2018 BC AWARE DAY CONFERENCE

 
cisco-title-sponsor.png
 
LogRhythm-platinum-sponsor-main.png
MNP-platinum-sponsor-main.png
 
telus-platinum-sponsor.png
BCAWARE-bg-2018.jpg


Featuring Kevin Mitnick, demonstrating a live hacking session!

feature-Kevin-Mitnick.jpg


Location

Registration & Afternoon Sessions
SFU Wosk Centre
580 West Hastings Street
Vancouver, BC V6B 1L6


Morning Session
SFU Segal School of Business
500 Granville Street
Vancouver, BC V6B 1L6

 

2018 BC AWARE DAY MOBILE APP

 

BC AWARE in conjunction with the fantastic folk at QuickMobile are excited to share our mobile app - developed exclusively for BC AWARE 2018 attendees! The app provides attendees with easy access to details on speakers, sponsors, schedules, exhibitors, and more!

In addition to the convenience the app provides, we're going green, alleviating the need for generating printed materials, and thereby not wasting natural resources.

To download the app, simply follow the instructions below:

  1. On your mobile device, visit the following URL to download the app: https://eventapps.quickmobile.mobi/
     
  2. Once downloaded, look for the QuickMobile app on your device, and then tap to launch the app.
     
  3. Tap on Search (magnifying glass icon at bottom of screen) and enter the Event ID: “BCAware” (no spaces, case sensitive!) The BC AWARE event should be listed.
     
  4. Tap the blue "+" symbol next to the “BC AWARE” event. The app's content will then download, and the BC AWARE app will launch.
     
  5. Continue past the disclaimer, and click the "First time user? Create a password" link beneath the white "LOGIN" banner. Enter the email address you registered with BC AWARE as your username, click "Send", and you'll be emailed a temporary password which you can then use the login.

THE AGENDA


7:30AM to 8:30AM


** REGISTRATION & COFFEE ** 
 Visit Vendors Fair in ICBC Salons @ Wosk Centre for Dialogue


8:30AM to 9:05AM


 


9:05AM to 9:50AM


BC AWARE KICK OFF & WELCOME
Matt Loeb, CEO
ISACA International
SFU Segal Building (500 Granville Street) // Track 1 //


Threat Landscape Review - Back to the Future?
Dean Turner, Product Manager, Advanced Threat Group
Cisco

Segal Building


Every year vendors publish their stats and trends on the Year That Was in security and more often than not, we see a trend where what’s old is new again. In the age of sophisticated security products, greater awareness and fewer core system vulnerabilities (recent events aside), why do we continue to see greater numbers of attacks, breaches and sophisticated malware year after year?    

This presentation will take a look at some of the stats and trends of 2017 and provide some speculation as to why we keep stepping into the Security DeLorean and attempts to answer the question -  ‘If we’re all compromised or compromises waiting to happen, what do we do next?’


9:50AM to 10:00AM


** BREAK & COFFEE @ Segal Building **


10:00AM to 11:45AM


Live Hacking Demonstration with Kevin Mitnick
Kevin Mitnick, CEO
Mitnick Security Consulting and the World's Most Famous Hacker and best selling author
Segal Building (note: limited seating)


11:45AM to 12:45PM



** LUNCH Visit Vendors Fair in ICBC Salons @ Wosk Centre for Dialogue **


12:45PM to 1:30PM

Framework and Holistic Cyber Security
Mike Vamvakaris, Director and Head of Cybersecurity Consulting
Telus 
Wosk Centre For Dialogue // Track 1 //

We continue to hear about organizations suffering from high profile security and privacy breaches.  What’s the one thing these organizations have in common?  They all have security technologies in place, from firewalls, to anti-virus, to intrusion prevention systems.  Many have even complied with industry regulations. So what went wrong? 

Today’s threats are sophisticated.  They are persistent, targeted and stealthy. Technology alone cannot protect your organization, because hackers always seem to be one step ahead.  Organizations need to view security differently - as an integrated ecosystem of people, process and technology, working together to block threats and if, or when they are breached, be able to recover back to normal operations.  

In my presentation, I will review the importance of implementing a framework for your security that goes beyond technology to improve your security posture.


Creating an Antifragile Security Mindset
Keith Cerny, Chief Technology Officer
ACL
 
Wosk Centre for Dialogue //  Track 2 //

How should you respond to cyber risks and incidents? Today's security professional is under intense pressure and this session explores strategies to help you thrive in a cyber security role. In a profession where fears are flamed daily, we will step back to gain perspective while sharing stories and knowledge to help you build security mental toughness.

