PRODUCED BY
FOUNDING SPONSOR
PREMIERE SPONSOR

Moderated Roundtables

We will have two virtual roundtables for live discussion and interaction. At noon join us for Cybersecurity Horror Stories with white-hat hacker Terry Cutler, and at 2:00 PM join Identity and Privileged Access: What You Need to Know Now for a brief discussion about the role of identity and privileged access, and then an open discussion about anything you heard in the day’s sessions. Additional details and links to the roundtables will appear here.

Moderated Roundtables

At 2:00 PM join Identity and Privileged Access: What You Need to Know Now for a brief discussion about the role of identity and privileged access, and then an open discussion about anything you heard in the day’s sessions.

Day 1 Moderated Roundtables

We had two virtual roundtables for live discussion and interaction. At noon Cybersecurity Horror Stories with white-hat hacker Terry Cutler and at 2:00 PM we dicussed Identity and Privileged Access: What You Need to Know Now, and then an open discussion about the day’s sessions.

LIVE ROUNDTABLE ON NOW!


Cybersecurity Horror Stories

Join white-hat hacker Terry Cutler, Founder & CEO of Cyology Labs, to share your stories of the incredible cybersecurity gaffs you’ve seen – and how they could have been avoided. We’re not naming names in this session, but bring along your favourite (true) story of the disaster that should have been averted.
Join Now →

LIVE ROUNDTABLE ON NOW!

Identity and Privileged Access: What You Need to Know Now

During the conference today you heard panelists and presenters reference insider threats, the new perimeter, and the role of cloud in security. Join CyberArk AVP and County Manager Chris Ruetz and guest Gerry Owens in the post-conference networking session for a live quiz, a brief discussion about the role of identity and privileged access, and then an open discussion about anything you heard in the day’s sessions.
Join Now →

THREATSCAPE DOWNLOADS

Critical Infrastructure Threat Information Sharing Framework

Cybercrimes and incidents require data to solve. When incidents get reported with the best available data, law enforcement and security professionals have a better chance of solving crimes and preventing future impacts.

Prevention and Mitigation Techniques for Computer Intrusion

The FBI does not endorse any particular private mitigation tools or programs. However, there are techniques that all companies can and should implement to efficiently and effectively protect their networks.

Cyber Strategy Recommendations from NIAC

The President’s National Infrastructure Advisory Council (NIAC) includes executive leaders from private industry and state/local government who advise the White House on how to reduce physical and cyber risks.

FBI Sees Rise in Fraud Schemes Related to the COVID-19 Pandemic

Scammers are leveraging the COVID-19 pandemic to steal your money, your personal information, or both. Don’t let them. Protect yourself and do your research before clicking on links.

Report on Securing and Growing the Digital Economy

Recognizing the extraordinary benefit interconnected technologies bring to our digital economy, President Obama established this Commission on Enhancing National Cybersecurity.
Fortinet Zero-Trust Network Access

For Comprehensive Visibility and Control

The Fortinet Zero-Trust Network Access (ZTNA) framework uses integrated security solutions to identify and classify all users and devices seeking network access, assess their state of compliance with internal security policies, assign them to zones of control, and continuously monitor them.
Identity and Access Management:

A Challenge that Never Gets Old, But Sure Gets Harder

Even if organizations were already planning to be “digital-first” or “fully digital”, the pandemic vastly accelerated this transformation, with security sometimes being an afterthought.

11 AM

Opening Remarks

11:15 AM

International Cybersecurity Threats Panel

11:45 AM

How to Make Yourself Too Expensive to Hack

NOON

Moderated Luncheon Roundtables
  • Cybersecurity Horror Stories hosted by Terry Cutler

12:30 PM

Our Live Quiz

12:40 PM

The Changing Threatscape Panel

1 PM

Dealing with the Media Following a Hack

1:25 PM

Hardware Needs Love Too

1:50 PM

Closing Remarks

2:00 PM

Identity and Privileged Access Roundtable

1:50 PM

Closing Remarks and Networking Roundtable hosted by CyberArk

Security Downloads

Top 10 Business Email Compromise Scams of 2020

Falling for an impostor’s email is easier than you might think. That’s because business email compromise attacks prey on human nature.
Download →
proofpoint

Proofpoint is purpose-built to protect people, first and foremost

PAM as a Service for Dummies

Privileged Access Management (PAM). Almost all of today’s breaches tie back to an attacker stealing an admin account or credential.
Download →
Cyber Ark

DATA SHEET - CYBERARK DISCOVERY & AUDIT

CyberArk DNA generates a detailed report that IT auditors and decision-makers can use to evaluate the status of privileged accounts in the organization and identify areas of risk.
Download →
Tehama

Securing the Workplace of the Future

Top four tips to securely onboard a digital workforce and third-party service providers
Download →





Cyber Security Today Podcast

Updates on the latest cyber security threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.






