Registration

Thu. Sep 15

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: FREE

VIP Code applied!


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:00 PM Thursday, September 15th.

  • Welcome / Introductions
  • What XDR Is and Isn’t 8:30 am

    Presented by Palo Alto Networks

    Since Nir Zuk, Palo Alto Networks CTO, coined XDR in 2018, XDR has captured and shifted the collective imagination of security teams and analysts alike. It has also led to confusion on what XDR is and isn’t.

    Many see extended detection and response, or XDR, as the key to breaking down data silos, reducing security blind spots and improving SOC efficiency. However, not all users know the use cases for XDR and which vendors are offering true XDR.

    Gain a deeper understanding of:
    • The top features and benefits of XDR solutions
    • How organizations are using XDR for security operations today
    • Tips to identify XDR imposters
    • How to choose the right XDR product for your environment

    Click to Expand

    Speaker:

    Dilan Kapadia
    Dilan Kapadia

    Dilan Kapadia

    Systems Engineer Specialist at Palo Alto Networks

    Collapse This Item

  • Securing the Modern API Ecosystem 8:50 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Global Director of Security Evangelism at Noname Security

    Collapse This Item

  • The Future of Vulnerability Management 9:35 am

    Presented by Kenna Security

    With the continued compression of the security market, vulnerability management is starting to look different in 2022. This talk will discuss the future of vulnerability management and how you can transform your vulnerability management program into a holistic risk-based vulnerability management program.

     

    Click to Expand

    Speaker:

    Jerry Gamblin
    Jerry Gamblin

    Jerry Gamblin

    Director Of Security Research at CISCO

    Collapse This Item

  • The Battle of Algorithms: How AI is Beating AI at Its Own Game 9:55 am

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    In this session, discover:
    • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
    • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    • Why defensive AI technologies are uniquely positioned to fight back

    Click to Expand

    Speaker:

    Nabil Zoldjalali
    Nabil Zoldjalali

    Nabil Zoldjalali

    Director of Cloud Security at Darktrace

    Collapse This Item

  • Protecting Against Cyber Attacks 10:15 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Kevin Cole
    Kevin Cole

    Kevin Cole

    Director, Technical Training at Zerto

    Jade Perron
    Jade Perron

    Jade Perron

    Cyber Security Strategist at Mimecast

    Cary Spearman
    Cary Spearman

    Cary Spearman

    Sr. Security Consultant at Critical Start

    Lorne Oickle
    Lorne Oickle

    Lorne Oickle

    Senior SE Manager at Cohesity

    Collapse This Item

  • The Safety Net: Ransomware and Disaster Recovery for Hybrid IT Environments 11:00 am

    Presented by Storagepipe

    Ransomware and other cyber threats are changing business’s needs for data protection across their on-premise, private cloud, and public cloud environments.

    If your organization is attacked, are you ready?

    Join our session on September 15 at the Toronto Cybersecurity Conference to get key insights from Storagepipe Vice President Kevin May on the benefits of a multi-layered data protection strategy for your Hybrid IT environments.

    Discover:
    • The rapidly evolving ransomware landscape along with common attack vectors and new malicious tactics
    • How to reduce vulnerabilities and data loss caused by user error, insider threats, and external attacks
    • Key considerations around Disaster Recovery such as staged recovery, cloud portability and workload mobility
    • How Veeam Cloud Backups outsmart ransomware with Insider Protection and Local Immutability
    • How Veeam Cloud Connect Replication delivers complete and rapid virtual machine Disaster Recovery
    • Data protection options for Azure and AWS and how they work to protect your multi-cloud future

    Storagepipe and Veeam Software® look forward to sharing the latest complete hybrid IT data protection insights and trends with you.

    Click to Expand

    Speaker:

    Kevin May
    Kevin May

    Kevin May

    Vice President at Storagepipe

    Collapse This Item

  • Identity: The Core of Zero Trust 11:20 am

    Presented by Okta

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    Click to Expand

    Speaker:

    Ashwin Ramnarayanan
    Ashwin Ramnarayanan

    Ashwin Ramnarayanan

    Solutions Engineer at Okta

    Collapse This Item

  • Lunch Break
  • The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business 1:10 pm

    Presented by ManageEngine

    At a time when work was still a place to go to, apart from a thing to get done, organizations could afford to protect their most sensitive data using firewalls, IDS and IPS systems, and VPNs. But today, when there are no corporate network boundaries, and data can be stored and accessed from anywhere, traditional security systems will no longer work.

    There has to be a paradigm shift in the way we think about security. Enter zero trust.

    In this 20-minute talk, you will hear about:
    – The need for zero trust
    – The zero trust architecture
    – The sophisticated attack kill chains of today and tomorrow
    – Zero trust implementation pitfalls and strategy

    Click to Expand

    Speaker:

    Ram Vaidyanathan
    Ram Vaidyanathan

    Ram Vaidyanathan

    Cybersecurity Technical Consultant at ManageEngine

    Collapse This Item

  • Windows 10, 11, or 12 – The Windows Journey Continues… 1:30 pm

    Presented by baramundi

    Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version.

    Holger Weeres from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while?  What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?

