Agenda 2020

CISO Forum Canada 2020
Schedule

*Schedule is subject to change.

10:00AM EST

Opening Keynote | Powered by IBM – Open Cybersecurity Alliance – Open Security – From Patchwork to Platform with Jason Keirstead

11:30 AM EST
Panel | Best Practices for Adopting an Effective Zero Trust Strategy with Bill Harmer, Michael Ball, Nicole Brouillard, Alkin Gorgun, Nicolas Khoubbieh
1:00PM EST

Keynote | Evolution of Cyber Resilience: What’s Next?

2:30PM EST

Keynote | Powered by IBM – Ensuring Efficiency in Compliance: Is it an Uphill Battle? with David Craig, Chetan Raithatha, Adriana Gliga-Belavic, Cat Coode

4:00PM EST

Panel | KPI’s & KRI’s for Security Governance in the Post Pandemic World with Danny Sutantyo, Kashif Parvaiz, Maggie Calle, 

6:00PM EST

Closing Session | vCISO: Success Stories with Farooq Naiyer, Michael Ball, Michael Castro,

10:00AM EST

Opening Keynote | Powered by VMware – Cybersecurity in the Age of Espionage with Ali Hirji, Eric O’Neill

11:30 AM EST
Panel | Powered by Darktrace – How Secure is the Cloud: What We Have Learned from Recent Breaches Encountered by Leading SaaS Providers with Nabil Zoldjalali, Michael Ball, Samer Adi, Sandra Liepkalns
1:00PM EST

Keynote | Powered by CrowdStrike – Speed Matters: What It Takes to Be Successful Defending Against High Speed Attackers with Austin Murphy

2:30PM EST

Keynote | Powered by CrowdStrike – Intelligence-Led Rapid Recovery with Jason Rebholz, Bernard Regan, Adam Cottini, Sandra Liepkalns

4:00PM EST

Keynote | Powered by Benchmark – What DevSecOps is Not? with Andrew Vezina, Aniket Bhardwaj, Sandra Liepkalns, Shlomo Bielak |

6:00PM EST

Closing Session | Auditing Cybersecurity in a Non-Traditional Environment with Daniel Pinsky, Juan Araya

10:00AM EST

Opening Keynote | Developing an Ecosystem for Supporting Cybersecurity Economy with Mahdi Raza

11:30 AM EST
Panel | Hours of Remembrance With the Mayors with Mahdi Raza
1:00PM EST

Keynote | Powered by VMware – Security is Broken: The Solution Requires a New Approach 

2:30PM EST

Panel | Powered by ConnexHealth & Lyte Clinic – Security Trends in Telemedicine with Ali Mohamed, Ali Hirji, Kashif Parvaiz, Mayor Shaun Collier, Medha Saraiya, Rob Davidson, Sam Vishal

4:00PM EST

Panel | Using AI for Monitoring, Compliance and Governance with Rukmani Ramasubbaralyalu, Ruba Alomari, Sukhwant Sagar, Danny Aniag, Samer Adi

6:00PM EST

Closing Session | The Role of Law Enforcement in Countering Cyber Crime with John Roberts, Vanessa Henri

10:00AM EST

Opening Keynote | Impact of Recent Cyber Attacks on the Growing E-Commerce Industry

11:30 AM EST
Panel | Powered by MIS3 – Powered by MIS3 Managing Digital Risks through Threat Intelligence with Alkin Gorgun, Sunny Jassal, Mohsen Azari, and Serge Bertini
1:00PM EST

Keynote | Powered by Huawei – Best Practices in Managing and Securing IoT with Olivera Zatezalo

2:30PM EST

Panel | Powered by City of Oshawa – Data Governance and Privacy Challenges for Smart Communities 

4:00PM EST

Panel | Shadow It: Is It the Root of All Evils? with Shadow It: Is It the Root of All Evils? with Ali Shahidi, Michael Ball, Farooq Naiyer, Sandra Liepkalns

6:00PM EST

Closing Session | Powered by ISACA  Toronto Chapter – Virtualizing Security Training with Heather MacLean, Hugh Burley,  Namir Anani

10:00AM EST

Opening Keynote | Powered by VMware –  Threat Hunting – New, Emerging, and What to Do About Them

11:30 AM EST
Panel | Powered by Huawei – Is Cybersecurity Still High on the List for BoD with Carlos Chalico, Farooq Naiyer, John Pinard, Mike Melo, Olivera Zatezalo, Scott Currie
1:00PM EST

Panel | Powered by Leading Cyber Ladies – Fireside Chat | Data Privacy, Automobiles and Your Personal Data; What You Need to Know Now with Helen Oakley

2:30PM EST

Panel | Powered by Windsor Essex – Women Leaders Helping Build the Talent Pipeline with Ali Hirji and Victoria Granova, Nicole Anderson, Sherry Rumbolt

4:00PM EST

Panel | ON CHEC; Lessons Learned from the ON CHEC Program with John Levay, Farooq Naiyer, Luc Roy

6:00PM EST

Closing Session | Awards Ceremony

Registrations will only be accepted from Director-level or above information security practitioners. All registrations are subject to approval and will be rejected if this requirement is not met.