Toronto Cybersecurity Conference

  • Conference

Don't wait for a breach to happen, take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Toronto Cybersecurity Conference on 10/26/23.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

Venue Website | Book Room

thursday, October 26, 2023

08:00 AM to 06:00 PM

Venue:

Hyatt Regency Toronto | 370 King Street West | Toronto, Ontario, Canada, M5V 1J9

  • Days
  • hrs
  • min
  • sec

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 08:30 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:30 AM to 09:00 AM
Internet Threat Radar - The Current Cyber Threat Landscape
General Sessions
Trey Guinn
Field Chief Technology Officer at Cloudflare
Add to Calendar 10/26/2023 08:30 AM 10/26/2023 09:00 AM America/Los_Angeles Internet Threat Radar - The Current Cyber Threat Landscape

Cloudflare operates one of the world’s largest networks which protects ~20% of all Internet applications from attack. Join us to learn about the recent attack trends Cloudflare sees across DDoS, API Attacks, Application Attacks and more. In the session you will not only learn about recent trends, but also patterns and tactics that can be used to protect your business from them.

Location of the event

Cloudflare operates one of the world’s largest networks which protects ~20% of all Internet applications from attack. Join us to learn about the recent attack trends Cloudflare sees across DDoS, API Attacks, Application Attacks and more. In the session you will not only learn about recent trends, but also patterns and tactics that can be used to protect your business from them.

09:00 AM to 09:30 AM
Cyber Resiliency from Prevention to Recovery
General Sessions
Kevin May
Regional Vice President and SME at Thrive
Add to Calendar 10/26/2023 09:00 AM 10/26/2023 09:30 AM Cyber Resiliency from Prevention to Recovery

Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. The likelihood of ransomware attacks has transitioned from ‘if’ to ‘when,’ and many discover too late that they have gaps in their disaster recovery plans. 

Do you have the right people, tools, and testing in place to protect your most valuable asset 24/7 – your data? 

Get key insights from Thrive on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size. 

Discover how to: 

  • Protect across the three main attack surfaces – endpoints, network, and cloud/SaaS 
  • Use immutable backup for resiliency from ransomware, sophisticated attacks, and data loss 
  • Detect and respond to cyber threats using actionable recommendations and observations 
  • Backup and recover Microsoft 365 Exchange, Teams, OneDrive for Business and SharePoint Online 
  • Build resilient and flexible disaster recovery for any budget 

Thrive and Veeam Software® work together to ensure comprehensive and proactive multi platform data protection and disaster recovery for our customers. 

Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. The likelihood of ransomware attacks has transitioned from ‘if’ to ‘when,’ and many discover too late that they have gaps in their disaster recovery plans. 

Do you have the right people, tools, and testing in place to protect your most valuable asset 24/7 – your data? 

Get key insights from Thrive on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size. 

Discover how to: 

  • Protect across the three main attack surfaces – endpoints, network, and cloud/SaaS 
  • Use immutable backup for resiliency from ransomware, sophisticated attacks, and data loss 
  • Detect and respond to cyber threats using actionable recommendations and observations 
  • Backup and recover Microsoft 365 Exchange, Teams, OneDrive for Business and SharePoint Online 
  • Build resilient and flexible disaster recovery for any budget 

Thrive and Veeam Software® work together to ensure comprehensive and proactive multi platform data protection and disaster recovery for our customers. 

09:55 AM to 10:15 AM
Strategies to Ensure Optimum Cyber-Hygiene and Enhancing End User Experience
General Sessions
James Raj Sambasivam
Technical Account Manager at ManageEngine
Add to Calendar 10/26/2023 09:55 AM 10/26/2023 10:15 AM Strategies to Ensure Optimum Cyber-Hygiene and Enhancing End User Experience

With digital transformation being accelerated exponentially, it is crucial for organizations to stay ahead of threats. To achieve this, IT & Security teams must work together and ensure security with positive end user experience.

In this session, we will discuss the endpoint security strategies for your IT stack against vulnerabilities and move from Risk to Resilience.

With digital transformation being accelerated exponentially, it is crucial for organizations to stay ahead of threats. To achieve this, IT & Security teams must work together and ensure security with positive end user experience.

