close x
download

Brochure

Enter Your Info Below And We Will Send
You The Brochure To Your Inbox!

Thank you!
Your submission has been received!

Oops! Something went wrong while submitting the form

Register

RiskSec Toronto 2017

Decrease Your Risk, Increase Your Security  |  Presented by SC Media
A two day conference and workshop for information and security professionals providing insightful analysis on all of the latest cybersecurity issues in collaboration with highly respected thought leaders.
June 12 & 13
St. Andrews Club & Conference Center
27th FL, 150 King St W
Toronto, CA
SC Media
Attention (ISC)2 Toronto Chapter Members, please join us for our next Town Hall meeting on June 12th at 6-730 PM at the RiskSec Conference, St Andrews Club & Conference Centre in room L4. Email sc.marketingmanager@haymarketmedia.com for registration details. (Open to members only)
Presenting our new conference RiskSec Toronto

Formerly SC Congress Toronto

  Decrease Your Risk, Increase Your Security

A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.


W elcome to RiskSec Toronto. SC Media, the leading IT security media brand, brings you an all-new conference discussing the latest in threat intelligence and risk management strategies. This conference is designed for IT security professionals with a focus on the most pressing issues confronting Toronto’s cybersecurity landscape.

Evolving from our SC Congress series, the leading cybersecurity conference and expo known throughout the globe, RiskSec is comprised of  interactive learning sessions, keynotes and panel discussions, and features an area designated for technology companies to demo and share their latest products and services. This event was created to immerse attendees in highly personalized and focused interactive exercises with discussions from senior thought-leaders in the cybersecurity industry.

Attendees will share perspectives with peers and discuss steps to tackle the cybersecurity issues proving most challenging to us all. RiskSec Toronto will enhance your knowledge set to bolster your organization’s security controls and build up your threat intelligence, risk management plans and best practices.

After 10 years of producing SC Congress events around the world, we are excited to introduce a modern cybersecurity conference and expo to meet the needs of today’s cybersecurity professionals.

You will not want to miss this gathering.

Illena Armstrong
VP, Editorial
Are you interested in participating as a presenter/speaker this June at RiskSec Toronto 2017?
Call for papers
speaker

John Glowacki

Chief Operating Officer, Shared Services Canada

John Glowacki was appointed by the Prime Minister of Canada in 2014 as Chief Operating Officer (COO) of Shared Services Canada. John is a former Corporate Vice President and CTO of CSC – at the time, the third largest IT service provider in the world. He retired from the U.S. Air Force in 2000 after 21 years of service mostly in special operations with experience in acquisitions, industrial engineering and education. 

learn more
speaker

John Proctor

VP, Cyber Security

John Proctor, VP, Cyber Security, is responsible for CGI’s strategic cyber consulting, including governance, risk and compliance, for CGI in Canada. Together with his team of security consultants, John partners with government and commercial clients to build and execute practical, proactive security roadmaps that address both IT and business concerns and priorities.

learn more
speaker

Graham J. Westbrook

Cybersecurity Analyst, Geisinger Health System’s Information Security Office

Graham J. Westbrook (Sec+, C|EH) is a cybersecurity analyst with Geisinger Health System’s Information Security Office. As an intelligence analyst by training and cybersecurity analyst by trade, Graham merges the disciplines to run the Threat Intelligence and User Awareness programs at Geisinger. Past experience includes time with a Defense Contractor, Foreign Policy firm and a Nashville-based tech. company.

learn more
speaker

Mark E. S. Bernard

Author, NIST Cybersecurity Courses
LEARN MORE
speaker

Walt Williams

Director of Information Security, MonoType Imaging

Walt Williams, CISSP®, SSCP®, CPT has served in leadership roles of organizations that have provided secure and scalable services in the cloud for over ten years.  He currently serves as Director of Information Security at MonoType Imaging. He is an outspoken proponent of design before build, an advocate of frameworks and standards.  He has spoken at Security B-Sides, Boston App Sec, Rochester Security Summit, DefCon’s Wall of Sheep, and the 2016  27K summit.

LEARN MORE
speaker

Lois Tullo

Exec-in-Residence, Global Risk Institute

Lois is currently an Exec-in-Residence at the Global Risk Institute.  Here upcoming book entitled - A Riskier World? It's Here - A Global Risks and Trends Framework, will be published in the fall. Prior to joining Schulich, Ms. Tullo was CFO at CIBC Finance Inc where she was responsible for a $6 billion portfolio of student and car loans. She was also responsible for interim risk management and HR. Before that Ms. Tullo was Director of Finance, HR, and Business Process Redesign at Unitel Communications.

learn more
speaker

Bobby Singh

CISO & global head of infrastructure, TMX Group

Mr. Bobby Singh has 20 plus years’ experience in information security with extensive experience in risk management, business operations, compliance, consulting and auditing. As the Chief Information Security Officer executive at TMX, Mr. Singh’s role involves ensuring that security is built-in both at the business-level and within the Infrastructure. 

