CISO Toronto Summit | September 26, 2017 | Vantage Venues (formerly St. Andrew's Conference Centre) - Toronto, ON, Canada

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, September 26, 2017 - CISO Toronto Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

Presented by:

Rob Collins, Author, Consultant, The Value Imperative View details

 
 
 

8:10 am - 8:40 am

Keynote Presentation

What is The future of Information Security?

Information Security professionals have traditionally viewed themselves to be the judge and jury; the sole decision-makers of what will be accepted from a risk perspective. As a result, there is usually a disconnect in organizations between the information security team and the units responsible for driving the business that powers the organization. The actions of Information Security organizations results in business partners perceiving IS to be part of an ivory tower, accountable to no-one but themselves and uninformed regarding business needs; unapproachable and unresponsive. 

Take Aways: 

  • Transform organizations that are business focused and towards customer satisfaction 
  • Having full visibility to the initiatives that shape our organizations 
  • Manage our risks to levels that the business accepts with foresight and knowledge

Presented by:

Robert Hofstatter, Vice President, Global Information Security Operation Services, Scotiabank View details

 
 
 

8:45 am - 9:15 am

Share:

Keynote Presentation

HP Presents: The Mindset of Hacker

As Sun Tzu famously said, "to know your enemy, you must become your enemy." This session is a unique opportunity to do just that. Join Canada's most infamous reformed hacker, Michael "MafiaBoy" Calce, as he sheds light on the biggest threat to today's CISO. Michael's presentation will provide a unique perspective on hackers' motives and tactics by highlighting the more unique methods and entry points targeted by today's cyber criminals.

Sponsored by:

HP Inc. View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Machine Learning for Next Generation Threat Protection: A Glimpse of What Predictive Looks Like

Neural networks, brave new world, Skynet. Are we in the future? The buzzword in the security industry is big data, machine learning, and artificial intelligence. Every vendor is claiming to have these technologies in their products. However, what do these technologies really do, how do they work, and how will make your organization more secure? This talk will examine the details behind neural networks and how they are being used to help make detection of threats quicker, and how to they can protect networks much more efficiently. Lastly, we will examine where Fortinet is going with these technologies. 

Takeaways:  

  • How does machine learning fits into cybersecurity 
  • How does the next generation threats will look like 
  • What does machine learning brings to the table when fighting the unknown

Sponsored by:

Fortinet View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Executive Boardroom

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

Sponsored by:

PhishMe View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Share:

Think Tank

Evolving From Legacy To Achieve Digital Transformation

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.

Presented by:

Robert Wong, EVP & CIO, Toronto Hydro View details

 
 

Think Tank

Diversity in IT: The case of Women in Technology

As Jobs in technology related fields have grown by 22% in the last 10 years, more than any other profession, the number of women in these jobs have been steadily decreasing. This is not only a social issue affecting all of us but it is also a lost economic opportunity. This discussion will focus on what the current situation is in terms of women in STEM ( Science, Technology, Engineering, Math) related fields and technology related jobs, why are women under represented and what can be done to change the picture.

Takeaways: 

This will be an open discussion and we hope that participants can bring their own experiences and points of view to the table as well as any advice or solutions for the group to discuss and take away.

Presented by:

Maryam Ghiai, Vice President Corporate Technology, TD View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Realizing the Enterprise of Things - Securing Corporate IP, Data and Communications Across Multiple Endpoints

Organizations today need to securely enable their mobile workers, while allowing for a rich user experience - but how do you effectively balance the two as new device types proliferate and the lines between desktops, laptops, tablets, smartphones, wearables and even IoT blur? How does the enterprise stay in control? 

This session will examine best practices in approaching data security, endpoint management and communication & collaboration with wide support for different operating systems, form factors, and ownership models in your organization's Enterprise of Things journey.

Sponsored by:

BlackBerry View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Cyber Crime and Financial Crime: different sides of the same coin

Rapidly evolving technology and business channel has resulted in the cyber landscape becoming a core tool for criminals conducting all facets of financial crime. Modern day criminals seek to steal information and commit various types of conventional fraud with coordinated efforts that increasingly leverage cyber technologies.  

Industries coping with compliance and/or processing financial transactions are affected, including financial institutions, insurance companies, retailers, and government. For these organizations keeping pace with the evolution of technology is critical to Business Defense. In this session, we will discuss some of the key use cases in the emerging intersection of financial and cyber crime, and how businesses can start bridging the gap between two typically independent domains such the Chief Risk Officer (fraud and compliance) and the Chief Security Officer (cyber security and intelligence).

Sponsored by:

BAE Systems Applied Intelligence View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Security @ The Speed of Business

There is an urgent need to innovate on the part of the business. The reality of today's business mandates a more agile and innovative approach to security. The old guard of draconian security focused on technology, compliance, and boundaries of protection is no longer effective and has prevented security from having a seat at the business table. All this, when a shift in the threat landscape, and a real impact to the bottom line have negatively affected most organizations. This presentation will deep dive into practical, attainable and effective methods to shift the mentality and allow security organizations to function at the speed of business.

