siberXchange 1.0

siberxchange

siberXchange Live is an online summit that will recreate the in-person conference experience across a virtual ecosystem. As COVID-19 has displaced numerous businesses and communities, this is a smarter and safer avenue to connect experts with the businesses and communities that need their services. From addressing the surge in COVID-19 ransomware to effectively solutioning access, this is the summit of the hour.

Event Details
Cyber Threat Analyst
Insikt Group - Recorded Future
Cyber Threat Analyst at Insikt Group - Recorded Future
Program Manager Developer Jumpstart
IBM
Program Manager Developer Jumpstart at IBM
CIO
Nanopay Corporation
CIO at Nanopay Corporation
vCISO
vCISO
President & CEO
Paradigm Ventures Niagara
President & CEO at Paradigm Ventures Niagara
Security Architect
IBM India Software Labs
Security Architect at IBM India Software Labs
Head of Application Security
HBL
Head of Application Security at HBL
VP, IT Operations, Infrastructure & Cybersecurity
DUCA Financial
VP, IT Operations, Infrastructure & Cybersecurity at DUCA Financial
Employer Service Consultant
The Career Foundation
Employer Service Consultant at The Career Foundation
Co Founder
CSAP
Co Founder at CSAP
Manager of Applied Research Business Development
Durham College
Manager of Applied Research Business Development at Durham College
Founder
KTech Labs
Founder at KTech Labs
President
Niagara Falls Tourism
President at Niagara Falls Tourism
Integration and Test Engineer
IBM
Integration and Test Engineer at IBM
CEO
SmartCone
CEO at SmartCone
Executive Director
WiCyS
Executive Director at WiCyS
Affiliate Leader
WiCyS
Affiliate Leader at WiCyS
Minister of Finance
Province of Ontario
Minister of Finance at Province of Ontario
Senator
Senate of Canada
Senator at Senate of Canada
CTO
GHQ
CTO at GHQ
Chief
Niagara Regional Police Services
Chief at Niagara Regional Police Services
Executive Director
South Niagara Chambers of Commerce
Executive Director at South Niagara Chambers of Commerce
Fire Department Chief
City of Niagara Falls
Fire Department Chief at City of Niagara Falls
Mayor
City of Niagara Falls
Mayor at City of Niagara Falls
Education, Business and Community Development Coordinator
Spark Niagara
Education, Business and Community Development Coordinator at Spark Niagara
Manager, Business Development & Expedited Services Niagara Economic Development
Niagara Region
Manager, Business Development & Expedited Services Niagara Economic Development at Niagara Region
Program Manager
IBM Security
Program Manager at IBM Security
President
Ownera Group
President at Ownera Group
Head Architect, Ontario Health
OTN Division
Head Architect, Ontario Health at OTN Division
VP of Platform Architecture
SonicWall
VP of Platform Architecture at SonicWall
Visual Designer
IBM Security
Visual Designer at IBM Security
VP Information Technology and Security
Inseego Corp
VP Information Technology and Security at Inseego Corp
CEO
Veiliux
CEO at Veiliux
Senior SANS Instructor & Author
SANS Institute
Senior SANS Instructor & Author at SANS Institute
Director, Information Security and Compliance
BlueCat
Director, Information Security and Compliance at BlueCat
Global Director Security, Risk and Compliance
Compass Group
Global Director Security, Risk and Compliance at Compass Group
