Vancouver

Don’t miss the Vancouver Cybersecurity Conference! Gain critical insights on tackling 2024’s cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your spot now to stay ahead of emerging challenges and strengthen your organization’s defenses.

Admission is $150 (without a promo code) and includes a catered lunch, breakfast, snacks, a cocktail networking reception, access to all presentations, keynotes, panel discussions, and the exhibit hall.

This event is focused on cybersecurity solutions and threats, not job opportunities. It’s for professionals who influence or make purchasing decisions. Sponsors and exhibitors are here as sales engineers and marketing executives, not recruiters.

If you’re interested in career advancement, visit our CyberNexus.World membership portal with access to our jobs board.

October 17, 2024

08:00 AM to 06:00 PM
Venue: The Westin Bayshore 1601 Bayshore Drive, Vancouver, British Columbia, Canada, V6G 2V4
Days
Hrs
Min
Sec
Register Now
Add to Calendar 10/17/2024 08:00 AM 10/17/2024 06:00 PM America/Toronto Vancouver Don't miss the Vancouver Cybersecurity Conference! Gain critical insights on tackling 2024's cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your… Venue: The Westin Bayshore

Featured Speakers

Kenrick Bagnall

President & Co-Founder, CyberNexus

Keynote Presentation
Jake Walker

Sr. Sales Engineer at Sysdig

"Guess Who?"
Chris O’Connor

Pre-sales Solutions Architect at Zerto

Fortifying the Future
Tom Fitzgerald

Senior Solutions Engineer at Cloudflare

How I Stole Millions of Dollars
Mike Frank

MySQL Product Management Director at Oracle

Presentation by Oracle
Will Powell

Senior Director, Incident Response & Restoration Services at Beazley Security

Hacked Again?
Peter Murphy

Resident Agent in Charge, Vancouver Office USSS

Inter-Agency Collaboration Panel
Jastej Aujla

Chief Information Security Officer, Information Security Services at Simon Fraser University

Cyber Exec RoundTable
Dominic Vogel

President at Vogel Leadership & Coaching

Unleashing Your Inner Leader!!!
Esther Christopher

Senior Cybersecurity Specialist at ManageEngine

Hackers' Check List:
Vaclav Vincalek

CTO at MeetAmi Innovations Inc.

Cyber Executive Roundtable
Parsa Riahi

Cofounder & CTO at DYNE

Cyber Executive Roundtable
Penny Longman

Director, Cyber Assurance Services at Kyndryl

Cyber Executive Roundtable
Robin Puga

CTO at Affinity Bridge

Cyber Executive Roundtable
Markus Westerholz

CTO at Greater Vancouver Realt

Cyber Executive Roundtable
Mehdi Mehrtash

CTO/Co-Founder at Cycurid Technologies Ltd

Navigating Emerging Threats and Evolving Technologies
Jorge Ribkin

CEO at Rainforest

Navigating Emerging Threats and Evolving Technologies
Ashok Madanahalli

Chief Product Officer at LOCH Technologies

Navigating Emerging Threats and Evolving Technologies

Event Schedule

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.

08:00 AM to 09:00 PM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
Session Partner
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:05 AM to 09:35 AM
Hackers' Check List: The Top Attack Vectors to Watch Out For
General Session
Session Partner
Esther Christopher

Senior Cybersecurity Specialist at ManageEngine

Add to Calendar 10/17/2024 09:05 AM 10/17/2024 09:35 AM America/Toronto Hackers' Check List: The Top Attack Vectors to Watch Out For In today's complex threat landscape, organizations face a constant barrage of emerging threats. This session will delve into the top cyber attack vectors and how organizations can combine proactive and reactive defenses for a robust, multi-layered cybersecurity strategy to combat them. We'll delve into the importance of a layered approach, proactive measures like threat intelligence, reactive measures like threat hunting and incident response, and how to integrate these approaches effectively. Venue: The Westin Bayshore
View Details hide Details
In today's complex threat landscape, organizations face a constant barrage of emerging threats. This session will delve into the top cyber attack vectors and how organizations can combine proactive and reactive defenses for a robust, multi-layered cybersecurity strategy to combat them. We'll delve into the importance of a layered approach, proactive measures like threat intelligence, reactive measures like threat hunting and incident response, and how to integrate these approaches effectively.
09:35 AM to 10:05 AM
How I Stole Millions of Dollars' Worth of Corporate Secrets from an Airline (and How I’d Do It Again).
General Session
Session Partner
Tom Fitzgerald

