IN-PERSON

Toronto CISO Executive Summit

June 25, 2024 | Westin Harbour Castle

June 25, 2024
Westin Harbour Castle

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Creatively spurring diligence and communicating the importance of cyber hygiene to the organization

Outmaneuvering threats posed either by external parties or internal users of varying access

Thoughtfully leveraging AI to develop needed, business-enabling tools and processes

Toronto CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Toronto CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 24, 2024

June 25, 2024

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Join the Toronto CISO Governing Body for a night of outdoor food, drinks, peer networking, and summer-ready activities. This event is open to local security executives and invited guests. 

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Remarkable Resilience - Tools for Combating Toxic Stress & Burnout

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

Today’s CIOs & CISOs face daunting challenges. As the business leader in charge of adding value to the company, finding the right talent and inspiring technology innovation, there’s an incredible amount of pressure. It’s no surprise that CIOs & CISOs are experiencing burnout at unprecedented rates. While taking care of employees is important, how can CIOs & CISOs make sure they are taking care of themselves to help make their careers sustainable while maintaining a sense of well-being?

Join this keynote to explore:

  • Evidence-based strategies that can help alleviate burnout
  • How to recognize the signs and symptoms of toxic stress and burnout
  • How to remain engaged, energized, and focused during turbulent times

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Endpoint, Cloud and the Board — Identifying Risk that Matters

Tahmeed Khan headshot

Tahmeed Khan

Director, Global Information Security

Celestica

Corey Smith headshot

Corey Smith

Vice President of Solution Architects

Qualys

Prioritizing and eliminating the cyber risks that matter most is the ultimate goal of security leaders. But how do you validate that your efforts are hitting the mark? It all comes down to well-crafted measurements: metrics that are reliable and easily understood by all stakeholders across the business.

In this session, we will discuss:

  • Cybersecurity risk assessment essentials and which risks truly carry weight
  • Concrete approaches to determine effectiveness of security capabilities
  • Creating simple "metric cards" to communicate across stakeholders


9:40am - 10:25am  Breakout Session

30-60-90s for the Newly Hired or Nearly Retired

Bill Dunnion headshot

Bill Dunnion

CISO & VP Information Security

Mitel

Umar Hossain headshot

Umar Hossain

Global Leader, IT Infrastructure & Operations

Mattr

The importance of a 30, 60, or 90-day plan is a message largely reserved for incoming executives. There's a lot to say, however, for their benefit to more comfortable, veteran CISOs.

Join this interactive conversation to consider:

  • How writing a 30, 60, or 90-day plan could impact your program, new or established
  • Ways to ensure your plan isn't just effective, but excellent
  • When and how to check your plans in-practice effectiveness

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk – Doubling Down on Critical Vulnerabilities

Peter Ling headshot

Peter Ling

VP, Global Cybersecurity Partnerships & Cyber Resilience Programs

RiskRecon - A MasterCard Company

Craig Peppard headshot

Craig Peppard

VP & CISO

ivari

Grace Kennedy headshot

Grace Kennedy

VP, IT, Risk and Governance, CISO

Empire Life Insurance

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Qais Sattar headshot

Qais Sattar

Principal Solutions Architect

Expel

Daniel Zaman headshot

Daniel Zaman

Director, Cyber Security, Operations and Infrastructure

Holt Renfrew

Gennady Duchovich headshot

Gennady Duchovich

Head of Cybersecurity

Haventree Bank

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Breakout Session - Presented by Cyera

 Details Coming Soon...

11:05am - 11:50am  Breakout Session

CISO Priority Workshop & Industry Small Groups

Puroo Maheshwari headshot

Puroo Maheshwari

CISO, Portfolio Value Creation

CPP Investments

As the spotlight on security grows, so does the pressure to understand your organization’s unique security demands. Split into groups by industry, Toronto security executives will have a chance to hash out their goals and challenges with a select few who truly get it.

Join this interactive session to:

  • Engage with your most similar CISO peers
  • Validate strategies and uncover new ways of thinking
  • Gather proven, industry-specific, practices

11:05am - 11:50am  Executive Boardroom

Generative AI – Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Tom Bornais headshot

Tom Bornais

CISO

NAV CANADA

Edmond Georges headshot

Edmond Georges

CISO

Canadian Forces Base

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

11:05am - 11:50am  Executive Boardroom

Executive Boardroom - Hosted by Okta

Details Coming Soon...