learn more
speaker

David Foote

David Foote, Chief Analyst & CRO, Foote Partners, LLC

David Foote is a trends research pioneer and one of the most quoted industry authorities on global tech workforce trends and the human capital side of technology value creation. He has spent more than two decades introducing innovative data-driven benchmark research and analysis focusing in IT/business cross-skilling and technology/business management integration, while also pioneering new industry practices for more accurate compensation benchmarking, tracking, and forecasting of tech skills supply and demand. 

learn more
speaker

Nathan LaFollette

Director, Trustwave SpiderLabs

Nathan LaFollette is a global information security leader. He currently is the Managing Consultant at Trustwave SpiderLabs focusing on web and mobile application security for the top Fortune companies. He has been interviewed and published by SC Magazine, Network World, Cisco and Gartner, and has acted as a trusted advisor to many corporate CEOs on best security practices.

learn more
speaker

John Beal

Canadian Endpoint Security Leader, IBM Security

John Beal is responsible for Endpoint Security Solutions across Canada and the Caribbean. He has 22 years experience with IBM across both Hardware and Software sales. For the last five years, he has been helping organizations remediate vulnerabilities faster while compressing cycles, reducing costs and ensuring continuous compliance on all endpoints including Servers, PCs, Laptops, ATMs, POS', Smartphones and Tablets.

learn more
speaker

Tony Sager

Senior Vice President and Chief Evangelist, CIS

Tony Sager is a Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security). In this role, he leads the development of the CIS Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute.

learn more
speaker

Robert W. (Bob) Gordon

Executive Director, Canadian Cyber Threat Exchange (CCTX)

Bob is the Executive Director, Canadian Cyber Threat Exchange (CCTX) where he has organizational responsibility to deliver cyber threat information services and lead all cyber intelligence engagements and research activities. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a long and successful career in the Federal Government, which included being the architect of Canada’s Cyber Security Strategy. 

learn more
speaker

Priscilla Moriuchi

Director of Strategic Threat Development, Recorded Future

Priscilla Moriuchi is an experienced threat intelligence manager and senior expert on East Asia and Pacific regional and cyber issues. Before coming to Recorded Future, Priscilla spent 12 years in the U.S. intelligence community and, most recently, led the National Security Agency’s East Asia and Pacific cyber threats office.

learn more
speaker

Casey Corcoran

Partner, FourV Systems

Casey is a Partner at FourV Systems, developing and marketing a business intelligence platform for security operations. Casey’s career includes, CIO of JoS. A. Bank Clothiers, CIO of Fairchild Corporations retail sports division, VP of the Commercial Healthcare Products and Services at General Dynamics Information Technology and the founder of a successful early innovation startup in wireless applications.

learn more
speaker

Angus MacDonald

Director, Sales Engineering, Trend Micro

As the Director, Sales Engineering for Trend Micro Canada, Angus MacDonald is responsible for systems engineering across the country.  Angus has more than 25 years of experience in the Security Industry, with an extensive background directing corporate programs and technology groups. Prior to joining Trend Micro, Angus held senior roles at Zix Corporation, Entrust and the Government of Canada. 

learn more
speaker

Carlos M. Recalde

Managing Director & CTO, Successful Technology, LLC

Carlos Recalde is currently the Managing Director of Successful Technology, LLC,

and also serves as the Chief Operating Officer for Sheltered Harbor LLC, a Financial

Industry not-for-profit cyber-resiliency organization. Until recently, he was the Chief

Technology Officer for SunGard’s Asset Management business, where he led a

transformation to market-focused, agile product development which enabled

double-digit revenue growth for this global financial technology provider. 

learn more
speaker

Rick Doten

Chief, Cyber and Information Security, Crumpton Group LLC

Rick is Chief, Cyber and Information Security for Crumpton Group in Arlington, Virginia.  Rick provides strategic guidance for large company CISOs, and sometimes acts as surrogate CISO for companies who want to improve the IT security and risk management programs. Prior to joining Crumpton Group, Rick was the CISO of Digital Management, Inc. (DMI), an international mobile services company, where he maintained an ISO 27001 certified program while the company tripled in size through acquisitions and organic growth. 

learn more
speaker

Manan Qureshi

VP and Head of Business Continuity, Crisis Management, Integrated Cyber Command + Control, Riyad Bank

Manan is a senior global governance, risk and compliance executive with over 16+ years of experience leading teams delivering strategic and operational cyber security, business continuity and disaster recovery services to financial institutions and customers worldwide. He is known for his technical brilliance and ability to communicate and deliver to internal and external clients at all levels. Manan is a thought leader and international speaker on enterprise risk mechanics and automation as well as innovative and disruptive technologies.

learn more
speaker

Chris Henry

Executive Director Technology, Cyber Security and Hospitality, Global Consulting Group

Chris is Head of Executive and Hospitality Interim, Consulting and Placements and assists executives and boards of organizations looking for executive and department head leaders to help them achieve their strategy – including CISO, CTO, CIO, CPO, CDO, CMO, CFO, CEO. As a practicing consultant and former CIO, Chris simplifies service, digital experiences, technology, cyber security, cloud and innovation for organizations of all sizes and levels of complexity. 

