8:00 - 9:00 AM |
Networking Breakfast |
9:00 – 9:10 AM |
Welcome and Introductions
-
Dave Millier
Dave Millier is a Serial Entrepreneur, Off-road Motorcycle Rider & Food Lover. Dave has been involved in cybersecurity for over 20 years. In 2001 he founded an InfoSec company, Sentry Metrics, building one of Canada’s most successful MSSPs before selling the company in 2014. After the sale, Dave’s lifelong passion for reading led him to finally sit down and write his first book, Breached!
In late 2014, Dave launched Uzado (www.uzado.com), a Cloud-based InfoSec company focused on helping companies simplify Cybersecurity by answering the questions “what now?” or “what next?”. Dave is also the CSO of Quick Intelligence (www.quickintel.com) , a boutique VAR and cybersecurity consulting company, and is the CEO of MIDAC Solutions (www.midac.ca), a Managed IT services provider focused on small to mid-size clients. Dave recently launched Canada Rides (www.canadarides.com) , an off-road motorcycle training company headquartered in beautiful Simcoe County, providing off-road motorcycle and ATV safety training. Dave lives in Ontario with his wife Maria and their two cats.
In his spare time, Dave volunteers with the Ontario Federation of Trail Riders (www.oftr.ca) and is the Chairperson for the Motorcyclists Confederation of Canada (www.motorcycling.ca)
|
9:10 – 9:55 AM |
Keynote #1: AI and Cybersecurity – A Force Multiplier?
-
Ira Goldstein
Ira Goldstein is an entrepreneur and cybersecurity expert; he advises on business growth, risk and cybersecurity to public and private sector leaders in his role as CEO of Kernel Advisory. Ira's career has taken him from leading complex security programs to executing dozens of mergers and acquisitions and hundreds of technical projects across a wide range of sectors with companies around the world. He previously served as the Chief Operating Officer of Herjavec Group, a company which he helped build over more than a decade into a global cybersecurity provider, that was acquired by Apax Partners. Ira is a published thought leader specializing in emerging business trends in security, privacy and identity. He is an active member on corporate boards, including as the Executive Chairman of UltraViolet Cyber; board director for Flare, a digital footprint security software, and Carbide, a security and compliance automation platform. Ira also serves in a volunteer capacity as a board director of the Rogers Cybersecure Catalyst at Toronto Metropolitan University, and as a board director for United for Literacy, Canada's largest literacy organization. He is a proud father and husband who resides in Toronto.
|
10:00 – 10:45 AM |
Panel #1: How AI and Technology are Partnering to Deal with Current Cybersecurity Challenges
-
Dave Millier, Moderator
Dave Millier is a Serial Entrepreneur, Off-road Motorcycle Rider & Food Lover. Dave has been involved in cybersecurity for over 20 years. In 2001 he founded an InfoSec company, Sentry Metrics, building one of Canada’s most successful MSSPs before selling the company in 2014. After the sale, Dave’s lifelong passion for reading led him to finally sit down and write his first book, Breached!
In late 2014, Dave launched Uzado (www.uzado.com), a Cloud-based InfoSec company focused on helping companies simplify Cybersecurity by answering the questions “what now?” or “what next?”. Dave is also the CSO of Quick Intelligence (www.quickintel.com) , a boutique VAR and cybersecurity consulting company, and is the CEO of MIDAC Solutions (www.midac.ca), a Managed IT services provider focused on small to mid-size clients. Dave recently launched Canada Rides (www.canadarides.com) , an off-road motorcycle training company headquartered in beautiful Simcoe County, providing off-road motorcycle and ATV safety training. Dave lives in Ontario with his wife Maria and their two cats.
In his spare time, Dave volunteers with the Ontario Federation of Trail Riders (www.oftr.ca) and is the Chairperson for the Motorcyclists Confederation of Canada (www.motorcycling.ca)
-
-
Bhojraj Parmar
Security Consulting Manager
Bhojraj Parmar is a manager at Mandiant Consulting, where he works with executives across governments and critical, national infrastructure organizations.
Before joining Mandiant in 2019, Bhojraj led cyber security for the largest electricity and gas distributor and smart meter infrastructure provider in New Zealand with a growing presence in Australia.
He’s worked in the IT industry for 21 years, the last 14 of which focused in cyber security, helping establish and implement security programs and responding to cyber crisis events across Government, Non-Profit, Energy and Finance sectors.
-
Advait Deodhar
Vice President of Americas Sales Engineering
Advait Deodhar is a certified information systems security professional (CISSP) and has been in the Identity and Access Management space for 19 years. He is VP of a team of ForgeRock Solution Architects, whose goal is to understand a customer’s identity-related business initiatives, map them to technical capabilities, and architect solutions that deliver an insightful solution to address those business requirements. Advait has helped deliver successful and innovative identity and security solutions to Fortune 100 companies address varying challenges across many different industries.