Connected threat defense is a new vision for modern security infrastructure that has the potential to help IT security teams stem the tide of modern threats – if not turn it. Anchored by a new breed of security management and analysis platform, the connected threat defense approach focuses on achieving widespread integration, security data sharing, and collaboration among both domain and management-level components of an organization’s security infrastructure.


Taking an Application Centric Approach to Secure Your Businesses Critical Data
Preston Hogue, Senior Director of Security Marketing
F5 Networks

Wosk Centre for Dialogue // Track 3 //

Applications are becoming the business. Applications are also the gateway to your data. 86% of breaches start with application attacks, or identity attacks that collect credentials and give attackers access to applications. Managing risk and securing your data requires an application centric approach to security.


Layered Defense in a World Without Layers
Andries Loubser, CTO
Charter

Wosk Centre for Dialogue // Track 4 //

The modern enterprise IT service model has a wide footprint as it tries to harness new ways for businesses to operate. With both services and users located and operating entirely outside the corporate network, the protection and enforcement controls of the enterprise environment is not available.  Layered Defense primarily based on layered network infrastructure is not a viable strategy anymore. How do we retain content control, threat protection, and visibility, without hindering the requirements of the business when the Internet is the core network?  In this talk we examine strategies to overlay a multi-layered security approach on an infrastructure we no longer control.


Post Secondary Channel - Networking 101: Build and Leverage the Power of Your Network
Michael Argast, Founder, Sky Northern Security Alliance
Wosk Centre for Dialogue // Track 5 //

You want a new job. Your first job. A customer contact. To learn a new skill.

We all have ideas as to what networking can do for you, but very few of us use the tools to their fullest extent. With tools like LinkedIn, Twitter, Facebook - networking is easier and more powerful than ever. Developing this skill and using it purposefully is one of the most versatile and important skill in any professional’s kit bag.

Michael will tell personal stories about how they've used networking skills to: 

  • land new jobs
  • gain access to new clients
  • build a business
  • recruit talent to his organization
  • rapidly develop valuable skills and expertise

In addition to these stories, Michael will provide specific, recommended steps to build your networking skills and reputation. Student or working professionals alike will benefit from this session.


1:30PM to 2:15PM


Latest Security Trends and Threats: Technical Analyses and Lessons Learned
Erika Noerenberg, Senior Malware Analyst
LogRhythm

Wosk Centre for Dialogue // Track 1 //

2017 was a banner year for malicious attacks causing massive destruction across the globe, and 2018 is off to an impressive start with the discovery of the Spectre and Meltdown vulnerabilities. This session provides an overview of the major events of 2017 and highlights the ongoing events surrounding Spectre and Meltdown, reviewing lessons learned and a view towards 2018. We will also take a dive into the technical details of a few of the most destructive threats, including a demonstration of the Wanacry ransomware in action.


The Forces Shaping Today's Cyber Threat Landscape
Alexander Rau, Senior Manager, Security Consulting Services
FireEye

Wosk Centre for Dialogue // Track 2 //

Cyber threats continue to evolve, improved tactics, techniques and procedures grow and change faster than security teams can keep up. Increasingly organized and collaborative, methods continuously grow more sophisticated. 

By combining and analyzing intelligence sources from Mandiant Incident Response Engagements, FireEye Product Learnings, iSight Intelligence and FireEye as a Service, Mandiant will explore the trends that define today’s threat landscape. During the session Mandiant will cover: 

  • New phishing trends breaching today’s companies.
  • Changes in modern attack telemetry and methodology.
  • Intelligence-led insights into emerging global threats.
  • Modern defensive strategies to better protect your organization.
  • Current and emerging global threats from the front lines of today’s leading forensic investigations.



Legal Concerns: Preparing for and Facing your “Oh Shit!” Cybersecurity Breach Moment
Kristal Allen, Partner
Randy Brunet, Partner
MLT Aikins

Wosk Centre for Dialogue // Track 3 //

This workshop is designed for executives, senior employees, in-house legal counsel, and all others who need to understand the legal aspects of preparing for and dealing with inevitable cybersecurity breaches. Learn practical advice from experienced professionals: developing a cybersecurity preparedness plan, building an incident response team, obligations of mandatory breach reporting, and why your legal team should be one of your first phone calls after you discover the cybersecurity breach (it’s not the reason you think!). All attendees of this workshop will receive a cybersecurity legal preparedness checklist.