learn more
speaker

Tom Levasseur

Vulnerability Assessment and Penetration Testing Specialist, CGI

Tom is an experienced IT Security Evaluator, Vulnerability Analyst, System Administrator, IT Security Trainer, Project Manager, and Senior Manager with a unique and valuable combination of technical, business, presentation and IT security skills.  His current work combines fulltime hands-on vulnerability analysis and penetration testing with part-time work on designing, building and delivering IT Security training through live Cyber Security Competitions for IT technical and planning professionals.

learn more
speaker

Steven Hurley

Assistant Vice President, Global Information Risk Management, Manulife

Steve Hurley in a seasoned Information Security and Risk Management leadership professional. He has spent over 20 years of his career with large Canadian Financial Institutions, where he is best known for leading the design and implementation of innovative Cyber Security and Risk Management programs and solutions. Steve has also spent over 15 years working at leading global suppliers of Information Security and Business Continuity Management Services, where he expended a significant amount of time and energy leading the design and implementation of world class Information Security and Risk Management solutions to a broad range of industry sectors.

learn more
speaker

Vivek Khindria

Head of Information Security, Bell Canada

Vivek Khindria, Head of Information Security, accumulated about 20 years experience in the Canadian Financial sector before joining Bell.  This experience included Trading floor design, development environments, security testing and assurance, security strategy and benchmarking, security standards and policy, awareness and education programs and Payment Card Industry Data Security Standard (PCI-DSS). 

learn more
speaker

Kris Klein

Managing Director, IAPP Canada, Partner, nNovation LLP

Kris Klein has more than a decade of experience in the federal regulatory arena, which he gained in both the public and private sectors in Canada. He is also one of the country's leading experts on the application of the Access to Information Act, the Privacy Act and the Personal Information Protection and Electronic Documents Act (PIPEDA). Klein practiced law with a preeminent national firm for several years prior to gaining a significant amount of litigation experience working for the Federal Department of Justice. He also has provided instrumental and crucial legal advice for the Privy Council Office.

learn more
speaker

James Smith

Sales Engineer, CISSP, CSTA, TCSSE, Tenable Network Security

James has 20 years experience in IT and Infosec, working in the tech, telecom, and banking industries.  Unix, Linux, and Networking skills have given James a holistic approach to Information Security.  James joined Tenable in December of 2016 as the Sales Engineer for Ontario. 

learn more
speaker

Cameron MacLeod

Enterprise Sales Manager, Cylance

Cameron MacLeod leads Cylance’s go-to-market strategy for Eastern Canada. Prior to Cylance, Cameron was a Senior Security Sales Manager with TELUS and a Regional Sales Manager with a large endpoint antivirus security company. Cameron possesses nearly a decade of experience with endpoint security and malware prevention.

learn more
Schedule

The Schedule

8:00 am
-
9:00 am

Registration and breakfast

Registration and breakfast

9:00 am
-
9:30 am

Opening Keynote

Shared Services Canada – On the front line of the Government of Canada’s cyber defence

Mr. John A. Glowacki Jr. will discuss how Shared Services Canada safeguards government networks and systems through a coordinated, enterprise-wide approach. By incorporating security into the design of IT projects, procurements and initiatives, the Department is improving cyber incident response capabilities and introducing best practices across the Government of Canada.

Moderator: Eric Green, program director, SC Media

John Glowacki, COO, Shared Services Canada

Opening Keynote

Shared Services Canada – On the front line of the Government of Canada’s cyber defence

Mr. John A. Glowacki Jr. will discuss how Shared Services Canada safeguards government networks and systems through a coordinated, enterprise-wide approach. By incorporating security into the design of IT projects, procurements and initiatives, the Department is improving cyber incident response capabilities and introducing best practices across the Government of Canada.

Moderator: Eric Green, program director, SC Media

John Glowacki, COO, Shared Services Canada

9:30 am
-
10:00 am

Editorial Spotlight Session

Internet of Things Info/Cybersecurity Jobs, Skills, and Staffing: What You Need To Know Now

IoT is growing at a 32.6% annual rate through 2020 but a 6 million shortfall of cybersecurity professionals is projected by 2019: recipe for disaster or the biggest career opportunity in decades for security professionals? This session will discuss transitioning info/cybersecurity jobs and skills to an IoT world including: What’s trending right now in IoT-driven jobs, skills, and certifications; current salaries for info/cyber security jobs and cash premiums skills; what should employers and tech professionals be doing now to prepare for securing IoT long term?  

Moderator: Bradley Barth, senior reporter, SC Media

David Foote, Chief Analyst & CRO, Foote Partners, LLC

Editorial Spotlight Session

Internet of Things Info/Cybersecurity Jobs, Skills, and Staffing: What You Need To Know Now

IoT is growing at a 32.6% annual rate through 2020 but a 6 million shortfall of cybersecurity professionals is projected by 2019: recipe for disaster or the biggest career opportunity in decades for security professionals? This session will discuss transitioning info/cybersecurity jobs and skills to an IoT world including: What’s trending right now in IoT-driven jobs, skills, and certifications; current salaries for info/cyber security jobs and cash premiums skills; what should employers and tech professionals be doing now to prepare for securing IoT long term?  

