Toronto

Don’t miss the Toronto Cybersecurity Conference! Gain critical insights on tackling 2024’s cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your spot now to stay ahead of emerging challenges and strengthen your organization’s defenses.

Admission is $150 (without a promo code) and includes a catered lunch, breakfast, snacks, a cocktail networking reception, access to all presentations, keynotes, panel discussions, and the exhibit hall.

This event is focused on cybersecurity solutions and threats, not job opportunities. It’s for professionals who influence or make purchasing decisions. Sponsors and exhibitors are here as sales engineers and marketing executives, not recruiters.

If you’re interested in career advancement, visit our CyberNexus.World membership portal with access to our jobs board.

October 3, 2024

08:00 AM to 05:00 PM
Venue: InterContinental Toronto Centre 225 Front Street West, Toronto, ON M5V 2X3
Days
Hrs
Min
Sec
Register Now
Add to Calendar 10/03/2024 08:00 AM 10/03/2024 05:00 PM America/Toronto Toronto Don't miss the Toronto Cybersecurity Conference! Gain critical insights on tackling 2024's cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your… Venue: InterContinental Toronto Centre

Featured Speakers

Kenrick Bagnall

President & Co-Founder, CyberNexus

Keynote Presentation
Ed Adams

Head of Cybersecurity, North America, Bureau Veritas

Keynote Presentation
Jean Le Bouthillier

CEO and Founder of Qohash

Presentation by Qohash
Kosta Mushkin

Kosta Mushkin, Solution Architect at Zerto

Fortifying the Future
Helen Oakley

Director of Secure Software Supply Chain and Secure Development at SAP

Women in Cybersecurity
Bambina Marcello

Head of Business Development at Check Point Software Technologies

Women in Cybersecurity
Parul Sharma

Solutions Engineer at Cloudflare

Navigating the Cyber Frontier
Nimira Dhalwani

Chief Technology Officer at The Hospital for Sick Children

Women in Cybersecurity
Soulmaz Oktaei

Consultant at InnovIT------

Women in Cybersecurity
Davin Cooke

North American Lead CISSP at Cryptomathic

Navigating Emerging Threats
J.D. Bradley

Senior Special Agent at USSS

Inter-Agency Collaboration Panel
Karim Hussain

Detective at Peel Regional Police - Intelligence Services

Inter-Agency Collaboration Panel
Nim Nadarajah

Managing Partner at CriticalMatrix | MatrixVentures

Cyber Exec RoundTable
Allison Atkins

National Leader – Cloud Endpoint, Security & Trust Leader at Microsoft

Cyber Exec RoundTable
Greg Thompson

Chief Information Security Officer

Cyber Exec RoundTable
Sgt. Jennifer Oliveros

Sgt at the Royal Canadian Mounted Police

Inter-Agency Collaboration Panel
Tiana Corovic

Associate at Norton Rose Fulbright Canada LLP

Women in Cybersecurity

Event Schedule

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.

08:00 AM to 09:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
Session Partner
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:00 AM to 09:30 AM
Navigating the Cyber Frontier: 2024’s Emerging Internet Threats
General Session
Session Partner
09:30 AM to 10:05 AM
Navigating the Cyber Frontier: 2024’s Emerging Internet Threats
General Sessions
Session Partner
Parul Sharma

Solutions Engineer at Cloudflare

Add to Calendar 10/03/2024 09:30 AM 10/03/2024 10:05 AM America/Toronto Navigating the Cyber Frontier: 2024’s Emerging Internet Threats In 2024, cybersecurity trends reflect a rapidly evolving threat landscape driven by technological advancements and new challenges. Artificial Intelligence (AI) is at the forefront, enhancing threat detection and response through sophisticated algorithms that analyze vast amounts of data to identify anomalies and potential breaches in real time. Zero Trust Architecture (ZTA) has become a cornerstone of modern security strategies, enforcing the principle of "never trust, always verify" to protect against both internal and external threats by continuously validating user and device identities. Phishing remains a prevalent threat, with attackers employing increasingly sophisticated tactics;organizations are countering this with advanced email filtering and employee training programs to recognize and respond to phishing attempts. Meanwhile, as cloud adoption surges, securing cloud environments is critical, with a focus on robust access controls, encryption, and vigilant monitoring to safeguard against vulnerabilities and data breaches. Together, these trends represent a comprehensive approach to addressing the multifaceted nature of contemporary cyber threats. Venue: InterContinental Toronto Centre
View Details hide Details
In 2024, cybersecurity trends reflect a rapidly evolving threat landscape driven by technological advancements and new challenges. Artificial Intelligence (AI) is at the forefront, enhancing threat detection and response through sophisticated algorithms that analyze vast amounts of data to identify anomalies and potential breaches in real time. Zero Trust Architecture (ZTA) has become a cornerstone of modern security strategies, enforcing the principle of "never trust, always verify" to protect against both internal and external threats by continuously validating user and device identities. Phishing remains a prevalent threat, with attackers employing increasingly sophisticated tactics;organizations are countering this with advanced email filtering and employee training programs to recognize and respond to phishing attempts. Meanwhile, as cloud adoption surges, securing cloud environments is critical, with a focus on robust access controls, encryption, and vigilant monitoring to safeguard against vulnerabilities and data breaches. Together, these trends represent a comprehensive approach to addressing the multifaceted nature of contemporary cyber threats.
10:30 AM to 10:55 AM
Fortifying the Future: The Essential Role of Cyber Vaults in Data Protection
General Sessions
Session Partner
Kosta Mushkin

