IN-PERSON

Toronto CISO Executive Summit

December 15, 2022 | Sheraton Centre Toronto

December 15, 2022
Sheraton Centre Toronto

Collaborate with your peers

Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Elevating the security practice and CISO role into strategic partners who manage cyber risk

Evolving traditional approaches and technologies in response to the expanding attack surface

Maturing IAM roadmaps and infrastructure to become more resilient against evolving demands

Toronto CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Zaki Abbas

Brookfield Asset Management
SVP, CISO

Michael Dundas

Manulife
AVP, Cyber Protection

Sandra Liepkalns

Choice Properties REIT
VP, Information Security & Data Governance

Ranjika Manamperi

Ontario Power Generation
VP Cybersecurity & CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Toronto CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 14, 2022

December 15, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this reception for attendees to open the event with an evening of peer networking and an opportunity to participate in a team building challenge. 

Team work, creativity, and perseverance, are just a few of the skills your team will need to win this unique Minute to Win it style game show! A combination of skill testing challenges and brain teasers will have your team firing on all cylinders. 

11:20am - 12:05pm  Breakout Session

Leveraging Pen Testing to Mitigate Risk

Fred Hopper headshot

Fred Hopper

VP, Security, Quality & Process Improvement

Giesecke+Devrient Mobile Security

Amirthan Gunanathan headshot

Amirthan Gunanathan

Director Technology Services and Solutions

Giesecke+Devrient Mobile Security

Mark McGinnis headshot

Mark McGinnis

Manager, Security

Giesecke+Devrient Mobile Security

As the attack surface continues to grow and the number of attacks increases, there still remains a gap when it comes to validating the effectiveness and accuracy of the enterprise’s cyber posture. Hackers are on 24/7, so how can CISOs validate their defenses like a hacker for round-the-clock assurance?

Join this interactive conversation to:

  • Organize and execute testing
  • Turn the report into an action plan
  • What to share with clients and auditors

11:20am - 12:05pm  Breakout Session

Build Your Backbone - Aligning IAM to Accelerate Strategy

Matt Duench headshot

Matt Duench

Sr. Director, Customer Identity Cloud

Okta

Customer Identity and Access Management is the backbone required to orchestrate and deliver digital business strategy. As these market dynamics shift and customer requirements evolve, organizations must adapt their CIAM strategies to meet the developing requirements.

Join this session to discuss:

  • Understanding and taking advantage of CIAM trends
  • Enabling consistent and trustworthy omnichannel experiences for customers and external partners
  • Tracking identity-centered security vulnerabilities in multi-cloud environments


11:20am - 12:05pm  Executive Boardroom

It Starts With People – Combating Data Loss and Insider Risk

John Checco headshot

John Checco

Resident CISO

Proofpoint

Michael Balenzano headshot

Michael Balenzano

Senior Manager, Canadian Server & Manufacturing Infrastructure

Wonderbrands

Nilesh Shastri headshot

Nilesh Shastri

CISO

Canadian Institute for Health Information

Data doesn’t move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. The growth in remote work from anywhere and everywhere has redefined the global security perimeter and increased the risk of insider-led data loss for organizations. At the same time, the frequency and volume of insider threats keeps rising, placing a significant burden on security teams to keep pace. Where do you start to stop insider threats?

Join this session to discuss:

  • Moving beyond legacy data loss prevention approaches
  • Managing insider threats and risks in your organization
  • Increasing visibility across multiple channels to accelerate incident response

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CxOs).

To reserve your seat, please contact Nick Hall at nick.hall@evanta.com

11:20am - 12:05pm  Executive Boardroom

Cybersecurity Insurance - What Price Will You Pay?

Assaf Afek-Levy headshot

Assaf Afek-Levy

CISO

GFL Environmental

Manas Giri headshot

Manas Giri

CISO

WestJet

At cyberattacks increase in sophistication and severity, financial losses have been acute. Because of this, Cybersecurity insurance is continuously evolving. Should your ransomware tool kit include cybersecurity insurance?