Building a Cybersecurity Awareness Program from the Ground Up - Practice Advise from the Finning Experience
Suzie Smibert, Global Director, Enterprise Architecture and CISO, Finning International; Nickolas Hilderman, Senior Security Analyst, Finning International; and
Agustin Del Vento, Director, Change Champions Consulting

Wosk Centre for Dialogue // Track 4 //

In business since 1933, and now employing more than 12,000 people around the world, Finning is the world’s largest dealer of Caterpillar heavy-industry equipment. To improve its cybersecurity posture, Finning’s IT security team developed a global cybersecurity awareness campaign designed to: 1) enable employees to better identify and respond to potential cybersecurity incidents; and 2) elevate a cybersecurity culture so it’s as routine as their already-pervasive health and safety environment.

Recipient of the CSO50 Award, Finning’s cyber security program is an excellent example of how to transform a global culture. Join us in this session to learn directly from the team responsible to engineer the program how they’ve rolled it out in multiple languages and geographies, and why it’s become a valuable lesson in managing change. During this session, the speakers will aim to give you practical tips and actionable advice to start your own program. This session will be delivered in a “panel” format where questions from the audience will be encouraged.


Post Secondary Channel - Career Options in the Field of Information Security: Getting a Foot in the Door
Wosk Centre for Dialogue // Track 5 //

Moderator:
Michael Argast, Founder and CEO, Sky Northern

Panelists:
Dragana Panic, VanCity
Zoe Alexander, WomenWhoCode
Commander (Navy) Kristoff Langland, N6/J6 -  ACOS CIS, Communication and Information Systems, Maritime Forces Pacific, Department of National Defence
Rehman Esmail, Affinity Staffing


A career in the security field is often misunderstood.  The demands of more secure environments in both public & private sectors keep increasing.  It’s resulted in the field of information security growing into a multi million dollar industry.  This industry is providing multitudes of opportunities for anyone pursuing a career in this particular field. As opposed to the general public’s view of security careers, this job does not only revolve around physical security, but also a myriad of other fields including but not limited to security of information, economic crime, terrorism, and fraud.   The panel will explore career opportunities across the business verticals of consulting, retail, recruiting, and the government/military.


2:15PM to 2:30PM
 


2:30PM to 3:15PM


** BREAK **
Visit Vendors Fair in ICBC Salons @ Wosk Centre for Dialogue


Lessons Learned from 2017: How Segmentation, Encryption and Two Factor Authentication would have helped minimize or stop recent data breaches
Ron Borsholm, Senior Manager, Cyber Security, MNP
Alexander Hanway, Senior Product Marketing Manager for Encryption, Gemalto
Wosk Centre for Dialogue // Track 1 //

Cyber crime damage costs are estimated to hit $6 trillion annually by 2021. Organizations are at risk more than ever as these cyber attacks grow more sophisticated and the resulting data breaches become more devastating.

Join MNP’s Ron Borsholm, BC Leader, Cyber Security Services and Alexander Hanway, Senior Product Marketing Manager, Encryption at Gemalto as they provide examples of recent data breaches and the impact these had on their respective organizations.  Ron and Alex will provide insight into how simple network segmentation, encryption and multi factor authentication can reduce the risk of a compromise to your systems and save you time and money resulting from a potential breach.


Everyone Owns Risk: Thoughts on Risk Management, Security Operations and Improving Internal Conversations
Ben Smith, Principal Sales Engineer and Field CTO
RSA

Wosk Centre for Dialogue // Track 2 //

In today’s modern organization, who exactly is responsible for risk is not always a straightforward answer. More mature organizations not only know the right answer to this question, but have also started to empower their front-line staff, across all aspects of the business, to play their part in this important equation. Join RSA, a Dell Technologies business, to learn more about the one essential internal communications problem today every organization faces when facing this challenge, along with some specific related thoughts and best practices relating to risk management and security operations.


DevSecOps - One Man Changes the World
William Olson, Technical Director
Tenable

Wosk Centre for Dialogue // Track 3 //

Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.