Kosta Mushkin, Solution Architect at Zerto

Add to Calendar 10/03/2024 10:30 AM 10/03/2024 10:55 AM America/Toronto Fortifying the Future: The Essential Role of Cyber Vaults in Data Protection In an era dominated by digital disruption, the evolving threat landscape has forced organizations to reevaluate their cybersecurity posture. The surge in ransomware attacks, with their unpredictable patterns, has underscored the urgent need for a resilient data protection strategy by costing organizations both big and small millions of dollars in downtime and data loss. In this presentation, join Shariq Aqil in discussing the importance of deploying Cyber Vaults as a linchpin in fortifying your data's defenses. This presentation will address the current trends and challenges encountered by many organizations in cyber recovery, uncover the best practices related to the design and architecture of on-premises Cyber Vaults, and how to integrate the essential elements of an Isolated Recovery Environment (IRE) and Immutable Data Vault (IDV) to create a cohesive approach to remaining resilient against cyber threats. Explore the imperative of Cyber Vaults in the modern cybersecurity landscape, shedding light on proactive measures to safeguard data and stand resilient against the rising tide of ransomware. Venue: InterContinental Toronto Centre
View Details hide Details
In an era dominated by digital disruption, the evolving threat landscape has forced organizations to reevaluate their cybersecurity posture. The surge in ransomware attacks, with their unpredictable patterns, has underscored the urgent need for a resilient data protection strategy by costing organizations both big and small millions of dollars in downtime and data loss. In this presentation, join Shariq Aqil in discussing the importance of deploying Cyber Vaults as a linchpin in fortifying your data's defenses. This presentation will address the current trends and challenges encountered by many organizations in cyber recovery, uncover the best practices related to the design and architecture of on-premises Cyber Vaults, and how to integrate the essential elements of an Isolated Recovery Environment (IRE) and Immutable Data Vault (IDV) to create a cohesive approach to remaining resilient against cyber threats. Explore the imperative of Cyber Vaults in the modern cybersecurity landscape, shedding light on proactive measures to safeguard data and stand resilient against the rising tide of ransomware.
10:55 AM to 11:35 AM
Transform Your GRC Strategy with Artificial Intelligence
General Session
Session Partner
11:40 AM to 12:10 PM
Lunch Break
Session Partner
12:10 PM to 12:50 PM
The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power
Keynote
Session Partner
Ed Adams

Head of Cybersecurity, North America, Bureau Veritas

Add to Calendar 10/03/2024 12:10 PM 10/03/2024 12:50 PM America/Toronto The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power "Insider Threat in Cybersecurity", this presentation will examine the serious yet sometimes disregarded threats that come from individuals working for a company. Insider threats, regardless of their nature—malicious, careless, or compromised—may result in financial losses, reputational harm, and data breaches. The session will begin by defining what constitutes an insider threat and reviewing various types, followed by real-world examples (some from my own professional experience) to highlight the devastating effects these threats can have. Attendees will learn to recognize early warning signs, understand the common motivations behind such actions, and see how insider threats evolve in today’s digital environment. Venue: InterContinental Toronto Centre
View Details hide Details
"Insider Threat in Cybersecurity", this presentation will examine the serious yet sometimes disregarded threats that come from individuals working for a company. Insider threats, regardless of their nature—malicious, careless, or compromised—may result in financial losses, reputational harm, and data breaches. The session will begin by defining what constitutes an insider threat and reviewing various types, followed by real-world examples (some from my own professional experience) to highlight the devastating effects these threats can have. Attendees will learn to recognize early warning signs, understand the common motivations behind such actions, and see how insider threats evolve in today’s digital environment.
01:20 PM to 01:50 PM
Insider Threat in Cybersecurity
Keynote
Session Partner
Kenrick Bagnall

