CISO Canada Summit | June 10, 2021 | Virtual Summit - Real-time Online Conversations

agenda

PDF Download Agenda (PDF)

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, June 10, 2021 - CISO Canada Summit

10:15 am - 10:30 am

Welcome Registration & Opening Remarks

 

10:30 am - 11:10 am

Keynote Panel

People, Process, & Platforms... Tech Must Change Before it is Too Late!

Many technologists have had their departments shift from being cost centers to revenue generators for their organizations. That isn't the only shift that is coming for tech executives. Margins are reduced and expectations are high. Innovation has to move faster. Leadership has to evolve. Risk has a whole new meaning in 2021. Business continuity is just one of many complex business challenges creating unanticipated market turbulence. Join us to gain insight into how tech leaders are turning complexity and chaos into real strategy execution initiatives. 

Key Takeaways:

  • Smarter Spending 
  • Customer and Employee Experience 
  • Leadership and Business Transformation

Presented by:

Andrew Nemirovsky, Chief Information Officer, Nova Scotia Health Authority

 

Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network

 
 

11:10 am - 11:40 am

Keynote

Understanding the Zero Trust Paradigm

Cloud based applications is one of the areas in which threats will increase in 2021. It is more critical than ever to understand the risk posed by potentially compromised user identities. How do you determine malicious behaviour and the infiltration of your organization by a rogue actor? 

Learn more about the Zero Trust Model and get clarity on how organizations can use this security framework to help secure their networks, applications, and data in this cloud-native era. 

You will learn: 

  •  What the Zero Trust Model really means and understanding the mindset.
  • Various approaches and steps towards Zero Trust Transformation including use cases.
  •  Importance of Zero Trust Risk insights and how to get continuous assessment and visibility.
  •  How to dynamically control user access to authorized corporate resources only based on the user's risk posture.
  •  Threat detection to protect emails, endpoints, cloud workloads, and network.

Sponsored by:

Trend Micro Inc. View details

 
 

Presented by:

Antoine Saikaley, Technical Director, Trend Micro Inc.

 
 

11:40 am - 12:00 pm

Executive Exchange

 

Think Tank

Cybersecurity on the Frontline: Pushing Cyber Resilience in 2021

In the continued evolving environment and rise of threat actor activities, there is high likelihood your organization will be the victim of an cyber attack. As IT/security leaders, to demonstrate cyber resilience, we are being called to shift focus from what has typically been just the IT systems and components associated with a security incident, to ensuring continuity of business operations during and after one. 

We'll explore balancing different thinking tied with people, process and technology to achieve greater cyber resilience.

Presented by:

John Del Grande, VP of Business Solutions, Ecclesiastical Insurance Office plc

 
 

12:00 pm - 12:20 pm

Executive Exchange

 

Thought Leadership

Open Hybrid Multi-Cloud Platform - A unified, streamlined and cost effective approach to responsibly consuming public cloud services

As more organizations increase their multi-cloud adoption, they have encountered significant challenges in the areas of cost overruns, increased levels of business, operational and compliance risk, delayed workload migrations and experienced unnecessary complexity of a disjointed cloud strategy. Red Hat platforms allow an open, unified approach across the multi-cloud and streamlines application and platform lifecycle processes, permits intercloud workload portability, reduces security threat surface and encourages highly collaborative organization cultures. Please join Red Hat Chief Strategist, Michael Cardy, as he presents how Open Hybrid Cloud platform is "Cloud - Done Right".

Sponsored by:

Red Hat Canada Limited View details

 
 

Presented by:

Todd Wilson, Chief Strategist, Red Hat Canada Limited

 
 

12:20 pm - 12:40 pm

Executive Exchange

 

Think Tank

Cloud-based Threats are Multiplying at an Alarming Rate

As the cloud migration continues, securing data and critical infrastructure certainly requires new approaches and board commitment. As much we want to defend but the fact is Organizations have struggled to maintain control of critical data and ensure real-time threat intelligence, giving cloud-based threats the ability to multiply.

