CISO Canada Summit | June 10, 2021 | Virtual Summit - Real-time Online Conversations

agenda

PDF Download Agenda (PDF)

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, June 10, 2021 - CISO Canada Summit

10:15 am - 10:30 am

Welcome Registration & Opening Remarks

 

10:30 am - 11:10 am

Keynote Panel

People, Process, & Platforms... Tech Must Change Before it is Too Late!

Many technologists have had their departments shift from being cost centers to revenue generators for their organizations. That isn't the only shift that is coming for tech executives. Margins are reduced and expectations are high. Innovation has to move faster. Leadership has to evolve. Risk has a whole new meaning in 2021. Business continuity is just one of many complex business challenges creating unanticipated market turbulence. Join us to gain insight into how tech leaders are turning complexity and chaos into real strategy execution initiatives. 

Key Takeaways:

  • Smarter Spending 
  • Customer and Employee Experience 
  • Leadership and Business Transformation

Presented by:

Andrew Nemirovsky, Senior Director IM and Information Technology and Chief Information Officer, Nova Scotia Health Authority

 

Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network

 
 

11:10 am - 11:40 am

Keynote

Zero Trust in the Real World: A Practical First Step

From a buzz to a buy for many organizations, Zero Trust has become the "must have" for tech leaders in 2021. For Zero Trust initiatives to succeed, they must be accompanied by an eyes-wide-open rollout that recognizes the cultural impact on the organization, and ways to lead, educate and nurture the adoption process. This starts with leadership all the way down to the entire staff to understand the "why" and "how" of Zero Trust initiatives. This session will dive into best practices around Zero Trust and how to get buy in across your organization.

 

11:40 am - 12:00 pm

Executive Exchange

 

Think Tank

Cybersecurity on the Frontline: Pushing Cyber Resilience in 2021


Presented by:

John Del Grande, VP of Business Solutions, Ecclesiastical Insurance Office plc

 
 

12:00 pm - 12:20 pm

Executive Exchange

 

Thought Leadership

Moments that make experiences

For years, marketers have focused on key points in the customer journey from when they start to explore to when they buy and when they leave feedback. But in a digital experience economy where more curious and demanding customers can get exactly what they want รข?" instantly and effortlessly it's pivotal to show you understand and can respond to their needs. Paige will reveal how the emotions and feelings that customers take away from each moment are what matters most, and how leading brands are creating enduring memories to win their customers' time, attention, and loyalty.

 

12:20 pm - 12:40 pm

Executive Exchange

 

Fireside Chat

Cybersecurity on the Frontline: Pushing Cyber Resilience in 2021

Working from home and shifting business initiatives have kept security executives on their toes in 2020. That intensity is unlikely to reduce in 2021. This session examines emerging threats in 2021 and beyond and how organizations can increase their security posture and achieve cyber resilience. - What should cybersecurity departments expect in 2021? 

Key Takeaways:

  • How organizations can focus their enterprise strategy to encompass cyber resilience 
  • What the new workplace will look like in the future from a cybersecurity standpoint 
  • New year, new strategy - learn tips to reboot and challenge new ways of thinking

 

12:40 pm - 1:00 pm

Executive Exchange

 

Executive Boardroom

Why old-school CISO principles still rule - how do you protect what's outside the firewall?

This session discusses the challenges and draws upon information rights management, also known as enterprise rights management. This typically uses encryption, rights policies, full auditing, and other security tools to protect sensitive information. Information rights management tools protect "who, what and when" policies for documents

Key Takeaways:

  • Evaluate the possible 'band aids' that were implemented in the rush of Covid-19 and looking at the requirements and enablement of taking business to a true cloud-based platform 
  • How IT teams can ensure their support and communications are secure - everywhere 
  • Strategies to address gaps in firewall resilience plans

Share:

Executive Boardroom

Secure accelerated cloud transformation with modern PAM backed by Zero Trust

Acceleration of cloud transformation and the increase in remote workers are key trends driving the movement toward Zero Trust security. The expanded attack surface resulting from hybrid- and multi-cloud environments often leads to compromised privileged credentials, which can be poorly managed due to confusion over responsibility, inconsistent security practices, and identity sprawl. If organizations are not securing privileged access to cloud management accounts or cloud workloads, the organization is more exposed to cyberattacks, data breaches, threats, and damage. 

