Registration

Thu. Sep 15

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to my contact data being shared with IBM, who may contact me as follow-up from my registration. Use of that contact data is governed by Data Connectors' Terms and Conditions as well as the IBM Privacy Policy

I agree to Data Connectors Terms and Conditions *

Price: $75.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:00 PM Thursday, September 15th.

  • Welcome / Introductions
  • IAM + WFH - Authentication vs Authorization 8:30 am
    Add to Calendar20220915 8:30 am20220915 8:50 amAmerica/New_YorkIAM + WFH - Authentication vs Authorization

    The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.

    Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust. 

    1 Harbour Square
    Toronto, ON M5J 1A6

    .

    The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.

    Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust. 

    Click to Expand

    Collapse This Item

  • Securing the Modern API Ecosystem 8:50 am
    Add to Calendar20220915 8:50 am20220915 9:10 amAmerica/New_YorkSecuring the Modern API Ecosystem

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Collapse This Item

  • The Future of Vulnerability Management 9:30 am
    Add to Calendar20220915 9:30 am20220915 9:50 amAmerica/New_YorkThe Future of Vulnerability Management

    With the continued compression of the security market, vulnerability management is starting to look different in 2022. This talk will discuss the future of vulnerability management and how you can transform your vulnerability management program into a holistic risk-based vulnerability management program.

     

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Kenna Security

    With the continued compression of the security market, vulnerability management is starting to look different in 2022. This talk will discuss the future of vulnerability management and how you can transform your vulnerability management program into a holistic risk-based vulnerability management program.

     

    Click to Expand

    Speaker:

    Jerry Gamblin
    Jerry Gamblin

    Jerry Gamblin

    Director Of Security Research at CISCO

    Collapse This Item

  • A New, Modern Way to Protect Data 9:50 am
    Add to Calendar20220915 9:50 am20220915 10:10 amAmerica/New_YorkA New, Modern Way to Protect Data

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Speaker:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am
    Add to Calendar20220915 10:10 am20220915 10:35 amAmerica/New_YorkProtecting Against Cyber Attacks

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    1 Harbour Square
    Toronto, ON M5J 1A6

    .

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Kevin Cole
    Kevin Cole

    Kevin Cole

    Director, Technical Training at Zerto

    Jade Perron
    Jade Perron

    Jade Perron

    Cyber Security Strategist at Mimecast

    Collapse This Item

  • The Safety Net: Ransomware and Disaster Recovery for Hybrid IT Environments 10:55 am
    Add to Calendar20220915 10:55 am20220915 11:15 amAmerica/New_YorkThe Safety Net: Ransomware and Disaster Recovery for Hybrid IT Environments

    Ransomware and other cyber threats are changing business’s needs for data protection across their on-premise, private cloud, and public cloud environments.

    If your organization is attacked, are you ready?

    Join our session on September 15 at the Toronto Cybersecurity Conference to get key insights from Storagepipe Vice President Kevin May on the benefits of a multi-layered data protection strategy for your Hybrid IT environments.

    Discover:
    • The rapidly evolving ransomware landscape along with common attack vectors and new malicious tactics
    • How to reduce vulnerabilities and data loss caused by user error, insider threats, and external attacks
    • Key considerations around Disaster Recovery such as staged recovery, cloud portability and workload mobility
    • How Veeam Cloud Backups outsmart ransomware with Insider Protection and Local Immutability
    • How Veeam Cloud Connect Replication delivers complete and rapid virtual machine Disaster Recovery
    • Data protection options for Azure and AWS and how they work to protect your multi-cloud future

    Storagepipe and Veeam Software® look forward to sharing the latest complete hybrid IT data protection insights and trends with you.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Storagepipe

    Ransomware and other cyber threats are changing business’s needs for data protection across their on-premise, private cloud, and public cloud environments.

    If your organization is attacked, are you ready?

    Join our session on September 15 at the Toronto Cybersecurity Conference to get key insights from Storagepipe Vice President Kevin May on the benefits of a multi-layered data protection strategy for your Hybrid IT environments.