     

    Click to Expand

    Speaker:

    Holger Weeres
    Holger Weeres

    Holger Weeres

    VP Midwest Operations at baramundi

    Collapse This Item

  • 2022 Trends & Directions 1:50 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Panel Participants:

    Jerry Gamblin
    Jerry Gamblin

    Jerry Gamblin

    Director Of Security Research at CISCO

    Steven Rodin
    Steven Rodin

    Steven Rodin

    Chief Executive Officer & President at Storagepipe

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Global Director of Security Evangelism at Noname Security

    Dilan Kapadia
    Dilan Kapadia

    Dilan Kapadia

    Systems Engineer Specialist at Palo Alto Networks

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 2:35 pm

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, Jaye will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    Jaye Tillson
    Jaye Tillson

    Jaye Tillson

    Director of Strategy at Axis Security

    Collapse This Item

  • Are You Breach Ready? Critical Tips to Minimize Business Disrupting Events 2:55 pm

    Presented by eSentire

    “It will never happen to me,” are the famous last words of executives who failed to put a proper plan in place to prevent cyber threats from disrupting their business. What if they had known the necessary steps that should have been taken? The potential damage to the business caused by being offline?

    This presentation will explore how proper preparation can highly increase the effectiveness of responding to an incident and deliver exceptional time to value. It will also cover how a properly executed response will minimize downtime, minimize risk, and help return your business to normal operations faster.

    Topics covered at-a-glance:
    • Preparing for a breach
    • Containing a cyber-security incident
    • Surviving an incident

     

    Click to Expand

    Speakers:

    Dustin Quesnel
    Dustin Quesnel

    Dustin Quesnel

    Senior Solutions Architect at eSentire

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:15 pm

    Moderator:

    Det. Con. Kenrick Bagnall
    Det. Con. Kenrick Bagnall

    Det. Con. Kenrick Bagnall

    Det. Constable at TPS - Coordinated Cyber Centre (C3)

    Panel Participants:

    Vern Crowley
    Vern Crowley

    Vern Crowley

    Detective Sergeant at OPP Cybercrime Investigation Team

    Tanner Hubbard
    Tanner Hubbard

    Tanner Hubbard

    Special Agent at US Secret Service

    Det. Con. Doug MacRae
    Det. Con. Doug MacRae

    Det. Con. Doug MacRae

    Det. Constable at York Regional Police

    Patrick Wilhelm
    Patrick Wilhelm

    Patrick Wilhelm

    Special Agent, National Program Manager at DHS

    Lina Dabit
    Lina Dabit

    Lina Dabit

    Inspector, Officer in Charge, RCMP

    Collapse This Item

  • Identity & Access Management: A Growing Need for Mid-Sized Organizations 4:05 pm

    Presented by Tenfold

    Mid-market businesses today are faced with increasingly complex IT landscapes, rapidly evolving digital threats and growing pressure through privacy and security regulations. To protect their data and ensure appropriate access across various local and cloud services, medium-sized organizations more than ever depend on automated IAM solutions.

    However, common IAM products designed for an enterprise context have proven too large and complex to be used effectively: Their lengthy setup and massive scope exceed the needs and resources of medium-sized companies. Mid-market access management takes a more efficient approach to help organizations quickly regain control of users and data.

    In this session, you will learn:
    • What makes identity & access management a necessity for the mid-market
    • How IAM boosts security, productivity and compliance
    • What to look out for when choosing an IAM provider

     

    Click to Expand

    Speaker:

    Helmut Semmelmayer
    Helmut Semmelmayer

    Helmut Semmelmayer

    VP Revenue Operations at tenfold

    Collapse This Item

  • We’re All in This Together 4:25 pm

    The importance of business working with cybersecurity hand in hand; exploring how to “embed” cybersecurity functions into business lines; leveraging cyber champions ; leveraging organizational change management principles to change cybersecurity culture!!

    Click to Expand

    Speaker:

    Victoria Granova
    Victoria Granova

    Victoria Granova

    Founder at CyberToronto

    Collapse This Item

  • Cyber Executive Panel 5:00 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Victoria Granova
    Victoria Granova

    Victoria Granova

    Founder at CyberToronto

    Panel Participants:

    Raphael Adeyemo
    Raphael Adeyemo

    Raphael Adeyemo

    President at ISC2 Toronto Chapter

    Susan Welstead
    Susan Welstead

    Susan Welstead

    AVP Cyber and Technology Risk at IGM Financial

    Allison Atkins
    Allison Atkins

    Allison Atkins

    National Leader, Cloud Endpoint Technical Specialists at Microsoft

    Jeff Clark
    Jeff Clark

    Jeff Clark

    Snr Director & BISO

    Collapse This Item

  • Conference Closing Session 5:30 pm
  • Happy Hour Networking Reception 5:35 pm
  • Partners

    Platinum Partners

    Kenna Security

    Gold Partners

    Darktrace
    Noname Security
    Palo Alto Networks
    Storagepipe

    Silver Partners

    Axis
    baramundi - Alternate
    eSentire
    ManageEngine
    Okta - Alternate
    tenfold

    Bronze Partners

    Cohesity
    CRITICALSTART
    Mimecast
    Zerto

    Exhibiting Partners

    Caveonix
    IEEE Toronto Chapter
    ITSIGN
    Mastercard

    Affiliate Partners

    Hackers For Change
    ISACA Toronto Chapter

    Collapse This Item

Partners Register