Cybersecurity Skills Gap in Today's IT Community
Zane West, Americas Cybersecurity Solutions Leader
Dimension Data

Wosk Centre for Dialogure // Track 4 //

Security is top of mind for everyone across the globe and has become a boardroom conversation but this means that there has been an enormous influx of new vendors and technologies trying to be the next big solution. This has created confusion as to which technology is right and how to use it. The focus of this talk is the significant skills gap this has left in the Cybersecurity industry. How do we address that and how does this impact the implementation of the right technologies effectively?


Managing Thunderstorms: Incident Response in the Cloud
Ermis Catevatis, Mainland Advanced Research Society
Alex Dow, Mainland Advanced Research Society
Wosk Centre for Dialogue // Track 5 //

Cloud has been a game changer on how we use IT, with startups now capable of deploying enterprise grade infrastructures and businesses consolidating IT while enabling innovation. However "minor" bad habits, risky behaviours and technology debt which has persisted with impunity behind the firewall are now being migrated to the cloud creating the perfect conditions for a thunderstorm. This talk will focus on the challenges security operations face with the rapid adoption of cloud technologies and how enterprises can prepare, prevent, detect and contain the stormy weather ahead.


3:15PM to 4:00PM


Board Director Concerns about Cyber and Technology Risk
Robert Clyde, Managing Director
Clyde Consulting LLC & ISACA Finance Committee Chair

Wosk Centre for Dialogue //  Track 1 //

The C-suite and boards of directors are increasingly concerned about cyber attacks and risk. If asked, how should you present and discuss such issues with the board?  Also, boards and executives are anxious to understand the business opportunity and impact and risk relative to new technologies. This session will explore ways to discuss new technologies with the board, including the Internet of Things, artificial intelligence and machine learning, augmented reality, and quantum computing. In addition, cyber attacks continue to escalate with data breaches and RansomWare attacks being discussed at the board level. This session will explore likely questions your board will ask you as well as give advice on how guidelines for how to discuss them.


Physical Access Control Systems: A Double-Edged Sword
Daniel Crowley, Research Baron
IBM

Wosk Centre for Dialogue //  Track 2 //

Physical Access Control Systems, or PACS, are increasingly common in businesses for a number of reasons. While these systems make it easy to grant or revoke access to physical assets, keep a watchful eye on a building, or keep track of who's visiting a campus, there are also drawbacks. Putting a computer in something means there's a potential for it to be hacked, and centralizing control of something means that an attacker who can compromise the central point of control holds (literally in this case!) the keys to the kingdom.

This lecture will provide an overview of different types of PACS, the advantages and disadvantages to deploying them, previously found vulnerabilities, and what the discovery of more bugs in these systems could mean for the businesses using them.


Charting a New Course for IT Security with Connected Threat Defense
Albert Kramer, Technical Director, Continental Europe
Trend Micro

Wosk Centre for Dialogue // Track 3 //

Enterprise security teams are losing the war against today’s threat actors and their increasingly elusive attack techniques and malware creations. Although the industrialization of hacking and the rise of one-and done malware are clearly big parts of the problem, they are not alone. Other contributing factors include too many gaps in most organizations’ defenses, the isolation of typical domain-level countermeasures, and the recent de-emphasis of prevention-oriented solutions in favor of response-focused investments.

Connected threat defense is a new vision for modern security infrastructure that has the potential to help IT security teams stem the tide of modern threats – if not turn it. Anchored by a new breed of security management and analysis platform, the connected threat defense approach focuses on achieving widespread integration, security data sharing, and collaboration among both domain and management-level components of an organization’s security infrastructure.

In this session we will explore the options, trade-offs and other considerations for organizations looking to migrate their security defenses in this direction.


Designing Secure Cloud-based Web and Mobile Applications
Farshad Abasi, Chief Technology Officer
Mirai Security Inc.

Wosk Centre for Dialogue // Track 4 //

Security should be ongoing and imperative in all that we design, build, and deploy. In this presentation, Farshad Abasi of Mirai Security Inc. talks about securing Cloud-based web and mobile applications, providing an overview of Security By Design principles, the Cloud Security Alliance’s (CSA) Cloud Control Matrix (CCM), and OWASP’s Top 10 web and mobile application risks. This session is targeted at architects and solution providers.


4:00PM to 4:15PM
 


4:15PM - 5:00PM


** BREAK **
Visit Vendors Fair in ICBC Salons @ Wosk Centre for Dialogue


The Security Effectiveness Challenge
Jason Maynard, Consulting Systems Engineer, Cybersecurity
Cisco Systems

Wosk Centre for Dialogue // Track 1 //

The adversary continues to adapt while defenders are challenged with a fragmented and complex security offering. This session will cover the security gaps that exist today and what to consider when increasing security effectiveness and building an integrated security architecture.