Acting Director, Recruitment & Partnerships
Contact North
Acting Director, Recruitment & Partnerships at Contact North
Online Learning Recruitment Officer
Contact North
Online Learning Recruitment Officer at Contact North
Director, Recruitment & Partnerships
Contact North
Director, Recruitment & Partnerships at Contact North
Professional Services Security Lead
AWS Canada
Professional Services Security Lead at AWS Canada
Solutions Architect
Recorded Future
Solutions Architect at Recorded Future
Director of Operational Outcomes
Insikt Group - Recorded Future
Director of Operational Outcomes at Insikt Group - Recorded Future
Subscriptions and Periodicals
Insikt Group - Recorded Future
Subscriptions and Periodicals at Insikt Group - Recorded Future
Admissions and Recruitment Specialist
Rogers Cybersecure Catalyst at Ryerson University
Admissions and Recruitment Specialist at Rogers Cybersecure Catalyst at Ryerson University
Security Gamification Engineer
IBM
Security Gamification Engineer at IBM
Product Marketing
Guardicore
Product Marketing at Guardicore
Senior Manager, Digital Innovation & Information Technology
City of Brampton
Senior Manager, Digital Innovation & Information Technology at City of Brampton
CEO
Spark Centre
CEO at Spark Centre
Senior Technical Staff Member
IBM
Senior Technical Staff Member at IBM
Managing Director
Cyber Seniors
Managing Director at Cyber Seniors
President
University of Windsor WiCyS Student Chapter
President at University of Windsor WiCyS Student Chapter
Executive Vice President
Ownera Group
Executive Vice President at Ownera Group
Vice President
IBM Security Business Unit
Vice President at IBM Security Business Unit
Director, Data Security, UEM & Zero Trust Offering Management
IBM
Director, Data Security, UEM & Zero Trust Offering Management at IBM
Associate Partner, Identity and Access Management
IBM Cloud and Cognitive Software
Associate Partner, Identity and Access Management at IBM Cloud and Cognitive Software
Global Application Security Consultant
IBM Cloud and Cognitive Software
Global Application Security Consultant at IBM Cloud and Cognitive Software
Sr. Manager of Offensive Security
Palo Alto Networks
Sr. Manager of Offensive Security at Palo Alto Networks
VP of Sales Engineering
SecurityScorecard
VP of Sales Engineering at SecurityScorecard
CTO for Strategy, Innovation, and Security
IBM Garage
CTO for Strategy, Innovation, and Security at IBM Garage
Emerging Security Research Liaison
IBM
Emerging Security Research Liaison at IBM
President and Co-Founder
Get Ready Inc.
President and Co-Founder at Get Ready Inc.
Sr. Industry Specialist, Security and Compliance
AWS
Sr. Industry Specialist, Security and Compliance at AWS
Deputy Mayor
Thames Centre
Deputy Mayor at Thames Centre
CEO
CQURE Inc.
CEO at CQURE Inc.
Threat Intelligence Analyst
Insikt Group - Recorded Future
Threat Intelligence Analyst at Insikt Group - Recorded Future
Computer Security Engineer
NASA Jet Propulsion
Computer Security Engineer at NASA Jet Propulsion
Cloud Security Service Lead
Tata Consultancy Service
Cloud Security Service Lead at Tata Consultancy Service
Asst. Professor and Industry Expert in Residence, Department of Computer Science
Western University
Asst. Professor and Industry Expert in Residence, Department of Computer Science at Western University
Designer