As such, organizations are being pushed to reevaluate their approach, let's look at some of the facts:

Key Takeaways:

  • Insight to the leaders in the Cyber Space about the new inevitable threat landscape and what can we do to stay ahead of the curve?
  • Insights to some recognizable trends and quick wins to succeed in the Cloud Security journey

Presented by:

Vinay Puri, Head of Security Architecture, VP Cybersecurity, Thomson Reuters

 
 

12:40 pm - 1:00 pm

Executive Exchange

 

Executive Boardroom

Align Security and IT Operations to Dramatically Compress Vulnerability Resolution Time:

With attack surface sprawl and growing numbers of vulnerabilities to address, security and IT teams are increasingly challenged to meet remediation targets. To overcome this problem, teams need an automated way of identifying and correlating the highest risk vulnerabilities with the right remediation steps.

Sponsored by:

HCL BigFix View details

 
 

Presented by:

Kathy Nguyen, BigFix Technical Advisor, HCL BigFix View details

 
 

Executive Boardroom

Privileged Access Management Challenges When Moving to the Cloud

The move to broad-based remote work has accelerated many organizations business requirements to move more infrastructure and services into the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces will arise and create greater security vulnerabilities. 

To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure and services both during and after cloud migration. In this session, we will discuss common challenges and the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.

Sponsored by:

Centrify View details

 
 

Presented by:

Jason Mitchell, Senior Vice President, Engineering, Centrify View details

 
 
 

1:00 pm - 1:20 pm

Executive Exchange

 

Think Tank

Digital Forensics Best Practices in Support of Cyber Incident Response

In this brief discussion, John will touch on baseline practices to maximize effective digital forensics response to cyber incidents.  Topics will include establishing roles and responsibilities in response teams, evidence containment best practices, endpoint image acquisition (logical vs physical, cloud + production vs deadbox), forensic tools and lab equipment needs, payload entry vector discovery through file signature and timeline analysis, and file security options for evidence storage and disclosure of findings.

Presented by:

John Bradley, Manager, Digital Forensics & Investigations, City of Toronto

 
 

1:20 pm - 1:40 pm

Executive Exchange

 

Executive Boardroom

Be Security Forward

Understand who is accessing files, and recover rapidly to a known good state. Organizations are destined to pay data ransoms if they can't recover quickly, not to mention experience significant revenue and brand damage. When an attack occurs, Rubrik provides visibility into the scope of damage, click restores from uncompromised backups, and alerting to uncover unusual behavior. 

  • Ransomware-proof Your Backup Data 
  • Prevent ransomware from ever accessing or encrypting your backups with an immutable architecture. 
  • Analyze Impact and Recovery Instantly 
  • Minimize downtime after a cyber attack with instant recovery and targeted impact analysis. 
  • Reduce Sensitive Data Exposure 
  • Discover, classify, and protect your most sensitive data to mitigate exposure.

Sponsored by:

Rubrik View details

 
 

Share:

Executive Boardroom

Rise of Next-Gen Software Supply Chain Attacks

Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain. 

Join this fireside chat with Ax Sharma, Senior Security Researcher, Sonatype and Michelle Dufty, Senior Vice President, Marketing Sonatype to: 

1) Understand software supply chain attacks and their impact on the open-source ecosystem 

2) Deep dive into prominent real-world examples of dependency confusion, typosquatting and brandjacking malware 

3) Learn how your organization can proactively protect itself against software supply chain attacks

Sponsored by:

Sonatype View details

 
 

Presented by:

Ax Sharma, Senior Security Researcher, Sonatype View details

 
 

Michelle Dufty, Senior Vice President of Marketing, Sonatype View details

 
 
 

1:40 pm - 2:00 pm

Executive Exchange

 

Think Tank (Debate)

Top 3 reasons why cyber professionals move jobs, it's not what you think!

Would you take a call with someone who says they have a job for you if you were happy at your job? How many calls could you take, while you're also working? People don't readily take job calls. In this talk, find out what's really going on with cybersecurity hiring from the Founder and CEO of the largest sole-focused Cybersecurity Talent firm in the US, Deidre Diamond. 

Presented by:

Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network

 
 

2:00 pm - 2:10 pm

Closing Remarks