Registration

Thu. Oct 06

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $200.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Pacific Time (PDT/PST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, October 6th.

  • Welcome to the Vancouver Cybersecurity Conference
  • AI & ML in Cybersecurity: Can We ‘Science the Heck’ Out of Trouble? 8:30 am
    Add to Calendar20221006 8:30 am20221006 8:50 amAmerica/Los_AngelesAI & ML in Cybersecurity: Can We ‘Science the Heck’ Out of Trouble?

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’? 

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’? 

    Click to Expand

    Collapse This Item

  • Managing the Insider Threat 8:50 am
    Add to Calendar20221006 8:50 am20221006 9:10 amAmerica/Los_AngelesManaging the Insider Threat

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • The Safety Net: Ransomware and Disaster Recovery for Hybrid IT Environments 9:30 am
    Add to Calendar20221006 9:30 am20221006 9:50 amAmerica/Los_AngelesThe Safety Net: Ransomware and Disaster Recovery for Hybrid IT Environments

    Ransomware and other cyber threats are changing business’s needs for data protection across their on-premise, private cloud, and public cloud environments. 

    If your organization is attacked, are you ready? 

    Join our session on October 6 at the Vancouver Cybersecurity Conference to get key insights from Storagepipe Vice President Kevin May on the benefits of a multi-layered data protection strategy for your Hybrid IT environments.

    Discover:
    • The rapidly evolving ransomware landscape along with common attack vectors and new malicious tactics
    • How to reduce vulnerabilities and data loss caused by user error, insider threats, and external attacks
    • Key considerations around Disaster Recovery such as staged recovery, cloud portability and workload mobility
    • How Veeam Cloud Backups outsmart ransomware with Insider Protection and Local Immutability
    • How Veeam Cloud Connect Replication delivers complete and rapid virtual machine Disaster Recovery
    • Data protection options for Azure and AWS and how they work to protect your multi-cloud future

    Storagepipe and Veeam Software® look forward to sharing the latest complete hybrid IT data protection insights and trends with you.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by Storagepipe

    Ransomware and other cyber threats are changing business’s needs for data protection across their on-premise, private cloud, and public cloud environments. 

    If your organization is attacked, are you ready? 

    Join our session on October 6 at the Vancouver Cybersecurity Conference to get key insights from Storagepipe Vice President Kevin May on the benefits of a multi-layered data protection strategy for your Hybrid IT environments.

    Discover:
    • The rapidly evolving ransomware landscape along with common attack vectors and new malicious tactics
    • How to reduce vulnerabilities and data loss caused by user error, insider threats, and external attacks
    • Key considerations around Disaster Recovery such as staged recovery, cloud portability and workload mobility
    • How Veeam Cloud Backups outsmart ransomware with Insider Protection and Local Immutability
    • How Veeam Cloud Connect Replication delivers complete and rapid virtual machine Disaster Recovery
    • Data protection options for Azure and AWS and how they work to protect your multi-cloud future

    Storagepipe and Veeam Software® look forward to sharing the latest complete hybrid IT data protection insights and trends with you.

    Click to Expand

    Speaker:

    Kevin May
    Kevin May

    Kevin May

    Vice President at Storagepipe

    Collapse This Item

  • The Battle of the Algorithms: How AI is Beating AI at Its Own Game 9:50 am
    Add to Calendar20221006 9:50 am20221006 10:10 amAmerica/Los_AngelesThe Battle of the Algorithms: How AI is Beating AI at Its Own Game

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    In this session, discover:

    • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
    • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    • Why defensive AI technologies are uniquely positioned to fight back
    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    In this session, discover:

    • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
    • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    • Why defensive AI technologies are uniquely positioned to fight back
    Click to Expand

    Speaker:

    Maria Fung
    Maria Fung

    Maria Fung

    Technical Manager at Darktrace

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am
    Add to Calendar20221006 10:10 am20221006 10:40 amAmerica/Los_AngelesProtecting Against Cyber Attacks

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Joe Bollman
    Joe Bollman

    Joe Bollman

    Senior Solution Architect Leader at SecurityScorecard

    Collapse This Item

  • What XDR Is and Isn't 10:55 am
    Add to Calendar20221006 10:55 am20221006 11:15 amAmerica/Los_AngelesWhat XDR Is and Isn't

    Since Nir Zuk, Palo Alto Networks CTO, coined XDR in 2018, XDR has captured and shifted the collective imagination of security teams and analysts alike. It has also led to confusion on what XDR is and isn’t.

    Many see extended detection and response, or XDR, as the key to breaking down data silos, reducing security blind spots and improving SOC efficiency. However, not all users know the use cases for XDR and which vendors are offering true XDR.

