Welcome and Opening Remarks
Jim Love, CIO ITWC
Jim Love, CIO ITWC
OPENING KEYNOTE:
Nick Aleks, Senior Director of Security, Wealthsimple, Author of Black Hat GraphQL & DEFCON Toronto Co-Founder
These are short presentations that provide a valuable and practical glimpse into some of the most innovative and powerful security tools, processes, techniques and research. They are the TED talk of Cyber Security done in 5 minutes.
As a security professional and business executive, does it feel like you’re always playing catch-up? Do you find yourself committing resources to fight yesterday’s battles? Well you are not alone but you are vulnerable!
Panelists:
John del Grande, VP Business Solutions, Ecclisiastical Insurance
Jim Love, Cio ITWC
Jim Love CIO, ITWC
Alkin Gorgun, Field CISO, Cloudflare
Panel
Our panel will walk you through the key elements of prevent and damage mitigation including discussion of the role, value and limitations of cyber insurance.
Moderator: Epsit Jajal, Virtual CIO – Ricoh IT Services
Panelists:
Greg Markell,President & CEO, RIDGE CANADA
Maryam Asgariazad, Director, Information Security, Alterna Savings
Panel
In this session you will hear not just how to make the case for greater investment this quarter, but ensure your executive buy-in to ongoing vigilance and the resources you need to keep the organization secure.
Moderator:
Jim Love, CIO, ITWC
Horace Wright, Senior Manager, Unit Risk & IT Transformation – I&O & Security Assets, National Bank of Canada
Azim Boblai, CISO, Toronto Community Housing
Test your knowledge with some fun trivia
This session will provide an update on privacy regulation, an exploration of how privacy and security can best work with one another and leave you with a checklist of things you have to know and do to ensure that you reduce the risks to your organization. Discussion will include developments in the US and Canada
Wendy Hulton, Partner, Dickinson Wright
One of the key things you will need to do post a breach of your security is to carry out an effective investigation to identify the cause. This is essential for three reasons:
1. Prevent further immediate loss
2. Improve your defenses to prevent future loss
3. If possible retrieve the information
In this session you will hear about the essential of investigation as well as some of the pitfalls to avoid.
Keith Elliott, President and CEO, Reed Research
Rahim Charania, Director, Cyber Security – Strategy and Design, Office of the Chief Information Officer of Canada
Shiza Charania
Closing Panel:
The day will conclude with a wide-ranging discussion among three leading CISO’s. They will discuss the route they took to the role, the skills they see as critical now and in the future, how they work with other C-Suite executives, and share what keeps them up at night and what makes them leap out of bed in the morning as they think about the world of threat and opportunity they face every day.
Moderator: Imran Ahmad, Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity at Norton Rose Fulbright
Panelists:
Kevin Dreyer, CISO, Maple Reinders
Samer Adi, CISO, Greenshield Canada
Natalia Bakhtina, Director of Cybersecurity and IT Risk Management, BFL Canada
Jim Love, CIO, ITWC
On October 3 the Rogers Cybersecure Catalyst released data from a research study on Cyber Talent Transformation in Canada
In this session Rushmi willI share the research findings and the correlated impact, when it comes to the talent gap. The research is designed to be action driven and provides companies with actionable elements that they can address to increase the quantity and quality of cybersecurity applicants while driving diversity.
Rushmi Hasham, Director of Development and Accelerated Cybersecurity Training Programs, Rogers Cybersecure Catalyst, Toronto Metropolitan University
Why cybersecurity matters and how the human factors make it work – or defeat it. Includes the challenges to cyber awareness and tips on how to realistically implement cyber discipline and building a culture of user engagement.
Natalia Bakhtina, Director of Cybersecurity and IT Risk Management, BFL Canada
Governance is not about committee meetings and dull droning discussions about policies no one will read. It’s an action oriented approach that is essential to protecting your organization. Yet many organizations struggle to make it work.
John del Grande, VP Business Solutions, Ecclisiastical Insurance
An update on the CyberSecure Canada certification program led by Innovation, Science and Economic Development Canada (ISED). This program is transitioning to the national standard produced by the Council for SMEs in cybersecurity. Keith will be able to answer questions about the standard including: “What does it cover? Why should I care? What tools and resources are available to help me get my organization certified to the national standard?”
Keith Jensa,
Test your knowledge with some fun trivia
While large breaches as high profile organizations make the headlines, cybersecurity should be a concern for your organization no matter your size. The sad truth is that there is no such thing as an organization too small to be a target. And with smaller organizations having less resources the impact on their business can be proportionately far greater than for large corporations.
Mandy D’Autremont, Vice President, Marketing Partnerships, Canadian Federation of Independent Business
Most small or medium sized businesses (SMBs) think a cybersecurity plan is expensive, consumes too much staff time or is something that they do not have the expertise to do. This misperception causes SMBs to be at considerable risk.
Yogi Schulz has helped companies face these types of challenges. He has designed risk models that are used in the oil and gas industry by small and large companies. He will show how to evaluate Critical Security Controls using a comprehensive, low-cost, and surprisingly low-effort process. The evaluation results produce an actionable list of cybersecurity gaps and a high level of assurance in understanding the state of SMB cybersecurity.
This is a “must see” for SMBs, but would benefit organizations of any size.
Yogi Schulz, Sr. Consultant, Corvelle Consulting
Tom Jacoby has seen it all in a career in cyber security and operations that has spanned over three decades. The lessons that he’s learned and the stories that he can tell breathe life into security discussions and give a practical framework for the elements of any cybersecurity plan.
Join Jim Love, CIO, ITWC and Tom Jacoby, Founder and CEO of IOSecure Internet Operations Inc. for a key discussion of four key elements that everyone must consider in cybersecurity planning.
CLOSING PANEL:
Looping back to the discussion that opened the event on the emerging threat environment, we will conclude the event with a wide ranging discussion of next steps – a call to action as it were, where assembled experts recommend simple, practical tasks you can take on now to be better prepared in the future
Moderator: Brennen Schmidt, Cybersecurity Author and Speaker
Joined by Jim Love, CIO ITWC
LAST EVENT
OCT 19-20, 2022
While some Canadian organizations are adopting the hybrid work model, others are embracing the work from home structure which poses new challenges to the CIOs and the CISOs to keep their teams secure from ransomware wherever they are in the country.
OCT
19-20, 2022
Are you Ready?
MAR
24, 2022
Building your Team
FEB 24, 2022
The 3 R’s of Cybersecurity
AUG
5, 2021
SECURITY & AI
MAY
11, 2021
LEARNING & TRAINING
OCT 5-7, 2021
THREE DAILY SESSIONS