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Advice for Embracing Our AI Future

Sam Curry headshot

Sam Curry

Global VP, CISO in Residence

Zscaler

Organizations that adopt the productivity promises of AI will outperform those that ignore its benefits. But behind that self-evident truth lies significant questions surrounding implementation, use cases, data privacy, business risk, and more. From the theoretical to the practical, unpack our current moment at the intersection of AI and humanity.

Join this session to learn:

  • How to safely and effectively embrace AI within your organization
  • The people, processes, and technologies needed to support this business evolution
  • How zero trust principles and critical thinking strategies should inform our AI embrace

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

A Table Top For Readiness and Respect

Paul Min headshot

Paul Min

VP, Technology Operations and Security

Cadillac Fairview

Drilling those outside the security function is a time-honored proactivity practice but, as it turns out, there’s more to be gathered there than interdepartmental threat readiness. Some have found these fabricated incidents the perfect backdrop to rehearse your C-Suite influence.

Gather and hear how CISOs:

  • Are translating table top reactions into leadership feedback
  • Have identified in-need executive relationships via threat simulation
  • Are making remediation plans that address security and culture needs

1:35pm - 2:20pm  Executive Boardroom

Governing Generative AI in your Organization

Anthony Scarfe headshot

Anthony Scarfe

Deputy CISO

Elastic

Abdul Karim headshot

Abdul Karim

Director IT Security & CISO

Unity Health Toronto

Anshul Srivastava headshot

Anshul Srivastava

CISO

Toronto Transit Commission

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join Elastic’s Deputy CISO, Anthony Scarfe, to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

1:35pm - 2:20pm  Executive Boardroom

Navigating Cybersecurity’s New Frontiers – Strategies for Resilience and Risk Mitigation

Peter Smetny headshot

Peter Smetny

Regional Vice President, Systems Engineering

Fortinet

Agnelo Dias headshot

Agnelo Dias

VP, Information Security & IT Risk

IGM Financial

Brenda McCulloch headshot

Brenda McCulloch

CISO

Teranet

In 2024, CISOs face a cybersecurity landscape characterized by evolving challenges and transformative opportunities. Whether balancing the risks and rewards of innovation, investing in proactive threat prevention, automation, and AI, or adopting nimble security models that reduce attack surfaces – the right cybersecurity strategies can enhance resilience and help mitigate risks amid rapid change.

Join this session to learn:

  • Crafting cybersecurity strategies for resilience.
  • Mitigating cybersecurity risks in a shifting landscape.
  • Optimizing team talent and resources to maximize protection

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Executive Boardroom

Reimagining SIEM for a Modern SOC

Zlatko Saric headshot

Zlatko Saric

Tech Strategist, CTO Americas

CrowdStrike

Shimul Bhattacharjee headshot

Shimul Bhattacharjee

Global Information Security Officer, Infrastructure & Operation

Holcim

The legacy SIEM has not met security operations needs and SOC teams are motivated to develop a remedy. Modernizing the SOC with AI and automation is one pathway for staying ahead of today’s critical security threats. By consolidating and simplifying all key data and threat intelligence in a single platform, SOCs can stop breaches faster, become more proactive, and demonstrate value.

Join this session to discuss how to:

  • Identify critical security events sooner and leverage AI to automate response and remediation
  • Consolidate siloed security tools and investments to increase SOC efficiency and optimize costs
  • Create unified visibility across all key data and threat intelligence

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Creative, Understandable, and User-Friendly Identity Solutions

Davis Arora headshot

Davis Arora

Senior Director of Cyber Security

Honeywell

The right identity processes can improve your security program and user experience at the same time. Getting to that point, though, will require vision, ambition, and the support of the business.

In this discussion between Honeywell's identity and security leaders you'll hear:

  • How major identity projects have already paid dividends for security
  • How they tailored authentication processes to meet the needs of the business
  • How those hoping to do the same can best approach garnering C-level support

4:45pm - 5:00pm  Closing Comments and Prize Drawing

June 24, 2024

June 25, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Harbour Castle
MORE INFORMATION

A block of rooms has been reserved at the Westin Harbour Castle at a reduced conference rate. Reservations should be made online or by calling 888-627-8559. Please mention EC5 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $469 CAD (plus tax) is June 3, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Nick Hall

Senior Community Program Manager

nick.hall@evanta.com