-
Corey Smith
Vice President, Solutions Architect
As the Vice President of Solution Architecture, and the head of the Global Center of Excellence for Qualys, Corey Smith provides thought leadership and strategic direction to some of Qualys largest accounts as well as leading a team of security architects who provide technical expertise in areas such as DevSecOps, Cloud, Container, and EDR/XDR. Mr Smith has been in the cyber security space since 1998 with positions in support, consulting and security architecture at companies such as Symantec, CyberArk, Expanse, and Qualys.
|
10:45 - 11:05 AM |
Networking Break |
11:10 AM – 12:00 PM |
Keynote #2: Harnessing AI to Detect Stealthy Attacks Hiding in the Multi-Cloud Chaos
-
Ezz Tahoun
Ezz Tahoun is a distinguished cyber data scientist, who won awards at Yale, Northwestern and Princeton universities as well as prizes from CCCS, CSE, Microsoft, Trustwave and PIA. During his PhD studies in Univ of Waterloo, he had authored 19 papers, 4 open source projects, and was a reviewer for top conferences. He led innovative security projects for Royal Bank of Canada, Orange, Canarie, Huawei, Forescout, various governments, and others. He holds the following certifications: GIAC Advisory Board, GCIH, GSEC, GFACT, CEH, CISM, CRISC, PMP, GCP Prof Cloud Architect, and was an Adjunct Professor of Cyber Security.
|
12:00 - 1:10 PM |
Lunch |
1:15– 2:00 PM |
Keynote #3: What’s New in Cloud and Cybersecurity, Tactics and Techniques
Organizations everywhere have assets in the cloud or are drafting cloud strategies, but there are many things to keep in mind in managing a cloud computing environment. Cloud environments may be easy to set up but often the important details of audit, vendor management, compliance, and much more, are overlooked. Privacy laws have companies asking where their data resides. Companies must ensure the correct vendors agreements are in place, requiring rights to audit and compliance with legal and regulatory obligations. Organizations should clearly define vendor roles and responsibilities and ensure there are no gaps in key assignments in managing the security of the shared environment. If your organization is considering cloud computing or has one in place, we will discuss the multitude of considerations across the entire cloud life cycle.
-
Dr. Lisa McKee
Dr. Lisa McKee is a Founding Partner at American Security and Privacy, LLC. She has over 20 years of industry experience and provides virtual Data Protection Officer (vDPO) services including assessments, training, program development and leadership for companies internationally. Dr. McKee completed a Ph.D. in Cyber Defense with a dissertation in Privacy from Dakota State University. She is a highly regarded privacy expert and a regular featured speaker and keynote at global events including IAPP, ISACA, IIA and RSA. Dr. McKee is a member of the Accredited Standards Committee X9 providing input on industry standards and an APMG ISACA Certified Trainer. She is passionate about privacy and volunteers on boards for several professional groups, mentors, and teaches graduate students as an adjunct professor at several universities. She is the author of several publications and a Data Privacy Management textbook.
|
2:00 – 2:45 PM |
Panel #2: Equipping Cybersecurity and IT Staff to Work With AI
-
Ali Abbas Mehboob Hirji, PhD, Moderator
With over 16 years of experience, Ali has been a driving force in team development and leadership across various phases of the IT development lifecycle. His career milestones include pioneering the expansion of Durham College’s Cybersecurity Innovation Center and the establishment of their cutting-edge AI and Cybersecurity labs. Ali's leadership was pivotal in deploying applications and infrastructure aligned with ISO 27001 and NIST frameworks, while also crafting processes for SOC 2 level clearances.
Ali's career trajectory features senior roles at the Ontario Research and Innovation Optical Network (ORION). He spearheaded projects focused on remote connectivity, technical training implementation, and improved access to critical applications. Leading teams of up to 65 professionals, Ali's profound expertise in the cyber domain has earned him a province-wide reputation for his leadership and innovation.
Notably, Ali's influence stretches beyond his professional roles. He is a distinguished host of various tech shows, including the renowned Power Hour, and a sought-after panelist for esteemed forums such as the CISO Forum Canada. Ali's instructional prowess is evident through his roles as a highly respected lecturer at numerous institutions throughout Canada, where he imparts his extensive knowledge.
Ali's impact extends to his role in the cyber community. He has orchestrated the execution of tabletop exercises for the province of Ontario, showcasing his commitment to cyber preparedness. His reputation as an expert has led to consistent invitations to deliver bespoke cyber training programs across diverse sectors.
In his most recent venture, Ali undertook the leadership of the cyber training division at Youth Employment Services. Here, he spearheaded programming aimed at nurturing and elevating the skillsets of budding cyber enthusiasts. Simultaneously pursuing his PhD, Ali finds fulfillment in lecturing at esteemed institutions such as Seneca College, Georgian College, Toronto School of Management, University of Fredericton, and Algoma University, solidifying his commitment to knowledge dissemination.
