THE AGENDA


7:00AM to 8:00AM


REGISTRATION & COFFEE



8:00AM to 8:15AM
TRACK 1
| Crystal Pavilion



8:15AM to 9:00AM
TRACK 1
| Crystal Pavilion




ISACA WELCOME MESSAGE & KICK OFF



ISACA International

Chair Rob Clyde



9:00AM to 9:45AM
TRACK 1
| Crystal Pavilion



Passive & Active Defence

Jason Maynard, Sr. Consulting Systems Engineer(West), Cisco

Most organizations (IT/OT) are focused on building out their security posture leveraging passive defensive capabilities but in today's threat landscape this is not enough. Passive defense is a necessity but active defense takes your defensive capabilities to the next level which further enhances your passive defensive capabilities. Learn how to take the next step when it comes to defending.

Attend this session to:

  • Understand passive defense

  • Learn the differences between passive and active defense

  • Review active defense in detail

  • Leverage open source capabilities when it comes to passive and active defense


9:45AM to 10:00AM


BREAK & VENDOR FAIR



10:00AM to 10:45AM
TRACK 1
| Crystal Pavilion








10:00AM to 10:45AM
TRACK 2
| Pacific Rim 2












A View From the Inside
Leita Ouellette, Director, Business Strategy, TELUS Cyber Security Solutions, TELUS

At TELUS, we see a lot of internet traffic. In protecting our national mobility and data networks with over 13 million customers, as well as our own 45,000+ employees around the globe, we see cyber threats and trends to which very few organizations are exposed. In my session, I will share some of the key Canadian cyber security trends we’ve uncovered, as well as some insights we’ve gained from protecting consumers, organizations and our employees.


Am I getting what I pay for? Effectively using MSSP’s to Defend Against Cyber-Threats.
Scott Stevens, Product Management, MDR and DFIR, Trustwave

The marketplace is seemingly filled with service providers touting effective defense against cyber-threats. How can you determine which is most effective and appropriate for your environment? This session highlights IT and business cyber-threat defense challenges while providing insight into emerging trends, in both Managed Security Services (MSS) and Digital Forensics & Incident Response (DFIR) consulting services, for effective risk mitigation and operational security.



10:00AM to 10:45AM
TRACK 3
| Pacific Rim 1

Topic: TBA
Speaker: TBA
Presented by: Global Knowledge



10:00AM to 10:45AM
* TRACK 4 *


Security-by-Design for Hybrid Cloud Development
Duha Younes, Cloud Security Product Manager, Cisco Cloud Infrastructure Engineering Group, Cisco Systems Canada Co.

Most people don't realize Cisco Systems has a team in Vancouver focused on building, managing and securing the infrastructure for its cloud security portfolio-specifically, Cisco Umbrella & Cisco Cloudlock. Attend this session to learn how Cisco's 'security-by-design' approach is ensuring the alignment of its hybrid cloud infrastructure with security best-practices and the evolving needs of its customers.


10:00AM to 10:45AM
* TRACK 5
*



11:00AM to 11:45AM
TRACK 1
| Crystal Pavilion


Topic: Post Secondary Networking 101
With: Michael Argast


Topic: TBA
Speaker: Ale Espinosa, Sr. Director, Product Marketing Security
Presented by: Splunk



11:00AM to 11:45AM
TRACK 2
| Pacific Rim 2


Soaring Global Cyber-Gotchas – Dissecting the Ever-Expanding Threat Landscape
Jeannette Jarvis, Director of Product Marketing, Fortinet

Today nearly every aspect of our society depends on the Global digital infrastructure. This increasing reliance means that cyber-attacks can be hugely disruptive. Bad actors are constantly evolving techniques and tactics to stay under cover. They are persistent. With all the noise from alerts, it can be hard to identify and prioritize incidents. Determining what is meaningful or not, where to prioritize your energy or not isn't easy. In this presentation I will discuss the state of the evolving threat landscape and provide specific data that will help you prioritize your time and resources. What with the 100 billion security events we analyze per day, representing assets from the endpoint to the cloud, I will show you our unique perspective on the threat world.



11:00AM to 11:45AM
TRACK 3
| Pacific Rim 1
















11:00AM to 11:45AM
TRACK 4
| Gazebo 1


Ignite Your Third Party Governance
Suzanne Grauer, Sr Manager Archer Sales Engineering, RSA

The number and significance of third party relationships continues to grow for organizations across all industries and geographies. When an organization falters in some way, the root cause of the problem is often linked to a third-party relationship. Unfortunately, many organizations that are hit by third party problems didn’t see them coming and had no chance to steer clear. 

