless authentication cultivates customer trust and can improve conversion rates, since a user frustrated by a clunky login or checkout process is likely to abandon their shopping cart without making a purchase.

    Click to Expand

    Panel Participants:

    Navrup Tom
    Navrup Tom

    Navrup Tom

    Product Manager at Auth0

    Collapse This Item

  • Expert Panel Discussion: AI/ML 3:05 pm

    AI/ML and Other Leading-Edge Innovations in Cybersecurity

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’? 

    Click to Expand

    Panel Participants:

    Karl Galbraith
    Karl Galbraith

    Karl Galbraith

    CISO at Galbraith & Associates Inc.

    Adam Frank
    Adam Frank

    Adam Frank

    CTO, Security Intelligence at IBM Canada

    David Masson
    David Masson

    David Masson

    Director of Enterprise Security at Darktrace

    David Hill
    David Hill

    David Hill

    Global Technologist (Product Strategy, Office of the CTO) at Veeam Software

    Collapse This Item

  • CISO RoundTable 3:45 pm

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Andrew Vezina
    Andrew Vezina

    Andrew Vezina

    VP and CISO at Equitable Bank

    Sachin Jain
    Sachin Jain

    Sachin Jain

    Former Global CIO and CISO at Evalueserve

    Ferris Adi
    Ferris Adi

    Ferris Adi

    Senior Security & Compliance Manager at Rogers Communications, Inc.

    Carlos A.P. Chalico
    Carlos A.P. Chalico

    Carlos A.P. Chalico

    Information Security and Privacy, IT Risk Management Practitioner & Information Governance Professional at Ernst & Young

    Shannon Brazil
    Shannon Brazil

    Shannon Brazil

    IR Lead at Arete Incident Response

    Ranjeet Khanna
    Ranjeet Khanna

    Ranjeet Khanna

    CISO at Mirion Technologies

    Collapse This Item

  • Summit Final Closing Session