In this session, we will discuss the endpoint security strategies for your IT stack against vulnerabilities and move from Risk to Resilience.

10:15 AM to 10:45 AM
Securing Enterprise 5G Cellular WAN
General Sessions
Alex Ryan
Sr Intelligence Analyst at Cradlepoint
Add to Calendar 10/26/2023 10:15 AM 10/26/2023 10:45 AM Securing Enterprise 5G Cellular WAN

While 5G promises new levels of high bandwidth throughput and low latency for businesses, adding technology to an enterprise network environment requires a risk assessment to evaluate how it will affect the security posture of the organization. Join Alex Ryan, Sr. Threat Intelligence Analyst at Cradlepoint, as she evaluates the latest countermeasures to mitigate risk introduced by the 5G technology eco-system, and maps example threats using the MITRE ATT&CK Framework.

While 5G promises new levels of high bandwidth throughput and low latency for businesses, adding technology to an enterprise network environment requires a risk assessment to evaluate how it will affect the security posture of the organization. Join Alex Ryan, Sr. Threat Intelligence Analyst at Cradlepoint, as she evaluates the latest countermeasures to mitigate risk introduced by the 5G technology eco-system, and maps example threats using the MITRE ATT&CK Framework.

10:45 AM to 11:15 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Moderator: Zubair Alexander
Senior Information Security GRC Analyst, POWER Engineers
Aviva Klein
Vice President of Digital Payments & Cybersecurity Solutions
Rares Sisu
Proactive Security Measures for Organizations at Kaspersky
Nikunj Nagalia
Director of Professional Services at ThreatModeler
Steve Mosley
VP of Sales at BitLyft
Steven Rodin
EVP & General Manager at Thrive Networks
11:35 AM to 11:55 AM
Machine Learning to the Rescue
General Sessions
Artem Pogossian
Principal Solutions Architect at Elastic
Add to Calendar 10/26/2023 11:35 AM 10/26/2023 11:55 AM Machine Learning to the Rescue

With the amount of data produced by all the signals in our modern enterprise infrastructure, humans can no longer meaningfully consume it while attacks on their networks are progressing. Join this session to learn the latest and greatest in AI/ML with Elastic, and enable cybersecurity analysts (not data scientists) all around the world to solve this challenge.

With the amount of data produced by all the signals in our modern enterprise infrastructure, humans can no longer meaningfully consume it while attacks on their networks are progressing. Join this session to learn the latest and greatest in AI/ML with Elastic, and enable cybersecurity analysts (not data scientists) all around the world to solve this challenge.

11:55 AM to 12:15 PM
KNOW WHAT YOU DON'T KNOW: Why Our Approach to Cybersecurity Eventually Fails and Leads to a Breach.
General Sessions
Ridge-IT-Cyber-Logos_Ridge-blue
Chad Koslow
CEO & Co-Founder
Add to Calendar 10/26/2023 11:55 AM 10/26/2023 12:15 PM KNOW WHAT YOU DON'T KNOW: Why Our Approach to Cybersecurity Eventually Fails and Leads to a Breach.

What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

12:20 PM to 12:50 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:30 PM to 12:40 PM
Demo Sessions: Transitioning from Security Questionnaires to Achieving SOC 2 Compliance
Lunch Break Session
Sanjay Chadha
Security and Compliance Thought Leader and SOC 2 Auditor at SAV Associates CPA
Add to Calendar 06/02/2023 12:30 PM 06/02/2023 12:40 PM America/Los_Angeles Demo Sessions: Transitioning from Security Questionnaires to Achieving SOC 2 Compliance

"RFP Pre-Qualification: Minimizing Effort with IT Security Compliance Responses" 

"Escape the Time Drain of Security Questionnaires and Vendor-Initiated Audits" 

"Small Companies Thriving in a Challenging Landscape: SOC 2 as the Competitive Edge" 

"The Gold Standard of Assurance: SOC 2 for Streamlined Security and Governance Verification" 

"Enhancing Security and Contract Success: Harnessing SOC 2 with Professional CPA Guidance" 