In this session, we will explore proven methods to quickly get your third party governance program off the ground. You will learn:

-Common sources of third party problems
-Key elements of a third party governance program
-Things to watch out for when starting a program
-How to mature your governance program



Topic:
TBA
Speaker: Gary Perkins, CISO Province of BC


11:45 AM to 12:45 PM


LUNCH & VENDOR FAIR






12:45 PM to 1:30 PM
TRACK 1
| Crystal Pavilion











1:45 PM to 2:30 PM
TRACK 1
| Crystal Pavilion



1:45 PM to 2:30 PM
TRACK 2
| Pacific Rim 2















1:45 PM to 2:30 PM
TRACK 3
| Pacific Rim 2



1:45 PM to 2:30 PM
TRACK 4
| Gazebo 1


1:45 PM to 2:30 PM
TRACK 5
| Gazebo 2


2:30 PM to 2:45 PM



2:45 PM to 3:30 PM
TRACK 1
| Crystal Pavilion























2:45 PM to 3:30 PM
TRACK 2
| Pacific Rim 2





2:45 PM to 3:30 PM
TRACK 3
| Pacific Rim 1


2:45 PM to 3:30 PM
TRACK 4
| Gazebo 1



3:45 PM to 4:30 PM
TRACK 1
| Crystal Pavilion




3:45 PM to 4:30 PM
TRACK 2
| Pacific Rim 2



3:45 PM to 4:30 PM
TRACK 3
| Pacific Rim 1








3:45 PM to 4:30 PM
TRACK 4
| Gazebo 1


4:30 PM to 5:30 PM


SheLeads Tech Panel: How Women are Making Their Mark in the Cybersecurity Landscape

Moderator: Karen Sandhu ISACA Vancouver Board Director & Chair SheLeadsTech

Panelists:
Teri Robb, Head North America Sales, Check Point Software Technologies
Vaishali Ghiya Sr. Director, Global Security Systems Engineering, Cisco
Diana Kelly Cybersecurity CTO, Executive Advisor, Technical Architect, Author, Microsoft
Jessie Adcock, Chief Technology Officer, Technology Services, City of Vancouver
Carol Vorster Vice-President & CIO, Corix Group of Companies



Targeting the Hidden Attack Surface of Automation
Carl Herberger, V.P. Security Solutions, Product Marketing, RADWARE

Every day, we hear about Artificial Intelligence (AI) invading more and more of everything around us. Within Information Security, we cannot get around new algorithms, new machine learning techniques and a rush to automate everything. However, have these new technologies paradoxically ushered in a completely new world of vulnerabilities? Radware explores a fascinating topic of how everything from APIs, to people are being attacked in a new hidden attack surface which has uniqueness to cloak and anonymize its designers and has incredible speed and efficiency in its attack types. In fact, this presentation will highlight how each step towards deeper and total connectivity comes with it consequences of protecting the very automation which is designed to make our world easy. In this session, you will take away the notion of how everything from humans to bots have weak undersides to automation and even AI interfaces can be duped into attacks


Cloud Security: Where to start and why?
Simon Wong, Security Specialist, Scalar Decisions


Security Architecture Panel
Moderator:
TBD
Panelists: TBD


Post Secondary: Career Panel
Speaker: Jo-Ann Smith


BREAK & VENDOR FAIR



My CEO told me we have to move our datacenter to the public cloud...So, what’s the big deal?

Grant Asplund, Principal Evangelist, Check Point / Dome9

In this session, we will discuss why today’s IT organizations require mature and complete native tools - built in the cloud for the cloud - which provide:

- Complete visibility
- Configuration management - Identity protection
- Secure DevOps
- Compliance Automation
- Governance Enforcement
- Environment Lockdown

We will discuss the subtle yet profound differences in operating your datacenter in the public cloud vs operating your own datacenter. We will discuss the ’Shared Responsibility Model’ and what it really means to you and your IT department as you expand the number of workloads you move to the public cloud. And, as your sophistication increases, and you expand your use of PaaS and IaaS, the complexities follow in tandem. We will show how today’s IT organizations require new, purpose-built tools designed and capable of ’speaking the same language’ as the public cloud infrastructures and built to leverage the extensive API’s they provide. We hope you’ll join us!


How to Build a Culture of Cybersecurity Awareness
Agustin Del Vento, MSC, ACC, Director, Change Champions Consulting
Emma Squires, Senior Change Consultant, Change Champions Consulting

Are you looking to turn your employees into your strongest security asset? Curious what some of Canada's leading organizations are doing to drive cybersecurity awareness? Join us in this interactive session hosted by Change Champions Consulting—experts in security awareness and digital transformations. You’ll learn best practices for running effective security awareness programs as well as essential steps to get one started at your organization. The session will close with a panel discussion featuring three leaders from some of BC’s most prestigious organizations who will share their perspectives and experiences in tackling cybersecurity awareness at their respective organizations. 

 About Change Champions Consulting 

Change Champions is a Vancouver-based change management consulting firm that addresses the ‘human’ element of digital transformation. In the cybersecurity space, we partner with organizations to maximize their IT security investments by turning employees into their strongest security assets. Our award-winning programs are used by some of Canada’s leading organizations and consistently drive tangible and sustainable results in cybersecurity. 



Technical Talk Track
Speaker: TBA
Presented by: Mainland Advance Research Society (MARS)



Topic: TBA
Speaker: TBA
Presented by: Tenable


Outsmarting Email Hackers Using AI and Machine Learning
Krista Laplante-Gaul, Sales Engineer, Trend Micro

Email hacking is a commonly used malicious tactic in our increasingly connected world. Cybercriminals compromise email accounts to enter the IT premises of an organization and carry out attacks ranging from fraud and spying to information and identity theft. Without effective security measures to stop email hacks, potential victims can suffer serious consequences.


Technical Talk Track
Speaker: TBA
Presented by: Mainland Advance Research Society (MARS)


Hitachi Wrap Up Reception, Award, Prize Draw & Vendor Fair