The Future of Cybersecurity

CISO Think Tank

April 12, 2023 - Toronto, Canada

Visionaries

Octavia Howell

CISO

Equifax Canada

Think Tank Speaker

Recognized as one of the 2022 Top 20 Women in Canada, Octavia Howell has spent her career protecting some of the world’s largest financial institutions from cyber attacks. Today, she serves as Equifax Canada’s Chief Information Security Officer and is the Founder and CEO of Augustus Redefined, an organization focused on the advise ent of Black Women in Cyber. Octavia believes a security leader should mentor, motivate trust, and lead their teams to act with integrity and transparency. She often says, “A team is only as strong as their leaders and each leader casts a shadow that they will be held accountable for.” Octavia is motivated by the belief that we are placed on this earth to help each other achieve greatness (whatever that may be).

Ben Halpert

CSO

Castle Black

Think Tank Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.--

Steve Magowan

VP - Cyber Security

Blackberry

Think Tank Speaker

A results-focused, forward-thinking, business minded Cyber Security, Security Architecture & Risk Management Leader with extensive experience and proven success at enabling business goals while invoking transformational change. Committed to strategic, risk focused innovation that aligns with the business and enables their goals while defending and supporting organizational interests. Recognized as a highly collaborative leader with a long history of managing large, globally distributed teams in high responsibility, error intolerant environments. Heavily invested in the team approach and committed to the maintenance of a positive work culture. Fluent in Spanish. Dated but revivable French. KEY ACCOMPLISHMENTS VALUE CREATION: Establishment of Cyber Security as a key enabler in revenue generation, through the mapping of compliance initiatives to the many government mandated compliance frameworks that gate sales in the current risk landscape (Biden Executive Order, CMMC, FedRAMP, CanRAMP, IRAP, ISMAP) Achievement of cost leadership with dramatic efficiency and efficacy gains through next generation methodologies & process modernization that lower the friction of governance and seamlessly integrate risk into the enterprise fabric. RISK MANAGEMENT: Strategic oversight of advanced risk tactics that leverage the power of Data Analytics, Machine Learning and other associated technologies to enable adaptive, effective and innovative solutions to previously unsolvable risk and security problems. CORPORATE GOVERNANCE: 22 years of successful compliance with Sarbanes-Oxley, SOC1 / 2, OSFI and NERC regulatory governance CORE AREAS OF STRENGTH Strategic Business Vision / Advanced Technology & Tactics Corporate Governance / Risk Management / Risk Analytics Data Protection / Data Loss Prevention / AI / Machine earning PCI-DSS / SOX / SOC 1 & SOC 2 / Privacy Compliance NIST / FIPS / COBIT / PIPEDA / GDPR / NYDFS / HIPPA Application Security – CI / CD, DevOps, DevSecOps Cloud Security Architecture / Zero Trust / IoT / SCADA Project / Program Management / Governance (Agile) $MM Budget Management / Large Team Leadership Executive Presentation & Large Audience Speaking

Stephane Asselin

Country Manager - Sales Engineering

CrowdStrike

Think Tank Speaker

Stephane Asselin, with his 29 years of experience in IT, is a Senior Manager for the entire CrowdStrike Canada Technical Team. He has national responsibility for Canada for a team that works with customer at planning, designing, and implementing Security solutions and all processes involved. At CrowdStrike, Mr. Asselin works with top Canadian strategic customers and partners, enabling them on all Modules of the CrowdStrike platform, developing technical expertise and helping them secure their local and remote workforce.

Ben Shelston

Technical Director

Netskope

Think Tank Speaker

Ben Shelston is the Technical Director for Netskope Canada. Ben leads the Solutions Engineering team that has been architecting SASE solutions for Canadian organizations since before the acronym was coined. Ben has been at Netskope for over 6 years, and has been in a similar roles for over 15 years.

Ozan Ocal

Director Cyber Security & Privacy Canada

PwC

Think Tank Speaker

Ozan is a Director within PwC’s Cybersecurity & Privacy practice, based out of Toronto. He is leading the network security practice across all industries in Canada. He is specializing in micro-segmentation, software defined perimeter, zero trust,traditional network security and next gen firewall solutions to enable businesses with reduced attack surfaces. Prior he was in different architecture positions within Rogers Communications for a number of years. He holds MBA and CCIE (11318) Routing and Switching, CCIE Security Certifications since 2002. Ozan has delivered high profile projects, leading many POCs for technology evaluation and contributed into multiple RFPs. He is experienced in leading multi-vendor IP technologies, system integration, network and .

Mike Hortobagyi

Senior Manager, Solutions Engineering

Okta

Think Tank Speaker

With almost 20 year in Canadian infosec, Mike Hortobagyi is an accomplished presales engineer and technical leader. Based in Toronto, he currently leads Okta's Commercial SE team across Canada. Mike has specific experience in emerging/disruptive security technologies including Zero Trust Security, Identity-as-a-Service (IDaaS) and Privileged Access Management (PAM).

Saurabh Dixit

Executive VP, Information Technology

Citco

Think Tank Speaker

Founded in 1948, Citco is an independent group of companies providing a range of financial services to clients throughout the world, including hedge funds, institutional banks, private equity firms, high net-worth individuals. and real estate firms.