Join this roundtable session to discuss:

  • The current state of the cyber insurance market given increased frequency/severity of cyber events
  • Level of engagement needed from CISO’s to drive strong renewal results
  • What value is really afforded to organizations who carry cyber insurance

12:05pm - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Securing Digital Business Transformation Starts With Zero

Vinay Puri headshot

Vinay Puri

VP, Head of Security Architecture

Thomson Reuters

Osgood Vogler headshot

Osgood Vogler

Global Director - Enterprise Platforms

Celestica

Ben Corll headshot

Ben Corll

CISO - Americas

Zscaler

Digital transformation is a powerful business enabler that is compelling leaders to fundamentally change their technology ecosystems. The potential of technology to unlock value and drive progress has never been greater and the imperative to transform your business, securely, has never been more urgent. With data, users, and devices everywhere, how can CISOs reimagine cybersecurity in a world without boundaries?

Join this keynote to hear strategies on:

  • Accelerating transformation with innovative security services, and communicating their value to the business
  • Scaling and simplifying security across the organization, minimizing risk and gaining agility
  • Protecting today's cloud-first, hybrid workforce with a proactive, intelligent, and radically simple security architecture

1:10pm - 1:25pm  Break

1:25pm - 2:10pm  Breakout Session

Resonating with the Board — Translating Insight Into Action

Omar Al-Assaf headshot

Omar Al-Assaf

Bank Information Security Officer for the Americas

American Express

Unlike the CISO role of just a few years ago – where many could still focus heavily on the bits and bytes – today’s security leader is also expected to be a business leader. Uncover strategies with your peers to help you become fluent in the languages of risk, finance and strategy and to effectively convey your message, including:

  • How to educate your board on cybersecurity so they become champions for security in your company
  • What the board really wants to hear from CISOs
  • Which metrics will help you craft a compelling story that inspires action

1:25pm - 2:10pm  Breakout Session

Transforming Security for a Hybrid Future of Work

John MacDonald headshot

John MacDonald

Director, Productivity & Collaboration Practice

Google

Technology can transform the way teams operate and collaborate together in the modern era. CISOs need to constantly evolve while planning and prioritizing security strategies that work for their organization.

In this session, we will explore:

  • What impact the pandemic has had on overall organizational readiness
  • How security needs have evolved post-pandemic with a distributed workforce
  • Overall insights on zero trust and hybrid work, and how they influence strategic initiatives

1:25pm - 2:10pm  Executive Boardroom

Taking a Risk-Based Approach to Data Governance

Steve Ferrigni headshot

Steve Ferrigni

CISO and Director of Security

CSA Group

Shakeel Sagarwala headshot

Shakeel Sagarwala

AVP, CISO

Canadian Tire Bank

Organizations are increasingly moving towards a risk-based approach to security rather than focusing solely on compliance. With data and information at the heart of every organization, data governance and information security are key foundations for enterprise cybersecurity.

Join this session to discuss:

  • Strategies to take a risk-based approach to data governance
  • The role CISOs should play in data governance strategies
  • Creating the foundation for sustainable, trust-based data and analytics governance

1:25pm - 2:10pm  Executive Boardroom

User Access — Leveraging the Right Technologies

Davis Arora headshot

Davis Arora

Senior Director of Cyber Security

Honeywell

May Sarout headshot

May Sarout

Global Head, Identity and Access Management

Scotiabank

June Leung headshot

June Leung

Head of Identity & Access Management

Moneris

The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.

Join this boardroom to discuss:

  • What the essentials are for building an efficient IAM system
  • The challenges faced when protecting a hybrid workforce environment
  • Readying your staff when adopting a user access program

7:45am - 8:45am  Registration & Breakfast

8:45am - 9:30am  Keynote

Life after Breach

Mike Melo headshot

Mike Melo

VP Technology Shared Services & CISO

LifeLabs

There are two types of organizations — those that have been breached and those that will be. Data breaches may be inevitable and do not correlate with the maturity of cyber security programs. Financial services and defense organizations that spent hundreds of millions of dollars on building the most mature security programs still get breached. So, what happens after a breach? Is there still life after a data breach?