"Demystifying SOC 2: Your Answer to the Drudgery of Security Questionnaires" 

"Unleashing the Power of SOC 2: Advantages that Outweigh Inefficiencies" 

"Guiding the SOC 2 Journey: From Time Waste to Contract Wins"

Location of the event

"RFP Pre-Qualification: Minimizing Effort with IT Security Compliance Responses" 

"Escape the Time Drain of Security Questionnaires and Vendor-Initiated Audits" 

"Small Companies Thriving in a Challenging Landscape: SOC 2 as the Competitive Edge" 

"The Gold Standard of Assurance: SOC 2 for Streamlined Security and Governance Verification" 

"Enhancing Security and Contract Success: Harnessing SOC 2 with Professional CPA Guidance" 

"Demystifying SOC 2: Your Answer to the Drudgery of Security Questionnaires" 

"Unleashing the Power of SOC 2: Advantages that Outweigh Inefficiencies" 

"Guiding the SOC 2 Journey: From Time Waste to Contract Wins"

12:40 PM to 12:50 PM
Demo Sessions: Disaster Recovery as a Service with Veeam Replication, sponsored by Thrive and Veeam Software
Lunch Break Session
Samson Antony
Solutions Architect at Thrive
Add to Calendar 06/02/2023 12:40 PM 06/02/2023 12:50 PM America/Los_Angeles Demo Sessions: Disaster Recovery as a Service with Veeam Replication, sponsored by Thrive and Veeam Software

Our live demo puts you in control, showcasing Next Gen cloud-enabled Disaster Recovery solutions in action. Redefine your recovery strategy and empower your organization's cyber resilience transformation with Thrive and Veeam Software.

Location of the event

Our live demo puts you in control, showcasing Next Gen cloud-enabled Disaster Recovery solutions in action. Redefine your recovery strategy and empower your organization's cyber resilience transformation with Thrive and Veeam Software.

12:50 PM to 01:20 PM
Keynote Presentation: Thriving at the crossroads of Physical and Cyber Security – A must win situation
General Sessions
event-simple-logo
Kenrick Bagnall
Executive Board Member & CISO, Cyber Security Global Alliance
Add to Calendar 10/26/2023 12:50 PM 10/26/2023 01:20 PM Keynote Presentation: Thriving at the crossroads of Physical and Cyber Security – A must win situation

When determining overall cyber risk, we must examine all aspects of Threat Accessibility. This forces us to not only reconcile the convergence of physical and cyber security, but it also forces us to embrace it and succeed. Moving beyond mainstream IoT, this presentation looks at the challenges presented by technologically advanced end points used in physical security and discusses opportunities to embrace these advancements to harden the infrastructure and reduce the overall attack surface

When determining overall cyber risk, we must examine all aspects of Threat Accessibility. This forces us to not only reconcile the convergence of physical and cyber security, but it also forces us to embrace it and succeed. Moving beyond mainstream IoT, this presentation looks at the challenges presented by technologically advanced end points used in physical security and discusses opportunities to embrace these advancements to harden the infrastructure and reduce the overall attack surface

01:45 PM to 02:05 PM
The Business Value of Continuous Network Security Assessment
General Sessions
Raj Jain
Senior Solutions Architect at NetBrain Technologies
Add to Calendar 10/26/2023 01:45 PM 10/26/2023 02:05 PM The Business Value of Continuous Network Security Assessment

CISOs are no longer looking for individual products to solve single problems. They are realizing that the proper automation platform can solve a range of challenges as their networks evolve.
Definition : Orchestration is the coordination and management of multiple computer systems, applications and/or services, stringing together multiple tasks in order to execute a larger workflow or process. These processes can consist of multiple tasks that are automated and can involve multiple systems
NetBrain and Itrica will share how you can deploy automation / orchestration that super-charges your resources, saves time (and money), ensures compliance, and scales/adapts with your organization demands.

CISOs are no longer looking for individual products to solve single problems. They are realizing that the proper automation platform can solve a range of challenges as their networks evolve.
Definition : Orchestration is the coordination and management of multiple computer systems, applications and/or services, stringing together multiple tasks in order to execute a larger workflow or process. These processes can consist of multiple tasks that are automated and can involve multiple systems
NetBrain and Itrica will share how you can deploy automation / orchestration that super-charges your resources, saves time (and money), ensures compliance, and scales/adapts with your organization demands.