Mamta Sethi

CIO - Group Functions Technology

Manulife Financial

Think Tank Speaker

Experienced Senior Strategy & Transformation Executive with a demonstrated history of working in the financial services industry. Expert and skilled in Technology, Application Development & Infrastructure, Business Development, Design Thinking, Operational and Organizational Efficiency, Business Relationship Management, Organization Leadership and Development, Strategic Workforce Planning and Organizational Change Management.

Stelian Hudea

CIO

ROINRO INC

Think Tank Speaker

As Computer Engineer and Electronics Engineer, Stelian constantly pushing the technology boundaries to build super fast and efficient Information Technology turn-key solutions. He was working for Fortune 100 companies and architects. He deployed their World-Wide Communication platform and worked on top security projects involving the leading security agencies at the National and International levels. He always loved AI, ML, and BI and it always came easy for him to architect and deploy system automation and intuitive reporting that generated accelerated productivity boosts.

Janet Lin

Vice President Technology - Lending & Payments

Equitable Bank

Think Tank Speaker

Equitable Bank, a subsidiary of Equitable Group, is a full service commercial bank in Canada. They are headquartered in Toronto, Ontario, Canada.

April 12, 2023

Agenda

All times Eastern Time

9:30 AM-10:15 AM

Registration


10:15 AM-11:00 AM

Morning Networking


11:00 AM-11:05 AM

Opening Remarks


11:05 AM-11:50 AM
Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


11:55 AM-12:10 PM
Disruptor

The Modern Enterprise Dilemma: How to Move Beyond the Network Perimeter to Secure Dynamic Work Environments.

Together, Cloud Leaders CrowdStrike, Netskope, and Okta, provide integrations that extend their value to customers to protect endpoint devices, provide unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps, as well as extend identity-based governance and compliance.

In partnership with:

12:15 PM-1:15 PM

Lunch & Networking


1:15 PM-2:00 PM
Panel

The Power of Three: Best-of-Breed Protection and Security for the Modern Enterprise

Together, CrowdStrike, Netskope, and Okta represent three best-of-breed solutions that form the core pillars of a modern, comprehensive security architecture. The Engineering Leaders of each organization will be part of a panel discussion to share the evolving Canadian threat landscape and how it has become unequivocally critical to adopt the right long-term security strategies for a remote-first workforce.

In partnership with:

2:05 PM-2:40 PM
Fireside Chat

Cloud Computing & Cloud Vulnerabilities

Cloud computing has become a cornerstone of modern business operations providing the enterprise with agility and scalability needed to thrive in the digital age. CIOs must evaluate the risks and benefits of cloud computing as its adoption continues to grow. While cloud solutions offer benefits like cost savings and flexibility, they also pose data security risks. CIOs & CISO’s must assess the enterprise and integrate cloud solutions effectively. By managing these risks and benefits, the CIO & CISO can fully leverage cloud technology for their organization's success.


2:40 PM-3:00 PM

Networking Break


3:00 PM-3:15 PM
Disruptor

Software Liability and a Path Forward

CISOs are facing an increasingly complex, dangerous, and difficult digital landscape. Software supply chain attacks have increased an average of 742% each year since 2019. The average cost of a data breach is an astounding $4.35 million–besides the potential shareholder lawsuits, loss of customers, and damage to brand reputation. Earlier this month, The White House released a new cybersecurity strategy that calls for greater cybersecurity liability and holding software providers responsible for insecure products released to consumers. Meaning, it’s now an organizational imperative at the highest level to get serious about securing your software supply chain and stop malicious open-source codes before their download.

In partnership with:

3:20 PM-4:05 PM
Panel

Third-Party Exposure

In today's interconnected business world, companies rely on vendors and suppliers for various services, which can pose significant cybersecurity risks. Third-party exposure is a major concern, as companies can be held liable for any data breaches or security incidents that occur due to the actions of their third-party providers. In 2023, this risk is expected to increase as companies continue to outsource work to third-party providers. This makes it more critical for companies to have effective security measures in place to properly secure third-party access. Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must prioritize implementing comprehensive security measures that include vendor risk assessments, due diligence, contractual requirements, and ongoing monitoring. Additionally, companies must ensure that their third-party providers adhere to cybersecurity best practices and standards. By taking these proactive steps, companies can better protect themselves from the risks associated with third-party exposure in 2023 and beyond.


4:05 PM-4:25 PM

Networking Break


4:25 PM-5:10 PM
Vision Keynote Panel

The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


5:15 PM-5:30 PM
Disruptor

The Castle at Home

Technology executives are laser-focused on operating and securing the critical aspects of their business. Continuity, compliance, and risk management cannot come at the expense of high performance. When faced with the same responsibility for their family, security and privacy compromises unfortunately get made. They are simply stretched too thin.

Partners, children, and parents are reusing passwords that have already been part of a data breach. Security and privacy settings on Instagram, TikTok, Facebook, Snapchat, Venmo, LinkedIn, and WhatsApp are not met with the same rigor as AWS, Salesforce or DocuSign in the enterprise. MFA adoption is low.

Learn how a proactive consumer Cyber Health company is delivering cybersecurity, privacy, and digital hygiene to all.


5:30 PM-5:35 PM

Closing Remarks & Raffle Giveaway


5:35 PM-6:35 PM

Cocktail Hour


In Partnership With