Day 1: October 19, 2022 (In-person)
Welcome and Opening Remarks
Fighting Back - Taking a Proactive Approach to Security
Nick Aleks, Senior Director of Security, Wealthsimple, Author of Black Hat GraphQL & DEFCON Toronto Co-Founder
These are short presentations that provide a valuable and practical glimpse into some of the most innovative and powerful security tools, processes, techniques and research. They are the TED talk of Cyber Security done in 5 minutes.
Threatscape - Understanding Current and Emerging Threats
As a security professional and business executive, does it feel like you’re always playing catch-up? Do you find yourself committing resources to fight yesterday’s battles? Well you are not alone but you are vulnerable!
John del Grande, VP Business Solutions, Ecclisiastical Insurance
Jim Love, Cio ITWC
Jim Love CIO, ITWC
Alkin Gorgun, Field CISO, Cloudflare
Panel: Ransomware Attacks - You don’t have to be a victim - Sponsored by Ricoh
Our panel will walk you through the key elements of prevent and damage mitigation including discussion of the role, value and limitations of cyber insurance.
Moderator: Epsit Jajal, Virtual CIO – Ricoh IT Services
Greg Markell,President & CEO, RIDGE CANADA
Maryam Asgariazad, Director, Information Security, Alterna Savings
Securing The Investment You Need to Protect Your Data: Creating a Sense of Urgency: Talking to Business Executives and Making the Case
In this session you will hear not just how to make the case for greater investment this quarter, but ensure your executive buy-in to ongoing vigilance and the resources you need to keep the organization secure.
Jim Love, CIO, ITWC
Horace Wright, Senior Manager, Unit Risk & IT Transformation – I&O & Security Assets, National Bank of Canada
Azim Boblai, CISO, Toronto Community Housing
Quiz - Sponsored by Okta
Test your knowledge with some fun trivia
Keeping Up To Date - The Essential Guide to Privacy and Security
This session will provide an update on privacy regulation, an exploration of how privacy and security can best work with one another and leave you with a checklist of things you have to know and do to ensure that you reduce the risks to your organization. Discussion will include developments in the US and Canada
Wendy Hulton, Partner, Dickinson Wright
Presentation: Conducting an Effective Investigation Post Breach
One of the key things you will need to do post a breach of your security is to carry out an effective investigation to identify the cause. This is essential for three reasons:
1. Prevent further immediate loss
2. Improve your defenses to prevent future loss
3. If possible retrieve the information
In this session you will hear about the essential of investigation as well as some of the pitfalls to avoid.
Keith Elliott, President and CEO, Reed Research
Cybersecurity management Process awareness from the Government Prospective
Rahim Charania, Director, Cyber Security – Strategy and Design, Office of the Chief Information Officer of Canada
The CISO Unplugged. Leading CISOs Share Their Hopes and Fears for a Secure Future
The day will conclude with a wide-ranging discussion among three leading CISO’s. They will discuss the route they took to the role, the skills they see as critical now and in the future, how they work with other C-Suite executives, and share what keeps them up at night and what makes them leap out of bed in the morning as they think about the world of threat and opportunity they face every day.
Moderator: Imran Ahmad, Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity at Norton Rose Fulbright
Kevin Dreyer, CISO, Maple Reinders
Samer Adi, CISO, Greenshield Canada
Natalia Bakhtina, Director of Cybersecurity and IT Risk Management, BFL Canada