    Discover:
    • The rapidly evolving ransomware landscape along with common attack vectors and new malicious tactics
    • How to reduce vulnerabilities and data loss caused by user error, insider threats, and external attacks
    • Key considerations around Disaster Recovery such as staged recovery, cloud portability and workload mobility
    • How Veeam Cloud Backups outsmart ransomware with Insider Protection and Local Immutability
    • How Veeam Cloud Connect Replication delivers complete and rapid virtual machine Disaster Recovery
    • Data protection options for Azure and AWS and how they work to protect your multi-cloud future

    Storagepipe and Veeam Software® look forward to sharing the latest complete hybrid IT data protection insights and trends with you.

    Click to Expand

    Speaker:

    Kevin May
    Kevin May

    Kevin May

    Vice President at Storagepipe

    Collapse This Item

  • Identity: The Core of Zero Trust 11:15 am
    Add to Calendar20220915 11:15 am20220915 11:35 amAmerica/New_YorkIdentity: The Core of Zero Trust

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Okta

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    Click to Expand

    Speaker:

    Alexandria Hodgson
    Alexandria Hodgson

    Alexandria Hodgson

    Senior Solutions Product Manager at Okta

    Collapse This Item

  • Lunch Break
  • Finding Factors, Not Fault: Building Cyber Resilience 12:10 pm
    Add to Calendar20220915 12:10 pm20220915 12:50 pmAmerica/New_YorkFinding Factors, Not Fault: Building Cyber Resilience

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of an organization’s security, or worse, bury the true causes of incidents and lead to repeated data breaches or operations disrupting cyber incidents. Join Mark Sangster, author of No Safe Harbor and Adlumin Chief of Strategy, as he explores a famous aviation accident to identify human biases, best practice root cause analysis, and explores how blaming single factor robs us of the opportunity to identify system causes and make the changes necessary to prevent repeat incidents.

    • Explore human biases and how they skew our findings

    • Examining a full range of factors and documenting impact

    • Continuous improvement through impartial examination

    1 Harbour Square
    Toronto, ON M5J 1A6

    .

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of an organization’s security, or worse, bury the true causes of incidents and lead to repeated data breaches or operations disrupting cyber incidents. Join Mark Sangster, author of No Safe Harbor and Adlumin Chief of Strategy, as he explores a famous aviation accident to identify human biases, best practice root cause analysis, and explores how blaming single factor robs us of the opportunity to identify system causes and make the changes necessary to prevent repeat incidents.

    • Explore human biases and how they skew our findings

    • Examining a full range of factors and documenting impact

    • Continuous improvement through impartial examination

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    VP, Chief of Strategy at Adlumin

    Collapse This Item

  • Complementary Signed Books From Our Keynote Speaker
    Add to Calendar20220915 20220915 12:20 amAmerica/New_YorkComplementary Signed Books From Our Keynote Speaker1 Harbour Square
    Toronto, ON M5J 1A6

    .

    About the book:

    No Safe Harbor
    No Safe Harbor

    No Safe Harbor

    By Mark Sangster

    Collapse This Item

  • The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business 1:10 pm
    Add to Calendar 1:10 pm 1:30 pmAmerica/New_YorkThe Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business

    At a time when work was still a place to go to, apart from a thing to get done, organizations could afford to protect their most sensitive data using firewalls, IDS and IPS systems, and VPNs. But today, when there are no corporate network boundaries, and data can be stored and accessed from anywhere, traditional security systems will no longer work.

    There has to be a paradigm shift in the way we think about security. Enter zero trust.

    In this 20-minute talk, you will hear about:
    – The need for zero trust
    – The zero trust architecture
    – The sophisticated attack kill chains of today and tomorrow
    – Zero trust implementation pitfalls and strategy

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by ManageEngine

    At a time when work was still a place to go to, apart from a thing to get done, organizations could afford to protect their most sensitive data using firewalls, IDS and IPS systems, and VPNs. But today, when there are no corporate network boundaries, and data can be stored and accessed from anywhere, traditional security systems will no longer work.

    There has to be a paradigm shift in the way we think about security. Enter zero trust.