    Gain a deeper understanding of:
    • The top features and benefits of XDR solutions
    • How organizations are using XDR for security operations today
    • Tips to identify XDR imposters
    • How to choose the right XDR product for your environment

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by Palo Alto Networks

    Since Nir Zuk, Palo Alto Networks CTO, coined XDR in 2018, XDR has captured and shifted the collective imagination of security teams and analysts alike. It has also led to confusion on what XDR is and isn’t.

    Many see extended detection and response, or XDR, as the key to breaking down data silos, reducing security blind spots and improving SOC efficiency. However, not all users know the use cases for XDR and which vendors are offering true XDR.

    Gain a deeper understanding of:
    • The top features and benefits of XDR solutions
    • How organizations are using XDR for security operations today
    • Tips to identify XDR imposters
    • How to choose the right XDR product for your environment

    Click to Expand

    Speaker:

    Chris Harris
    Chris Harris

    Chris Harris

    Systems Engineering Specialist at Palo Alto Networks

    Collapse This Item

  • Identity: The Core of Zero Trust 11:15 am
    Add to Calendar20221006 11:15 am20221006 11:35 amAmerica/Los_AngelesIdentity: The Core of Zero Trust

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    Click to Expand

    Collapse This Item

  • Conference Lunch Break
  • Project Zero Trust 12:10 pm
    Add to Calendar20221006 12:10 pm20221006 12:40 pmAmerica/Los_AngelesProject Zero Trust

    The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. Many organizations struggle with success when it comes to cybersecurity—not because they are doing nothing but because they don’t have a consistent strategy for protecting their data. Zero Trust is a strategy for protecting your organization’s most important assets. This strategy focuses on preventing breaches by eliminating one of your biggest blind spots when it comes to computers and computer networks—trust. Since Zero Trust focuses on a strategy of prevention, attendees will find opportunities to realize improvements in efficiency and reduced costs, in addition to increased security.

    Attendees will learn:

    •     John Kindervag’s’ five-step methodology for implementing Zero Trust  
    •     How to limit the blast radius of a breach
    •     Common myths and pitfalls when implementing Zero Trust
    •     Actionable tactics for implementing Zero Trust for multiple protect surfaces
    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. Many organizations struggle with success when it comes to cybersecurity—not because they are doing nothing but because they don’t have a consistent strategy for protecting their data. Zero Trust is a strategy for protecting your organization’s most important assets. This strategy focuses on preventing breaches by eliminating one of your biggest blind spots when it comes to computers and computer networks—trust. Since Zero Trust focuses on a strategy of prevention, attendees will find opportunities to realize improvements in efficiency and reduced costs, in addition to increased security.

    Attendees will learn:

    •     John Kindervag’s’ five-step methodology for implementing Zero Trust  
    •     How to limit the blast radius of a breach
    •     Common myths and pitfalls when implementing Zero Trust
    •     Actionable tactics for implementing Zero Trust for multiple protect surfaces
    Click to Expand

    Speaker:

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Collapse This Item

  • Signed Books From Keynote Speaker George Finney 12:40 pm
    Add to Calendar20221006 12:40 pm20221006 12:50 pmAmerica/Los_AngelesSigned Books From Keynote Speaker George Finney1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    About the book:

    Project Zero Trust
    Project Zero Trust

    Project Zero Trust

    A Story about a Strategy for Aligning Security and the Business by George Finney

    Collapse This Item

  • Using Endpoint Security To Build a Resilient Hybrid Workforce 1:00 pm
    Add to Calendar20221006 1:00 pm20221006 1:20 pmAmerica/Los_AngelesUsing Endpoint Security To Build a Resilient Hybrid Workforce

    Organizations cannot thrive in today’s world if their key assets are not protected round the clock. Lackluster cybersecurity measures not only inhibit business growth but can also lead to companies losing their customer trust. In this session, we’ll learn to break down cyber threats into their basic components and figure out a way to simplify endpoint security practices that can pave the way for a secure and safer tomorrow.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by ManageEngine

    Organizations cannot thrive in today’s world if their key assets are not protected round the clock. Lackluster cybersecurity measures not only inhibit business growth but can also lead to companies losing their customer trust. In this session, we’ll learn to break down cyber threats into their basic components and figure out a way to simplify endpoint security practices that can pave the way for a secure and safer tomorrow.

    Click to Expand

    Speaker:

    Romanus Prabhu Raymond
    Romanus Prabhu Raymond

    Romanus Prabhu Raymond

    Global Head - Technical Support, Unified Endpoint Management & Security at ManageEngine

    Collapse This Item

  • Windows 10, 11, or 12 – The Windows Journey Continues… 1:20 pm
    Add to Calendar20221006 1:20 pm20221006 1:40 pmAmerica/Los_AngelesWindows 10, 11, or 12 – The Windows Journey Continues…

    Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version. 