IBM Security
Designer at IBM Security
Manager of Information Technology
Entegrus
Manager of Information Technology at Entegrus
vCISO
Dare Innovative
vCISO at Dare Innovative
Sr. Sales Engineer
Guardicore
Sr. Sales Engineer at Guardicore
Principal Information Security
T-Systems Schweiz
Principal Information Security at T-Systems Schweiz
Senior Consultant
InterVentis Global
Senior Consultant at InterVentis Global
Co-Founder
CyberWayFinder
Co-Founder at CyberWayFinder
Senior Managing Consultant
IBM Security
Senior Managing Consultant at IBM Security
Senior Consultant
InterVentis Global
Senior Consultant at InterVentis Global
Associate Partner, X-Force Cloud Security Services
IBM
Associate Partner, X-Force Cloud Security Services at IBM
Sr. Manager Application Security
Habib Bank Limited
Sr. Manager Application Security at Habib Bank Limited
CISO
Equifax
CISO at Equifax
Co-Founder
Little Doctors
Co-Founder at Little Doctors
Co-Founder
Little Doctors
Co-Founder at Little Doctors
Professor, Research Director
University of Calgary
Professor, Research Director at University of Calgary
Senior Director of Products and Solutions
Fortinet
Senior Director of Products and Solutions at Fortinet
IT Advisor
Government of Tamil Nadu
IT Advisor at Government of Tamil Nadu
Senior Vice-President & CISO
Wibmo Inc.
Senior Vice-President & CISO at Wibmo Inc.
Founder
WiCSP
Founder at WiCSP
Co-Founder
WiCSP, NASSCOM & HYSEA
Co-Founder at WiCSP, NASSCOM & HYSEA
CIO
BNY Mellon
CIO at BNY Mellon
Founder
The Amanda Todd Legacy Society
Founder at The Amanda Todd Legacy Society
CEH
Trend Micro
CEH at Trend Micro
CEO and Founder
siberX
CEO and Founder at siberX
Director of Cyber Security
MLSE
Director of Cyber Security at MLSE
Global Director of Enterprise Endpoint and Security Products
Intel
Global Director of Enterprise Endpoint and Security Products at Intel
Co-Founder and CEO
Team8
Co-Founder and CEO at Team8
President & CEO
Cybera
President & CEO at Cybera
CISO in Residence
Team8
CISO in Residence at Team8
Former Commander, U.S. Cyber Command and Director
National Security Agency
Former Commander, U.S. Cyber Command and Director at National Security Agency
Sr. Leader, Worldwide Business Development
AWS
Sr. Leader, Worldwide Business Development at AWS
Founder and CEO
Cyology Labs Inc
Founder and CEO at Cyology Labs Inc
Marketing and Economic Development
Town of Ajax
Marketing and Economic Development at Town of Ajax
Dean, Chairperson Advisory Council
EC-Council University
Dean, Chairperson Advisory Council at EC-Council University
Country Manager
Intel
Country Manager at Intel
President
SaskTech Association
President at SaskTech Association
Research Chair and Director Digital Integration Centre of Excellence
Saskatchewan Polytechnic
Research Chair and Director Digital Integration Centre of Excellence at Saskatchewan Polytechnic
Executive Director
Co.Labs
Executive Director at Co.Labs
CEO
Innovation Saskatchewan
CEO at Innovation Saskatchewan
CEO
ConnexHealth
CEO at ConnexHealth
Director of Corporate Policy & Strategic Initiatives
Region of Durham
Director of Corporate Policy & Strategic Initiatives at Region of Durham
Security Operations Engineer
Palo Alto Networks
Security Operations Engineer at Palo Alto Networks
VP of Information Security, & CISO
Brookfield Asset Management