To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure both during and after cloud migration. Adopting an approach based on Zero Trust principles can strengthen security postures by assuming that anyone attempting access cannot be trusted, whether internal or external and even if they present a correct credential. A privileged access management (PAM) approach that verifies the user, contextualizes the request, secures the administrative environment, and grants least privilege can better secure access to both cloud and on-premises infrastructure and workloads. 

Sponsored by:

Centrify View details

 
 

Presented by:

Jason Mitchell, Senior Vice President, Engineering, Centrify View details

 
 
 

1:00 pm - 1:20 pm

Executive Exchange

 

Think Tank

Cloud-based Threats are Multiplying at an Alarming Rate

As the cloud migration continues, securing data and critical infrastructure is going to require new approaches. Organizations have struggled to maintain control of critical data and ensure real-time threat intelligence, giving cloud-based threats the ability to multiply. Data buckets being misconfigured, or inadequately secured increases the risk of a breach. Being able to manually manage security for large web application infrastructures has become a thing of the past. As such, organizations are being pushed to reevaluate their approach to web application security. 

Key Takeaways:

  • The drumbeat to implement critical infrastruture just keeps getting louder. What are the top 3 CISO tips to avoid certain failure? 
  • Versioning explained..and does it protect your data?

Think Tank

Accelerating Cloud Migration while Minimizing Risk

Most organizations struggle with competing priorities of risk management, compliance, cost, and user experience; all while working to manage the long tail of legacy systems, including legacy identity & access management solutions when it comes to cloud migration. Find out how to drive successful digital transformation with a comprehensive digital identity solution that helps you balance security and user experience while supporting a non-disruptive migration 

Key Takeaways: 

  • How can your organization measure cost savings from a move to a broader cloud strategy? 
  • In what ways can the implementation of cloud platforms maximize data center performance while reducing capital expenditures? 
  • Explore ways to determine which assets can be retired from your architecture with a move to the hybrid cloud

 

1:20 pm - 1:40 pm

Executive Exchange

 

Executive Boardroom

Rubrik

Content TBD

Sponsored by:

Rubrik View details

 
 

Share:

Executive Boardroom

Rise of Next-Gen Software Supply Chain Attacks

Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain. 

Join this fireside chat with Ax Sharma, Senior Security Researcher, Sonatype and Michelle Dufty, Senior Vice President, Marketing Sonatype to: 

1) Understand software supply chain attacks and their impact on the open-source ecosystem 

2) Deep dive into prominent real-world examples of dependency confusion, typosquatting and brandjacking malware 

3) Learn how your organization can proactively protect itself against software supply chain attacks

Sponsored by:

Sonatype View details

 
 

Presented by:

Ax Sharma, Senior Security Researcher, Sonatype View details

 
 

Michelle Dufty, Senior Vice President of Marketing, Sonatype View details

 
 
 

1:40 pm - 2:00 pm

Executive Exchange

 

Think Tank (Debate)

Why organizational resilience depends on an integrated security architecture to reduce risk

The risk extends beyond the perimeter and requires extending your protections against external, insider, and 3rd party threats. It's not just your perimeter that is at risk, it's your customers, your supply chain, your staff, and your business reputation that could be easily tarnished with just one breach - Following on from our earlier thought leadership discussion, this session we will debate how cloud storage can often be the cornerstone of a ransomware insurance plan - but is it the end solution? 

Key Takeaways:

  • In discussion with us, explore additional factors organizations need to consider when leveraging the cloud in your ransomware strategy 
  • Ensure you don't make the same mistake twice - new cyberattacks require new protection strategies

Presented by:

Deidre Diamond, Managing Director Founder and CEO, Cyber Security Network

 

Think Tank (Debate)

There are two kinds of measurements in business: one to assess performance and the other to provide intelligence - how can CIO's/CISO's do both in 2021 and successfully manage business outcomes?

Key Takeaways: 

  • It can be argued that performance cannot be managed if it cannot be measured. But what if we've been measuring the wrong thing all along? 
  • Can CIO's/CISO's pair critical success factors and key performance indicators as a powerful tool for establishing progress towards an objective? 
  • Is it possible for KPIs to also relate to underlying elements of an organization's goals?

 

2:00 pm - 2:10 pm

Closing Remarks