Founding Sponsor

Produced By

IT World Canada logo

Sponsored By

cloudflare logo

As the pandemic enters its third year, the cybersecurity threats in Canada have become more aggressive and imperative than ever. While some Canadian organizations are adopting the hybrid work model, others are embracing the work from home structure which poses new challenges to the CIOs and the CISOs to keep their teams secure from ransomware wherever they are in the country.

ITWC’s highly anticipated cybersecurity event MAPLESEC returns in a hybrid model to focus on the new challenges for leadership in protecting their organizations’ digital posture and anticipating the upcoming ransomware risks. Taking place in multiple venues across the country while maintaining the high quality streaming offering, MAPLESEC will cover burning topics involving the nation’s cybersecurity concerns from coast to coast.

Why you need to attend

MAPLESEC brings together industry, non-profits, government, and agencies to share practical tips and information that help make us all stronger in the application of cybersecurity.

Who Should Attend?

  • CIOs
  • CISOs
  • Directors and Managers in IT
  • Business Users and Management
  • Marketing Professionals
  • IT Executive Leadership
  • Business Executive Leadership


Day 1: October 19, 2022 (In-person)

Welcome and Opening Remarks

Jim Love, CIO ITWC


Fighting Back - Taking a Proactive Approach to Security

Nick Aleks, Senior Director of Security, Wealthsimple, Author of Black Hat GraphQL & DEFCON Toronto Co-Founder

Security Solution Lab #1

These are short presentations that provide a valuable and practical glimpse into some of the most innovative and powerful security tools, processes, techniques and research. They are the TED talk of Cyber Security done in 5 minutes.

Panel: Threatscape - Understanding Current and Emerging Threats

Leading security experts explain the important trends and new threats they are seeing now and in the near future so you can make better decisions about how you allocate your resources to protect your data.

John del Grande, VP Business Solutions, Ecclisiastical Insurance
Rushmi Hasham, Director, Accelerated Cybersecurity Training Programs, Rogers Cybersercure Catalyst, Toronto Metropolitan University

Security Solution Lab #2

FireSide Chat - Email Security

Security Solution Lab #3


Ransomware Attacks - You don’t have to be a victim

Our panel will walk you through the key elements of prevent and damage mitigation including discussion of the role, value and limitations of cyber insurance.

Moderator: Epsit Jajal, Virtual CIO – Ricoh IT Services

Greg Markell,President & CEO, RIDGE CANADA
Maryam Asgariazad, Director, Information Security, Alterna Savings

Security Solution Lab #4


Securing The Investment You Need to Protect Your Data: Creating a Sense of Urgency, Talking to Business Executives and Making the Case

In this session you will hear not just how to make the case for greater investment this quarter, but ensure your executive buy-in to ongoing vigilance and the resources you need to keep the organization secure.

Horace Wright, Senior Manager, Unit Risk & IT Transformation – I&O & Security Assets, National Bank of Canada
Azim Boblai, CISO, Toronto Community Housing

Security Solution Lab #5


Quiz - Sponsored by Okta

Test your knowledge with some fun trivia

Keeping Up To Date - The Essential Guide to Privacy and Security

This session will provide an update on privacy regulation, an exploration of how privacy and security can best work with one another and leave you with a checklist of things you have to know and do to ensure that you reduce the risks to your organization.  Discussion will include developments in the US and Canada

Wendy Hulton, Partner, Dickinson Wright

Security Solution Lab #6

Presentation: Conducting an Effective Investigation Post Breach

One of the key things you will need to do post a breach of your security is to carry out an effective investigation to identify the cause.  This is essential for three reasons:

1. Prevent further immediate loss
2. Improve your defenses to prevent future loss
3. If possible retrieve the information 

In this session you will hear about the essential of investigation as well as some of the pitfalls to avoid.

Keith Elliott, President and CEO, Reed Research


Security Solution Lab #7


The CISO Unplugged. Leading CISOs Share Their Hopes and Fears for a Secure Future

The day will conclude with a wide-ranging discussion among three leading CISO’s.  They will discuss the route they took to the role, the skills they see as critical now and in the future, how they work with other C-Suite executives, and share what keeps them up at night and what makes them leap out of bed in the morning as they think about the world of threat and opportunity they face every day.

Kevin Dreyer, CISO, Maple Reinders
Samer Adi, CISO, Greenshield Canada
Rachel Guinto, Vice President, Cybersecurity, First West Credit Union

Closing Remarks

Jim Love, CIO, ITWC

Networking Reception

Day 2: October 20, 2022

Day 2 Host

Brennen Schmidt
Cybersecurity Author and Speaker


The second day of this event will consist of a series of concurrent special workshop sessions.  We are currently curating streams specifically for students, small businesses, and non-IT business leaders among others.

Currently under development we look forward to announcing a compelling selection of practical sessions that will help you better protect your company’s vital information assets.  

Plenary sessions in development for this day include:

Leadership in Cybersecurity – A Day in the Life of a CISO

Building on the concluding conversation of the first day, we will be joined by a leading CISO who will take a deep dive into the day-to-day challenges of the role and what it is they see as being the critical factors for success.

John Pinard, Vice President, IT Operations, Infrastructure & Cybersecurity, DUCA Financial Services Credit Union Ltd.

DevSecOps – Balancing Security and Speed in the Real World

DevSecOps has promised software maintenance and development with security “built in” versus “bolted on.”  While the principles are sound the results have been “uneven” and sometimes disappointing. 

Do we need to rethink or just modify our approach?  Join us for this lively discussion.

Practical Guide to Cybersecurity Governance - Why Governance is part of essential protection.

Governance is not about committee meetings and dull droning discussions about policies no one will read. It’s an action oriented approach that is essential to protecting your organization. Yet many organizations struggle to make it work.


What to do Tomorrow to Prepare for the Day After…

Looping back to the discussion that opened the event on the emerging threat environment, we will conclude the event with a wide ranging discussion of next steps – a call to action as it were, where assemble experts to recommend simple, practical tasks you can take on now to be better prepared in the future


Resourcing the Security Function – People, Technology, Outsourcing

On the first day we discussed the critical issue of securing the financial investment security needs to be effective.  But that is only the first step in building the function – and regardless of the budget you have the challenge of optimizing your efforts to ensure you build or sustain the function.  Topics for discussion will include:

  • To outsource or not to outsource?
  • Assessing technology investments
  • Recruitment and retention in tough talent markets


Jim Love


John Del Grande

VP Business Solutions, Ecclesiastical Insurance


Samer Adi, CISO

Green Shield Canada


Wendy Hulton

Partner, Dickinson Wright

Horace Wright

Senior Manager, Unit Risk, Transformation et performance  – Infrastructure, Operations & Security Assets

Epsit Jajal

Virtual CIO – Ricoh IT Services

Rushmi Hasham

Director, Development and Accelerated Cybersecurity Training Programs, Toronto Metropolitan University


Brennen Schmidt

Cybersecurity Author and Speaker


Kevin Dreyer

I.T. Director/CISO, Maple Reinders


Alkin Gorgun

Field CISO, Cloudflare



Past Maplesec Events available on-Demand (Registration is Required)

MAR 24, 2022

Building Out Your Cybersecurity Team: Readiness, Preparation, Resilience

FEB 24, 2022

The 3 R’s of Cybersecurity

5, 2021


11, 2021


OCT 5-7, 2021