VP of Information Security, & CISO at Brookfield Asset Management
CIO
Electrical Safety Authority
CIO at Electrical Safety Authority
Broadband Program Manager
Durham Region
Broadband Program Manager at Durham Region
Regional Chair
Durham Region
Regional Chair at Durham Region
Director, Treasurer
ISC2
Director, Treasurer at ISC2
CISO
UHN
CISO at UHN
Founder
UrWorthMore
Founder at UrWorthMore
President and CEO
Ontario Shores
President and CEO at Ontario Shores
CISO
SickKids
Get Ready Inc. at SickKids
Software and Chaos Engineer Advocate
Software and Chaos Engineer Advocate
Founder and CEO
Smoke’s Poutinerie
Founder and CEO at Smoke’s Poutinerie
Managing Partner
Round 13 Capital
Managing Partner at Round 13 Capital
Technical Director Canada
Trend Micro
Technical Director Canada at Trend Micro
Co-Founder and CEO
Argentum Electronics
Co-Founder and CEO at Argentum Electronics
Director of Product Management
GuardiCore
Director of Product Management at GuardiCore
International Keynote Speaker
HR Ninja
International Keynote Speaker at HR Ninja
SVP Product, Demisto
Palo Alto Networks
SVP Product, Demisto at Palo Alto Networks
Global Chief Information Security Officer
Zscaler
Global Chief Information Security Officer at Zscaler
Security Researcher
Guardicore Labs
Security Researcher at Guardicore Labs
CEO and Co-founder
4PAY INC
CEO and Co-founder at 4PAY INC
Co-founder and CEO
ShiftLink Inc
Co-founder and CEO at ShiftLink Inc
Regional Councillor
Town of Ajax
Regional Councillor at Town of Ajax
Mayor
Town of Ajax
Mayor at Town of Ajax
AVP and CTO
McMaster University
AVP and CTO at McMaster University
Manager, Business Technology Risk and Information Security
TD Bank
Manager, Business Technology Risk and Information Security at TD Bank
Manager - Federal Account North America
SANS
Manager - Federal Account North America at SANS
Director, Transformation Strategy
Zscaler
Director, Transformation Strategy at Zscaler
Cloud Security Program Manager
IBM
Cloud Security Program Manager at IBM
Senior Manager
Amazon Web Services
Senior Manager at Amazon Web Services
Senior Cybersecurity Strategist
Treasury Board of Canada Secretariat
Senior Cybersecurity Strategist at Treasury Board of Canada Secretariat
Sr. Product Security Architect
SAP
Sr. Product Security Architect at SAP
Executive Director
Global Privacy & Security by Design Centre
Executive Director at Global Privacy & Security by Design Centre
AI and Machine Learning Systems Architect
IBM
AI and Machine Learning Systems Architect at IBM
General Manager, Cybersecurity
OPG
General Manager, Cybersecurity at OPG
Founder & CEO
RiskAware Inc.
Founder & CEO at RiskAware Inc.
Director Cybersecurity & GRC
Allstate
Director Cybersecurity & GRC at Allstate
Vice President Information Technology
Enova Power Corp
Vice President Information Technology at Enova Power Corp
MPP
Mississauga East-Cooksville
MPP at Mississauga East-Cooksville
CISO
New Brunswick Power
CISO at New Brunswick Power
Co-Founder and Lead Instructor
Cyber Insurance Education Inc.
Co-Founder and Lead Instructor at Cyber Insurance Education Inc.
Privacy and Data Strategist
Binary Tattoo
Privacy and Data Strategist at Binary Tattoo
Chair
Operation: Defend the North
Chair at Operation: Defend the North
Partner, Cybersecurity and Privacy Lead
MNP Digital
Partner, Cybersecurity and Privacy Lead at MNP Digital