State of the Phish™ 2018: What Your Peers Are Doing to Reduce Successful Phishing Attacks
Alan Levine, Cybersecurity Advisor
Wombat Security

Wosk Centre for Dialogue // Track 2 //

Join Wombat Security Technologies’ Cybersecurity Advisor, Alan Levine, as he discusses key findings from the 2018 State of the Phish™ Report. In this session you will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats. This collection of data is taken from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period, responses from quarterly survey’s, and an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors.


Self Evolving Detection System
Douglas Santos, Security Strategist
Fortinet

Wosk Centre for Dialogue // Track 3 //

Neural networks, Brave New World, Skynet. Are we in the future? The buzzword in the security industry is big data, machine learning, and artificial intelligence. Every vendor is claiming to have these technologies in their products. However, what do these technologies really do, how do they work, and how will make your organization more secure? This talk will examine the details behind neural networks and how they are being used to help Fortinet make detection of threats quicker, and more efficiently.


Is Cyptocurrency Really Secure?
Yiman Jiang, President & Principal Consultant
Sumus Technology Ltd

Wosk Centre for Dialogue // Track 4 //

Have you used cryptocurrency to purchase goods and services? Are you thinking about investing in cryptocurrency? Have you been forced to set up a bitcoin account to pay for ransomware? Do you want to know if cryptocurrency is safe to use? Then this talk is for you.

As cryptocurrencies and digital wallets begin to see mainstream adoption, financial institutions as well as users are faced with a complex ecosystem that provides convenience and opportunities on one hand and incurs security risks on the other.

This session aims to look at the recent trends in various cryptocurrencies, key security challenges, and privacy issues at each step of the virtual transaction journey. Through case studies, we will discuss how cryptocurrency breach/fraud/theft/laundering occurs and what has been done and what can be done further to mitigate risks.


The Difference between IT Security and Cyber Security
Commander (Navy) Kristoff Langland, N6/J6 -  ACOS CIS, Communication and Information Systems, Maritime Forces Pacific
Department of National Defence

Wosk Centre for Dialogue // Track 5 //

With reference to the concept of cyberspace, as we move forward into the future, there is perception clash between what we read in Science Fiction, what see as Hollywood’s interpretation of Science Fiction and what we experience in the reality we are living. This perception clash creates momentum towards one image or another,  effecting the perception of many in the IT industry that what they do is going to change somehow.

This perception is the basis for this discussion  - which will hopefully open the floor to talking about the differences between IT security and cyber security – in an interactive manner –learning from each other. As a starter, folks would be encouraged to read Distract, Deceive, Destroy: Putin at war in Syria. Cdr Langland will facilitate the discussion.


5:00PM to 6:00PM


**WRAP UP RECEPTION & THANK YOU**
Visit Vendors Fair in ICBC Salons @ Wosk Centre for Dialogue


8:30AM to 5:00PM

 



CANADIAN CYBER DEFENSE CHALLENGE
for high school students
Wosk Centre for Dialogue


Screen Shot 2017-10-16 at 3.26.42 PM.png

The Speakers

 

