siberXchange 3.0

siberxchange 3 0

siberXchange is a global community of cybersecurity leaders and professionals representing leading organizations across the world. Led by an advisory of cybersecurity champions, this online community has groups for problem solving, custom solutioning, networking and broadcasting.

Address the global community from our reporting hub with live statistics and immersive visuals: multilingual, accessible and customized outreach.

Together, we secure our world and communicate through live streams, whitepapers and demonstrations.

Together, we build the future of cybersecurity professionals and welcome learners to join us in collaborative educational exchanges and employment outreach.

This is Your Global Cyber Community.

Event Details
Cyber Defense Trainer
Secure Communications and Control Experts
Cyber Defense Trainer at Secure Communications and Control Experts
Principal
Ritesh Kotak Consulting
Principal at Ritesh Kotak Consulting
CEO
Talisman Security Inc
CEO at Talisman Security Inc
Co-Founder
Arc Compute Ltd.
Co-Founder at Arc Compute Ltd.
President and Founder
Netmechanics
President and Founder at Netmechanics
Manager, Application Services
City of Richmond Hill
Manager, Application Services at City of Richmond Hill
CEO
GroundLevel Insights
CEO at GroundLevel Insights
Director of Cyber Security Operations
Scotiabank
Director of Cyber Security Operations at Scotiabank
Senior Information Security Analyst
TD
Senior Information Security Analyst at TD
Director of Enterprise Risk Management
UBC
Director of Enterprise Risk Management at UBC
Cyber Security Consultant
Honeywell
Cyber Security Consultant at Honeywell
Senior Cyber Risk Consultant
CDW Canada
Senior Cyber Risk Consultant at CDW Canada
Strategic Advisor and Corporate Board Director
Descartes Systems Group
Strategic Advisor and Corporate Board Director at Descartes Systems Group
Business Information Security Officer
TD
Business Information Security Officer at TD
Director, Information Security & Risk
City of Toronto Toronto Community Housing
Director, Information Security & Risk at City of Toronto Toronto Community Housing
CSO
CDW Canada
CSO at CDW Canada
Chief Cybersecurity Advisor
Microsoft
Chief Cybersecurity Advisor at Microsoft
Director of Solution Architecture
Perimeter 81
Director of Solution Architecture at Perimeter 81
vCISO
vCISO
VP, IT Operations, Infrastructure & Cybersecurity
DUCA Financial
VP, IT Operations, Infrastructure & Cybersecurity at DUCA Financial
Professional Services Security Lead
AWS Canada
Professional Services Security Lead at AWS Canada
Senior Managing Consultant
IBM Security
Senior Managing Consultant at IBM Security
Founder
WiCSP
Founder at WiCSP
CIO
Electrical Safety Authority
CIO at Electrical Safety Authority
CEO & Co-Founder
BlokSec Technologies
CEO & Co-Founder at BlokSec Technologies
Sr. Product Security Architect
SAP
Sr. Product Security Architect at SAP
Director Cybersecurity & GRC
Allstate
Director Cybersecurity & GRC at Allstate
Vice President Information Technology
Enova Power Corp
Vice President Information Technology at Enova Power Corp
Chief Information Officer
Laurentian University
Chief Information Officer at Laurentian University
Director of Information Security
Thompson Rivers University
Director of Information Security at Thompson Rivers University
Co-Founder and Lead Instructor
Cyber Insurance Education Inc.
Co-Founder and Lead Instructor at Cyber Insurance Education Inc.
Professor and Researcher
Durham College
Professor and Researcher at Durham College
Chair
Operation: Defend the North
Chair at Operation: Defend the North

 

Join the opening discussion as we review the day and highlight the upcoming innovative approaches to each challenge. How will each organization fare?  The opening discussion gives you a sneak preview!

Known Unknowns: How do you Scan For Unknown Vulnerabilities in a Fast Paced, Global financial market.