Senior Solutions Engineer at Cloudflare

Add to Calendar 10/17/2024 09:35 AM 10/17/2024 10:05 AM America/Toronto How I Stole Millions of Dollars' Worth of Corporate Secrets from an Airline (and How I’d Do It Again). In this engaging session, Tom Fitzgerald will recount the story of how he successfully stole millions of dollars' worth of corporate secrets from a major international airline during a penetration test. Through this captivating narrative, Tom will share the exact methods he used—highlighting social engineering, physical access, and exploitation of weak security practices. He'll then discuss how he would approach it today, with updated techniques that exploit the same vulnerabilities many companies still overlook. Attendees will leave with a new understanding of just how vulnerable organizations can be to social engineering and physical attacks. Tom encourages everyone at the conference to ask themselves, and the vendors they meet, one critical question: How are you going to protect against people like me? Venue: The Westin Bayshore
View Details hide Details
In this engaging session, Tom Fitzgerald will recount the story of how he successfully stole millions of dollars' worth of corporate secrets from a major international airline during a penetration test. Through this captivating narrative, Tom will share the exact methods he used—highlighting social engineering, physical access, and exploitation of weak security practices. He'll then discuss how he would approach it today, with updated techniques that exploit the same vulnerabilities many companies still overlook. Attendees will leave with a new understanding of just how vulnerable organizations can be to social engineering and physical attacks. Tom encourages everyone at the conference to ask themselves, and the vendors they meet, one critical question: How are you going to protect against people like me?
10:05 AM to 10:35 AM
Navigating Emerging Threats and Evolving Technologies
Panel
Session Partner
Mehdi Mehrtash

CTO/Co-Founder at Cycurid Technologies Ltd

Jorge Ribkin

CEO at Rainforest

Ashok Madanahalli

Chief Product Officer at LOCH Technologies

11:00 AM to 11:35 AM
New Approaches for Thwarting Cyber Attacks Using MySQL Telemetry Traces, Metrics, and Logs
Session Partner
Mike Frank

MySQL Product Management Director at Oracle

Add to Calendar 10/17/2024 11:00 AM 10/17/2024 11:35 AM America/Toronto New Approaches for Thwarting Cyber Attacks Using MySQL Telemetry Traces, Metrics, and Logs Protecting today’s complex systems across 100s or thousands requires better overall observability. MySQL built-in Telemetry can • Emit up to 400 different metrics • Link together trace data from a browser through apps and micro servers, to the mysql driver down into the server itself. • Provide the telemetry data need to see who made what call from where and more up the stack • Cross reference data from traces, to metrics, to logs. • And more MySQL did this by leveraging the CNCFs OpenTelemetry libraries by building them directly into the MySQL product. In this talk I’ll dive into the MySQL Telemetry data to show what exactly MySQL can emit that can be used to improve security • Trigger events that indicate attacks • Provide data for attack analysis • Find the attack trail and track down the bad guys • Proactively spot and flag weaknesses and deficiencies I’ll show how simple MySQL Telemetry is to set up and configure. All while avoiding data leakage via that data and avoiding usage of privileges accounts typically needed by polling agent methods, removing yet another surface area that can be attacked. Venue: The Westin Bayshore
View Details hide Details
Protecting today’s complex systems across 100s or thousands requires better overall observability. MySQL built-in Telemetry can • Emit up to 400 different metrics • Link together trace data from a browser through apps and micro servers, to the mysql driver down into the server itself. • Provide the telemetry data need to see who made what call from where and more up the stack • Cross reference data from traces, to metrics, to logs. • And more MySQL did this by leveraging the CNCFs OpenTelemetry libraries by building them directly into the MySQL product. In this talk I’ll dive into the MySQL Telemetry data to show what exactly MySQL can emit that can be used to improve security • Trigger events that indicate attacks • Provide data for attack analysis • Find the attack trail and track down the bad guys • Proactively spot and flag weaknesses and deficiencies I’ll show how simple MySQL Telemetry is to set up and configure. All while avoiding data leakage via that data and avoiding usage of privileges accounts typically needed by polling agent methods, removing yet another surface area that can be attacked.
11:35 AM to 12:10 PM
Law Enforcement Cybersecurity Fireside Chat
Panel
Session Partner
Kenrick Bagnall