Moderator: Bradley Barth, senior reporter, SC Media

David Foote, Chief Analyst & CRO, Foote Partners, LLC

10:00 am
-
10:45 am

Expo Floor Opens & Networking Break

Expo Floor Opens & Networking Break

10:45 am
-
11:30 am

Editorial Spotlight Session

Managing 3rd Party Risk

Increasingly security pro’s in Canada are faced with having 3rd parties managing risk for them through managed applications, shared cloud services and traditional MSSP. This session will show you how to insure the integrity of your network resources when dealing with this management issue.

Moderator: Teri Robinson, executive editor, SC Media

John Proctor, VP global cyber security, CGI

Editorial Spotlight Session

Managing 3rd Party Risk

Increasingly security pro’s in Canada are faced with having 3rd parties managing risk for them through managed applications, shared cloud services and traditional MSSP. This session will show you how to insure the integrity of your network resources when dealing with this management issue.

Moderator: Teri Robinson, executive editor, SC Media

John Proctor, VP global cyber security, CGI

11:30 am
-
12:15 pm

Editorial Spotlight Session

Security Awareness Training and Compliance

The fact remains that the most popular point of entry to your network by bad guys is social engineering. Hear leading experts provide key tips on better security awareness and ways your organization can enforce compliance.

Moderator: Doug Olenick, online editor, SC Media

Bobby Singh, CISO & global head of infrastructure, TMX Group

Graham Westbrook, cybersecurity analyst, Geisinger Health Systems

Editorial Spotlight Session

Security Awareness Training and Compliance

The fact remains that the most popular point of entry to your network by bad guys is social engineering. Hear leading experts provide key tips on better security awareness and ways your organization can enforce compliance.

Moderator: Doug Olenick, online editor, SC Media

Bobby Singh, CISO & global head of infrastructure, TMX Group

Graham Westbrook, cybersecurity analyst, Geisinger Health Systems

12:15 pm
-
1:15 pm

Networking Lunch and Expo Floor

Networking Lunch and Expo Floor

1:15 pm
-
2:00 pm

Tech Sessions

Tech Sessions

1:15 pm
-
2:00 pm

Trustwave Tech Session

Nathan LaFollette, Director, Trustwave SpiderLabs

Trustwave Tech Session

Nathan LaFollette, Director, Trustwave SpiderLabs

1:16 pm
-
2:00 pm

Container Security - Be ready for next-gen virtualization

Containers are the new virtualization platform. Containers allow application deployments faster than ever.  Container life cycles range from days to mere minutes.  Some development shops can get applications built, unit tested, and deployed into production in a matter of hours.  How do you maintain security in an environment this fast-paced?

James Smith , Sales Engineer, CISSP, CSTA, TCSSE, Tenable Network Security

Container Security - Be ready for next-gen virtualization

Containers are the new virtualization platform. Containers allow application deployments faster than ever.  Container life cycles range from days to mere minutes.  Some development shops can get applications built, unit tested, and deployed into production in a matter of hours.  How do you maintain security in an environment this fast-paced?

James Smith , Sales Engineer, CISSP, CSTA, TCSSE, Tenable Network Security

2:05 pm
-
2:50 pm

Tech Sessions

Tech Sessions

2:06 pm
-
2:50 pm

GOING BEYOND NEXT-GENERATION ENDPOINT SECURITY

Endpoints are at the centre of the universe of advanced attacks. They’re the most vulnerable, and act as a favored attack vector for cybercriminals because they provide the easiest entry points into your network.   Hear ways IT teams can go beyond simple threat detection and look at the organization’s entire security posture. 

John Beal, Canadian Endpoint Security Leader, IBM Security

GOING BEYOND NEXT-GENERATION ENDPOINT SECURITY

Endpoints are at the centre of the universe of advanced attacks. They’re the most vulnerable, and act as a favored attack vector for cybercriminals because they provide the easiest entry points into your network.   Hear ways IT teams can go beyond simple threat detection and look at the organization’s entire security posture. 

John Beal, Canadian Endpoint Security Leader, IBM Security

2:07 pm
-
2:50 pm

The Endpoint is Just the Starting Point

In today’s perpetually evolving technological landscape, security has never been more important in every facet of a business - from mobile to desktop; all interconnected through the Internet of Things. Join us for a discussion on recent cybersecurity threats, the current and emerging security landscape, interesting insights into product security, and an overview of how BlackBerry Cybersecurity Services can provide optimization and peace of mind for your company and organization.

Ryan Brander, Senior Technical Manager, Blackberry Cybersecurity Services

The Endpoint is Just the Starting Point

In today’s perpetually evolving technological landscape, security has never been more important in every facet of a business - from mobile to desktop; all interconnected through the Internet of Things. Join us for a discussion on recent cybersecurity threats, the current and emerging security landscape, interesting insights into product security, and an overview of how BlackBerry Cybersecurity Services can provide optimization and peace of mind for your company and organization.

Ryan Brander, Senior Technical Manager, Blackberry Cybersecurity Services

2:08 pm
-
2:50 pm

Mind the Gap: Going Beyond Penetration Testing

Subjects like IT security management, threat modelling, incident response and security architecture improvement aren't usually addressed in most penetration tests, and compliance driven audit processes rarely extend beyond the regulation or standard that is being audited.  This talk will cover a few great ways to examine, analyze, review and improve organizational and product-oriented security programs using data and experience from Rapid7's consulting teams and will examine frameworks used for security program improvement and review, and discuss common gaps in security programs at different stages of maturity and in different verticals.