Following a series of complaints from customers about unauthorized transactions, a financial institution has established a pattern consistent with a cyber attack. It has become evident that the transactional systems within the bank are compromised and that multiple actors, spread across international borders, are potentially involved. Initial investigations are revealing a spear phishing campaign may have utilized a vulnerability in an operating system that has now released key controls to illegitimate actors.We invite your team to prepare this institution in the midst of this shift? What are some of the best practices they should adhere to and how do they consolidate threat intelligence feeds. Your approach should outline how your team will work collaboratively with the institution to address the shifting landscape and provide actionable intelligence.

A bank is preparing for the launch of a series of digital wallets and would like to conduct a complete vulnerability analysis. More importantly, the analysis must distinguish between client and server side vulnerabilities and make recommendations. In light of a changing economy, the analysis must be forward thinking and ready to take on new trends.

Cross-site scripting is making an ugly return into the finance sector, with limited controls on browsers and user behavior, a bank wants to effectively plan proactive protection strategies. Besides training and awareness programming, a pathway for secure dev-ops must be taken. How can you help?

As a result of the pandemic, a financial institution has been forced to move operations to distributed and remote frameworks. Aware of the growing cyber risks facing digital banking, executive teams are concerned that remove workers are beyond the scope of their montoring and proactive thread capabilities. Employees have already reported COVID related pishing emails and their threat surface increases.

Join the opening discussion as we review the day and highlight the upcoming innovative approaches to each challenge. How will each organization fare? The opening discussion gives you a sneak preview!

A local government centrally manages and operates hydro and water operations for its constituents. In light of the recent attacks in North America, the IT team would like to proactively detect and respond to suspicious activity. However, given the detrimental costs of false positives, the team is unsure of how AI-driven models can action threat intelligence accurately. How can you help with the adoption of a new tool?

There is growing concern that critical infrastructure, such as energy and utilities, may be a target for disruption and/or espionage. In addition to establishing a plan to detect and manage insider threats, a series of activities need to be considered to ensure organizational preparedness and response. What steps should organizations/institutions take to build cyber resilience?

Without any prior warning, a local hydro facility has experienced a shutdown - all IT systems are locked with limited to no access to any control panels. You are now tasked with mitigating against any damage but also determining a path to system restoration. The integrity of the plant and community is in your hands.

 

Join the opening discussion as we review the day and highlight the upcoming innovative approaches to each challenge. How will each organization fare?  The opening discussion gives you a sneak preview!

Insider threat: Often, the greatest cyber-threat to an organization is not malware or cyber-criminal gangs, but instead trusted insiders with access to sensitive data and systems. Whether it’s an employee with malicious intent, or simply a misconfiguration, insiders can pose a serious threat to organizations.

With mounting cyber-attacks on critical infrastructure such as oil & gas industries, banking and healthcare platforms, are service providers prepared to react to the national warning against quantum attacks by adopting the next generation encryption protocols?

Cloud Inequity: The divide between the haves and the have nots in modern business infastructure. All businesses rely on a web presence- cloud inequity keeps the access to critical resources in the hands of the few

Join the opening discussion as we review the day and highlight the upcoming innovative approaches to each challenge. How will each organization fare?  The opening discussion gives you a sneak preview!

Many of the recent cyber attacks have utilized legitimate resources such as common applications or existing file objects as their initial entry point when targeting organizations with evolved tactics and techniques. Education is specifically susceptible to this type of entry point since both students and faculty bring devices from the outside and connect to the school network. It is also very common to use a significant number of unregulated applications. Document sharing and documents existing in both the private and public environment is also a challenge for educational entities. In several incidents a student has downloaded a vulnerable application to their personal device and become compromised, to worsen the matter they have connected their compromised device to the school network and transferred files to their teacher. To make matters exponentially worse in at least one of the cases the teacher then published the infected documents on a public drive for other students to access causing lateral movement. How can we prevent this from happening again?

With the evolving nature of cyber threats, today's cybersecurity leaders need to proactively prepare themselves. In this session, we explore what leadership traits successful cybersecurity leaders embody and learn how Phelps Cybersecurity is preparing leaders across Canada.

Event Details
Sponsors