This opening keynote will kick off siberXchange live - learn from Canada's very best innovators on how best to secure your business in the new normal!

This session will look at how AWS is powering innovations in healthcare for municipalities across the world!

Securing Mental Health

CEO at ConnexHealth
President and CEO at Ontario Shores
Director Cybersecurity & GRC at Allstate
Founder at UrWorthMore

Continuity of Operations Amidst COVID-19

CISO at UHN
Get Ready Inc. at SickKids
Co-founder and CEO at ShiftLink Inc
International Keynote Speaker at HR Ninja

Malware & Ransomware

Technical Director Canada at Trend Micro

Business Continuity Opening Keynote - "The Internet Is Everything" The C-Level Mandate for Secure Cloud Transformation

The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. A practical cyber security and operations approach that prioritizes security and user performance to align with today’s "new" way of working.

In this session, they'll discuss how enterprise IT leaders can:

  • Improve customer digital experience while safeguarding sensitive information
  • Increase user performance while minimizing risk
  • Drive revenue and scalability while controlling costs

The arrival of COVID-19 has brought unprecedented challenges to businesses around the globe, making daily operations a struggle. Cybercriminals have taken advantage of this chaotic time, bringing new threats to business continuity on a daily basis. These groups are constantly on the lookout for news that they can use as lures in attacks to improve their infection rates. Join this keynote session with Trend Micro Sales Engineer Antoine Saikaley where we’ll be covering:

• Examples and information on how COVID-19 is being used in attacks

• Best practices for minimizing the risks associated with these threats

• Ideas for supporting your employees working from home

Empowering Business Innovation in Saskatchewan

President at SaskTech Association
Executive Director at Co.Labs
CEO at Innovation Saskatchewan
Research Chair and Director Digital Integration Centre of Excellence at Saskatchewan Polytechnic

Framework for Reopening Ontario

Mayor at Town of Ajax
MPP at Mississauga East-Cooksville
Chair at Operation: Defend the North

Security and Business Continuity in the Cloud

How do organizations keep application and infrastructure up while implementing security in best practices in the cloud? DevSecOps and Security by Design play key roles here. In this talk we will discuss the importance of a secure-by-design high availability architectures. Then, how does continuity and security play into multi-cloud environment. The value of monitoring posture and incident response is key here. Finally, the importance of a shared responsibility and a DevSecOps culture to remain flexible, fast, and secure when deploying cloud workloads and containers across the multi-cloud environment.

Global Application Security Consultant at IBM Cloud and Cognitive Software
Associate Partner, X-Force Cloud Security Services at IBM

Business Impact of COVID-19

Founder and CEO at Smoke’s Poutinerie

Cyber Resilience: Challenges and Opportunities in India

IT Advisor at Government of Tamil Nadu
Senior Vice-President & CISO at Wibmo Inc.
CIO at BNY Mellon
Founder at WiCSP
Co-Founder at WiCSP, NASSCOM & HYSEA

Life, as we know it came to a halt two months ago. The worldwide pandemic that lead to the global lockdown and confinement forced us to change our behavior in ways we never thought possible. For many of us this has cast a spotlight on our dependence on technology to live, In many instances to magnitudes we couldn’t previously fathom. Technology has become the instrument to communicate with loved ones, to work from home, to learn from home or to achieve simple daily tasks like ordering food or keeping the family entertained. This bring to mind a famous quote by Albert Einstein that “In the middle of difficulty lies opportunity” for within these challenges does emerge huge opportunity. Our PC, our internet connection, our VPN, our collaboration tools, our fleet management applications and how we protect and secure our employees privacy as well as our organization data are now front and center for everyone in the world. In the words of Andy Grove (3rd CEO of Intel) “Bad companies are destroyed by crisis, Good companies survive them, Great companies are improved by them” Come join me as I will share my vision on how your organization can capitalize and leverage The Post COVID-19 World that promises to become our new normal.

Modernizing Information Security With HW-Based Security to Address Today’s and Tomorrow’s Challenges

IT/Infosec organizations are spending more and more money, yet attacks continue to grow in frequency and magnitude of impact to the business. This requires rethinking and modernizing information security to cope with today’s and tomorrow’s challenges in a more cost-effective manner. In this session, we will walk you through HW-based approach to information security using Intel® vPro Platform capabilities to defend against evolving attacks.

Global Director of Enterprise Endpoint and Security Products at Intel

Cybersecurity for the Public Sector

Sr. Industry Specialist, Security and Compliance at AWS

Threat Hunting in the Dark Side of the Internet

The Dark Side of the Internet or the dark-web is largely anonymous. Given its anonymity, it's also become a haven for hackers and cybercriminals to host malware and exfiltrate data. The Onion Router (TOR) is a largely utilized protocol that allows for many popular malware families and Advanced Persistent Threats to host their C2 infrastructures. In this talk, we will discuss ways to hunt for TOR based attacks. The speaker will provide insights on how the Palo Alto Networks Security Operations Center utilizes their technology suite to automate and hunt for dark-web based threats and will share with the audience their threat hunting philosophy and approach.

