CISO Canada Summit | June 10, 2021 | Virtual Summit - Real-time Online Conversations
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
10:15 am - 10:30 am
10:30 am - 11:10 am
Many technologists have had their departments shift from being cost centers to revenue generators for their organizations. That isn't the only shift that is coming for tech executives. Margins are reduced and expectations are high. Innovation has to move faster. Leadership has to evolve. Risk has a whole new meaning in 2021. Business continuity is just one of many complex business challenges creating unanticipated market turbulence. Join us to gain insight into how tech leaders are turning complexity and chaos into real strategy execution initiatives.
Key Takeaways:
Presented by:
Andrew Nemirovsky, Chief Information Officer, Nova Scotia Health Authority
Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network
11:10 am - 11:40 am
Cloud based applications is one of the areas in which threats will increase in 2021. It is more critical than ever to understand the risk posed by potentially compromised user identities. How do you determine malicious behaviour and the infiltration of your organization by a rogue actor?
Learn more about the Zero Trust Model and get clarity on how organizations can use this security framework to help secure their networks, applications, and data in this cloud-native era.
You will learn:
Sponsored by:
Trend Micro Inc.
Presented by:
Antoine Saikaley, Technical Director, Trend Micro Inc.
11:40 am - 12:00 pm
In the continued evolving environment and rise of threat actor activities, there is high likelihood your organization will be the victim of an cyber attack. As IT/security leaders, to demonstrate cyber resilience, we are being called to shift focus from what has typically been just the IT systems and components associated with a security incident, to ensuring continuity of business operations during and after one.
We'll explore balancing different thinking tied with people, process and technology to achieve greater cyber resilience.
Presented by:
John Del Grande, VP of Business Solutions, Ecclesiastical Insurance Office plc
12:00 pm - 12:20 pm
As more organizations increase their multi-cloud adoption, they have encountered significant challenges in the areas of cost overruns, increased levels of business, operational and compliance risk, delayed workload migrations and experienced unnecessary complexity of a disjointed cloud strategy. Red Hat platforms allow an open, unified approach across the multi-cloud and streamlines application and platform lifecycle processes, permits intercloud workload portability, reduces security threat surface and encourages highly collaborative organization cultures. Please join Red Hat Chief Strategist, Michael Cardy, as he presents how Open Hybrid Cloud platform is "Cloud - Done Right".
Sponsored by:
Red Hat Canada Limited
Presented by:
Todd Wilson, Chief Strategist, Red Hat Canada Limited
12:20 pm - 12:40 pm
As the cloud migration continues, securing data and
critical infrastructure certainly requires new approaches and board commitment.
As much we want to defend but the fact is Organizations have struggled to
maintain control of critical data and ensure real-time threat intelligence,
giving cloud-based threats the ability to multiply.
As such, organizations are being pushed to reevaluate
their approach, let's look at some of the facts:
Key Takeaways:
Presented by:
Vinay Puri, Head of Security Architecture, VP Cybersecurity, Thomson Reuters
12:40 pm - 1:00 pm
With attack surface sprawl and growing numbers of vulnerabilities to address, security and IT teams are increasingly challenged to meet remediation targets. To overcome this problem, teams need an automated way of identifying and correlating the highest risk vulnerabilities with the right remediation steps.
Sponsored by:
HCL BigFix
Presented by:
Kathy Nguyen, BigFix Technical Advisor, HCL BigFix
The move to broad-based remote work has accelerated many organizations business requirements to move more infrastructure and services into the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces will arise and create greater security vulnerabilities.
To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure and services both during and after cloud migration. In this session, we will discuss common challenges and the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.
Sponsored by:
Centrify
Presented by:
Jason Mitchell, Senior Vice President, Engineering, Centrify
1:00 pm - 1:20 pm
In this brief discussion, John will touch on baseline practices to maximize effective digital forensics response to cyber incidents. Topics will include establishing roles and responsibilities in response teams, evidence containment best practices, endpoint image acquisition (logical vs physical, cloud + production vs deadbox), forensic tools and lab equipment needs, payload entry vector discovery through file signature and timeline analysis, and file security options for evidence storage and disclosure of findings.
Presented by:
John Bradley, Manager, Digital Forensics & Investigations, City of Toronto
1:20 pm - 1:40 pm
Understand who is accessing files, and recover rapidly to a known good state. Organizations are destined to pay data ransoms if they can't recover quickly, not to mention experience significant revenue and brand damage. When an attack occurs, Rubrik provides visibility into the scope of damage, click restores from uncompromised backups, and alerting to uncover unusual behavior.
Sponsored by:
Rubrik
Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain.
Join this fireside chat with Ax Sharma, Senior Security Researcher, Sonatype and Michelle Dufty, Senior Vice President, Marketing Sonatype to:
1) Understand software supply chain attacks and their impact on the open-source ecosystem
2) Deep dive into prominent real-world examples of dependency confusion, typosquatting and brandjacking malware
3) Learn how your organization can proactively protect itself against software supply chain attacks
Sponsored by:
Sonatype
Presented by:
Ax Sharma, Senior Security Researcher, Sonatype
Michelle Dufty, Senior Vice President of Marketing, Sonatype
1:40 pm - 2:00 pm
Would you take a call with someone who says they have a job for you if you were happy at your job? How many calls could you take, while you're also working? People don't readily take job calls. In this talk, find out what's really going on with cybersecurity hiring from the Founder and CEO of the largest sole-focused Cybersecurity Talent firm in the US, Deidre Diamond.
Presented by:
Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network
2:00 pm - 2:10 pm