President & Co-Founder, CyberNexus

Peter Murphy

Resident Agent in Charge, Vancouver Office USSS

12:15 PM to 12:45 PM
Lunch Break
Break
12:45 PM to 01:15 PM
Winning at the 'Team Sport" of Cybersecurity
Keynote
Session Partner
Kenrick Bagnall

President & Co-Founder, CyberNexus

Add to Calendar 10/17/2024 12:45 PM 10/17/2024 01:15 PM America/Toronto Winning at the 'Team Sport" of Cybersecurity With cybersecurity, success is not solely determined by technological fortifications but by the collaboration, synergy, and unified efforts of an organization. This keynote delves into the strategic imperative of treating cybersecurity as a “team sport.” Hear insights into the CISO’s playbook, exploring the vital role of cross-functional collaboration, organizational culture, and effective communication in achieving cybersecurity triumphs. Learn how fostering a united front can elevate your organization’s resilience and position it as a formidable force against evolving cyber threats. Venue: The Westin Bayshore
View Details hide Details
With cybersecurity, success is not solely determined by technological fortifications but by the collaboration, synergy, and unified efforts of an organization. This keynote delves into the strategic imperative of treating cybersecurity as a “team sport.” Hear insights into the CISO’s playbook, exploring the vital role of cross-functional collaboration, organizational culture, and effective communication in achieving cybersecurity triumphs. Learn how fostering a united front can elevate your organization’s resilience and position it as a formidable force against evolving cyber threats.
01:40 PM to 02:05 PM
Fortifying the Future: The Essential Role of Cyber Vaults in Data Protection
General Sessions
Session Partner
Chris O’Connor

Pre-sales Solutions Architect at Zerto

Add to Calendar 10/17/2024 01:40 PM 10/17/2024 02:05 PM America/Toronto Fortifying the Future: The Essential Role of Cyber Vaults in Data Protection In an era dominated by digital disruption, the evolving threat landscape has forced organizations to reevaluate their cybersecurity posture. The surge in ransomware attacks, with their unpredictable patterns, has underscored the urgent need for a resilient data protection strategy by costing organizations both big and small millions of dollars in downtime and data loss. In this presentation, join Shariq Aqil in discussing the importance of deploying Cyber Vaults as a linchpin in fortifying your data's defenses. This presentation will address the current trends and challenges encountered by many organizations in cyber recovery, uncover the best practices related to the design and architecture of on-premises Cyber Vaults, and how to integrate the essential elements of an Isolated Recovery Environment (IRE) and Immutable Data Vault (IDV) to create a cohesive approach to remaining resilient against cyber threats. Explore the imperative of Cyber Vaults in the modern cybersecurity landscape, shedding light on proactive measures to safeguard data and stand resilient against the rising tide of ransomware. Venue: The Westin Bayshore
View Details hide Details
In an era dominated by digital disruption, the evolving threat landscape has forced organizations to reevaluate their cybersecurity posture. The surge in ransomware attacks, with their unpredictable patterns, has underscored the urgent need for a resilient data protection strategy by costing organizations both big and small millions of dollars in downtime and data loss. In this presentation, join Shariq Aqil in discussing the importance of deploying Cyber Vaults as a linchpin in fortifying your data's defenses. This presentation will address the current trends and challenges encountered by many organizations in cyber recovery, uncover the best practices related to the design and architecture of on-premises Cyber Vaults, and how to integrate the essential elements of an Isolated Recovery Environment (IRE) and Immutable Data Vault (IDV) to create a cohesive approach to remaining resilient against cyber threats. Explore the imperative of Cyber Vaults in the modern cybersecurity landscape, shedding light on proactive measures to safeguard data and stand resilient against the rising tide of ransomware.
02:05 PM to 02:35 PM
"Guess Who?" The Cloud Detection and Response Board Game
General Sessions
Session Partner
Jake Walker