    In this 20-minute talk, you will hear about:
    – The need for zero trust
    – The zero trust architecture
    – The sophisticated attack kill chains of today and tomorrow
    – Zero trust implementation pitfalls and strategy

    Click to Expand

    Speaker:

    Ram Vaidyanathan
    Ram Vaidyanathan

    Ram Vaidyanathan

    Cybersecurity Technical Consultant at ManageEngine

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 1:30 pm
    Add to Calendar 1:30 pm 1:50 pmAmerica/New_YorkWindows 11: Adapt Early or Follow Cautiously?

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.  

    Holger Weeres from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.  

    Holger Weeres from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Holger Weeres
    Holger Weeres

    Holger Weeres

    VP Midwest Operations at baramundi

    Collapse This Item

  • 2022 Trends & Directions 1:50 pm
    Add to Calendar 1:50 pm 2:15 pmAmerica/New_York2022 Trends & Directions

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    1 Harbour Square
    Toronto, ON M5J 1A6

    .

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Panel Participants:

    Jerry Gamblin
    Jerry Gamblin

    Jerry Gamblin

    Director Of Security Research at CISCO

    Steven Rodin
    Steven Rodin

    Steven Rodin

    Chief Executive Officer & President at Storagepipe

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 2:35 pm
    Add to Calendar 2:35 pm 2:40 pmAmerica/New_YorkThe Journey to Security Service Edge: The Killer Feature is Simplicity

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, Jaye will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, Jaye will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    Jaye Tillson
    Jaye Tillson

    Jaye Tillson

    Director of Strategy at Axis Security

    Collapse This Item

  • An Adversary-Focused Approach to Cybersecurity Defenses 2:55 pm
    Add to Calendar 2:55 pm 3:15 pmAmerica/New_YorkAn Adversary-Focused Approach to Cybersecurity Defenses

    Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by eSentire

    Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.

    Click to Expand

    Speakers:

    Dustin Quesnel
    Dustin Quesnel

    Dustin Quesnel

    Senior Solutions Architect at eSentire

    Collapse This Item

  • Guest Keynote Presentation 3:15 pm
    Add to Calendar 3:15 pm 3:45 pmAmerica/New_YorkGuest Keynote Presentation1 Harbour Square
    Toronto, ON M5J 1A6

    .

    Collapse This Item

  • Threat Disruption: Securing 2022 from 2021 4:05 pm
    Add to Calendar 4:05 pm 4:25 pmAmerica/New_YorkThreat Disruption: Securing 2022 from 2021

    In this session, Malwarebytes highlights the top threats across operating systems, how cybercrime targeting has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving the audience the tools and knowledge needed to make informed cyber protection decisions.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Malwarebytes

    In this session, Malwarebytes highlights the top threats across operating systems, how cybercrime targeting has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving the audience the tools and knowledge needed to make informed cyber protection decisions.

    Click to Expand

    Speaker:

    Adam Kujawa
    Adam Kujawa

    Adam Kujawa

    Director of Malwarebytes Labs

    Collapse This Item

  • It’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365 4:25 pm
    Add to Calendar 4:25 pm 4:45 pmAmerica/New_YorkIt’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365

    In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services. 

    Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.

    1 Harbour Square
    Toronto, ON M5J 1A6

    Presented by Tenfold

    In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services. 

    Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.

    Click to Expand

    Speaker:

    Helmut Semmelmayer
    Helmut Semmelmayer

    Helmut Semmelmayer

    CEO at tenfold

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 4:45 pm
    Add to Calendar 4:45 pm 5:30 pmAmerica/New_YorkCyber Inter-Agency Collaboration Panel

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    1 Harbour Square
    Toronto, ON M5J 1A6

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Collapse This Item

  • Conference Closing Session 5:20 pm
    Add to Calendar 5:20 pm 5:30 pmAmerica/New_YorkConference Closing Session1 Harbour Square
    Toronto, ON M5J 1A6

    .

    Collapse This Item

  • Happy Hour Networking Reception 5:30 pm
    Add to Calendar 5:30 pm 6:30 pmAmerica/New_YorkHappy Hour Networking Reception1 Harbour Square
    Toronto, ON M5J 1A6

    .

    Collapse This Item

Partners Register