Ali's remarkable journey culminates in his rich Durham College experience, where his pivotal role in advancing the Cybersecurity Innovation Center and steering AI and Cybersecurity labs stands as a testament to his enduring dedication to technological advancement and leadership excellence.
-
Dani Grabois
Chief Solutions Architect
-
Greg Young
VP of Cybersecurity and Corporate Dev
Greg Young is the Vice President of Cybersecurity and Corp Dev for Trend Micro.
Prior to joining Trend, Greg was a Research Vice President and analyst with Gartner for 13 years . He advised thousands of companies and government agencies on how to better secure themselves. He led research for network security, threat trends, data center security, and cloud netsec. He was lead author for more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits.
Greg was CISO for the Federal Department of Communications, served as chief security architect for a security product company, and headed several large security consulting practices.
As Captain Young, he served in the military police and counterintelligence branch working as a certifier/accreditor at the national authority. Greg received the Confederation Medal from the Governor General of Canada for his work with smart card security.
He currently is:
- co-chair for the federal government’s Forum on Digital infrastructure Resilience (CFDIR), and on its Working Groups for AI, and Supply Chain Resilience,
- on the federal National Cross Sectoral Forum (NCSF) for Critical Infrastructure,
- appointed by cabinet of the Government of Barbados as a member of their Cybersecurity Working Group, &
- co-host of the Real CyberSecurity Podcast
He mentions too often he was an extra in 2 episodes of Airwolf.
-
-
Edgar Ortiz
Director of Solution Architects - East
|
2:45 – 3:05 PM |
Networking Break |
3:05 – 3:50 PM |
Keynote #4: The Future of AI and Cybersecurity
A concept of AI surpassing human intelligence and disrupting life as we know, an AI apocalypse, has been explored by futuristic novels many times. In the current world, is this still just a fantasy? In the past few years AI has emerged as a transformative force and is integrating its way into every industry and every aspect of a human life. With increasing dependency on this technology, what are the realistic causes for concern?
In this talk, speakers will explore the future of integrating AI technology and impact of cybersecurity in preparation of an AI-driven world. Can lessons of the past prepare us for the future? Join this session to learn about emerging AI threats, challenges and opportunities in the field of AI and cybersecurity.
-
Helen Oakley
Helen Oakley, CISSP, GPCS, is a Lead Security Architect at SAP’s Global Security team, where she defines the strategy and architecture for software supply chain security, as well as requirements for implementation of security capabilities, driving security-by-design and privacy-by-design architecture across all software at SAP. Artificial Intelligence software is one of the technology categories that Helen addresses as part of her overall role, where security controls must incorporate not only the fundamental principles of application security but also specifics for AL/ML, such as AI model security, training data security and AI software transparency. Helen is working on AI software security research together with her colleagues at SAP, and contributing to AI-related forums by Linux Foundation.
Aside of her work at SAP, Helen is a Co-Founder of Leading Cyber Ladies - a global professional network for women in cybersecurity. Helen is on an advisory board for several cybersecurity startups where she is providing founders and their teams with guidance on the fast-paced cybersecurity market and industry and advising the C-Suite on their corporate security needs. Helen is an educator and a frequent speaker at various conferences, and she was honored by IT World Canada as Top Canadian Women in Cybersecurity for impactful cybersecurity achievements in the field.
www.linkedin.com/in/helen-oakley
-
Rhea Michael Anthony
Rhea Michael Anthony is a Product Security Specialist at SAP's Global Security Team. Her mission is to research and develop robust software product security and secure software development practices that support innovation and champion a security-first culture that impacts products across SAP. She is actively engaged in researching threats and safeguards for developing AI Software, for secure data consumption and secure model, to ensure security at the forefront of AI development. This also includes reviewing and adapting industry standards (eg: OWASP Top 10) and regulatory requirements (eg: EU AI Act) with consideration of SAP's diverse technology and use of open source software.
With prior experience as an Analytics and Machine Learning programmer, she understands the challenges of development which lends her a unique perspective in bridging the worlds of AI development and Secure Software, with a vision of innovating solutions where security and usability are intricately interwoven.
Rhea is an Engineer with a Master's Degree from the University of Texas at Dallas in Business Analytics, majoring in Data Science. She is a speaker and advocate for adopting cybersecurity as a way of life in both, business and personal context. In this ever-evolving landscape of technology, she values continuous learning and building strong collaboration with industry peers in fortifying the future of technology.
www.linkedin.com/in/rhea-michael-anthony
|
3:50 – 4:00 PM |
Closing Remarks |
4:00 - 5:00 PM |
Networking Reception |