Sr. Sales Engineer at Sysdig

Add to Calendar 10/17/2024 02:05 PM 10/17/2024 02:35 PM America/Toronto "Guess Who?" The Cloud Detection and Response Board Game In today's cloud security landscape, Cloud Detection and Response (CDR) plays a pivotal role in safeguarding enterprise environments against sophisticated cyber threats. Interestingly, the classic game "Guess Who?" offers a surprisingly apt metaphor for understanding the principles and processes underpinning CDR. "Guess Who?" involves players deducing their opponent's chosen character through a series of yes-or-no questions, systematically narrowing down possibilities based on observable characteristics. Similarly, CDR involves identifying and responding to security threats by continuously monitoring cloud environments, analyzing data in real time, and employing investigative techniques to filter out benign activities from potential security incidents. Both rely on a process of elimination, pattern recognition, and strategic questioning to reach a conclusive identification. Venue: The Westin Bayshore
View Details hide Details
In today's cloud security landscape, Cloud Detection and Response (CDR) plays a pivotal role in safeguarding enterprise environments against sophisticated cyber threats. Interestingly, the classic game "Guess Who?" offers a surprisingly apt metaphor for understanding the principles and processes underpinning CDR. "Guess Who?" involves players deducing their opponent's chosen character through a series of yes-or-no questions, systematically narrowing down possibilities based on observable characteristics. Similarly, CDR involves identifying and responding to security threats by continuously monitoring cloud environments, analyzing data in real time, and employing investigative techniques to filter out benign activities from potential security incidents. Both rely on a process of elimination, pattern recognition, and strategic questioning to reach a conclusive identification.
02:55 PM to 03:30 PM
Unleashing Your Inner Leader!!!
Keynote
Dominic Vogel

President at Vogel Leadership & Coaching

Add to Calendar 10/17/2024 02:55 PM 10/17/2024 03:30 PM America/Toronto Unleashing Your Inner Leader!!! Most IT and technical professionals overlook their foundational people skills. The ability to inspire, to lead, to rally a team. These are skills that most technical professionals do not take the time to develop and strengthen. This talk will identify the hidden leadership traits (authenticity, vulnerability, empathy, and kindness. This talk will provide practical and actionable ways for you to start unleashing your hidden inner leader! Venue: The Westin Bayshore
View Details hide Details
Most IT and technical professionals overlook their foundational people skills. The ability to inspire, to lead, to rally a team. These are skills that most technical professionals do not take the time to develop and strengthen. This talk will identify the hidden leadership traits (authenticity, vulnerability, empathy, and kindness. This talk will provide practical and actionable ways for you to start unleashing your hidden inner leader!
03:30 PM to 04:00 PM
Hacked Again? How to Use Cybersecurity Chaos to Make Smarter Moves!
General Session
Session Partner
Will Powell

Senior Director, Incident Response & Restoration Services at Beazley Security

Add to Calendar 10/17/2024 03:30 PM 10/17/2024 04:00 PM America/Toronto Hacked Again? How to Use Cybersecurity Chaos to Make Smarter Moves! Cyber threats are a daily occurrence, it’s easy to feel overwhelmed by the sheer volume of incidents and data flooding your systems. But what if every hack, breach, or phishing attempt held the key to smarter decision-making and stronger security? Venue: The Westin Bayshore
View Details hide Details
Cyber threats are a daily occurrence, it’s easy to feel overwhelmed by the sheer volume of incidents and data flooding your systems. But what if every hack, breach, or phishing attempt held the key to smarter decision-making and stronger security?
04:15 PM to 04:45 PM
Cyber Executive Roundtable
Session Partner
Dominic Vogel

President at Vogel Leadership & Coaching

Vaclav Vincalek

CTO at MeetAmi Innovations Inc.

Parsa Riahi

Cofounder & CTO at DYNE

Penny Longman

Director, Cyber Assurance Services at Kyndryl

Robin Puga

CTO at Affinity Bridge

Jastej Aujla

Chief Information Security Officer, Information Security Services at Simon Fraser University

Markus Westerholz

CTO at Greater Vancouver Realt

04:45 PM to 06:00 PM
Reception & Closing
Solutions Showcase
Session Partner
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
PARTNER LIST View Details hide Details

Gold Parnters

Silver Parnters

Bronze Parnters

Exhibiting Partners

Affiliate Partners

You Can’T Afford To Miss This Conference:

Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.