Caspian Kilkelly, Information Security Consultant, Rapid7

Mind the Gap: Going Beyond Penetration Testing

Subjects like IT security management, threat modelling, incident response and security architecture improvement aren't usually addressed in most penetration tests, and compliance driven audit processes rarely extend beyond the regulation or standard that is being audited.  This talk will cover a few great ways to examine, analyze, review and improve organizational and product-oriented security programs using data and experience from Rapid7's consulting teams and will examine frameworks used for security program improvement and review, and discuss common gaps in security programs at different stages of maturity and in different verticals.

Caspian Kilkelly, Information Security Consultant, Rapid7

2:50 pm
-
3:30 pm

Expo Floor & Coffee Break

Expo Floor & Coffee Break

3:30 pm
-
4:15 pm

Editorial Spotlight Session

Data Analytics vs. Privacy

It’s one thing to capture customer and employee data on a day-to-day basis, but what is the best way to use it and protect it without causing security issues? This session will provide a better understanding on the balance between the worth of the data you collect and the risk to the organization for having it.

Moderator: Bradley Barth, senior reporter, SC Media

Rick Doten, chief, cyber and information security, Crumpton Group LLC

Kris Klein, managing director, IAPP Canada, partner, nNovation LLP

Editorial Spotlight Session

Data Analytics vs. Privacy

It’s one thing to capture customer and employee data on a day-to-day basis, but what is the best way to use it and protect it without causing security issues? This session will provide a better understanding on the balance between the worth of the data you collect and the risk to the organization for having it.

Moderator: Bradley Barth, senior reporter, SC Media

Rick Doten, chief, cyber and information security, Crumpton Group LLC

Kris Klein, managing director, IAPP Canada, partner, nNovation LLP

4:15 pm
-
5:00 pm

Live Ransomware DEMO – You’ll Wanna’ Cry

Witness a short, punchy demo of the WannaCrypt/WannaCry ransomware doing it’s damage.  Demo will be peppered with relevant background data to give perspective, and inform our discussion on how to fight these.  This attack would have been so easy to defend against, you’re going to want to cry.

Moderator: Eric Green, program director, SC Media

Tom Levasseur, Vulnerability Assessment and Penetration Testing Specialist, CGI

Live Ransomware DEMO – You’ll Wanna’ Cry

Witness a short, punchy demo of the WannaCrypt/WannaCry ransomware doing it’s damage.  Demo will be peppered with relevant background data to give perspective, and inform our discussion on how to fight these.  This attack would have been so easy to defend against, you’re going to want to cry.

Moderator: Eric Green, program director, SC Media

Tom Levasseur, Vulnerability Assessment and Penetration Testing Specialist, CGI

5:00 pm
-
6:00 pm

Networking Reception

Gain a clearer perspective on ways to manage mobile threats and where technology and policy must intersect.

Networking Reception

Gain a clearer perspective on ways to manage mobile threats and where technology and policy must intersect.

6:00 pm
-
7:30 pm

ISC2 Toronto Chapter Town Hall Meeting

(ISC2 Toronto Chapter Members Only event)​. Following the conclusion of the conference's first day, please join the ISC2 Toronto Chapter for the next Town Hall Meeting. Please email sc.marketingmanager@haymarketmedia.com for registration details.

ISC2 Toronto Chapter Town Hall Meeting

(ISC2 Toronto Chapter Members Only event)​. Following the conclusion of the conference's first day, please join the ISC2 Toronto Chapter for the next Town Hall Meeting. Please email sc.marketingmanager@haymarketmedia.com for registration details.

8:30 am
-
9:30 am

Breakfast

Breakfast

9:00 am
-
9:30 am

Keynote

Cyberdefense for the Rest of Us

Today’s cyber defenders are trapped in a dense “Fog of More” – more threats, tools, training, guidance, and requirements than they can absorb. But to manage your risk, you still have to prioritize in the face of motivated and creative attackers. We’ll describe how dynamic information models (like Cyber OODA Loops, the Cyber Kill Chain, the CIS Community Attack Model) allow us to continuously understand attacks and translate them into effective defensive action.

Moderator: Bradley Barth, senior reporter, SC Media

Tony Sager, senior VP & chief evangelist, Center for Internet Security

Keynote

Cyberdefense for the Rest of Us

Today’s cyber defenders are trapped in a dense “Fog of More” – more threats, tools, training, guidance, and requirements than they can absorb. But to manage your risk, you still have to prioritize in the face of motivated and creative attackers. We’ll describe how dynamic information models (like Cyber OODA Loops, the Cyber Kill Chain, the CIS Community Attack Model) allow us to continuously understand attacks and translate them into effective defensive action.