Join our Interactive Chat

Load on your second screen (phone or tablet) and chat with ITWC and CIRA staff — interact with other attendees.

Scan the QR CODE below:
Group Chat

Go to this link:
tinyurl.com/maplesec-chat
Or join in the embedded chat.


SPEAKERS

Dr. Ali Dehghantanha
CEO, CyberOrion

Vanessa Henri
Associate, Fasken

Howard Solomon
Cybersecurity Journalist

Jill Clayton
Information and Privacy Commissioner, Province of Alberta

Jon Lewis
Product Marketing Specialist, CIRA

Cat Coode
Founder
Binary Tattoo

Andrew Loschmann
Chief Operating Officer
Field Effect

Brian Lesser
CIO
Ryerson University

Atefeh Mashatan
Director
Cybersecurity Research Lab
Ryerson University

Jonathan Nguyen-Duy
VP CISO Fiel Team, Fortinet

Byron Holland
CEO, CIRA

Allan Bonner
Cybersecurity Author – Board of Governors, MacKenzie Institute

Michael Ball
Founder, Team CISO

Terry Cutler
Founder & CEO, Cyology Labs

Shawna Coxon
Deputy Chief, Toronto Police Service

Le Ha Hang
VP, Global Security
CGI

Jacques Latour
Chief Technology Officer, CIRA

Amy Oke
Senior Engineer

Natalia Stakhanova, Ph.D
Director, The CyberLab
University of Saskatchewan

David T.S. Fraser
Partner, McInnes Cooper

Frank Downs
Senior Director, Cybersecurity Advisory and Assessment Solutions, ISACA

Matthew MacNeil
Director, Standards and Technology, CIO Strategy Council

Dr. Florian Kerschbaum
Director, Cybersecurity and Privacy Institute

David Shipley
CEO and Co-Founder, Beauceron Security Inc. 

Brennen Schmidt
Cybersecurity Author — Board of Governors, MacKenzie Institute

Mitra Mirhassani
Associate Professor
University of Windsor

Steve Biswanger
President CISO Division, CIOCAN

Benoit Dupont
Canadian Research Chair in Cybersecurity, Universite de Montreal

Sherry Rumbolt
National Information System Security Officer
Directorate Information Management Security, DND/CAF

Jim Love
CIO, ITWC

Robert W. (Bob) Gordon
Executive Director
Canadian Cyber Threat Exchange

Spencer Callaghan
Communications and Content Manager, CIRA

Neal Ziring
Technical Director
Cybersecurity Directorate, National Security Agency

Adam Hamilton
Special Agent, Federal Bureau of Investigation

Chris Ruetz
AVP & Country Manager
Cyberark

Gerry Owens
IT Risk Management and Cyber Security Executive

Andrew Milne
Chief Revenue Officer
Field Effect

Steve Winterfeld
Advisory CISO
Akamai Technologies

Derek Manky
Chief, Security Insights & Global Threat Alliances, FortiGuard Labs

Dan Mathieson
Mayor
City of Stratford

Claudiu Popa
Principal Risk Advisor
Informatica Security

Leo de Sousa
Deputy Chief Information Officer, City of Vancouver

Helen Wetherley Knight
Principal, Helen Knight Consulting

Paul Vallée
Chief Executive Officer, Tehama

Adam “Abe” Abernethy
MISA Board member

Dr. Kevin Mahoney
Senior Director, Strategy
Fortinet

Mark Gaudet
Product Manager, Canadian Internet Registration Authority

Join the Conversation


PRODUCED BY
FOUNDING SPONSOR
PREMIERE SPONSOR
PRESENTING SPONSORS
SPONSOR
SUPPORTED BY