Security Operations Engineer at Palo Alto Networks

An opening roundtable with members of the siberXchange advisory!

Enjoy a keynote on the important role women are playing in shaping the cybersecurity industry!

Diversity and Diverse Skills in Cybersecurity

This breakout session will focus on the diversity of aspects of cybersecurity, and how a successful team requires a diverse range of skills such as the ability to track trends, various sorts of subject matter expertise, and technical skills.  There is no "one way" to do cybersecurity, it takes an extensive breadth of skills and diverse team to best figure out how to tackle issues from all sides.  This panel will consist of the three female analysts from the threat research team at Recorded Future, known as Insikt (Swedish for "insight").  They will discuss their own research pieces they've done and highlight examples of their skillset that aided in the research, what it took to gain those skills, and successful collaborations.

Director of Operational Outcomes at Insikt Group - Recorded Future
Subscriptions and Periodicals at Insikt Group - Recorded Future
Threat Intelligence Analyst at Insikt Group - Recorded Future
Cyber Threat Analyst at Insikt Group - Recorded Future

Mentorship and Careers

Software and Chaos Engineer Advocate
Cloud Security Program Manager at IBM
Senior Manager at Amazon Web Services
AVP and CTO at McMaster University
Manager - Federal Account North America at SANS

Tech Facilitated Violence: Cyberbullying

Founder at The Amanda Todd Legacy Society
CEO at ConnexHealth
Chair at Operation: Defend the North
Senator at Senate of Canada

Attacks of the Industry: A View into the Future of Cybersecurity

CEO at CQURE Inc.

The Balancing Act - Imposter Syndrome

Senior Cybersecurity Strategist at Treasury Board of Canada Secretariat
Sr. Product Security Architect at SAP
Privacy and Data Strategist at Binary Tattoo
VP of Sales Engineering at SecurityScorecard
Computer Security Engineer at NASA Jet Propulsion
Chair at Operation: Defend the North

Women Leaders Across The Globe

Product Marketing at Guardicore
Director of Product Management at GuardiCore
Security Researcher at Guardicore Labs

The dramatic shifts towards digital transformation and more effective risk management is having a profound impact on cybersecurity programs around the globe. This session will detail the three trends having the greatest influence right now, and how programs are responding - good and not-so-good.

Protecting the Enterprise from Home

Working remotely has been happening for decades, but recent events has introduced teleworking to huge new swaths of the workforce and challenged IT teams on how to connect and secure this newly remote workforce. Fortinet’s Security Fabric approach to cybersecurity includes protections for remote working, even at the vast scale taking place now. Come learn how to connect securely back to the office network and what steps security professionals can take to keep the company, and the workforce, secure and productive.

Senior Director of Products and Solutions at Fortinet

Lessons Learned from Recent Breaches

VP of Information Security, & CISO at Brookfield Asset Management
VP Information Technology and Security at Inseego Corp
Sr. Sales Engineer at Guardicore

Delivering a Zero Trust Strategy Built on Effective Identity & Access Management

Enterprise IT environments have undergone major shifts in the last few years with digital transformation, shifts to cloud and expectations of employees to work from any location. For security teams supporting these environments has increased the number of connections into and throughout the organization. These connections change continuously –new users are added, new APIs created, and more –making it difficult for security teams to effectively protect data, users and resources.

In order to successfully secure these new environments, organizations must adopt a new security strategy. Adopting a Zero Trust security strategy and governance model can help organizations adapt to the "new normal" and better manage the risks that occur in an ever evolving, perimeter-less business environment.

Identity and Access Management (IAM) is a key ingredient to any Zero Trust strategy. In this presentation, we will explore different IAM capabilities that will support a Zero Trust strategy.