Moderator: Bradley Barth, senior reporter, SC Media

Tony Sager, senior VP & chief evangelist, Center for Internet Security

9:30 am
-
10:15 am

Editorial Spotlight Session:

Elephants on the Lawn

There is an ever building rush to innovate and bring the newest technology to the forefront. In the mad scramble security is often bypassed in an effort to save money or reduce the time to deliver. The question remains as to who will be left to pay the bill once the dust settles? We have to address the elephants that are standing on the lawn before security debt crushes our ability to advance.

Moderator: Eric Green, Program Director, SC Media

Dave Lewis, Global Security Advocate, Akamai Technologies

Editorial Spotlight Session:

Elephants on the Lawn

There is an ever building rush to innovate and bring the newest technology to the forefront. In the mad scramble security is often bypassed in an effort to save money or reduce the time to deliver. The question remains as to who will be left to pay the bill once the dust settles? We have to address the elephants that are standing on the lawn before security debt crushes our ability to advance.

Moderator: Eric Green, Program Director, SC Media

Dave Lewis, Global Security Advocate, Akamai Technologies

10:15 am
-
11:00 am

Expo Floor Opens & Networking Break

Expo Floor Opens & Networking Break

11:00 am
-
11:45 am

Cyber 360 Clinics

Cyber 360 Clinics

11:01 am
-
11:45 am

Cyber 360 Clinic: Automating Threat Intelligence

Hear practical areas to consider when building and managing your threat intel strategy. Gain an understanding on how to ensure you have the right technologies and processes in place, what you should buy and the best options for your budget.

Moderator: Eric Green, program director, SC Media

Tony Sager, senior VP & chief evangelist, Center for Internet Security

Priscilla Moriuchi, Director of Strategic Threat Development, Recorded Future

Cyber 360 Clinic: Automating Threat Intelligence

Hear practical areas to consider when building and managing your threat intel strategy. Gain an understanding on how to ensure you have the right technologies and processes in place, what you should buy and the best options for your budget.

Moderator: Eric Green, program director, SC Media

Tony Sager, senior VP & chief evangelist, Center for Internet Security

Priscilla Moriuchi, Director of Strategic Threat Development, Recorded Future

11:02 am
-
11:45 am

Cyber 360 Clinic: RansomEVERYware

Learn key methods for detection and remediation for ransomware through this hands-on workshop.

Moderator: Bradley Barth, senior reporter, SC Media

Walt Williams, director of information security, MonoType Imaging

Angus MacDonald, director, sales engineering, Trend Micro Canada

Cyber 360 Clinic: RansomEVERYware

Learn key methods for detection and remediation for ransomware through this hands-on workshop.

Moderator: Bradley Barth, senior reporter, SC Media

Walt Williams, director of information security, MonoType Imaging

Angus MacDonald, director, sales engineering, Trend Micro Canada

11:45 am
-
12:30 pm

Tech Sessions

Tech Sessions

11:45 am
-
12:30 pm

The Last Line of Defense in a Risk Strategy

Financial institutions, healthcare providers, pharmaceutical manufacturers, and organizations across other industries struggle with optimizing regulatory spend while mitigating risks. Boards of directors continue to approve security spending on the known quantities: perimeter, identity, and more recently, behavioral initiatives. But is this enough? In today’s environment of a highly mobile workforce, an intelligent endpoint has become the last line of defense and a pillar of a modern risk management program. Understand how Cylance’s unique predictive, pre-execution, prevention technology provides the highest level of risk protection for global organizations, while minimizing alert fatigue.

Cameron MacLeod, Enterprise Sales Manager, Cylance

The Last Line of Defense in a Risk Strategy

Financial institutions, healthcare providers, pharmaceutical manufacturers, and organizations across other industries struggle with optimizing regulatory spend while mitigating risks. Boards of directors continue to approve security spending on the known quantities: perimeter, identity, and more recently, behavioral initiatives. But is this enough? In today’s environment of a highly mobile workforce, an intelligent endpoint has become the last line of defense and a pillar of a modern risk management program. Understand how Cylance’s unique predictive, pre-execution, prevention technology provides the highest level of risk protection for global organizations, while minimizing alert fatigue.

Cameron MacLeod, Enterprise Sales Manager, Cylance

11:47 am
-
12:30 pm

Is Business Intelligence poised to Transform Cyber Security Operations?

Security Operations Analysis and Reporting (SOAR) is the new Business Intelligence (BI) for Cyber Security.  In the past BI was instrumental in transforming industry segments such as retail and supply chain to dramatically increase efficacy, accuracy and overall business performance.  SOAR should do the same for Cyber Security.  This session will answer the question will/can it?

Casey Corcoran, Partner, FourV Systems

Is Business Intelligence poised to Transform Cyber Security Operations?

Security Operations Analysis and Reporting (SOAR) is the new Business Intelligence (BI) for Cyber Security.  In the past BI was instrumental in transforming industry segments such as retail and supply chain to dramatically increase efficacy, accuracy and overall business performance.  SOAR should do the same for Cyber Security.  This session will answer the question will/can it?

Casey Corcoran, Partner, FourV Systems

11:47 am
-
12:30 pm

Unsupervised Machine Learning: A New Approach to Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security is that the threat is most likely already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks are not sufficient to combat new, evolving attacks. Hear what you need to do to react quickly enough to these threats. 

