Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
State of the Art Security Event Analysis
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as AI, ML, Expert Systems, and probabilistic math. We’ll also discuss the pros and cons of each of these approaches.
Raj is currently part of the Respond team focused on helping organizations with automation of Security Operations. Prior to Respond, Raj held Field, Product management and Development roles at Fortify Software, WorkSoft, Rational Software, and Pure Software focusing on SDLC and security.
Session Two9:30 am - 10:00 am
Protection From Today’s Biggest Threats
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Rippy has been in IT field for over 19 years and has been in security for the Past 8 years with Sophos. He has has spent the majority of that time supporting the western Canada Region.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Smart Buildings – Are they the next cybersecurity risk?
Is it possible a cybercriminal could hold an entire building hostage and force the evacuation of all the occupants? Smart-building technology brings many benefits to overall building operations and is itself being transformed as lower cost devices reduce the expense of automating and connecting the very fabric of the building. The expense is often offset through energy and efficiency costs. But, is it increasing risk and is it secure by design? The possibility a cybercriminal may launch a ransomware attack on a building are fast becoming reality. In this presentation, Tony will discuss what smart building technology means, how it can benefit an organization, explore the current landscape and the possible threats and outcomes of a cyberattack on building infrastructure. And most importantly discuss some of the considerations needed to avoid the risk and how best to mitigate potential attacks.
Tony Anscombe is the Global Security Evangelist for ESET, an industry-leading IT security software and services company for businesses and consumers worldwide. With over 20 years of security industry experience, Anscombe is an established Author, Blogger and Speaker on the current threat landscape, security technologies and products, data protection, privacy and trust, and Internet safety. His speaking portfolio includes industry conferences RSA, CTIA, MEF, GlobSEC and Child Internet Safety (CIS). He has been quoted in security, technology and business media, including BBC, the Guardian, the Times and USA Today, with broadcast appearances on Bloomberg, BBC, CTV, KRON and CBS. Anscombe has served on the board of MEF and FOSI and holds an executive position with the Anti-Malware Testing Standards Organization (AMTSO).
Session Four11:00 am - 11:30 am
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford.
From network and device management to security and service desk software, we’re bringing IT together for an integrated, overarching approach to optimize your IT.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
France Thibodeau will give an overview of the National Cybercrime coordination unit(NC3) and explore ways that we can work together more efficiently. The IT industry and the NC3 have to work together to ensure that we protect all citizens. It is unacceptable that in 2019 the most reported “cybercrime” are randsomware directed at small to medium business and scams directly affecting the most vulnerable members of our society.
France Thibodeau is a retired civilian member of the Royal Canadian Mounted Police. She was the Manager of the Technological Crime Learning Institute at the Canadian Police College for more than twenty years. In April, she joined the newly created National Cybercrime Coordination Unit in the partnership/outreach team.
Ms. Thibodeau led a team of twelve high-tech crime specialists consisting of RCMP Police officers and civilian members. Her team has trained thousands of police officers from across the Canada and countries from around the world.
Ms. Thibodeau has a Bachelor of Science degree in Computer Science from the University of New Brunswick. Over the past decade, she has devoted significant time and effort to continuous learning in order to stay current in the fields of computer forensics, on-line investigative techniques, and in the latest adult learning techniques.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Bridging Islands of Security
Bridging Islands of Security
To handle their network security needs, most organizations rely on many different products and services from multiple vendors. Often these solutions lack integration and are not able to quickly and easily share critical security information. The resulting silos can create costly delays, hinder agility and visibility, and result in a diminished security posture. Learn how to bridge the islands of security that expose your network to ongoing risk to:
- Enhance visibility across your extended network regardless of infrastructure complexity
- Automatically share indicators of compromise across multivendor security systems
- Get the most out of your cyber threat intelligence and network data to prioritize responses using rich context
- Detect, contain, and remediate threats faster through response integration
Philip Qian is currently a senior product manager in security at Infoblox, Inc., where he manages analytics-based threat detection products. He has more than 15 years’ experience in the network security industry, having worked at McAfee and HP ArcSight before. He earned a Master of Science degree in Computer Science from University of North Carolina at Chapel Hill.
Session Seven1:45 pm - 2:15 pm
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Doug Smith is the Country Manager for Malwarebytes based in Toronto. Doug is a respected industry veteran with more than 25 years’ sales experience in Software Sales (Cloud Computing IaaS, Security Software ), SCM (Secure Content Management), Broadband Carrier solutions, Enterprise Networks, Systems Management Tools, International WAN Services and earlier as a pioneer in Records Management.
National Sales positions include: Zscaler, BigFix (acquired by IBM), Trend Micro, FaceTime (now Actiance) and Enomaly/Virtustream (acquired by EMC).
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Deception Technology, Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why financial institutions both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
Mark has over 20 years of success leading high-growth teams in IT, telecom, networking and security markets such as A10 Networks, Damballa, DataEndure and Symantec. Prior to these leadership roles, he served in the United States Air Force for 22 years and retired as a highly decorated Senior Master Sergeant. He holds a BS degree in Electrical Engineering from the University of Maryland with numerous technical certifications. Mark is an avid outdoorsman who enjoys Fly Fishing, Mountain Biking, Climbing and Mountaineering.
Session Nine3:00 pm - 3:20 pm
How to leverage technology + expertise to respond within the “breakout time” window
“Breakout time” is the average time it takes an intruder to compromise a system and move laterally through a network. This concept is emerging as a critical window to stop a breach, and on average it takes one hour and 58 minutes. Best practices dictate that preventing/detecting is less than 1 minute, analyzing is less than 10 minutes, and responding in less than 60 minutes to stop these adversaries. Is your organization up to the challenge?
Join CrowdStrike for an important, in-depth discussion of the common hurdles Canadian organizations face in developing and executing an effective incident response framework . We will discuss “outcome-driven metrics” that can spell the difference between an organization stopping a breach or experiencing catastrophic data loss.
· Why speed of detection, investigation and remediation are key factors for successful day-to-day security management
· The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats
· How to fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
Imagine if you could enable your staff to multiply their capacity to manage and respond to alerts and to take full advantage of their technology investments!
Mr. Malczewski is a 30+ year veteran of the technology industry in Western Canada. Prior to CrowdStrike, Justin held senior cybersecurity sales roles with Cisco Systems, Fortinet and Forcepoint (formerly Websense).
Justin is an active member of the Western Canada IT security community and is keenly interested in working within and outside of the security and privacy communities to foster a collaborative environment among like-minded professionals. To that end, he currently holds the position of Director Academic Outreach and is a member of the Past President’s Advisory Council for ISACA Vancouver.
CISO PANEL3:30 pm - 4:30 pm
8:30 am - 4:30 pm900 Canada Place WayVancouver, British Columbia V6C 3L5604-691-1991