Director, Data Security, UEM & Zero Trust Offering Management at IBM
Associate Partner, Identity and Access Management at IBM Cloud and Cognitive Software

Making Cybersecurity Strategic During COVID-19

CISO at Equifax
Director of Cyber Security at MLSE
CISO at New Brunswick Power
Partner, Cybersecurity and Privacy Lead at MNP Digital

Transforming Agility & Security in a Cloud World - 6 Critical Steps for Securing your Environment for a Remote Workforce

The cloud and mobility are powerful enablers of digital transformation, but many IT organizations are grappling with legacy architectures and processes that haven't evolved in over 30 years. When apps lived in the data center, it made sense to invest in building a 'hub-and-spoke' network and to protect that network by employing a 'castle-and-moat' security model. But agility demands from both internal and external stakeholders in the new world of SaaS, cloud and mobility requires organizations to evolve their network and security architectures.

In this session Stan will discuss;

  • The operational challenge of enabling remote work for everyone
  • The dark side of remote access: new threat exposure, employees “going rogue” for speed
  • Keys to enabling remote work: prioritization, triage, and local internet breakouts
Global Chief Information Security Officer at Zscaler

Security Risks for Companies When Adopting a Work from Home Strategy

VP of Platform Architecture at SonicWall

Team8 is a venture group and leading think tank solving problems of magnitude by creating and accelerating category-leading companies. Its unique company-building model is powered by a dedicated team of company-builders that lead the process from surfacing the problem through to building the solution in collaboration with a strong network of enterprise leaders. Team8 takes on the biggest problems at the heart of security, privacy, data, AI/ML, and builds companies to solve them. Team8 is backed by some of the world’s most renowned businesses including Cisco, Microsoft, AT&T, Walmart, Airbus, Softbank, Accenture, Qualcomm, Moody’s, Munich-Re, Dimension Data, Nokia and Scotiabank. --- As we are experiencing a "super" evolution, defined by decades worth of change that has transpired in only a few weeks, our confidence and trust in IT and digital foundational infrastructure has never been more critical. Security leaders are responsible for keeping their companies up and running in an environment that has not been stress-tested and that is increasingly fragile.Former Commander of Unit 8200 (Israel’s elite security & technology military unit) and CEO & Co-Founder of Team8, Formeer CISo of CITI bank, and Former Director of the NSA will share their insights.

In 2019 ransomware hit local governments hard. That trend is continuing in 2020, but ransomware threat actors have moved beyond targeting municipalities and are going after utilities, healthcare organizations, and other essential government services. The worst part is their attacks have only intensified during the COVID-19 pandemic. This talk will discuss the threat actors, how they are going after their targets, and what local governments can do to protect themselves, especially with limited budget and staff.

Automation of Transportation and Logistics | Powered by DCAVR

How do autonomous vehicles impact the cybersecurity landscape? Ever wondered how one of these vehicles could be attacked? Join us for a session where we explore this landscape and look at new opportunities for funding prototype development at Durham College

Founder at KTech Labs
President at University of Windsor WiCyS Student Chapter
Cloud Security Service Lead at Tata Consultancy Service
Manager of Applied Research Business Development at Durham College
CEO at SmartCone

5G and Innovation | Powered by Huawei

Deputy Mayor at Thames Centre
Asst. Professor and Industry Expert in Residence, Department of Computer Science at Western University
General Manager, Cybersecurity at OPG

Funding and Securing Smartcities

Senior Manager, Digital Innovation & Information Technology at City of Brampton
CEO and Co-founder at 4PAY INC
Founder & CEO at RiskAware Inc.
VP, IT Operations, Infrastructure & Cybersecurity at DUCA Financial
CTO at GHQ

Protecting Utilities

Manager of Information Technology at Entegrus
Vice President Information Technology at Enova Power Corp
CISO at New Brunswick Power
Founder at WiCSP

Invasive Technologies & Municipalities

Professor, Research Director at University of Calgary

Enabling Innovation and Opportunities in the Eastern & Rural Corridor

President & CEO at Cybera
Broadband Program Manager at Durham Region
Co-Founder and CEO at Argentum Electronics
CEO at Spark Centre

This session will introduce you to the certified secure computer user course by EC-Council - interested in beginning a career in Cybersecurity? This is a great starting point.