Alisha Lee, Regional Manager, Darktrace

Mathew Beechener, Regional Manager, Darktrace

Unsupervised Machine Learning: A New Approach to Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security is that the threat is most likely already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks are not sufficient to combat new, evolving attacks. Hear what you need to do to react quickly enough to these threats. 

Alisha Lee, Regional Manager, Darktrace

Mathew Beechener, Regional Manager, Darktrace

12:35 pm
-
1:35 pm

Networking Lunch and Expo Floor

Networking Lunch and Expo Floor

1:35 pm
-
2:15 pm

Editorial Spotlight Session: Building a successful GRC program

How to build a successful GRC program that even a small organization can afford and successfully implement with scarce resources and a small budget

Moderator: Doug Olenick, Online Editor, SC Media

Walt Williams, Director of Information Security, MonoType Imaging

Editorial Spotlight Session: Building a successful GRC program

How to build a successful GRC program that even a small organization can afford and successfully implement with scarce resources and a small budget

Moderator: Doug Olenick, Online Editor, SC Media

Walt Williams, Director of Information Security, MonoType Imaging

2:15 pm
-
3:00 pm

Closing Session

The Canadian Cyber Threat Exchange (CCTX)

The CCTX is operational.  It has just completed it’s first year.  Hear from Executive Director and executives from two CCTX Member companies about what has been accomplished and what’s next.

Moderator: Teri Robinson, executive editor, SC Media

Robert (Bob) Gordon, executive director, Canadian Cyber Threat Exchange (CCTX)

Steven Hurley, assistant vice president, global information risk management, Manulife

Vivek Khindria, director, information security, Bell Canada

Closing Session

The Canadian Cyber Threat Exchange (CCTX)

The CCTX is operational.  It has just completed it’s first year.  Hear from Executive Director and executives from two CCTX Member companies about what has been accomplished and what’s next.

Moderator: Teri Robinson, executive editor, SC Media

Robert (Bob) Gordon, executive director, Canadian Cyber Threat Exchange (CCTX)

Steven Hurley, assistant vice president, global information risk management, Manulife

Vivek Khindria, director, information security, Bell Canada

3:05 pm
-
3:10 pm

Editorial Wrap Up

(mainstage)

Teri Robinson, executive editor, SC Media

Editorial Wrap Up

(mainstage)

Teri Robinson, executive editor, SC Media

ICON is an invite-only half-day track on RISKSEC Day 2.

For consideration of an invitation to I.C.O.N.
please email sc.marketingmanager@haymarketmedia.com


Icon: A half-day international clinic for CSO’s

Club Room | RiskSec Day 2 | 10:30AM to 3:20 PM

This clinic will tackle challenges from a technical, corporate and a policy perspective within both domestic and international realms. This new feature is specifically for senior cybersecurity leaders. This is a must attend event for any C level cybersecurity professional in the NY and Tri-state area.

10:30 am
-
11:30 am

Privacy – It’s Not Just About Your Country's Rules!

Learn and understand how privacy regulations both differ and continue to change in various nations. This can affect how you manage data of employees, customers and partners residing in or doing business in various locations. Ignore at your own peril!Learn and understand how privacy regulations both differ and continue to change in various nations. This can affect how you manage data of employees, customers and partners residing in or doing business in various locations. Ignore at your own peril!

Moderator: Teri Robinson, executive editor, SC Media

Kris Klein, managing director, IAPP Canada, Partner, nNovation LLP

Privacy – It’s Not Just About Your Country's Rules!

Learn and understand how privacy regulations both differ and continue to change in various nations. This can affect how you manage data of employees, customers and partners residing in or doing business in various locations. Ignore at your own peril!Learn and understand how privacy regulations both differ and continue to change in various nations. This can affect how you manage data of employees, customers and partners residing in or doing business in various locations. Ignore at your own peril!

Moderator: Teri Robinson, executive editor, SC Media

Kris Klein, managing director, IAPP Canada, Partner, nNovation LLP

11:30 am
-
12:30 pm

Risk, Security and Executive Management

Your job is to mitigate the security risk faced by your organization. Nowhere is it written you need to often convince the very ones who hired you of how it fits directly into the organizations overall risk management strategy. And yet to be able to do your job you need executive and board support – they understand the topic of risk – so give it to them in a form they can digest for the betterment of the organization and your blood pressure.

Moderator: Doug Olenick, online editor, SC Media

Lois Tullo, Executive-in-Residence, Global Risk Institute & Professor, Schulich School of Business

John Del Grande, Director, Architecture & Information Security Solutions Delivery, President's Choice Financial

Risk, Security and Executive Management

Your job is to mitigate the security risk faced by your organization. Nowhere is it written you need to often convince the very ones who hired you of how it fits directly into the organizations overall risk management strategy. And yet to be able to do your job you need executive and board support – they understand the topic of risk – so give it to them in a form they can digest for the betterment of the organization and your blood pressure.

Moderator: Doug Olenick, online editor, SC Media

Lois Tullo, Executive-in-Residence, Global Risk Institute & Professor, Schulich School of Business

John Del Grande, Director, Architecture & Information Security Solutions Delivery, President's Choice Financial

12:30 pm
-
1:30 pm

CISO Lunch

CISO Lunch

1:30 pm
-
2:15 pm

International Organization for Standards (ISO)

Why So Important?