Takeaways:

  • The use of practical lightweight risk management
  • The need for a dynamic workforce, and material shift in focus from technology to business alignment.

Presented by:

Neumann Lim, Lead IT Network and Security Architect, Detour Gold Corporation View details

 
 

Think Tank

Artificial Intelligence and the Rise of Advanced Machine Learning

Often times the terms "Artificial Intelligence" and "Advanced Machine Learning" are thought of interchangeably and while there is a relationship between AI and AML, to say they are the same thing is an oversimplification and mis-classification. Rather the one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data for the purposes of making decisions in ways that first mimic, but ultimately surpass (in terms of speed at the very least) those of humans. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.

Takeaways: 

  • While initial focus of AML decision making will be focused on binary decision making (i.e. Yes/No) ongoing advancements will move things to the next level 
  • AI and AML are foundationally based on data and analytics -if these capabilities are not strong for you yet, investment is required 
  • The possibilities with AML are potentially boundless, with autonomous cars the most publicly visible at this point, from which every industry can benefit

Presented by:

Humza Teherany, CEO, Compass Digital Labs, North America View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty. 

Takeaways:  

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most. 
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization. 
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

Presented by:

Gale Blank, VP of IT, Holt Renfrew

 

Think Tank

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 

Takeaways: 

  • The pressure on CIO's to drive change has never been higher, but fortunately neither has the opportunity to do so
  • Disruptive technologies don't just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better 
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

Presented by:

Eric Whaley, COO & CIO, Wolseley Canada Inc.

 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Executive Boardroom

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ?immune system' technologies are capable of learning the ?self' of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

Rules and signatures are not keeping pace with today's rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why 100% network visibility allows you to detect threats as they happen, or before they happen
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ?immune system' technology

Sponsored by:

Darktrace View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Executive Boardroom

Turning a Trillion Rows of Security Threat Data into Actionable Gold

Having access to security big data is not enough. The real value lies in learning from it and generating actionable items that exponentially improve your security posture. After going through over a trillion rows of security data in the last 12 months, we've got some interesting findings to share. Expect to hear about: 

  1. Cutting-edge intrusion trends and tactics
  2. Common cybersecurity blind spots for enterprises
  3. Implementation-ready methods you can apply now to deter hacks

Sponsored by:

Symantec View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

APSA Mindset - An Integrated Approach to IT Compliance and Governance

The IT landscape has become more disruptive and complex resulting in a challenging environment to manage the enterprise effectively and efficiently. Adopting an integrated approach to (APSA) Architecture, Privacy, Security and Accessibility will leverage each area's strength and create a more stable environment to manage the future of the Enterprise.  

Takeaways: 

  • We need an integrated approach to manage the complexity of the Enterprise 
  • Enterprise Architecture, Privacy, Security and Accessibility provide a comprehensive and integrated approach to manage compliance and governance 
  • A more coordinated approach will break down the siloed effect within the Enterprise and improve its responsiveness and effectiveness

Presented by:

Claude Sam-Foh, Chief Enterprise Architect, Chief Security Officer, Financial Services Commission of Ontario View details

 
 

Think Tank

The Unbearable Lightness of Digital Transformation

Building a Disruptive Technology Digital team. To become fully digital enterprises, you need to shift the focus inward and innovate the employee experience. Is this defined as how employees feel about their organizations with regard to both opportunities for growth/skills development, and employees' willingness to continue to work for their current firms? Use digital DNA behaviors. 

Takeaways: 

  • Look after -Capability Planning, Innovation, Strategic Intelligence, Predictive Analytics, Disruptive Technology, Enterprise Architecture, Strategic Roadmap, M&A, Patents and Communication.

Presented by:

Scott Wu, VP Technology, Compass Group Canada View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Executive Boardroom

Sponsored by:

Agari View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Disruptive Technologies and How Organizations Should Respond

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. And now we have IOT, AI and natural language processing to consider...These new platforms allow organizations radically new ways of engaging with data to create dynamic relationships with clients and stakeholders. 

Takeaway:  

Finding the resources, wherewithal, and ability to commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome with sustained effort and organizational change and leveraging the right partners, skills and experiences to bear.

Presented by:

Samantha Liscio, SVP, Enterprise Planning & Reporting, eHealth Ontario View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Rob Collins, Author, Consultant, The Value Imperative View details

 
 

Panelists:

Michon Williams, Director, Marketing & Corporate Solutions Technology BMO, BMO Financial Group View details

 
 

Philip Armstrong, EVP & Global CIO, Great-West Lifeco Inc. View details

 
 

Robert Hofstatter, Vice President, Global Information Security Operation Services, Scotiabank View details

 
 

Maryam Ghiai, Vice President Corporate Technology, TD View details

 
 

Bobby Singh, Chief Information Security Officer, Global Head of Infrastructure Services, TMX Group View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Rob Collins, Author, Consultant, The Value Imperative View details

 
 
 

5:30 pm - 7:00 pm

Cocktail Reception