How safe have you been online? Chances are, you’re one of the many people who go to bed looking at your phone and wake up looking at your phone. We increasingly live on our devices, trusting them with confidential information and signing over our data to companies and their websites. But do you know how to keep yourself safe online? Let's find out, together. (Note that this session is intended for ages 14 to 18)

This session will be focused on identifying the potential cyber threats specific to Tourism and Hospitality Sector. We will also explore the importance of educating the end users within the industry (Management & Staff) and touch on the basic course of action and business continuity plan after a cyber disaster. As one of the top industries in Niagara and across Canada, it requires additional awareness and assistance from the cyber community, especially after COVID-19, to ensure all levels of safety are achieved. The increased reliance on digital tools and its impact to how we will be doing business in the future will open up further threats that need to be addressed proactively.

Join us with the world's youngest AI expert on the best ways to begin learning how to code

Scott Ashley, the President of Get Ready has developed and led the implementation of multiple infectious Disease Outbreak Programs for Healthcare and the Private Sector, he is currently on several committees and working groups including the “Meeting Events” to help restore the $32B conference and convention industry across Canada, Long Term Care and Retirement Homes the next steps and several Business Improvement Associations - to help find an integrated approach to standardize a safe and sustainable reopening of these community businesses. The topics for the presentation will include: • COVID-19 Transmission • The Regulations VS Guidelines • Staff training • The 80/20 rule • The Psychology of Returning – The Fear Factor • Screening Asymptomatic People • Effective Physical Distancing practices • Managing the Cluster Outbreak • Q&A

Everyone who lives or works in the digital world is concerned about cyber security. To that end, it is important that we all understand to protect their online identities. This session is designed to help raise cyber security awareness among students aged 10-13 and to capture imaginations by offering encouragement and support to counteract the social and peer pressures that discourage too many talented young people, especially women, from pursuing their interests in STEM related fields such as cybersecurity.

From smart thermostats to light bulbs and fitness trackers, the world of Internet connected "things" and apps are a part of our everyday lives. For that reason, it is critical to understand the importance of securing the Internet of Things. Join this enlightening discussion to learn about the world of Internet connected “things”, if they are hackable, and raise cyber security awareness for students ages 10-18.

What are the lessons from international hostage negotiators and their critical incident handling via law enforcement? What do global experts, including technical experts, cyber security consultants, educators and ‘cyber thought leaders’ think of using professional negotiators? What lessons can be shared from international hostage negotiators who have been responding globally to ‘crimes in actions’ for decades through negotiations and engagement with nefarious threat actors? Can these lessons managing and mitigating the risks associated to transnational organized crime networks and terrorist incidents be applied to cyber-attacks and incidents? Are we ready to support our C-suite, board executives and businesses in an extortion incident? When a major ransom demand strikes a client, are we ready? Do we understand the psychology of our opponents during an incident? Are we truly prepared to leverage all resources to derive maximum harm mitigation and optimal outcomes? When things go really-really wrong, do we know where, how and who to go for help supporting us through a stressful and critical incident with nefarious threat actors?

Our program changes the game for seniors--lessening isolation, enabling engagement and access to vital resources, and providing with seniors with tools that can enrich their lives with continued growth through learning.

WiCyS is a community of engagement, encouragement and support for women in cybersecurity. Join this panel discussion to learn more about WiCyS, including the benefits of WiCyS membership, our annual WiCyS conference, and how to get involved in a WiCyS Affiliate or Student Chapter.

In this session titled "A Song of Red and Blue", the audience will first experience the challenges a Security Operations Engineer faces when dealing with an active incident. The speakers will then walk you through the transition of a traditional Security Operation Center to enable an automated and a much faster response during an attack.

Event Details
Sponsors