Various ISO standards may be a large part of the framework for PCI, HIPAA and others but those standards, whether explicitly or implicitly, helps organizations do security better as well. Hear how to enforce such standards on your partners to further protect you and hear ways to get the most out of ISO.

Moderator: Bradley Barth, senior reporter, SC Media

Mark E. S. Bernard, Cybersecurity Consultant and Project Manager, Secure Knowledge Management Inc

Carlos Recalde, managing director, CTO, Successful Technology, LLC

International Organization for Standards (ISO)

Why So Important?

Various ISO standards may be a large part of the framework for PCI, HIPAA and others but those standards, whether explicitly or implicitly, helps organizations do security better as well. Hear how to enforce such standards on your partners to further protect you and hear ways to get the most out of ISO.

Moderator: Bradley Barth, senior reporter, SC Media

Mark E. S. Bernard, Cybersecurity Consultant and Project Manager, Secure Knowledge Management Inc

Carlos Recalde, managing director, CTO, Successful Technology, LLC

2:15 pm
-
3:00 pm

Cybersecurity Canada

The True North has a lot to offer the cybersecurity industry. From professionals and security organizations to security guidelines and national governmental support. However, as any security pro worth their salt will tell you – you can always do more. This session will discuss the many strengths Canada has in our industry and how to leverage those – but as well some of the perceived blind spots and how you and your organization can help get beyond those.

Moderator: Eric Green, program director, SC Media

Manan Qureshi, VP/head of business continuity, crisis management, integrated cyber command + control, Riyad Bank

Chris Henry, executive director, technology, cyber security and hospitality, Global Consulting Group

Cybersecurity Canada

The True North has a lot to offer the cybersecurity industry. From professionals and security organizations to security guidelines and national governmental support. However, as any security pro worth their salt will tell you – you can always do more. This session will discuss the many strengths Canada has in our industry and how to leverage those – but as well some of the perceived blind spots and how you and your organization can help get beyond those.

Moderator: Eric Green, program director, SC Media

Manan Qureshi, VP/head of business continuity, crisis management, integrated cyber command + control, Riyad Bank

Chris Henry, executive director, technology, cyber security and hospitality, Global Consulting Group

features

The Features

30+ Industry leading Keynotes and Speakers

Attend ICON, a half-day International Cyber security clinic (for CSO’s) invite-only

Discussing cyber policy trends, corporate Risk issues and models and Network Solutions.

Interactive floor & demos from over 25 leading technology companies

Earn 15 CPE to maintain your certification while expanding your knowledge base and/or skill set

Interactive 360 Clinics on:

- Threat Intelligence
- Ransomware
- Mobile Threat
- Cloud Computing
- Executive support
- Policy vs Technology

Sharpen Risk Management Strategies

Network with senior cybersecurity leaders connected across all industry verticals

Intelligent Connection Discussion Roundtables

Participate in an interactive Q&A and live polling with our conference App

Corporate-meets-social in our new full service event venue designed around your attendee experience

Unlimited snacks and beverages, lunch from an executive chef at our nourish bar

Register now for this must attend event

Two Day Conference Pass

$995CAD

Early Bird
Before April 15th

register today

All Inclusive Access for two full days of insightful analysis and a 360 degreee exploration of the most salient topics in cybersecurity

An exclusive opportunity to contribute to the tactical solutions and ideas affecting organizations and individuals

Must have content from all Keynote, Editorial Spotlight Sessions, Cyber 360 Clinics, Intelligent Connection Discussion Groups

Networking Breakfasts, Luncheons and Cocktail Reception to share perspectives with other top industry professionals

Two day full immersion in information security strengthening your cybersecurity arsenal and risk posture

Full collaboration and discussion with 175+ top cybersecurity executives and thought leaders

Earn up to 15 CPE credits

Unlimited snacks and beverages throughout the event

Meet in person your favorite speakers

One Day Workshop

$675CAD

Early Bird Pricing

register today

All Inclusive Access for one day of analysis and exploration in cybersecurity

An exclusive opportunity to contribute to the tactical solutions and ideas affecting organizations and individuals

Must-have content from Keynote, Editorial Spotlight Session, Cyber 360 Clinics, Intelligent Connection Discussion Groups

Networking Breakfast and Luncheons to share perspectives with other top industry professionals

One day full immersion in information security strengthening your cybersecurity arsenal and risk posture

Full collaboration with 175+ leading cybersecurity executives and thought leaders

Earn up to 6 CPE credits

Unlimited snacks and beverages throughout the day

Meet in person your favorite speakers

Featured Blog posts

Walt Williams to discuss information security management systems at RiskSec Toronto

Walt Williams, the director of security and compliance at Lattice Engines, will be speaking on information security management systems at...

venue

150 King Street West

address

150 King Street West
27th Floor,
Toronto, ON M5H 1J9
(647) 560-1659

more information

646-638-6137

follow us

RiskSec Toronto 2017

Decrease Your Risk, Increase Your Security  |  Presented by SC Media
register
#risksectoronto