Join this keynote session with Mike Melo as he discusses:

  • Leading and navigating your company through a data breach and what to do to prepare for it
  • Communicating risk to the Board and building their confidence in your security program
  • Challenges and best practices in managing major security events

9:30am - 10:00am  Networking Break

10:00am - 10:45am  Breakout Session

Developing the Leaders of Tomorrow

Andrew Faber headshot

Andrew Faber

Director Security Technology Services

Toronto Pearson Airport

Samer Adi headshot

Samer Adi

CISO

Green Shield Canada

Craig Peppard headshot

Craig Peppard

VP & Group CISO

Wilton Re

As the role of the CISO becomes increasingly business-oriented, the skill set of today’s IT leader must become business-technology centric. CISOs are now challenged to identify and mentor those on their teams who possess both the technology skills and business leadership necessary to drive their organization into the future. Leaders have a responsibility to prepare their teams as they face an increasingly complex business and threat landscape.

Join this session to learn:

  • How to elevate the team you have
  • Tactics to upskill and mentor the next generation of talent
  • Sourcing and developing a robust and diverse leadership bench

10:00am - 10:45am  Breakout Session

Metrics for Success: How to Define Company Protection Needs

Sunil Chand headshot

Sunil Chand

VP, Cyber and Information Security Officer

Ontario Lottery and Gaming Corporation

CISOs can turn metrics into actionable, communicable data that protects the organization. Whether the metrics are used on the operational or executive sides of the organization, they can serve as important benchmarks. Metrics must also be packaged correctly and be consumable to effectively bridge communication gaps.

Join this session to:

  • Determine which metrics to prioritize
  • Share progress, or roadblocks, with peers
  • Gain a better understanding of the relevant numbers and data

10:00am - 10:45am  Executive Boardroom

Overcoming Hurdles to Execute a Security Automation Plan

Derek Browne headshot

Derek Browne

CISO

Northbridge Financial Corporation

Vishal Sharma headshot

Vishal Sharma

CISO

Achievers

Taking certain objectives out of the hands of your already-busy team members and putting them in the capable hands of an automated program ensures those objectives are accomplished, accomplished regularly and accomplished without human error. Of course, the security automation process comes with some unique challenges.

Let’s figure out:

  • Which of your more burdensome objectives best qualify for automation
  • How you can use the currently available tools to start the automation process
  • Processes your fellow CISOs have seen success in automating

10:00am - 10:45am  Executive Boardroom

Ahead of the Cloud — Flexible Solutions for a Moving Target

David Geevaratne headshot

David Geevaratne

SVP Sales

Uptycs

Umar Hossain headshot

Umar Hossain

Senior Director of IT Operations

Staples Canada

Manny Singh headshot

Manny Singh

Manager, Information Security Engineering

Hyundai Capital Canada

Ranjika Manamperi headshot

Ranjika Manamperi

VP Cybersecurity & CISO

Ontario Power Generation

Sometimes, cloud can seem like a "one size fits none" type of hurdle; Endpoints, Kubernetes, Containers, Workloads and Cloud Providers. One thing is certain, however — as the cloud landscape evolution continues to accelerate, so too should a CISO’s security strategies.

Join this boardroom to:

  • Gather practical takeaways and cloud solutions from your peers - what is working and what to avoid
  • Explore solutions to current, future and yet to be identified cloud security issues
  • Gain feedback on your organization's cloud priorities and what to focus on next

10:45am - 11:20am  Networking Break

10:50am - 11:15am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:10pm - 2:40pm  Networking Break

2:15pm - 2:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:45pm - 3:30pm  Breakout Session

#EpicFail – A Ransomware Choose Your Own Adventure

Deepak Upadhyaya headshot

Deepak Upadhyaya

CISO, Partner - Digital Tech and Risk

Baker Tilly International

Whether it comes from across the globe or down the street, the ever-looming threat of a ransomware attack is always in the back of the IT and security executive’s mind. Get your collaborative and creative juices flowing in this gamified choose your own adventure.