President & Co-Founder, CyberNexus

Add to Calendar 10/03/2024 01:20 PM 10/03/2024 01:50 PM America/Toronto Insider Threat in Cybersecurity "Insider Threat in Cybersecurity", this presentation will examine the serious yet sometimes disregarded threats that come from individuals working for a company. Insider threats, regardless of their nature—malicious, careless, or compromised—may result in financial losses, reputational harm, and data breaches. The session will begin by defining what constitutes an insider threat and reviewing various types, followed by real-world examples (some from my own professional experience) to highlight the devastating effects these threats can have. Attendees will learn to recognize early warning signs, understand the common motivations behind such actions, and see how insider threats evolve in today’s digital environment. Venue: InterContinental Toronto Centre
View Details hide Details
"Insider Threat in Cybersecurity", this presentation will examine the serious yet sometimes disregarded threats that come from individuals working for a company. Insider threats, regardless of their nature—malicious, careless, or compromised—may result in financial losses, reputational harm, and data breaches. The session will begin by defining what constitutes an insider threat and reviewing various types, followed by real-world examples (some from my own professional experience) to highlight the devastating effects these threats can have. Attendees will learn to recognize early warning signs, understand the common motivations behind such actions, and see how insider threats evolve in today’s digital environment.
01:50 PM to 02:15 PM
Securing Unstructured Data in the Generative AI Era: Strategies for Risk Reduction
General Sessions
Session Partner
Jean Le Bouthillier

CEO and Founder of Qohash

Add to Calendar 10/03/2024 01:50 PM 10/03/2024 02:15 PM America/Toronto Securing Unstructured Data in the Generative AI Era: Strategies for Risk Reduction Unstructured data is one of the toughest areas to secure because files move around different data sources, and oversharing is common. In the past, even if an employee had access to sensitive files, they weren’t likely spending their whole day figuring out which files they could access. But with generative AI, machines can do just that—scanning and accessing every file without missing anything. This creates a new kind of risk that we need to understand before we can safely use generative AI with access to these files. Join us to discuss the risks and solutions for managing unstructured data in the age of generative AI. Venue: InterContinental Toronto Centre
View Details hide Details
Unstructured data is one of the toughest areas to secure because files move around different data sources, and oversharing is common. In the past, even if an employee had access to sensitive files, they weren’t likely spending their whole day figuring out which files they could access. But with generative AI, machines can do just that—scanning and accessing every file without missing anything. This creates a new kind of risk that we need to understand before we can safely use generative AI with access to these files. Join us to discuss the risks and solutions for managing unstructured data in the age of generative AI.
02:30 PM to 03:00 PM
Women in Cybersecurity
Panel
Session Partner
Helen Oakley

Director of Secure Software Supply Chain and Secure Development at SAP

Soulmaz Oktaei

Consultant at InnovIT------

Nimira Dhalwani

Chief Technology Officer at The Hospital for Sick Children

Tiana Corovic

Associate at Norton Rose Fulbright Canada LLP

03:00 PM to 03:30 PM
Presentation by Axiad
General Session
Session Partner
03:30 PM to 04:00 PM
Inter-Agency Collaboration Panel
Panel
Session Partner
Kenrick Bagnall

President & Co-Founder, CyberNexus

Karim Hussain

Detective at Peel Regional Police - Intelligence Services

J.D. Bradley

Senior Special Agent at USSS

Sgt. Jennifer Oliveros

Sgt at the Royal Canadian Mounted Police

04:10 PM to 04:40 PM
Cyber Exec Roundtable
Panel
Session Partner
Nim Nadarajah

Managing Partner at CriticalMatrix | MatrixVentures

Allison Atkins

National Leader – Cloud Endpoint, Security & Trust Leader at Microsoft

Greg Thompson

Chief Information Security Officer

04:40 PM to 06:00 PM
Networking & Closing
Solutions Showcase
Session Partner
Meet, Engage & Connect with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
PARTNER LIST View Details hide Details

Gold Parnters

Silver Parnters

Bronze Parnters

Exhibiting Sponsors

Affiliate Partners

You Can’t Afford To Miss This Conference:

Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.