googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 2, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 200B

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, April 3, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    The CISO-Law Enforcement Partnership: A Win-Win
    speaker photo
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: 205A

    In the high-stakes cybersecurity landscape, collaboration is key. This closed-door session for Advisory Council members and select VIPs explores the powerful synergy between CISOs and law enforcement. Come ready to share how this partnership creates:

      • Critical threat intelligence: CISOs gain early warnings and insights, while law enforcement tracks emerging trends and actors.
      • Streamlined incident response: Joint investigations expedite evidence collection, enhance victim support, and bring perpetrators to justice.
      • Proactive threat prevention: Collaboration on public awareness campaigns and legislative efforts strengthens the overall cybersecurity ecosystem.
      • Enhanced preparedness: Learn how proactive partnerships improve incident response and proactive threat mitigation.
      • Case studies: Discover tangible examples of successful CISO-law enforcement collaborations and their impact.
      • Actionable insights: Gain practical guidance on building relationships, navigating legal considerations, and maximizing the value of these partnerships.
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Winning at the 'Team Sport' of Cybersecurity
    • session level icon
    speaker photo
    Toronto Police Service, Coordinated Cyber Centre (Ret.); Founder, KONCYBER
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    With cybersecurity, success is not solely determined by technological fortifications but by the collaboration, synergy, and unified efforts of an organization. This keynote delves into the strategic imperative of treating cybersecurity as a “team sport.” Hear insights into the CISO’s playbook, exploring the vital role of cross-functional collaboration, organizational culture, and effective communication in achieving cybersecurity triumphs. Learn how fostering a united front can elevate your organization’s resilience and position it as a formidable force against evolving cyber threats.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Quantum and Cyber: How to Prepare for Quantum-Secure Times?
    • session level icon
    speaker photo
    Director of Cybersecurity and IT Risk Management, BFL CANADA
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 200C
    Quantum computing: What does it mean to cybersecurity – is it a universal solution to all challenges or a disaster-in-waiting? Will it increase the complexity of cybersecurity or make cybersecurity discipline simpler and easier? One thing is certain: quantum alone does not mean secure. From new stronger cryptography algorithms to “years-to-quantum” countdown – whether we know it or not – cybersecurity is already in transition to quantum. The quantum future is happening now. What do we need in cybersecurity today for a truly quantum-safe tomorrow? The key to success in our building quantum-resistant cybersecurity may be in the basics: analyzing all potential risks. Understanding the quantum potential and possible leverage for cybersecurity will help derive the next steps. This presentation covers the opportunities that quantum brings to the industry along with the potential threats and possible applications: how and what the industry can do to ensure quantum adoption goes smoothly and is leveraged to enhance cybersecurity posture, discipline, and industry as a whole.
    10:15 am
    [Panel] Harmony in the Digital Age: Cybersecurity, Privacy, and Technology Unveiled
    • session level icon
    speaker photo
    Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity, Norton Rose Fulbright Canada LLP
    speaker photo
    CSO and Head of Security, Governance & Compliance, CDW Canada
    speaker photo
    Cybersecurity Architect and Evangelist
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 200A
    In an era where technological advancements intersect with privacy concerns, the delicate balance between cybersecurity and individual privacy becomes paramount. This session addresses the intricate interplay of cybersecurity, privacy, and technology, unraveling the challenges and opportunities at this intersection. Hear about the evolving landscape of digital security, the impact on individual privacy rights, and the innovative technologies shaping the future. Join this enlightening exploration of the symbiotic relationship between cybersecurity, privacy, and technology, and discover strategies to navigate this dynamic terrain responsibly and effectively.
    10:15 am
    A Practical Approach to TDIR & the Impact of AI
    • session level icon
    speaker photo
    Director, Product Marketing, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 200B

    In the past year, a whopping $100 billion was invested into cybersecurity solutions. But here’s the burning question: How effective are enterprises in enhancing their threat detection, investigation, and response (TDIR) capabilities with such hefty investments?

    Many SIEM and SIEM-like solutions fall short due to evolving threats and data overload with their cybersecurity mesh barely able to keep up with their service edge. The need for advanced security analytics is clear to effectively identify and detect threats. Costs are a major concern, and budgets are tight. Automation is desired, especially in the triage phase, but confusing cost models for tools add complexity.

    In 2024, AI is a top consideration for CISOs. However, a lack of understanding and program for how to apply AI and where to look for it in embedded workflows hinders the secure use of Generative AI tools – a hesitation not shared by threat actors.

    Addressing these challenges, a practical TDIR approach—threat, detection, investigation, and response—offers a solution for organizations.

    This presentation will include insights from a global study conducted last year by Exabeam and IDC, surveying over 1,100 senior security and IT professionals from eight countries.

    Key findings include:

    • Organizations’ perception of their TDIR capabilities and continued pain points
    • How automation and AI can combat knowledge gaps and improve environment visibility
    • How TDIR can help improve SOC efficiency and aide SOC analysts
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Say 'SBOM' One More Time! Securing the Software Supply Chain
    • session level icon
    speaker photo
    Lead Security Architect, SAP Global Security and Cloud Compliance
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 200C
    In this session, come ready to learn about key components of securing the software supply chain and best practices for software producers and consumers. The speaker elaborates on the role of Software Bill of Material (SBOM) in software supply chain and presents the architecture of generating and operationalizing SBOMs to achieve software transparency. Although the SBOM is an important aspect of securing the software supply chain, it’s not the only one. Learn about risks across CI/CD pipelines, guidance for threat modeling the DevOps processes and procedures, and how to introduce safeguards across the infrastructure. While this presentation is not a breakdown of regulatory requirements on the topic, it will refer to regulations and industry best practices and will provide supporting references for further reading. Actionable takeaways will be provided on how to start, followed by short-term and long-term steps to mature software supply chain security for software producers and consumers.
    11:10 am
    The Rosetta Stone of Cyber Security: Presenting Cyber as a Business Risk
    • session level icon
    speaker photo
    Principal, Cyber Security Risk Advisory, Zurich Resilience Solutions (ZRS) Canada
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 200B

    It is generally understood that cybersecurity is not “an IT problem,” but the gap between cybersecurity and business leaders persists. CISOs have been instructed to “use business language” and success is based on driving security from the top down, but those are simply unclear T-shirt slogans. We have clear, actionable steps for cybersecurity leaders to present cyber risk in line with other strategic business risks using common risk management concepts and language.

    As one of the operational risk managers for the Canadian Security Intelligence Service, Dan Elliott presented complex operational risks in relatable terms for organizational leaders. As an undercover operator, he learned effective social engineering methods to gain partners and effectively turn dissidents into supporters.

    Attendees will leave with actionable takeaways to improve their communication of cyber risk to their non-technical colleagues, increase awareness of cyber mitigation activities, and present with greater confidence to organizational leaders and their boards. The techniques provided are drawn from government training, social engineering methodology, traditional risk management practices and multiple successful engagements with clients who have been able to reduce their overall cyber risk through increased collaboration and a focus on effective cyber controls.

    This is not a session telling CISOs to speak in business language. This is a shortcut to helping CISOs understand how the rest of the business measures risk and how they can effectively position cyber risks in that environment.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Principal Solutions Architect, Lacework
    speaker photo
    Sr. Manager, Systems Engineering, Palo Alto Networks
    speaker photo
    Sr. Manager, Solution Engineering, Okta
    speaker photo
    Sr. Security Solutions Engineer II, Rapid7
    speaker photo
    Principal Solutions Architect, Elastic
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 200A

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Running Cybersecurity as a Business
    • session level icon
    speaker photo
    Chief Trust Officer, Pantheon.io
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The old way of running security no longer works. Providing insights from a CISO’s perspective – and perhaps with some controversial takes – this opening keynote delves into the strategic shift from traditional IT security to ‘trust product development’ measured in value outcomes. The session underlines how such a strategic pivot can meet rigorous cybersecurity standards while promoting growth and retention by aligning trust mechanisms to various customer stakeholders.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Challenges and Triumphs for Cybersecurity in SMBs
    • session level icon
    speaker photo
    IT Director & CISO, Maple Reinders Group
    Registration Level:
    • session level iconConference Pass
    1:00 pm - 1:45 pm
    Location / Room: 200C

    Small and medium-sized businesses (SMBs) face unique challenges, from shoestring budgets to limited staffing, leaving them exposed in a constantly evolving threat landscape. This session explores how to build an actionable strategy for building a robust cyber defense, even without a robust staff at your back.

    Get ready to:

    • Discover creative (and budget-friendly) strategies for attracting, retaining, and upskilling cybersecurity talent in the SMB domain; and why it’s OK to let team members move on to new opportunities
    • Learn practical ways to bridge the knowledge gap in your team, regardless of experience level.
    • Forge a culture of resilience: Build a foundation of security awareness that resonates with employees, from frontline teams to the C-suite.
    • Speak the language of business: Master the art of communicating cyber risks and ROI to gain buy-in from even the most budget-conscious executive.
    • Learn to translate technical jargon into compelling narratives that capture the attention and support of leadership.

    This session is not just about survival; it’s about thriving. Discover practical tools, actionable strategies, and inspiring peer-to-peer insights to transform your SMB cybersecurity platform from potential vulnerability to a source of strength.

    1:00 pm
    SEC for the North: What's the Impact on Canada?
    • session level icon
    speaker photo
    Lead, Cybersecurity Services at YES, and Professor
    speaker photo
    President & CISO, Netmechanics Inc.
    Registration Level:
    • session level iconConference Pass
    1:00 pm - 1:45 pm
    Location / Room: 200A
    The regulatory landscape for cybersecurity is experiencing a seismic shift, and organizations must proactively adapt to the evolving reporting guidelines and SEC requirements. This session, tailored for cybersecurity professionals operating in Canada, explores the anticipated impacts of these changes on the nation’s cybersecurity framework. Delve into the nuances of reporting guidelines, compliance expectations, and strategic considerations for aligning with the shifting SEC requirements. This session aims to equip attendees with the knowledge needed to navigate the regulatory landscape successfully and fortify their organizations against emerging cyber threats.
    1:00 pm
    [Panel] Elevating Security Through Cloud Resilience and AI Innovations
    • session level icon
    speaker photo
    Cybersecurity Executive & Co-Founder, Profound Security Labs
    speaker photo
    Sr. SASE Leader, Canada, Cloudflare
    speaker photo
    Cybersecurity Architect and Evangelist
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    Location / Room: 200B
    Unlock the secrets to fortified digital defenses and proactive cybersecurity leadership in our compelling panel session. Join us for a deep dive into cloud resilience and cutting-edge AI innovations, unraveling their pivotal roles in the contemporary threat landscape. This isn’t just a discussion; it’s your gateway to actionable insights that will empower you to not only stay abreast of the cybersecurity curve but surge ahead as a strategic leader in the realm of digital security.
     
    Key session highlights:
    • Cloud Resilience Strategies: Explore innovative approaches to fortifying your cloud infrastructure, ensuring resilience in the face of emerging threats and disruptions.
    • AI-Powered Security Innovations: Dive into the realm of AI-driven cybersecurity innovations and discover how artificial intelligence is transforming threat detection, response, and overall security posture.
    • Real-world Case Studies: Gain insights from real-world case studies showcasing successful integrations of cloud resilience and AI innovations, providing tangible examples for implementation.
    • Optimizing Security Leadership: Elevate your role as a security leader by understanding how to navigate the complexities of contemporary cybersecurity challenges, fostering a proactive and resilient security posture.
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    The Future of AI and Cybersecurity
    • session level icon
    speaker photo
    Lead Security Architect, SAP Global Security and Cloud Compliance
    speaker photo
    Product Security Architect – Associate, SAP
    Registration Level:
    • session level iconConference Pass
    2:00 pm - 2:45 pm
    Location / Room: 200C
    The concept of AI surpassing human intelligence and disrupting life as we know it – an AI apocalypse, if you will – has been explored by futuristic novels many times. In the current world, is this still just a fantasy? In the past few years, AI has emerged as a transformative force and is integrating its way into every industry and every aspect of human life. Bad actors and those in charge of protecting organizations and people are in a race to see who uses AI to it fullest. With increasing dependency on this technology, what are the realistic causes for concern? This session explores the future of integrating AI technology and the impact it will have on cybersecurity in preparation for an AI-driven world. Can lessons of the past prepare us for the future? Listen and learn about emerging AI threats, challenges, and opportunities in the field of AI and cybersecurity.
    2:00 pm
    [Panel] Here to Help: Law Enforcement Is a Vital Partner for CISOs
    • session level icon
    speaker photo
    Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity, Norton Rose Fulbright Canada LLP
    speaker photo
    SVP & CISO, RBC
    speaker photo
    SVP, Information Security & CISO, Rogers Communications Cda Inc.
    speaker photo
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: 200A

    Cybercrime flourishes in the shadows. But security leaders don’t have to face it alone. This panel discussion demystifies the role of law enforcement and illuminates their collaborative potential as allies in the fight against cyber threats. Takeaways from this session:

        • Learn firsthand experiences and success stories from CISOS for leveraging law enforcement partnerships.
        • Understand the legal landscape surrounding collaboration, data privacy considerations, and incident reporting requirements.

    This session:

      • Explores practical steps for building meaningful partnerships with law enforcement.
      • Details moving beyond incident response to discover joint initiatives for threat prevention, public awareness, and legislative advocacy.
      • Addresses concerns about data sharing, legal complexities, and establishing trust.
    2:45 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    2:45 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:15 pm
    [Closing Keynote] Cyber World on Fire: Global Digital War's Impact on Governments, Societies
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater
    In this eye-opening keynote loaded with an insider’s perspective on the latest developments in the Global Cyber War, hear how the Ukraine-Russia and Israel-Hamas wars and continual attacks from nation-states on entities across the globe are impacting governments and societies around the world. Weaving together the latest cyber intelligence with current military, diplomatic, government, and corporate developments, Col. Leighton assesses current efforts to counter bad actors and charts a path forward as the good guys and gals rush headlong into a cyber world heavily influenced by the dawn of AI and other game-changing technologies.
Exhibitors
  • Cloudflare
    Booth: 110

    Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

    Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

    Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.

  • Elasticsearch
    Booth: 320

    At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.

    With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. Delivered wherever data lives, in one cloud, across many clouds, or on-prem, Elastic enables more than 50% of the Fortune 500, and 17,000+ customers including Netflix, Uber, Slack, and Microsoft, to achieve new levels of success at scale and on a single platform. Learn more at elastic.co.

  • Exabeam
    Booth: 240

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • ISACA Toronto
    Booth: 140

    The ISACA Toronto Chapter, with 2800 plus members, is the largest chapter in Canada and the 5th largest in the world. As of 2017, it will have existed in the Toronto information systems audit, control and governance community for 40 years, and is one of the most active ISACA chapters serving IT Governance, Risk, Audit, and Security professionals.

    The aim of the Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the Greater Toronto Area.

    ISACA (previously the Information Systems Audit and Control Association) is a worldwide association of IS governance professionals. The association currently focuses on assurance, security, and governance and provides globally recognized certification in assurance (Certified Information Systems Auditor), security (Certified Information Security Manager), and governance (Certified in the Governance of Enterprise IT).

  • ISC2 Toronto
    Booth: 340

    Founded in 2013, the ISC2 Toronto Chapter is an official chapter of ISC2.  Based in Toronto, our purpose is to provide educational opportunities for management, operational and technical aspects of the information security field, and to support the mission of ISC2.

  • Lacework
    Booth: 310

    Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

  • Leading Cyber Ladies – Toronto Chapter
    Booth: 300

    Leading Cyber Ladies is a global non-profit organization who focuses on bringing more women into the cyber field through educational cybersecurity sessions, mentorship, speaking opportunities, networking and career opportunities through close partnership with the business sector and other groups in the cybersecurity community.

    While we are focusing on educating women, we are welcoming everyone, all genders and identities! Here we support each other in a friendly and encouraging environment. We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    Learn more about LCL here: https://leadingcyberladies.com

  • Okta
    Booth: 120

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Palo Alto Networks
    Booth: 380

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Rapid7
    Booth: 250

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Rogers Cybersecure Catalyst
    Booth: 330

    The Rogers Cybersecure Catalyst was announced in Fall 2018. This important initiative will empower Canadians and Canadian businesses to take full advantage of the opportunities, and tackle the serious challenges, of cybersecurity, through training and certification; commercial acceleration and support for cyber scale-ups; applied research and development; and public education.

    The Rogers Cybersecure Catalyst is driven by strong partnerships with industry leaders in Brampton, and across Canada. The Catalyst’s collaborations with governments and public agencies focuses on ensuring Canada’s economic security and global competitiveness in cybersecurity.

  • ThreatLocker
    Booth: 360

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS Ontario Affiliate
    Booth: 130

    Women in Cybersecurity (WiCyS) is an organization dedicated to bringing women in cybersecurity together to share knowledge and experience through networking, education and mentoring. The WiCyS Ontario, established in April 2019, is a community of Ontario women interested in cybersecurity.

    As the first Canadian Affiliate, our aim is to achieve gender parity for women in the cybersecurity field through outreach, awareness, networking, sharing, mentoring and engagement. As a WiCyS Affiliate, our group organizes activities and events which promote recruitment, retention and advancement of women in cybersecurity.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Lina Dabit, Inspector
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while working solo in the Gulf Islands.

    After transferring to Ontario in 2008, she focused on organized crime and national security, and as an Investigative Interviewing Subject Matter Expert, she went on to establish the RCMP interview team in Ontario.

    She was commissioned to Inspector in 2017 and became the commander of the Air Marshal Toronto Field Unit. In 2021, she was selected to lead the Cybercrime Investigative Team in Ontario. She is currently working to establish an innovative operational Cyber hub focused on collaboration between federal, international and private sector partnerships.

  • speaker photo
    Kenrick Bagnall
    Toronto Police Service, Coordinated Cyber Centre (Ret.); Founder, KONCYBER

    Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda where he was a Senior Network Analyst for the Bank of Butterfield, then an IT Manager for FLAG Telecom and then Senior Vice President of Information Technology for CAPITAL G Bank (now Clarien Bank) before returning to Canada in 2005. Kenrick is also a cybersecurity instructor, writer, and host of the KONCYBER podcast.

  • speaker photo
    Natalia Bakhtina, MBA, CRISC
    Director of Cybersecurity and IT Risk Management, BFL CANADA

    Natalia Bakhtina is a strategic CISO-level leader and is globally recognized as the Women in IT Canada Finalist 2022. Natalia holds a Master’s of Business Administration Degree from Dalhousie University and is Certified in Risk and Information Systems Control (CRISC).

    Experienced results-oriented strategic professional in cybersecurity, IT and enterprise risk management and program management, currently Natalia is the Director of Cybersecurity and IT Risk Management at BFL CANADA.

    Natalia is well regarded for her innate strategic analytical and critical thinking mindset and strong business acumen demonstrated through 20 years of proven first hand experience to successfully lead multimillion-dollar strategic enterprise wide initiatives and complex risk management programs in global financial services, fintech and insurance industries.

    Passionate about cybersecurity, Natalia is the Governing Body Member for the Toronto CISO Community by Evanta, a Gartner Company, a Board of Directors Member for the CyberEd Board by the Information Security Media Group, and an actively contributing member of ISACA Toronto Chapter.

    Natalia is often invited to speak at cybersecurity conferences, expert roundtables, industry panel discussions and is cited in various publications. Natalia is also a trusted successful mentor for younger professionals in the fields of risk and project management.

    Natalia is respected as an approachable and diplomatic relationship builder with excellent interpersonal, communication and influencing skills and inherent ability to effectively develop long term trusting sustainable partnerships with various IT, business and legislative stakeholders of different personalities, backgrounds, levels and styles.

    As a car enthusiast, Natalia is on the Board of Directors for the Yorkville Exotic Car Show, an annual Father’s Day charity car exhibition downtown Toronto. At her spare time Natalia enjoys downhill skiing, salsa dancing, swimming and choir singing.

  • speaker photo
    Imran Ahmad
    Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity, Norton Rose Fulbright Canada LLP

    Imran Ahmad is the Canadian head of our technology sector and Canadian co-head of our information governance, privacy and cybersecurity practice. He is based in our Toronto and Montreal offices and is recognized as a leading cybersecurity lawyer by several legal directories.

    Imran advises clients across all industries on a wide array of technology-related matters, including outsourcing, cloud computing, SaaS, strategic alliances, technology development, system procurement and implementation, technology licensing and transfer, distribution, open source software, and electronic commerce.

    As part of his cybersecurity practice, Imran works very closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk allocation advice, security, and data breach incident preparedness and response.

    In addition, Imran often acts as "breach counsel" in the event of a cybersecurity incident, such as a data or privacy breach, and has extensive experience in managing complex security incidents and cross-border breaches. He also provides representation in the event of an investigation, an enforcement action or a litigation.

    Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (LexisNexis, August 2017). Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (2nd Edition) (LexisNexis, March 2021).

    In his privacy law practice, he advises clients on compliance with all Canadian federal and provincial privacy and data management laws. He has a particular focus on cross-border data transfer issues and enterprise-wide governance programs related to privacy and information governance. Imran is the former chair of the Privacy and Access to Information Section of the Ontario Bar Association.

    Imran is an adjunct professor at the University of Toronto's Faculty of Law, where he teaches cybersecurity and privacy law.

  • speaker photo
    Daniel Pinsky
    CSO and Head of Security, Governance & Compliance, CDW Canada

    Daniel is an accomplished cybersecurity professional with more than two decades of experience, serving diverse clients across North America and Europe across the financial, public, and technology sectors. His expertise encompasses technical roles and leadership positions, including leading the implementation and certification of essential security frameworks, such as PCI DSS, ISO 27001, and NIST CSF.

    Daniel holds the CSO position at CDW Canada and has the following certifications: CCISO, CISM, CISA, CRISC, and CISSP. He is committed to leadership, effective communication, and personal development. He shares insights through writing, public speaking, and mentoring others.

  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    Jeannie Warner
    Director, Product Marketing, Exabeam

    Jeannie Warner, CISSP, Director of Product Marketing at Exabeam, is an information security professional with over twenty years in infrastructure operations/security. Jeannie started her career in the trenches working in various Unix helpdesk and network operations centers. She began in Security Operations for IBM MSS and quickly rose through the ranks to technical product and security program manager for a variety of software companies such as Symantec, Fortinet, and NTT (formerly WhiteHat) Security. She served as the Global SOC Manager for Dimension Data, building out their multi-SOC “follow the sun” approach to security. Jeannie was trained in computer forensics and practices. She also plays a lot of ice hockey.

  • speaker photo
    Helen Oakley
    Lead Security Architect, SAP Global Security and Cloud Compliance

    Helen Oakley is a cybersecurity enthusiast, researcher, and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s "Canadian Women in Cybersecurity” conference. Helen is currently working on her own Artificial Intelligence cybersecurity research project and strongly believes in giving back to the community. Helen is a lead of Toronto’s community group “Leading Cyber Ladies” and a HackStudent.com teacher, which is a non-profit organization that educates kids in cybersecurity skills.

  • speaker photo
    Dan Elliott
    Principal, Cyber Security Risk Advisory, Zurich Resilience Solutions (ZRS) Canada

    Dan Elliott is the Principal for Cyber Security Risk Advisory at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting Zurich’s clients in making risk-based cyber security decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organizations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to Canadian businesses and critical infrastructure, helping organizations improve their overall risk posture. Dan is frequently asked to speak to international conference audiences and NGOs about the communication challenges that exist between traditional technical professionals and business leaders and the best practices for aligning cyber risk with business goals.

    Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).

  • speaker photo
    Carlos Bacquet
    Principal Solutions Architect, Lacework

    Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bachelor of Computer Science and a Master in Computer Science with focus on machine Learning applied to Security applications. His areas of expertise include Kubernetes security and machine learning security applications applied to cloud infrastructure.

  • speaker photo
    Garry Coldwells
    Sr. Manager, Systems Engineering, Palo Alto Networks

    Garry has 25+years of cybersecurity experience. He has worked on security projects of global scale and reach and has spoken at conferences for 20+ years on what he has seen and learned in the field. Today, Garry is part of the global solutions consultant group at Palo Alto Networks, where he works with key clients on possibilities for their SASE deployments.

  • speaker photo
    Mike Hortobagyi
    Sr. Manager, Solution Engineering, Okta

    With more than 20 years in Canadian InfoSec, Mike Hortobagyi is an accomplished engineer and technical leader. Based in Toronto, he currently leads Okta's Commercial Presales team across Canada. Mike has experience in a wide variety of security technologies, including Zero Trust, Identity, and Cloud Security.

  • speaker photo
    Simon-trésor Shabani
    Sr. Security Solutions Engineer II, Rapid7

    With more than 13 years of experience, Simon-trésor Shabani is a skilled cybersecurity expert with a demonstrated history of working in the industry both in EMEA and the Americas. As Sr. Security Solutions Engineer II at Rapid7, he strives to raise awareness on the importance of best security practices and to constantly educate clients and partners on the right security program.

    "We're all one hack away from making the news" is a reality that we first need to accept to better fight the enemy. With his in-depth, hands-on product knowledge and expertise, Simon-trésor brings to organizations an extraordinary contribution in solving the most complex issues with his unique communication skills, multiple points of view, and the ability to advise on the right security solutions and/or services. He has also helped businesses gain better visibility and understanding into the cybersecurity products market space by taking part in multiple workshops and conferences, as well as by developing a better security program.

  • speaker photo
    Ray Cotten
    Principal Solutions Architect, Elastic

    With over 20 years of experience in information security, this accomplished expert addresses security challenges and vulnerabilities by crafting innovative solutions for organizations. They have successfully managed large, complex programs for Fortune 500 companies, exhibiting both technical expertise and exceptional cross-functional team leadership. Their ability to communicate fluently across technical and C-level teams has aided them in guiding organizations to achieve powerful results.

    Significant roles at Elastic, Exabeam, Deloitte, and HP Enterprise Security Products showcased their versatility as a trusted advisor for diverse clientele, including corporations and government agencies. Notably, they demonstrated the skill to translate complex security concepts into tangible strategies, bridging the gap between technology and business needs. International assignments in the Asia Pacific region and Australia provided them with opportunities to expand their global influence, doubling team sizes and fostering heightened collaboration among sales, partners, and professional services.

    Certifications such as Elastic Certified Analyst, CEH, CISM, and CISSP demonstrate their dedication to staying current with industry trends and expanding their skill set. Throughout their career, they have built a solid reputation for their commitment to delivering innovative and robust technology solutions. By implementing highly organized strategies and motivating cross-functional teams, they have consistently achieved tangible completion and had a powerful impact on numerous organizations.

  • speaker photo
    Glen Sorensen, Moderator
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Sabino Marquez
    Chief Trust Officer, Pantheon.io

    Sabino Marquez is the Chief Trust Officer at Pantheon.io, a premier provider of WebOps solutions for Drupal and WordPress sites globally. His approach to leading cybersecurity as a ‘Trust Product Practice’ has led to substantial returns on security investments, higher value-generation velocity, and enhanced equity valuations. Sabino leads the Trust Product organization as a go-to-market leader, working alongside the productive business to enable and defend value, and transforming stakeholder Trust into a powerful tool for competitive differentiation. Within his key areas of focus, Sabino ensures robust protection mechanisms are in place for stakeholder interests while also leveraging organizational Trust as a distinct advantage in a competitive market landscape. His work has not only brought him recognition as ‘2023 C100 Winner’, but he is also an esteemed thought leader who frequently shares insights in Security Magazine, The Wall Street Journal, and Cyber Security Tribe.

  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the lures of the darker side of computer security, he has spent his adult life working on the defensive side while finishing a college diploma and working on certifications from IBM, Cisco, Novell, Microsoft, Mile2, and finally CISSP about two years ago.

  • speaker photo
    Ali Abbas Mehboob Hirji
    Lead, Cybersecurity Services at YES, and Professor

    With over 16 years of experience, Ali has been a driving force in team development and leadership across various phases of the IT development lifecycle. His career milestones include pioneering the expansion of Durham College’s Cybersecurity Innovation Center and the establishment of their cutting-edge AI and Cybersecurity labs. Ali's leadership was pivotal in deploying applications and infrastructure aligned with ISO 27001 and NIST frameworks, while also crafting processes for SOC 2 level clearances.

    Ali's career trajectory features senior roles at the Ontario Research and Innovation Optical Network (ORION). He spearheaded projects focused on remote connectivity, technical training implementation, and improved access to critical applications. Leading teams of up to 65 professionals, Ali's profound expertise in the cyber domain has earned him a province-wide reputation for his leadership and innovation.

    Notably, Ali's influence stretches beyond his professional roles. He is a distinguished host of various tech shows, including the renowned Power Hour, and a sought-after panelist for esteemed forums such as the CISO Forum Canada. Ali's instructional prowess is evident through his roles as a highly respected lecturer at numerous institutions throughout Canada, where he imparts his extensive knowledge.

    Ali's impact extends to his role in the cyber community. He has orchestrated the execution of tabletop exercises for the province of Ontario, showcasing his commitment to cyber preparedness. His reputation as an expert has led to consistent invitations to deliver bespoke cyber training programs across diverse sectors.

    In his most recent venture, Ali undertook the leadership of the cyber training division at Youth Employment Services. Here, he spearheaded programming aimed at nurturing and elevating the skillsets of budding cyber enthusiasts. Simultaneously pursuing his PhD, Ali finds fulfillment in lecturing at esteemed institutions such as Seneca College, Georgian College, Toronto School of Management, University of Fredericton, Computek College and Algoma University, solidifying his commitment to knowledge dissemination.

    Ali's remarkable journey culminates in his rich Durham College experience, where his pivotal role in advancing the Cybersecurity Innovation Center and steering AI and Cybersecurity labs stands as a testament to his enduring dedication to technological advancement and leadership excellence.

  • speaker photo
    Graeme Barrie
    President & CISO, Netmechanics Inc.

    Graeme is a CISO with more than 25 years in IT risk and security governance in government, healthcare, and manufacturing sectors. He fell in love with computers when he discovered a Tandy TRS80 at the public library in the rural Ontario town he grew up in. Fast forward to today, where Graeme assists business leaders in understanding that cyber risk isn’t a technology issue but a business risk, and that you can never be too prepared when it comes to incident response and preparedness. As such, he has delivered tabletop exercises from scrappy start-ups to Fortune 500 companies and coached them on building robust incident response programs.

  • speaker photo
    Vinay Puri
    Cybersecurity Executive & Co-Founder, Profound Security Labs

    Vinay is an ex-veteran and a leader in cybersecurity with two decades of experience. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organizations in architecting complete security frameworks. Vinay holds dual masters in Computer Science and Information Warfare from the United States Naval Postgraduate School and possesses niche certifications in the cyber space, which include ISSO, ISSM, ISSP, SABSA, ECSA, CEH, and CCNA.

  • speaker photo
    Alkin Gorgun
    Sr. SASE Leader, Canada, Cloudflare

    Alkin specializes in helping drive Digital Transformation and Cybersecurity initiatives in the enterprise. At Cloudflare, he leads the SASE (Secure Access Service Edge) product portfolio for Canada, working with organizations across all verticals to build a safer, faster, more reliable Internet. Previously, Alkin was head of MIS3’s Cybersecurity consulting practice and a part-time instructor at the University of Toronto. He is a Certified Information Systems Security Professional (CISSP) and holds a Masters of Business Administration (MBA) degree from EDHEC Business school in France.

  • speaker photo
    Evgeniy Kharam, Moderator
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    Helen Oakley
    Lead Security Architect, SAP Global Security and Cloud Compliance

    Helen Oakley is a cybersecurity enthusiast, researcher, and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s "Canadian Women in Cybersecurity” conference. Helen is currently working on her own Artificial Intelligence cybersecurity research project and strongly believes in giving back to the community. Helen is a lead of Toronto’s community group “Leading Cyber Ladies” and a HackStudent.com teacher, which is a non-profit organization that educates kids in cybersecurity skills.