02:05 PM to 02:35 PM
Keynote Presentation: From Push to Partner: Driving Cyber Value Through Your Supply Chain
General Sessions
event-simple-logo
Sharee English
Information Security Governance Manager, POWER Engineers
Add to Calendar 10/26/2023 02:05 PM 10/26/2023 02:35 PM Keynote Presentation: From Push to Partner: Driving Cyber Value Through Your Supply Chain

 What happens when a large enterprise pushes smaller companies (subsidiaries, vendors, independent consultants) to comply with cyber requirements?  

 

Is there another way to achieve the same or better compliance? What if they were asking to partner with you instead?

 

With the right strategies, SMB’s can implement best practices, understand common threats and better protect their business against cyberattacks. This can benefit both large and small businesses, creating a winning partnership where each can grow. 

Sharee English will share a case study of how her company, a large enterprise, retained 100% of smaller subsidiaries in the face of legal cybersecurity requirements. 

This keynote is a must-attend for large and small business leaders alike.

 What happens when a large enterprise pushes smaller companies (subsidiaries, vendors, independent consultants) to comply with cyber requirements?  

 

Is there another way to achieve the same or better compliance? What if they were asking to partner with you instead?

 

With the right strategies, SMB’s can implement best practices, understand common threats and better protect their business against cyberattacks. This can benefit both large and small businesses, creating a winning partnership where each can grow. 

Sharee English will share a case study of how her company, a large enterprise, retained 100% of smaller subsidiaries in the face of legal cybersecurity requirements. 

This keynote is a must-attend for large and small business leaders alike.

02:55 PM to 03:40 PM
Guest Keynote Presentation: SOS: Save Our Systems! The Hidden Link between Phishing, Ransomware, and Training
General Sessions
Nim Nadarajah
Chief Revenue Officer of Cyber Security Global Alliance
Add to Calendar 10/26/2023 02:55 PM 10/26/2023 03:40 PM Guest Keynote Presentation: SOS: Save Our Systems! The Hidden Link between Phishing, Ransomware, and Training

In a rapidly evolving digital world, join me in uncovering the urgent connection between the art of phishing, the menace of ransomware, and the transformative power of training. In "SOS: Save Our Systems!" we'll navigate the treacherous waters of cyber threats to reveal how the absence of effective training casts society adrift, leaving our systems vulnerable to ransomware's stranglehold. Join me in unveiling the hidden link that empowers us to be the defenders our systems need and learn how to thwart cyber villains with resilience and knowledge.

In a rapidly evolving digital world, join me in uncovering the urgent connection between the art of phishing, the menace of ransomware, and the transformative power of training. In "SOS: Save Our Systems!" we'll navigate the treacherous waters of cyber threats to reveal how the absence of effective training casts society adrift, leaving our systems vulnerable to ransomware's stranglehold. Join me in unveiling the hidden link that empowers us to be the defenders our systems need and learn how to thwart cyber villains with resilience and knowledge.

03:40 PM to 04:10 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Kenrick Bagnell - Moderator
Executive Board Member & CISO, Cyber Security Global Alliance
J.D. Bradley
Senior Special Agent at U.S. Secret Service
Sgt. Wayne Wong
Operations NCO, "O" Division Cybercrime at Royal Canadian Mounted Police
Sgt. Craig Elliott
Sgt. at Royal Canadian Mounted Police
Ryan Braganza
Detective Constable at Toronto Police Service
04:25 PM to 05:15 PM
Cyber Synergy: How Academia-Industry Partnerships Can Close the Cybersecurity Skills Gap
General Sessions
event-simple-logo
Raphael Adeyemo
President, ISC2 Toronto Chapter
Suzanne Abraham
Chair, School of Information Technology Administration & Security at Seneca College
Feroz Hyder
CEO at Ferro Technics
Olusola Ayodele
Cybersecurity Director at Équité Association, Director of Academic Partnerships
05:20 PM to 06:30 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.