 Albert Kramer, Technical Director Continental Europe, Trend Micro

Albert Kramer, Technical Director Continental Europe, Trend Micro

 Alex Dow, Mainland Advance Research Society

Alex Dow, Mainland Advance Research Society

 Alexander Hanway, Senior Product Marketing Manager for Encryption, Gemalto

Alexander Hanway, Senior Product Marketing Manager for Encryption, Gemalto

 Alexander Rau, Senior Manager, Security Consulting Services, Mandiant / FireEye

Alexander Rau, Senior Manager, Security Consulting Services, Mandiant / FireEye

 Alan Levine, Cybersecurity Advisor, Wombat Security

Alan Levine, Cybersecurity Advisor, Wombat Security

 Andries Loubser, CTO, Charter

Andries Loubser, CTO, Charter

 Agustin Del Vento, Director, Change Champions Consulting

Agustin Del Vento, Director, Change Champions Consulting

 Ben Smith, Principl Sales Engineer and Field CTO, RSA

Ben Smith, Principl Sales Engineer and Field CTO, RSA

 Conn Nicoll, Director Security Western Canada, Telus

Conn Nicoll, Director Security Western Canada, Telus

 Daniel Crowley, Research Baron, IBM

Daniel Crowley, Research Baron, IBM

 Danny Timmins, National Cyber Security Leader, MNP

Danny Timmins, National Cyber Security Leader, MNP

 Dean Turner, Product Manager, Advanced Threat Group, Cisco

Dean Turner, Product Manager, Advanced Threat Group, Cisco

 Douglas Santos, Security Strategist, Fortinet

Douglas Santos, Security Strategist, Fortinet

 Dragana Panic, IT Risk Manager, Vancity Credit Union

Dragana Panic, IT Risk Manager, Vancity Credit Union

 Erika Noerenberg, Senior Malware Analyst, LogRhythm

Erika Noerenberg, Senior Malware Analyst, LogRhythm

 Ermis Catevatis, Mainland Advanced Research Society

Ermis Catevatis, Mainland Advanced Research Society

 Gary Perkins, CISO Government of BC

Gary Perkins, CISO Government of BC

 Farshad Abasi, Mirai Security Inc

Farshad Abasi, Mirai Security Inc

 Jason Maynard, Consulting Systems Engineer, Cybersecurity, Cisco Systems

Jason Maynard, Consulting Systems Engineer, Cybersecurity, Cisco Systems

 Keith Cerny, Chief Information Officer, ACL

Keith Cerny, Chief Information Officer, ACL

 Kevin Mitnick, CEO MItnick Consulting & World's Most Famous Hacker

Kevin Mitnick, CEO MItnick Consulting & World's Most Famous Hacker

 Kristal Allen Partner, MLT Aikins

Kristal Allen Partner, MLT Aikins

 Commander (Navy) Kristoff Langland, N6/J6 -  ACOS CIS, Communication and Information Systems, Maritime Forces Pacific Department of National Defence

Commander (Navy) Kristoff Langland, N6/J6 -  ACOS CIS,
Communication and Information Systems, Maritime Forces Pacific
Department of National Defence

 Matt Loeb, CEO ISACA International

Matt Loeb, CEO ISACA International

 Michael Argast, Founder and CEO, Sky Northern Security Alliance

Michael Argast, Founder and CEO, Sky Northern Security Alliance

 Mike Vamvakaris, Director and Head of Cybersecurity Consulting, Telus

Mike Vamvakaris, Director and Head of Cybersecurity Consulting, Telus

 Nickolas Hilderman, Senior Security Analyst, Finning International

Nickolas Hilderman, Senior Security Analyst, Finning International

 Preston Hogue, Senior Director of Security Marketing, F5 Networks

Preston Hogue, Senior Director of Security Marketing, F5 Networks

 Randy Brunet, Partner, MLT Aikins

Randy Brunet, Partner, MLT Aikins

 Rehman Esmail, Recruiting Manager, Affinity Staffing

Rehman Esmail, Recruiting Manager, Affinity Staffing

 Robert Clyde, Vice Chair ISACA International & Former CTO Symantec Corporation

Robert Clyde, Vice Chair ISACA International & Former CTO Symantec Corporation

 Ron Borsholm, Senior Manager, Cyber Security, MNP

Ron Borsholm, Senior Manager, Cyber Security, MNP

 Suzie Smibert, Global Director, Enterprise Architecture and CISO, Finning International

Suzie Smibert, Global Director, Enterprise Architecture and CISO, Finning International

 William Olson, Technical Director, Tenable

William Olson, Technical Director, Tenable

 Yiman Jiang, President and Principal Consultant, Sumus Technology Ltd

Yiman Jiang, President and Principal Consultant, Sumus Technology Ltd

 Zane West, Americas Cybersecurity Solutions Leader, Dimension Data

Zane West, Americas Cybersecurity Solutions Leader, Dimension Data

 Zoe Alexander, WomenWhoCode

Zoe Alexander, WomenWhoCode

 

Pricing

2018BCAWARE-Tickets — General.jpg

GENERAL |  $150

** SOLD OUT **

2018BCAWARE-Tickets — VIP.jpg

VIP | $250

** Only 50 Available ** 

Includes: Preferred Seating for Kevin Mitnick Keynote & Kevin Mitnick’s latest book, “The Art of Invisibility

2018BCAWARE-Tickets — Student.jpg

STUDENT |  $60

 


** View more details & ISACA Student Memberships here **

Screen Shot 2017-10-19 at 10.37.17 AM.png