In this interactive session attendees will:

  • Collaborate to identify threat responses
  • Respond to choices and forces out of their control
  • Discuss pitfalls and best practices

2:45pm - 3:30pm  Breakout Session

Career Chess — Thinking Strategically about Your Next Move

Terence Lam headshot

Terence Lam

AVP Cyber & Technology Risk

Canadian Tire Corporation

Octavia Howell headshot

Octavia Howell

VP, CISO

Equifax Canada

Brent Thomas headshot

Brent Thomas

Incoming VP, Information Security & Compliance

Great Canadian Entertainment

In a world of evolving roles and responsibilities, it can be a challenge to decide where to make your next career move. Do you switch to a larger organization with more growth opportunity or move to a smaller company where you can have a larger impact? Peers who have made big moves will share their insight on how they view the chessboard of job progression.

Join this session to learn:

  • When to say 'yes' or 'no' to that next job
  • How to prioritize the right fit
  • Ways to proactively find new opportunities 

2:45pm - 3:30pm  Executive Boardroom

Delivering Trust and Confidence Through Resilience

Gennady Duchovich headshot

Gennady Duchovich

Head of Cybersecurity

Haventree Bank

Jeff Curtis headshot

Jeff Curtis

Chief Privacy Officer

Sunnybrook Health Sciences Centre

How did you fare after the latest round of disasters? Join an engaging peer-discussion on the best practices and new approaches for DR/BCM and crisis management. Discover answers to a variety of questions including:

  • What are your biggest challenges before, during and after a disaster?
  • What kind of scenario planning do you have in place?
  • What is the best way to utilize cyber insurance or legal resources?

2:45pm - 3:30pm  Executive Boardroom

Next Gen Third Party Risk

Faiza Kacem headshot

Faiza Kacem

Head Americas - Operational Resilience, Crisis Management, and Third Party Tech Risk

BNP Paribas Canada

Paul Min headshot

Paul Min

Head of Information Security and End User Experience

Cadillac Fairview

Jason Williams headshot

Jason Williams

Director, Security and Compliance

Aecon

In this era of digital transformation, organizations rely heavily on their third parties, however, third-party relationships come with risks. To help mitigate those risks CISOs much work closely with their partners to ensure security.

Join this session to discuss:

  • Strategies to establish a process for continuous assessment and monitoring of third parties
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

3:30pm - 3:45pm  Networking Break

3:45pm - 4:20pm  Keynote

The ROI of Creativity

Noah Scalin headshot

Noah Scalin

Artist, Innovation Consultant

Guest Speaker

The World Economic Forum named creativity one of the top must-have skills for success in all industries. It is the key to thriving in this era of rapid innovation and change. But very few organizations have truly invested in the development of this essential capability. Why? Because creativity is considered too intangible to measure, too messy to fit into a strategic plan or simply something that is only for a few specially talented people.  In this engaging presentation, Artist/Author Noah Scalin pulls back the curtain on his own creative practice to explain the real ROI of creativity.

In this session, we will learn:

  • Why creativity is a crucial skill for fostering innovation at your organization
  • How to use creativity strategically for long-term impact
  • Simple strategies that anyone can use to innovate, grow and inspire others

4:20pm - 4:50pm  Closing Reception & Prize Drawing

December 14, 2022

December 15, 2022

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Sheraton Centre Toronto
MORE INFORMATION

A block of rooms has been reserved at the Sheraton Centre Toronto at a reduced conference rate. Reservations should be made online or by calling 1-888-627-7175 . Please mention Toronto Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $199 CAD (plus tax) is November 28, 2022.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Nick Hall

Senior Program Manager

425-318-0488

nick.hall@evanta.com