    Axel Peters from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while?  What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by baramundi

    Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version. 

    Axel Peters from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while?  What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • 2022 Trends & Directions 1:40 pm
    Add to Calendar20221006 1:40 pm20221006 2:00 pmAmerica/Los_Angeles2022 Trends & Directions

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Panel Participants:

    Kevin May
    Kevin May

    Kevin May

    Vice President at Storagepipe

    Josh Snow
    Josh Snow

    Josh Snow

    Principal Engineer at ExtraHop Networks

    Chris Harris
    Chris Harris

    Chris Harris

    Systems Engineering Specialist at Palo Alto Networks

    Collapse This Item

  • Managing Cloud Risk Without Slowing App Delivery 2:25 pm
    Add to Calendar20221006 2:25 pm20221006 2:45 pmAmerica/Los_AngelesManaging Cloud Risk Without Slowing App Delivery

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Principal Security Engineer Jonathon Cerda will share our customers’ best practices for securing containers, Kubernetes and cloud services.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Principal Security Engineer Jonathon Cerda will share our customers’ best practices for securing containers, Kubernetes and cloud services.

    Click to Expand

    Speaker:

    Jonathon Cerda
    Jonathon Cerda

    Jonathon Cerda

    Principal Security Engineer at Sysdig

    Collapse This Item

  • Recalibrating Your Zero Trust 2:45 pm
    Add to Calendar20221006 2:45 pm20221006 3:05 pmAmerica/Los_AngelesRecalibrating Your Zero Trust

    Over the past two years, organizations worldwide have increased the velocity with which they are moving operations into the cloud and adopting and maturing DevOps, edge computing, edge security, IoT technologies, and a multitude of other digital transformation initiatives. The long-time mindset of perimeter-focused security is clearly no longer tenable in this environment. Fortunately, the understanding that IT environments must evolve to embrace and embody zero trust principles is now almost universal.

    Dan Deganutti will provide insight into how you can start your Zero Trust journey, and enable the business for transformation, compliance and risk reduction.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    Presented by BeyondTrust

    Over the past two years, organizations worldwide have increased the velocity with which they are moving operations into the cloud and adopting and maturing DevOps, edge computing, edge security, IoT technologies, and a multitude of other digital transformation initiatives. The long-time mindset of perimeter-focused security is clearly no longer tenable in this environment. Fortunately, the understanding that IT environments must evolve to embrace and embody zero trust principles is now almost universal.

    Dan Deganutti will provide insight into how you can start your Zero Trust journey, and enable the business for transformation, compliance and risk reduction.

    Click to Expand

    Speaker:

    Dan Deganutti
    Dan Deganutti

    Dan Deganutti

    SVP, Canada at Beyond Trust

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:05 pm
    Add to Calendar20221006 3:05 pm20221006 3:35 pmAmerica/Los_AngelesCyber Inter-Agency Collaboration Panel

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Panel Participants:

    Skigh Murray
    Skigh Murray

    Skigh Murray

    Cybercrime Sergeant at VPD

    Chris Evanhoe
    Chris Evanhoe

    Chris Evanhoe

    Special Agent at Department of Homeland Security

    Collapse This Item

  • Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 3:55 pm
    Add to Calendar20221006 3:55 pm20221006 4:15 pmAmerica/Los_AngelesOperational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections. 

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    This session will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections. 

    Click to Expand

    Collapse This Item

  • FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money) 4:15 pm
    Add to Calendar20221006 4:15 pm20221006 4:40 pmAmerica/Los_AngelesFBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money)

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime.  In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime.  In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.

    Click to Expand

    Speaker:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • Cyber Executive Panel 4:55 pm
    Add to Calendar20221006 4:55 pm20221006 5:25 pmAmerica/Los_AngelesCyber Executive Panel

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Michael Leung

    Michael Leung

    Founder and Management Consultant at CANADIAN CYBERSECURITY

    Brian Kuhn
    Brian Kuhn

    Brian Kuhn

    vCIO at Softlanding Solutions

    Collapse This Item

  • Conference Closing Session 5:25 pm
    Add to Calendar20221006 5:25 pm20221006 5:30 pmAmerica/Los_AngelesConference Closing Session1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Collapse This Item

  • Vancouver Cybersecurity Conference Happy Hour & Networking Reception 5:30 pm
    Add to Calendar20221006 5:30 pm20221006 6:30 pmAmerica/Los_AngelesVancouver Cybersecurity Conference Happy Hour & Networking Reception1000 Burrard Street
    Vancouver, BC V6Z 2R9

    .

    Collapse This Item

Partners Register