• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Summit will be open from 8:00 AM to 5:00 PM.

  • Welcome to the Canada Virtual Cybersecurity Summit
  • The Journey to Security Service Edge: The Killer Feature is Simplicity 8:45 am

    Presented by Axis

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, Jaye will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    Jaye Tillson
    Jaye Tillson

    Jaye Tillson

    Director of Strategy at Axis Security

    Collapse This Item

  • Continuous Monitoring and the Future of Security Compliance 9:05 am

    Presented by AuditBoard

    As technology advances and cybersecurity grows in importance, compliance requirements continue to increase. The old way of asking system admins for point-in-time screenshots, multiple times a year, is inefficient and outdated. In order to evolve the security compliance profession, we need a new way of performing compliance activities through continuous automation. This session will spotlight the way forward for compliance teams in today’s ever-evolving cyber risk landscape.

     

    Click to Expand

    Speaker:

    John Volles
    John Volles

    John Volles

    Senior Manager, Security Compliance at AuditBoard

    Collapse This Item

  • Will the Real Zero Trust Please Stand Up? 9:40 am

    Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is a complex concept that unifies many different facets of cybersecurity. Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures. As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2022 and act more quickly against new and evolving cyber threats.

    Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts.

    Click to Expand

    Panel Participants:

    Ram Vaidyanathan
    Ram Vaidyanathan

    Ram Vaidyanathan

    Cybersecurity Technical Consultant at ManageEngine

    Steven Rodin
    Steven Rodin

    Steven Rodin

    Chief Executive Officer & President at Storagepipe

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Tim Savage
    Tim Savage

    Tim Savage

    Top of Funnel Optimizer at Conceal

    Collapse This Item

  • Identity: The Core of Zero Trust 10:25 am

    Presented by Okta

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    Click to Expand

    Speaker:

    Ashwin Ramnarayanan
    Ashwin Ramnarayanan

    Ashwin Ramnarayanan

    Solutions Engineer at Okta

    Collapse This Item

  • Demystifying Gen V Attacks: Ransomware, Nation State, and Supply Chain 10:45 am

    Presented by Check Point

    Over the US Independence Day weekend, the attack on IT management software firm Kaseya combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.

    Click to Expand

    Speaker:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Collapse This Item

  • 2022 Trends & Directions 11:05 am

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    Click to Expand

    Panel Participants:

    Kevin May
    Kevin May

    Kevin May

    Vice President at Storagepipe

    Josh Snow
    Josh Snow

    Josh Snow

    Principal Engineer at ExtraHop Networks

    Chris Harris
    Chris Harris

    Chris Harris

    Systems Engineering Specialist at Palo Alto Networks

    Joe Bollman
    Joe Bollman

    Joe Bollman

    Senior Solution Architect Leader at SecurityScorecard

    Collapse This Item

  • Summit Lunch Break
  • FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money) 11:55 am

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime.  In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.

    Click to Expand

    Panel Participants:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business 1:00 pm

    Presented by ManageEngine

    At a time when work was still a place to go to, apart from a thing to get done, organizations could afford to protect their most sensitive data using firewalls, IDS and IPS systems, and VPNs. But today, when there are no corporate network boundaries, and data can be stored and accessed from anywhere, traditional security systems will no longer work.

    There has to be a paradigm shift in the way we think about security. Enter zero trust.

    In this 20-minute talk, you will hear about:
    – The need for zero trust
    – The zero trust architecture
    – The sophisticated attack kill chains of today and tomorrow
    – Zero trust implementation pitfalls and strategy

    Click to Expand

    Speaker:

    Ram Vaidyanathan
    Ram Vaidyanathan

    Ram Vaidyanathan

    Cybersecurity Technical Consultant at ManageEngine

    Collapse This Item

  • Windows 10, 11, or 12 – The Windows journey continues… 1:20 pm

    Presented by baramundi

    Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version. 

     Axel Peters from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while?  What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 1:40 pm

    This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

    Click to Expand

    Panel Participants:

    Det. Con. Kenrick Bagnall
    Det. Con. Kenrick Bagnall

    Det. Con. Kenrick Bagnall

    Det. Constable at TPS - Coordinated Cyber Centre (C3)

    Vern Crowley
    Vern Crowley

    Vern Crowley

    Detective Sergeant at OPP Cybercrime Investigation Team

    Tanner Hubbard
    Tanner Hubbard

    Tanner Hubbard

    Special Agent at US Secret Service

    Det. Con. Doug MacRae
    Det. Con. Doug MacRae

    Det. Con. Doug MacRae

    Det. Constable at York Regional Police

    Lina Dabit
    Lina Dabit

    Lina Dabit

    Inspector, Officer in Charge, RCMP

    Patrick Wilhelm
    Patrick Wilhelm

    Patrick Wilhelm

    Special Agent, National Program Manager at DHS

    Collapse This Item

  • Project Zero Trust 2:20 pm

    The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. Many organizations struggle with success when it comes to cybersecurity—not because they are doing nothing but because they don’t have a consistent strategy for protecting their data. Zero Trust is a strategy for protecting your organization’s most important assets. This strategy focuses on preventing breaches by eliminating one of your biggest blind spots when it comes to computers and computer networks—trust. Since Zero Trust focuses on a strategy of prevention, attendees will find opportunities to realize improvements in efficiency and reduced costs, in addition to increased security.

    Attendees will learn:

    • John Kindervag’s’ five-step methodology for implementing Zero Trust
    • How to limit the blast radius of a breach
    • Common myths and pitfalls when implementing Zero Trust
    • Actionable tactics for implementing Zero Trust for multiple protect surfaces
    Click to Expand

    Speaker:

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Collapse This Item

  • Cyber Executive RoundTable 3:10 pm

    Submit your bio for consideration to participate on our Cyber Executive RoundTable

    at future summits and conferences

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Dr. Chandana Unnithan
    Dr. Chandana Unnithan

    Dr. Chandana Unnithan

    Chief Scientific Officer at Lifeguard Digital Health

    Mike Glover
    Mike Glover

    Mike Glover

    Chief Information Officer at MaximBet

    Sachin Jain
    Sachin Jain

    Sachin Jain

    Former Global CIO and CISO at Evalueserve

    Victoria Granova
    Victoria Granova

    Victoria Granova

    Founder at CyberToronto

    Collapse This Item

  • Canada Virtual Cybersecurity Summit Closing
Partners Register