September 26, 2024

Cybersecurity Summit: Canada East

Event Overview

ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Venue

Toronto

TBC

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Canada East Cybersecurity Summit: Financial Services

Cybersecurity Leadership: How is the CISO Role Evolving?

You can bet that their CISOs have responded to today’s challenges, and have a vision for what the CISO role will evolve to tomorrow and beyond.

One of our guests is the former CISO of the City of Toronto, and the other is current VP and CISO of RBC. We still have seats left on this panel discussion which will explore:

  • The impact of digital transformation thus far
  • How to approach the growing digital divide and start closing the gap
  • What is needed to grow a larger, more skilled cybersecurity talent pool

Canada East Cybersecurity Summit

Passwords Must Be Eliminated

 “Passwords must be eliminated,” he says, and in this exclusive session he explains not just why, but how:

  • The state of the art re: passwordless authentication
  • Concerns about the evolving threat landscape
  • CISO priorities as we head into 2022

Canada East Summit

Efficient TPRM: The Secret Sauce to Business Growth

In this talk, we will share updates to the insights that he first shared over four years ago. We will discuss how the opportunities and accountability afforded to developers need better support from employers and the vendor community. There will be practical advice to rise to the challenge. 

You will learn about: 

  • The change in responsibility and ownership that has occurred in application development; 
  • The gap that exists in the support system that is affecting your velocity; 
  • What developers and development leaders should do to better enable teams to succeed

Networking & Exhibition Break

Canada East Summit

Anatomy of a Business Email Compromise Attack and their Mutations (And why they continue to be successful today)

The Solution Room is an interactive and dynamic conference session designed to bring Cybersecurity Leaders together and provide peer-to-peer learning and SME advice on their most pressing challenges. 

At the beginning of The Solution Room session, attendees will be broken into small groups.  In your group, you’ll receive help from your peers, a moderator and a Secret Service Agent as you work through the lifecycle of a Business Email Compromise.

The US Secret Service has extensive experience and expertise in investigating and preventing BEC attacks. They have a proven track record of successfully identifying, disrupting, and prosecuting cybercriminals involved in BEC schemes. 

During this workshop on the anatomy of a BEC attack and its mutations, the US Secret Service will provide attendees the opportunity to learn from the experts and gain a deeper understanding of this type of cybercrime. Participants will hear about the latest forms of BEC attacks, including executive impersonation, invoice fraud, and supplier swindle, and understand the tactics and techniques used by attackers. 

Lunch & Exhibition Break

Canada East Cybersecurity Summit

Prioritizing Security Actions with Insight into Active, Relevant Threat Campaigns

Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. 

In this session you will explore:

  • How UEBA provides insights into user behavior, helping to detect potential threats before they occur.
  • The importance of human insight in cybersecurity and how to effectively incorporate it into your organization’s security strategy.
  • Tools and best practices for monitoring and responding to user behavior in a Zero Trust environment.
  • How to continuously improve your security posture with ongoing monitoring and analysis of user behavior

Networking & Exhibition Break

Canada East Cybersecurity Summit

The Impact of Cybersecurity on Business Continuity and Growth

By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.

In this session we will explore:

  • Why Piecemeal Security Solutions are failing Your Business
  • The Importance of Executive Leadership in Cybersecurity Strategy”s
  • Prioritizing Holistic Cybersecurity for Business Efficiency
  • The Risks of Neglecting Cybersecurity Investments
  • Maximizing Technology Projects with a Strong Cybersecurity Foundation

Canada East Cybersecurity Summit: Financial Services

Supercharging Your Cyber Insurance

Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents.  This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.

Key learning objectives:

  • Understanding the underwriting process and how to avoid voiding your coverage; 
  • Integration of your insurance resources into your cybersecurity program; 
  • Avoiding pitfalls during and after an incident that could reduce your recovery.  

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Sponsors

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration