googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Monday, April 7, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Tuesday, April 8, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Breakfast Roundtable (VIP / Invite Only)
    • session level icon
    The Responsible Vulnerability Disclosure – Beyond Bug Bounties
    speaker photo
    Toronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This session is for SecureWorld Advisory Council members only.

    As the cybersecurity landscape evolves, the complexity of responsibly disclosing vulnerabilities has extended far beyond traditional bug bounty programs. The stakes are high: improperly handled disclosures can lead to data breaches, reputational damage, and exploitation by malicious actors. This interactive roundtable discussion brings together leading cybersecurity professionals, policymakers, and technology executives to explore the multifaceted challenges and opportunities in modern vulnerability disclosure practices.

    This roundtable encourages an open, collaborative dialogue, with attendees sharing actionable insights into creating more effective and ethical vulnerability disclosure programs. Be prepared to leave with a deeper understanding of best practices, innovative strategies, and emerging trends that can help your organizations navigate the complexities of responsible vulnerability disclosure in an interconnected digital world.

    Join us for this critical conversation and be part of shaping the future of vulnerability management beyond the bug bounty.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Why Your Security Team's Structure Is the Biggest Vulnerability
    • session level icon
    The Future of Cross-Functional Training
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    Co-Host, Bare Knuckles & Brass Tacks Podcast
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Today’s cybersecurity teams are increasingly brittle. Organized around human specialization and siloed expertise, today’s teams can’t seize the advantage with new AI-powered tooling. Drawing from military operations and elite sports, this keynote introduces a new paradigm for organizing cross-functional and interdisciplinary cyber defense teams. By breaking down traditional role boundaries, organizations can forge adaptive teams that think faster, respond quicker, and innovate better.

    This session will explore how cross-functional teams offer three key advantages:

    • Enhanced Agility: Cross-trained personnel can quickly pivot to address emerging threats, eliminating bottlenecks caused by over-specialization.
    • Improved AI Integration: Teams with diverse skill sets are better equipped to understand, implement, and derive value from AI-driven security tools.
    • Cognitive Diversity: Blending perspectives from various security disciplines fosters creative problem-solving and more comprehensive threat analysis.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    Founder & Director, MindShield Institute
    speaker photo
    COO, iON United Inc.
    speaker photo
    Co-Founder, Mind Over Cyber
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    10:15 am
    [Panel] What's Next in AI/ML and Shadow IT: Opportunities and Challenges for CISOs
    • session level icon
    speaker photo
    Director of Cyber Defence, goeasy Ltd.
    speaker photo
    VP, Information Security, Moneris Solutions
    speaker photo
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    The rapid adoption of artificial intelligence (AI) and machine learning (ML) technologies is revolutionizing businesses across industries—but it’s also creating new challenges for CISOs and their cybersecurity teams. Compounding the issue is the surge in Shadow IT, where employees adopt unauthorized tools and applications, often powered by AI/ML, to boost productivity. This convergence of trends creates a double-edged sword: while AI/ML offers unprecedented opportunities to strengthen security and drive innovation, it also introduces significant risks. This forward-looking session explores:

    • Emerging Trends in AI/ML Adoption: How organizations are leveraging AI/ML to improve efficiency and security, and what new use cases are on the horizon.
    • The Shadow IT Explosion: How unsanctioned AI/ML tools bypass security controls, introducing vulnerabilities and compliance challenges.
    • Implications for CISOs: The evolving role of CISOs in managing the risks and rewards of AI/ML and Shadow IT while maintaining visibility across sprawling tech ecosystems.
    • Balancing Innovation and Security: Strategies for enabling AI/ML adoption responsibly while minimizing risk from Shadow IT practices.
    • What’s Next: Predictions for how AI/ML technologies and Shadow IT will shape the future of cybersecurity programs.

    Attendees walk away with actionable insights into how to stay ahead of the curve as AI/ML adoption accelerates and Shadow IT continues to grow. Whether you’re a CISO, security practitioner, or IT leader, this session prepares you to navigate the opportunities and risks of this rapidly evolving landscape.

    10:15 am
    Bug Bounties: Tips from the Triager
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Hear directly how someone who has spent years reviewing and prioritizing bug bounty program submissions approaches the task. In this talk, discover how to craft reports that stand out, ensuring your findings are presented for maximum impact and value. Discover the most common pitfalls to avoid, tips on how to structure your reports for clarity and precision, and hear highlights of the key elements triagers focus on to determine the severity and validity of vulnerabilities.

     

    10:15 am
    Tabletop Exercises: The Fun Kind
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Tabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!

    This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Building Human Firewalls: Fortifying Your Organization's Security Culture
    • session level icon
    speaker photo
    Principal Cybersecurity Advisor, 1SEC Solutions Inc
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    The human element is both the greatest vulnerability and the most powerful defense in cybersecurity. This interactive session aims to transform security awareness from a mere compliance checkbox into an integral part of your organizational DNA. Through engaging activities, including games, quizzes, and real-world scenarios, participants will learn how to identify risks, spot deepfakes, adopt secure behaviors, and foster a culture of accountability. Compete for awards and leave empowered to become a critical line of defense against cyber threats.

    11:10 am
    Soft Skills: The Hidden Key to Cybersecurity Success
    • session level icon
    speaker photo
    Cybersecurity Architect and Evangelist
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Technical skills are vital in cybersecurity, but soft skills; communication, empathy, adaptability, collaboration – are keys to true success. This session explores how mastering these abilities bridges gaps between technical and business professionals and enhances teamwork. Learn practical techniques through real-world examples to develop these competencies and see how they amplify your impact.

    11:10 am
    Cyber Risk by the Numbers from a Cyber Insurance Perspective
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    You’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.

    11:10 am
    [Panel] Improving Incident Response Through Threat Intelligence, Cloud Resilience, and AI Innovations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Session description to come.

    12:00 pm
    [Lunch Keynote] Paving the Future of AI with Trust and Transparency
    • session level icon
    speaker photo
    Director of Secure Software Supply Chains and Secure Development, SAP
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    As AI reshapes industries, ensuring trust and transparency is essential to drive secure innovation. This keynote explores the latest AI trends, key security challenges, and the importance of safeguarding AI supply chains. It will also delves into designing resilient agentic AI systems to address evolving risks and foster responsible growth. Prepare to leave with practical strategies to secure the future of AI while maintaining innovation at scale.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    From Manual to Mastery: How GRC Automation Can Elevate Business Efficiency
    • session level icon
    speaker photo
    Director of GRC, GlobalVision
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Small and medium-sized businesses (SMBs) face more and more challenges in managing GRC functions amid the fast-evolving regulatory, cyber threat, data privacy, and general risks landscape. SMBs are usually limited by smaller teams and limited funds, which makes manual processes ineffective and error prone. In contrast, major organizations frequently have specialized staff to perform these duties. The SMBs search for a solution to efficiently handle GRC functions without taxing resources or spending excessive amounts of money as cybersecurity threats and regulatory demands increase. As regulatory demands are always growing and cybersecurity threats constantly evolve, SMBs are searching for ways to manage GRC functions effectively without straining resources or spending too much dollars. This session goes through a case study of an SMB that successfully transitioned from manual GRC processes to a fully automated system. Through the adoption of GRC automation, the company streamlined its risk management program, reduced human errors, and aligned more easily with highly regulated clients, thus supporting its long-term growth and creating a scalable compliance framework for the future.

    1:15 pm
    Beyond Questionnaires: Innovative Approaches to Earning Customer Trust
    • session level icon
    speaker photo
    CISO, C&R Software
    speaker photo
    Director, Information Security, GRC, C&R Software
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Supply chain risk has become a critical concern for organizations worldwide, with vendors facing pressure to demonstrate reasonable cyber assurance. In the past, a simple questionnaire with yes/no answers was often sufficient to address these concerns. However, the landscape has shifted due to increased regulatory scrutiny and high-profile data breaches, significantly raising the bar around due diligence.

    This session explores the evolving expectations in supply chain risk from a vendor perspective and provide valuable insights into best practices for:

    • Crafting comprehensive questionnaire responses
    • Developing and maintaining effective customer trust portals
    • Leveraging third-party reports to enhance credibility
    • Successfully navigating client audits

    The presenters will share practical strategies to help organizations meet the standards of cyber assurance and enhancing trust with customers. Attendees will gain actionable insights to strengthen their risk management processes and better align with latest stringent requirements.

     

    1:15 pm
    Addressing the Cybersecurity Skill Shortage Internally and Externally
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    This presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.

    1:15 pm
    [Panel] The Secret Potential of AI and ML
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    [Panel] Crisis Ready: Mastering Incident Response, Disaster Recovery, and Business Continuity
    • session level icon
    speaker photo
    Cybersecurity Architect and Evangelist
    speaker photo
    Director, IAM, IGM Financial
    speaker photo
    Principal Cybersecurity Advisor, 1SEC Solutions Inc
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    This panel session explores how organizations can effectively integrate incident response playbooks, disaster recovery (DR) strategies, and business continuity (BC) planning to build resilience against disruptions. The discussion focuses on best practices, lessons learned, and actionable insights for ensuring operational stability during crises.

    2:10 pm
    Integrating Transformative OT Cybersecurity Programs
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Session description to come.

    2:10 pm
    Social Engineering: Training the Human Firewall
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    2:10 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    In today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.

    To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.

    2:55 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [Closing Keynote] Emerging Cyber and Physical Security Threats
    • session level icon
    Navigating Quantum, AI, Personal Security, and Global Conflict
    speaker photo
    VP & CISO, Varicent
    speaker photo
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    As technology rapidly evolves, cybersecurity professionals must prepare for emerging threats that could reshape the cyber landscape. Quantum computing looms as both a security disruptor and an opportunity, open-source AI is expanding the attack surface, geopolitical tensions are fueling state-sponsored cyber warfare, and executives are more and more at risk of physical violence due to policy decisions unrelated to cybersecurity. How can organizations anticipate and mitigate these risks before they escalate?

    This expert panel explores the intersection of cybersecurity and physical security, emerging technologies, and global conflict, providing insights into:

    • Quantum Computing: The timeline for quantum threats and how post-quantum cryptography is evolving.
    • Open-Source AI: The double-edged sword of AI-driven cyber threats and defense strategies.
    • Geopolitical Cyber Warfare: How nation-state conflicts are shaping the cyber threat landscape and what organizations can do to bolster resilience.
    • Risk Mitigation Strategies: Practical steps security leaders should take today to future-proof their defenses.
    • Managing Physical Threats: How organizations are keeping executives and rank-and-file employees safe.
    4:00 pm
    Cyber Pitch Battle Royale & Happy Hour
    • session level icon
    Open to all attendees; separate registration required
    speaker photo
    Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 6:00 pm
    Location / Room: Keynote Theater (Princes’ Gate Ballroom)

    Come join your fellow attendees for an exciting conclusion to the conference with a complimentary Happy Hour prior to a one-of-a-kind event.

    The Cyber Pitch Battle Royale reimagines how cybersecurity vendors and senior leaders connect. Brought to life by the hosts of the award-winning cybersecurity podcast, Bare Knuckles and Brass Tacks, this event combines their raw energy with the fun of a comedy roast. The result is an electric atmosphere where vendors brave the stage for five minutes before a crowd that’s encouraged to cheer innovation and jeer jargon. With a panel of five CISO judges and an audience of decision-makers from Canada’s leading organizations, contestants will compete for the Battle of Toronto Champion Belt in a format that strips away traditional corporate pretense. This breakthrough event promises to transform industry networking through authenticity, humor, and high-energy engagement. As one CISO put it, “I didn’t know what to expect, but it blew my expectations. I’d wanna do this again and again!”

    NOTE: You must register separately for the complimentary Happy Hour and Cyber Pitch Battle Royale; watch for that separate link to arrive in your conference registration confirmation email.

Exhibitors
  • Arctic Wolf Networks
    Booth: TBD

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Anomali
    Booth: TBD

    Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

  • Cyberhaven
    Booth: TBD

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Infoblox
    Booth: TBD

    Infoblox delivers modern, cloud-first networking and security experiences that are simple, automated, scalable and reliable. The company is the market leader with over 12,000 customers worldwide, including over 70 percent of the Fortune 500. The company’s portfolio of SaaS, data center, and hybrid offerings for DHCP, DNS, IPAM and security solutions enable organizations to leverage the advantages of on-premises and cloud-first architectures. The combination of NIOS, BloxOne DDI, BloxOne Threat Defense and threat intelligence services provide a robust foundation for connecting and securing the modern enterprise.

  • Leading Cyber Ladies – Toronto Chapter
    Booth: TBD

    Leading Cyber Ladies is a global non-profit organization who focuses on bringing more women into the cyber field through educational cybersecurity sessions, mentorship, speaking opportunities, networking and career opportunities through close partnership with the business sector and other groups in the cybersecurity community.

    While we are focusing on educating women, we are welcoming everyone, all genders and identities! Here we support each other in a friendly and encouraging environment. We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    Learn more about LCL here: https://leadingcyberladies.com

  • One Identity
    Booth: TBD

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Kenrick Bagnall, Moderator
    Toronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor

    Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda where he was a Senior Network Analyst for the Bank of Butterfield, then an IT Manager for FLAG Telecom and then Senior Vice President of Information Technology for CAPITAL G Bank (now Clarien Bank) before returning to Canada in 2005. Kenrick is also a cybersecurity instructor, writer, and host of the KONCYBER podcast.

  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Kamide
    Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    Sumona Banerji
    Founder & Director, MindShield Institute

    Sumona Banerji is a futurist, cyber-psychology expert, and founder of MindShield Institute, a think-tank developing products that build emotional intelligence, cyber-resilience, and cognitive security. The goal is to mitigate risks to human cognition, connection, and security, in the face of exponential technology, through innovation in education, mental health, and ethical technology.

  • speaker photo
    Kevin Banks
    COO, iON United Inc.
  • speaker photo
    George Kamide, Moderator
    Co-Founder, Mind Over Cyber
  • speaker photo
    Mohsen Azari
    Director of Cyber Defence, goeasy Ltd.

    Mohsen Azari is a Senior Cyber Security leader. He is an advocate of agile cybersecurity program aligning to business missions. He enjoys public speaking and is well-versed in cybersecurity strategy, GenAI governance, DevSecOps, and business resilience. Mohsen has extensive leadership experience in manufacturing, retail and finance. He is currently leading the Cybersecurity practice at goeasy financials overseeing cyber defence portfolio. He graduated from McMaster University, Hamilton, Ontario, and obtained his CISSP, Microsoft Azure, ISACA CISM, and Lean Belt certifications. He is a Gartner Evanta governing body member, as well as an EC-Council and SiberX advisory board member.

    During the past 20 years, Mohsen has worked in various tech and security domains helping people and organizations finding innovative solutions to their business problems. He has led multiple teams of infrastructure, compliance, and security professionals.

    Some highlights of his career include co-authoring first MPAA Anti-Piracy and Security Standard otherwise known as CDSA APCP, achieving PCI/SOC2 compliance with multiple organizations, and building effective cybersecurity awareness and strategy.

    He is a firm believer that dealing with modern security challenges would require fresh thinking and innovation in all facets of technology.

  • speaker photo
    Vinay Puri
    VP, Information Security, Moneris Solutions

    Vinay is an ex-veteran and a leader in cybersecurity with two decades of experience. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organizations in architecting complete security frameworks. Vinay holds dual masters in Computer Science and Information Warfare from the United States Naval Postgraduate School and possesses niche certifications in the cyber space, which include ISSO, ISSM, ISSP, SABSA, ECSA, CEH, and CCNA.

  • speaker photo
    Ali Abbas Hirji, Moderator
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global

    With more than 16 years in IT leadership, Ali specializes in Governance, Risk and Compliance (GRC), aligning with ISO 27001, NIST and SOC 2 to build secure and compliant infrastructures. His expertise spans IT security, risk management, and developing high-performing teams.

    In post-secondary education, he has taught at institutions across Canada, including Algoma University, Sheridan College, and York University, and served as Academic Chair for IT at the University of Fredericton. He also led the expansion of Durham College's Cybersecurity Innovation Center and established AI & Cybersecurity labs.

    His experience includes senior roles at ORION, managing connectivity projects and leading cybersecurity initiatives across Ontario, from tabletop exercises to keynotes at Graylog GO. As a strategic advisor at SiberX and VP of Cybersecurity and Technology at Computek College & 369 Global, he also led cyber training for Youth Employment Services, shaping talent through specialized programs.

  • speaker photo
    Gennady Duchovish
    Principal Cybersecurity Advisor, 1SEC Solutions Inc

    Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security policies with global standards. As a former Head of Cybersecurity at a Canadian bank and an active member of the Toronto CISO governing body, he inspires cultural change through leadership, peer influence, and by demonstrating tangible business value. Gennady is a frequent speaker at industry events, sharing insights on cybersecurity transformation and resilience.

  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    Panel Discussion
  • speaker photo
    Helen Oakley
    Director of Secure Software Supply Chains and Secure Development, SAP

    Helen Oakley, CISSP, GPCS, GSTRT, is a cybersecurity leader driving standards for AI transparency and security. She co-leads key initiatives, including CISA.gov’s AIBOM and OWASP’s Agentic AI Security – threats and mitigations, shaping frameworks to address emerging risks in AI. As Director of Secure Software Supply Chains and Secure Development at SAP’s Global Security and Cloud Compliance, she defines and enforces security requirements and policies at every stage of development and across all technologies, ensuring robust protection, including in AI-driven systems. A Founding Partner of the AI Integrity and Safe Use Foundation (AISUF.org), Helen advises startups and speaks at major industry events, sharing practical insights to advance cybersecurity and AI innovation. She is also a co-founder of LeadingCyberLadies.com, a global network empowering women in cybersecurity, and was recognized as one of the Top 20 Canadian Women in Cybersecurity.

  • speaker photo
    Shruti Mukherjee
    Director of GRC, GlobalVision

    Shruti is a seasoned Governance, Risk, and Compliance (GRC) professional with over six years of experience designing and executing robust GRC programs for global organizations. With expertise in ISO certifications (9001, 27001, 27701, 27017/18, 42001), data privacy frameworks, and audit management, Shruti has consistently delivered improved compliance efficiency and minimized operational risks.

    Known for leading cross-functional teams, mentoring professionals, and cultivating a culture of accountability, Shruti excels at aligning GRC strategies with business objectives to drive sustainable growth and strengthen stakeholder trust. Whether addressing regulatory challenges or optimizing organizational processes, Shruti brings a pragmatic and impactful approach to fostering compliance and resilience in today’s dynamic business environment.

  • speaker photo
    Arif Hameed
    CISO, C&R Software

    Arif Hameed is a seasoned and award-winning Cybersecurity leader with more than 20 years of technology experience. He is a Chief Information Security Officer and has had roles in Security Advisory, IT Risk and IT Audit at various Financial Institutions and Service Providers. He actively volunteers for professional associations including ISACA, Cloud Security Alliance, EC-Council and participates in advisory committees for academic programs in Cybersecurity and IT Audit. He also has presented, moderated, and took part in panels for Cyber conferences including the RSA Conference, InfoSec World, Secure World etc. He has obtained the CISSP, CISA, CRISC, GSTRT, ISO27001 LA and ABCP certifications. He also has a Level II (Secret) Canadian Federal Government clearance.

  • speaker photo
    Rana Khurram
    Director, Information Security, GRC, C&R Software

    Rana Khurram is a seasoned security professional with 15+ years of experience working in different security domain such as GRC (Governance, Risk & Compliance), incident response, and customer trust. He has led security programs successfully across various industries (banking, business processing, credit unions, software development) and helped organizations to obtain certifications/attestations from frameworks like SOC1-2, PCI DSS, ISO 27001, and NIST CSF.

    Currently, as Head of Information Security-GRC at Jonas Software (doing business as C&R Software), Rana manages global security framework, customer trust initiatives, and provides mentorship to security teams. He holds certifications including CISSP, CISM, PCI-ISA/PCIP, and ISO 27001 Lead Auditor. Rana is skilled in aligning security with business goals, customer handling from security perspective, managing risks, and promoting cybersecurity awareness across organizations.

  • speaker photo
    Panel Discussion
  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    June Leung
    Director, IAM, IGM Financial

    Intuitive, result-driven Cybersecurity Leader with notable success directing a broad range of enterprise Cybersecurity initiatives with over 15 years of experience in the financial cybersecurity vertical. Defining Cybersecurity strategy and roadmap, implementing cloud security, managing an annual budget of over $4 million. Effective management experience steering and directing all aspects of operations, metrics reporting, compliance, and resource planning. Outstanding leader inspiring high-performance team through coaching, training and mentoring. Processing strong business acumen, interpersonal and communication skills and be able to proactively convey operational and security needs to Senior Executives. Regular speaker at Cybersecurity events and non-profit organization for new comers.

  • speaker photo
    Gennady Duchovish, Moderator
    Principal Cybersecurity Advisor, 1SEC Solutions Inc

    Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security policies with global standards. As a former Head of Cybersecurity at a Canadian bank and an active member of the Toronto CISO governing body, he inspires cultural change through leadership, peer influence, and by demonstrating tangible business value. Gennady is a frequent speaker at industry events, sharing insights on cybersecurity transformation and resilience.

  • speaker photo
    Maggie Calle
    VP & CISO, Varicent

    Maggie is currently the Chief Information Security Officer at Varicent. With 25+ years of experience in Cybersecurity and IT, she has successfully lead cybersecurity and risk management programs supporting business objectives, innovation, and digital transformations.

  • speaker photo
    Lina Dabit, Moderator
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while working solo in the Gulf Islands.

    After transferring to Ontario in 2008, she focused on organized crime and national security, and as an Investigative Interviewing Subject Matter Expert, she went on to establish the RCMP interview team in Ontario.

    She was commissioned to Inspector in 2017 and became the commander of the Air Marshal Toronto Field Unit. In 2021, she was selected to lead the Cybercrime Investigative Team in Ontario. She is currently working to establish an innovative operational Cyber hub focused on collaboration between federal, international and private sector partnerships.

  • speaker photo
    Happy Hour
  • speaker photo
    George Kamide
    Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.