  • speaker photo
    Rhea Michael Anthony
    Product Security Architect – Associate, SAP

    Rhea Michael Anthony is a Product Security Architect Associate at SAP's Global Security team. Her mission is to research and develop robust software security and secure software development practices that support innovation and champion a security-first culture that impacts products across SAP. She is actively engaged in researching threats and safeguards for developing AI Software, for secure data consumption and secure model, to ensure security at the forefront of AI development. This also includes reviewing and adapting industry standards (eg: OWASP Top 10) and regulatory requirements (eg: EU AI Act) with consideration of SAP's diverse technology and use of open source software.

    With prior experience as an Analytics and Machine Learning programmer, she understands the challenges of development which lends her a unique perspective in bridging the worlds of AI development and security, with a vision of innovating solutions where security and usability are intricately interwoven.

    Rhea is an Engineer with a Master's Degree from the University of Texas at Dallas in Business Analytics, majoring in Data Science. She is a speaker, advocating for adopting ethical AI principles and empowering development teams to navigate through the security challenges inherent in AI development. In this ever-evolving landscape of technology, she values continuous learning and building strong collaboration with industry peers in fortifying the future of technology.

  • speaker photo
    Imran Ahmad
    Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity, Norton Rose Fulbright Canada LLP

    Imran Ahmad is the Canadian head of our technology sector and Canadian co-head of our information governance, privacy and cybersecurity practice. He is based in our Toronto and Montreal offices and is recognized as a leading cybersecurity lawyer by several legal directories.

    Imran advises clients across all industries on a wide array of technology-related matters, including outsourcing, cloud computing, SaaS, strategic alliances, technology development, system procurement and implementation, technology licensing and transfer, distribution, open source software, and electronic commerce.

    As part of his cybersecurity practice, Imran works very closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk allocation advice, security, and data breach incident preparedness and response.

    In addition, Imran often acts as "breach counsel" in the event of a cybersecurity incident, such as a data or privacy breach, and has extensive experience in managing complex security incidents and cross-border breaches. He also provides representation in the event of an investigation, an enforcement action or a litigation.

    Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (LexisNexis, August 2017). Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (2nd Edition) (LexisNexis, March 2021).

    In his privacy law practice, he advises clients on compliance with all Canadian federal and provincial privacy and data management laws. He has a particular focus on cross-border data transfer issues and enterprise-wide governance programs related to privacy and information governance. Imran is the former chair of the Privacy and Access to Information Section of the Ontario Bar Association.

    Imran is an adjunct professor at the University of Toronto's Faculty of Law, where he teaches cybersecurity and privacy law.

  • speaker photo
    Adam Evans
    SVP & CISO, RBC

    Adam Evans is Senior Vice President (SVP) & Chief Information Security Officer (CISO) for RBC.

    As CISO, Adam sets RBC’s cyber vision, strategy and program to reduce cyber risks and keep clients, employees, and systems safe. He manages an evolving threat landscape and the global expansion of cyber security services as RBC’s businesses continue to digitize.

    With over 20 years of experience in the financial services industry as a security professional, Adam is recognized as a thought leader in cyber security and global defense.

  • speaker photo
    Greg Murray
    SVP, Information Security & CISO, Rogers Communications Cda Inc.

    A Canadian and United States dual citizen with over 25 years of international executive experience. Greg is widely recognized as a business‐focused technology and cyber security expert. He has a proven track record of establishing intricate public‐private partnerships and delivering transformational technological solutions by building high performing, people centric teams.

    Passionate about community involvement, Greg serves as the Technology & Cyber Security Director‐in‐Residence for Rotman's National ICD Directors Education Program, is academically published, and has instructed 3,300+ board members. He helped co‐found Toronto Metropolitan University’s (TMU) Rogers Cybersecure Catalyst, whose inclusive and innovative cyber security programs have trained 800+ students, including veterans, women and displaced workers.

    Greg frequently advises boards, senior executives, the Government of Canada and academic institutions on Policy, IT, Networks, Cyber Security, AI and digital transformation. Greg was the the industry co‐chair for the Canadian Security Telecommunications Advisory Committee (CSTAC) from 2020 – 2023 with accountability to facilitate across Government and Industry the Telecommunications Memorandum of Understanding (MOU). Greg serves on the board of TMU's Rogers Cybersecure Catalyst. A graduate of the University of Toronto and Athabasca University, Greg also holds the ICD.D designation.

  • speaker photo
    Lina Dabit, Moderator
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while working solo in the Gulf Islands.

    After transferring to Ontario in 2008, she focused on organized crime and national security, and as an Investigative Interviewing Subject Matter Expert, she went on to establish the RCMP interview team in Ontario.

    She was commissioned to Inspector in 2017 and became the commander of the Air Marshal Toronto Field Unit. In 2021, she was selected to lead the Cybercrime Investigative Team in Ontario. She is currently working to establish an innovative operational Cyber hub focused on collaboration between federal, international and private sector partnerships.

  • speaker photo
    Happy Hour
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes